Skip navigation
  • Home
  • Products & Services
    • AppSpider
    • Metasploit
    • Nexpose
    • InsightIDR
    • Data & Analytics
    • Incident Response
    • Security Strategy
  • Information Security
    • Overview
    • Research
    • Industry News
    • Industry Events
    • Internet Of Things
    • Legislation & Policy
  • Rapid7 News
    • Overview
    • Corporate News
    • International
    • New Hires
    • Rapid7 Events
    • Recruiting
    • Leader Perspectives
  • Discussions
    • All
    • AppSpider
    • Metasploit
    • Nexpose
    • InsightIDR
  • Blogs
    • All
    • AppSpider
    • Metasploit
    • Nexpose
    • InsightIDR
    • Information Security
    • Rapid7 News
    • Log in
    • Register
    0
  • Search
Cancel

HTML

Loading...
AppSpider
Web Application
Security
Metasploit
Penetration
Testing
Nexpose
Vulnerability
Management
InsightIDR
Incident Detection
and Response

Ask Rapid7 Community and Blog

Loading...

Browse

Loading...
All Content
Blog Posts
Documentation
Discussions
Videos
People
Spaces
 

Featured Space

Loading...
Rapid7 Community Site Help

Rapid7 Community Site Help

Having trouble accessing your Rapid7 Community account or resetting your password? Not sure where to post your question? Find help on using the Rapid7 Community here.

Popular Content

Loading...
  • Custom Default Password Vulnerability
  • How to add a third column, asset count, to an existing SQL query?
  • Cannot access Nexpose web portal
  • Scan Template Tweaking - Max Scan Processes Simultaneously
  • Discovery of ePO Assets in Nexpose
  • Mirai FAQ: When IoT Attacks
  • SQL report with Asset Group and its Assets
  • [oss-security] CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability, under active exploit
  • Ruby - Add Multiple Assets to site and Audit Report
  • SQL Query Export Example: Credential status

Popular Tags

Loading...
  • api
  • community
  • error
  • exploit
  • general
  • installation
  • metasploit
  • metasploit-community
  • metasploit-express
  • metasploit-framework
  • metasploit-pro
  • metasploit-release-notes
  • meterpreter
  • nexpose
  • penetration-testing
  • rapid7
  • release
  • release-notes
  • release_notes
  • report
  • reporting
  • scan
  • security
  • sql
  • update
View all

Newest Members

Loading...
  • Dave Rideout Dave Rideout
  • Luis Perez Luis Perez
  • John Jones John Jones
  • Riehaan Soebratie Riehaan Soebratie
  • fei sun fei sun
  • Pat Benecker Pat Benecker
View all newest members

Featured Blog Posts

Loading...

Latest Blog Posts

Loading...
Subject Author
NCSAM: The Danger of Criminalizing Curiosity 15 hours ago in Information Security by Amanda Fountain Employee Amanda Fountain
Discovery of ePO Assets in Nexpose 14 hours ago in Nexpose by Vanessa MacDougal Employee Vanessa MacDougal
Mirai FAQ: When IoT Attacks 2 days ago in Information Security by todb Employee todb
Nexpose integrates with McAfee ePO and DXL: The first unified vulnerability management solution for Intel Security customers! 2 days ago in Nexpose by Nathan Palanov Employee Nathan Palanov
Multiple Bluetooth Low Energy (BLE) Tracker Vulnerabilities 2 days ago in Information Security by todb Employee todb
More

Loading...

Recent activity around the Rapid7 Community

Filter
Set as default view
Filtered by:All Items
Agora Security
Agora Security in Metasploit5 minutes ago (Show moreShow less)
What's the best way to store MySQL credentials?
I'm planning to develop a module to search and obtain the credentials of a database GUI client. Anyhow the credentials found may be limited, for example a secure deployment of a DB should only allow access form localhost on the root user. My question is that the IP related to the credentials, what should it be? If I leave 127.0.0.1 it may be a… (Show moreShow less)
in MetasploitLike (0)
0 replies
Social News
  • Jay Rosenberger achieved level 1 in the Mission: Trendsetter
  • brian.w.gray achieved level 5 in the Mission: Validator
  • mr.moon achieved level 1 in the Mission: Trendsetter
  • Jay Rosenberger achieved level 1 in the Mission: Helper
  • Samuel Boateng achieved level 1 in the Mission: Trendsetter
  • Ken Mizota achieved level 1 in the Mission: Helper
  • smaske achieved level 63 in the Mission: Responder
  • Adrian Czebiniak achieved level 1 in the Mission: Helper
  • jaldridge achieved level 1 in the Mission: Helper
  • maria_d completed a Quest: Helpful
View More
xyclops M
xyclops M in Nexpose5 days ago (Show moreShow less)
[oss-security] CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability, under active exploit
[oss-security] CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability, under active exploit   Do we have any vulnerability check for this? If not how much time will it take to release the vuln check. Also is there any way we can make the vuln check through XML file and push it to all the Nexpose instances? Thanks ~XM  
in NexposeLike (5)
3 repliesShow more activityShow more activity
brian.w.gray marked Ken Mizota's reply as helpful
Latest Likes
  • brian.w.gray likes zeroorone's reply Re: Ruby - Add Multiple Assets to site and Audit Report
  • brian.w.gray likes Vanessa MacDougal's blog post Discovery of ePO Assets in Nexpose
  • zeroorone likes jnicoara11's reply Re: How to add a third column, asset count, to an existing SQL query?
  • jnicoara11 likes zeroorone's reply Re: How to add a third column, asset count, to an existing SQL query?
  • brian.w.gray likes Greg Wiseman's reply Re: Custom Default Password Vulnerability
  • Greg Wiseman likes Brandon Koelle's reply Re: Custom Default Password Vulnerability
  • zeroorone likes myra's reply Re: SQL report with Asset Group and its Assets
  • Scott Meyer likes royhodgman's blog post NCSAM: You Should Use a Password Manager
  • chris288 likes xyclops M's question [oss-security] CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability, under active exploit
  • chris288 likes mattspierce's reply Re: [oss-security] CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability, under active exploit
View More
Matters Most
Brandon Koelle
Brandon Koelle in Nexpose7 days ago (Show moreShow less)
Custom Default Password Vulnerability
I'm trying to add a custom vulnerability check for a specific username and password that are the defaults on a set of software and devices. I have been through the documentation on the community on this subject and have, what I believe, to be a decent grasp on it. However, I am running into it not functioning and would like someone with more… (Show moreShow less)
in NexposeLike (0)
20 repliesShow more activityShow more activity
brian.w.gray marked Greg Wiseman's reply as helpful
Kyle Flaherty
Kyle Flaherty Employee in Information Security3 weeks ago (Show moreShow less)
Rapid7 On Top in SANS Top 20 Critical Security Controls
Being great is, well… great, right? But as we all know it doesn’t happen in a vacuum, it’s an equation:   Greatness = Individual Excellence + Teamwork + Meaningful Customer Relationships   Coincidentally (or not), these items make up three of the five core values we strive towards here at Rapid7 – the other two play a role as well in ‘Disciplined… (Show moreShow less)
in Information SecurityLike (2)
13 commentsShow more activityShow more activity
Jay Rosenberger
Jay Rosenberger 4 hours ago (Show moreShow less)
What a Feat!   keep up the good work.
Like (0) Actions
Matters Most
Vanessa MacDougal
Vanessa MacDougal Employee in Nexpose14 hours ago (Show moreShow less)
Discovery of ePO Assets in Nexpose
As a corporate network grows and new locations are opened up, it becomes increasingly difficult for companies to keep track of and understand their total asset count and the associated risk exposure. Nexpose lets you easily discover all of your assets before a scan, but if that information is already in a great asset management tool like McAfee… (Show moreShow less)
in NexposeLike (1)
2 commentsShow more activityShow more activity
Jay Rosenberger
Jay Rosenberger 4 hours ago (Show moreShow less)
Sadly my new company doesn't use ePO but glad you have integrated! wish I could still take advantage of this.
Like (0) Actions
Matters Most
Matt Hathaway
Matt Hathaway Employee in InsightIDR1 week ago (Show moreShow less)
Displace SIEM “Rules” Built for Machines with Custom Alerts Built For Humans
If you’ve ever been irritated with endpoint detection being a black box and SIEM detection putting the entire onus on you, don’t think you had unreasonable expectations; we have all wondered why solutions were only built at such extremes. As software has evolved and our base expectations with it, a lot more people have started to wonder why it… (Show moreShow less)
in InsightIDRLike (1)
6 commentsShow more activityShow more activity
Jay Rosenberger
Jay Rosenberger 4 hours ago (Show moreShow less)
SIEM doesn't have to be as complicated as legacy systems made it.  i cant wait to maybe one day move to a product that works the way I believe it should. 
Like (0) Actions
Matters Most
todb
todb Employee in Information Security2 days ago (Show moreShow less)
Mirai FAQ: When IoT Attacks
Unless you've been blessed with some long DNS TTLs, you probably noticed that some name-brand chunks of the Internet seemed to go missing on Friday, October 21, including Twitter, GitHub, and Pandora. Over the weekend, it became clear that this was another (yes, another) IoT-based denial-of-service attack, where many thousands of devices with… (Show moreShow less)
in Information SecurityLike (0)
4 commentsShow more activityShow more activity
Jay Rosenberger
Jay Rosenberger 4 hours ago (Show moreShow less)
I wonder which incident, breach or attack will force us to look at finally implementing DNSSec and other technologies meant to prevent some of the root causes.
Like (0) Actions
People Updates
  • Chandy Bilugu, richard van Schaijik, Dave Rideout and 7 others
    • Luis Perez
    • John Jones
    • Riehaan Soebratie
    • chris288
    • Pat Benecker
    • Mochammad Muchlis Salam
    • 风 夜
    updated profile information
Load more items

Top Participants

Loading...
hdmoore
tdoan Employee
todb Employee
egypt Employee
sinn3r Employee
Maria Varmazis Employee
mglinski Employee
Matt Hathaway Employee
Rapid7 Learning Team Employee
jhart Employee

Recent Content

Loading...
  • What's the best way to store MySQL credentials?
  • Re: Custom Default Password Vulnerability
  • Re: [oss-security] CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability, under active exploit
  • Re: Cannot access Nexpose web portal
  • Re: Report on missing patches
  • Re: Scan Template Tweaking - Max Scan Processes Simultaneously
  • Re: Filter on Metasploit Exploit Skill Necessary
  • Re: How to add a third column, asset count, to an existing SQL query?
  • Re: Ruby - Add Multiple Assets to site and Audit Report
  • Discovery of ePO Assets in Nexpose in Nexpose
More
Get a feed of this content

@Rapid7

Loading...
  • Rapid7.com
  • Legal
  • Privacy Policy
  • Disclosure Policy
  • Export Notice
  • Partner Center
© 2016 Jive Software | Powered by Jive Software
Home | Top of page | Help
Jive Software Version: 2016.2.5.1, revision: 20160908201010.1a61f7a.hotfix_2016.2.5.1