Anyonefamiliar with this exit code of -1073741502. I am seeing this exit code fire for a number of endpoints in my environment. My action script entails starting services, and making a few registry changes. The ActionScript completed successfully on most systems. However, there are a handful of systems where I get back this weird exit code. Any ideas?
@dj0321, need more information. What OS was targeted (i.e. Windows, Mac, *NIX)? What command was executed via Action Script that returned this exit code? Have you checked with the OS and software vendors about this specific exit code?
So it appears that one of the commands from the wizardedit.reg is causing this error. Can you confirm that this REG file executes as expected when run locally by a local Admin? Have you tried enabling BESClient Debug Logging at 10000 and rerunning this fixlet/task to collect additional debug details?
The Registry Wizard generated that for me and I took it and added it to my action script. It works fine on other machines, but then I have machines firing back this exit code. Makes no sense. I will enable the debug logging. If anyone has another way I should write my action, please let me know. @cmcannady @JasonWalker
When this batch runs, it should create a c:\reset-nessus.log file containing both the command output and any error messages. You should be able to check that log and see if there were any error messages presented.
You should be able to log into Nessus with your old username and passwords If you get a corrupt global.db error. Stop the nessusd service, and re-copy global.db from your backup. Start Nessusd and it should be back to normal.
Hi Ro,
Glad to see that support was able to assist. Should this ever happen again (or if you experience any other issues), we always recommend contacting our support as they will always have the correct procedures and best practices to share. The fastest way to get a solution will be to log into
support.tenable.com and begin a chat session. Also, if you need additional support, please feel free to tag or PM me!
Unless somebody knows a way to set the timeout to something like 86400 seconds, I would like to use the API Access/Secret Key that I generate. The only problem I have is that I cannot find an example of how to list this with some bit of perl script using the Net::Nessus::REST module. Could somebody help me with the bit API Key of code that I could swap in for the create_session example above?
API KeysThese keys are generated per account through Nessus.session: keys or Nessus.users: keys and can be used to authenticate without creating a session.Add them to your request using the following HTTP header:
NESSUS was initially developed by SwRI for NASA to perform probabilistic analysis of space shuttle main engine components. SwRI continues to develop and apply NESSUS to a diverse range of problems including aerospace structures, automotive structures, biomechanics, gas turbine engines, geomechanics, nuclear waste packaging, offshore structures, pipelines, and rotordynamics. To accomplish this, the codes have been interfaced with many well-known third-party and commercial deterministic analysis programs.
The latest Nessus plugins must be downloaded and applied to Nessus before running scans to ensure the scan results are relevant and up to date. The Nessus plugins must be obtained from Tenable directly by using the Nessus plugin URL obtained from the Nessus offline activation page.
(Optional) If an HTML report is also required, instead choose Report Format HTML and whichever Report Template seems reasonable. The recommended report template is "Detailed Vulnerabilities By Plugin with Compliance/Remediation".
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Scan code before production deployment with Tenable Cloud Security CI/CD workflow integrations. Scan IaC, including Terraform and CloudFormation, to gain preventive context and risk prioritization. Developers can then quickly evaluate critical security alerts against industry standard benchmarks or custom policies and correct as needed.
Achieve and maintain compliance with non-disruptive agentless scanning, with less overhead and set-up that takes just minutes. Continuously scan infrastructure as code (IaC) against industry regulations and benchmarks, such as:
The Nessus Attack Scripting Language, usually referred to as NASL, is a scripting language that is used by vulnerability scanners like Nessus and OpenVAS. With NASL specific attacks can be automated, based on known vulnerabilities.
Tens of thousands of plugins have been written in NASL for Nessus and OpenVAS.[1] Files that are written in this language usually get the file extension .nasl. For the exploitation of a zero day attack it is possible for an end user of Nessus or OpenVAS to write custom code in NASL which is executed by these vulnerability scanners.
In earlier versions of Nessus, a binary called nasl or nasl.exe was provided that could interpret NASL code to perform vulnerability scans. In later versions of Nessus, this should be done via an API that is provided by this software.
If the plugin, in this example myzeroday.nasl, is placed in the same directory where other NASL plugins are located, it can also be included in standard scans by Nessus or OpenVAS, via the Web GUI or an API.
Many of the specifications of the formal language are similar to those of the programming language C and the scripting language Perl and those of other languages. Control flow such as the for loop, the if and if-else statements are part of the language and comments are preceded by a hash.
If you suspect that you ran the linking command from the wrong directory, then you'll need to run it again. This time, make sure that you're either in the folder where nessuscli is installed, or add the path to the command.
The agent hasn't installed
It is possible that your original install command contained errors (wrong filename, wrong path, name / NESSUS_NAME etc) so we would recommend going back and trying the installation process again.
Your system cannot reach out to tenable
You need to check that you are connected to the internet and that the agent can reach out to
cloud.tenable.com on port 443. (This is the only relevant firewall rule). When you are certain that the system is connected to the internet, try running the command again. If it still says "not linked to a manager" then you will need to try the installation process again.
An internet proxy/filter is getting in the way
The agent cannot connect to the manager, this could be due to internal network controls such as an outbound proxy. If your environment has these types of controls, please refer to documentation here, and use the proxy parameters on install to ensure the agent connects to the manager via the proxy.
Nessus is defined as a vulnerability scanner originally designed as a free tool by Renaud Deraison in 1998, which became a proprietary solution in 2005 after the release of the Nessus 3 and the launch of Tenable, Inc. a cybersecurity company co-founded by Deraison. This article explains the features and functionalities of the Nessus scanner.
Nessus is a vulnerability scanner designed initially as a free tool by Renaud Deraison in 1998, which became a proprietary solution in 2005 after the release of the Nessus 3 and the launch of Tenable, Inc, a cybersecurity company co-founded by Deraison.
The proprietary vulnerability scanner called Nessus was created by Tenable, Inc. Tenable.io, a service that requires a subscription. In addition, Tenable incorporates what was once known as Nessus Cloud, the Software-as-a-Service solution offered by Tenable. Nessus Essentials, formerly Nessus Home, a member of the Nessus family, enables you to scan your environment with the same quick, thorough evaluations and ease of agentless scanning that Nessus subscribers experience.
As an open-source network vulnerability scanner, Nessus uses the Common Vulnerabilities and Exposures architecture to make it easy for compliant security solutions to cross-link. The Nessus Attack Scripting Language (NASL), a straightforward language used by Nessus, is used to specify specific threats and potential attacks.
It checks a computer and sends an alert if it detects any security vulnerabilities that hackers could use to get into any of your computers connected to a network. It does this by checking a machine more than 1200 times to see if malicious actors could use any such attacks to get into the system or do other harm.
Like most scanners, Nessus is used during penetration testing and vulnerability assessments, including malicious assaults. It is a program that scans computers for security holes that hackers could exploit. When running on a computer, Nessus examines each port to see whether or not hackers may exploit any vulnerabilities to launch damaging attacks. Nessus will test each service once it has determined what is operating on each port to ensure no vulnerabilities.
Nessus is also free and open-source software, allowing developers to view and change the code however they see fit. Two primary pages make up the Nessus user interface: the scans page and the settings page. One can manage scan configurations on these pages and configure the scanner to operate in their system how they want it.
3a8082e126