Tenable Activation Code

0 views
Skip to first unread message

Rosham Rosebure

unread,
Aug 5, 2024, 2:34:31 PM8/5/24
to thumbdeskrakoo
HiI was working on the vulnerability rescan (tenable sc) but getting an error:

Error: Invalid response code received from TenableSCScanner: 403 - Please specify a Scan Zone.



Can anyone please help me with this?


Ultimately this issue is two fold, it seems when a customer has configured Scan Zones there is an option to remove the Default Scan Zone (which has an ID of 0). By the Tenable documentation, the Default Scan Zone (ID 0) is "All Zones."


Otherwise essentially someone (I am in contact with ServiceNow and seeing if we can get this request added) will need to import the Zones from Tenable (docs here: -center/api/Scan-Zone.htm#ScanZoneRESTReference-/zone), then modify the TenableSCScanner script include to dynamically find the Scan Zone by checking if the IP Address that is being requested for a Re-Scan is in the defined zones ipList (one of the fields on the zone). Then add that zone to the REST call.


The Nessus vulnerability scanner allows you to perform compliance audits of numerous platforms including (but not limited to) databases, Cisco, Unix, and Windows configurations as well as sensitive data discovery based on regex contained in audit files. Audit files are XML-like text files that contain the specific configuration, file permission, and access control tests to be performed.


The Tenable AuditLang extension for VS Code assists with creating and modifying Tenable .audit files. Core features include syntax highlighting, audit check snippets, and command shortcuts for supporting content such as Compliance Checks reference documentation, download links, etc.


The extension provides snippets for common check types. Currently the most common Windows and Unix check types have been added, with additional check types added in future releases. If you start typing windows or unix in an open .audit file, a pop up will apppear with the snippets that match.


There are several command shortcuts provided by the extension. To see the list click View > Command Palette. All commands provided by this extension start with Tenable AuditLang.


This extension works in conjunction with the tenable/audit-utils container to provide plugin level parse checking. In the problems section any issues detected during parse checking will be listed. In the example below, an error is displayed because a check was given an invalid type.


Scan code before production deployment with Tenable Cloud Security CI/CD workflow integrations. Scan IaC, including Terraform and CloudFormation, to gain preventive context and risk prioritization. Developers can then quickly evaluate critical security alerts against industry standard benchmarks or custom policies and correct as needed.


Achieve and maintain compliance with non-disruptive agentless scanning, with less overhead and set-up that takes just minutes. Continuously scan infrastructure as code (IaC) against industry regulations and benchmarks, such as:


Tenable One Exposure Management Platform enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks, and accurately communicate cyber risk to support optimal business performance.


On February 23, VMware released a security advisory (VMSA-2021-0002) to address two vulnerabilities in vCenter Server, a centralized management software for VMware vSphere systems, as well as a vulnerability in the VMWare ESXi hypervisor.


The most notable vulnerability disclosed as part of this advisory is CVE-2021-21972, a critical remote code execution (RCE) flaw in vCenter Server. The vulnerability was discovered and disclosed to VMware by Mikhail Klyuchnikov, a security researcher at Positive Technologies.


In recent years, Klyuchnikov has been credited with discovering and disclosing critical vulnerabilities that were later exploited by attackers in the wild. These include CVE-2019-19781, a critical vulnerability in Citrix Application Delivery Controller (ADC) and Gateway, and CVE-2020-5902, a critical vulnerability in F5 BIG-IP.


CVE-2021-21972 is an unauthorized file upload vulnerability in vCenter Server. The issue stems from a lack of authentication in the vRealize Operations vCenter Plugin. It received a critical CVSSv3 score of 9.8 out of 10.0. An unauthenticated, remote attacker could exploit this vulnerability by uploading a specially crafted file to a vulnerable vCenter Server endpoint that is publicly accessible over port 443. Successful exploitation of this vulnerability would result in an attacker gaining unrestricted RCE privileges in the underlying operating system of the vCenter Server.


On February 24, just one day after VMware published their advisory, Troy Mursch, chief research officer at Bad Packets, tweeted that mass scanning activity has been detected searching for vulnerable vCenter servers.


If upgrading is not feasible at this time, VMware has provided workaround instructions for CVE-2021-21972 and CVE-2021-21973 that involve a change to the compatibility matrix file and setting the vRealize Operations vCenter Plugin to incompatible.


Satnam joined Tenable in 2018. He has over 15 years experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spam bots on Tinder. He's appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.


Interests outside of work: Satnam writes poetry and makes hip-hop music. He enjoys live music, spending time with his three nieces, football and basketball, Bollywood movies and music and Grogu (Baby Yoda).


Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.


Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.


Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.


I was reaching out to see if anyone has come across issues connecting Tenable.sc add-on to Splunk. I downloaded the Tenable application and add-on, and I was able upload to Splunk. My issue is getting Tenable to connect to Splunk. When I try with credentials, I receive the following error, "Please enter valid address, username and password, or configure valid proxy settings or verify SSL certificate." When trying with API keys, I receive the following error, "Please enter valid address, access key, secret key, or configure valid proxy settings. I have verified credentials and API keys multiple times. Can anyone help with this? Thank you.


Looking at tenable_account_validation.py that error is unfortunately just as vague as it looks. Funnily enough, the ConnectionError exception that's raised to trigger that exception is decently verbose but for some reason the TA Devs have decided to mask it with that generic error you're seeing.


If you're comfortable with it, you could temporarily modify the TA to include the verbose exception details. I've also included some more generic troubleshooting steps to help if you'd rather not touch the code.


Does the same command work with SSL Verification (no -k)? If not, then you're probably using a self-signed certificate for your Tenable SC instance. Tenable does not support self-signed certificates on their SDK, but you could modify the TA slightly to support it. A quick look through the code shows that it leverages the restfly library so you could update the APISessions base class to support your self-signed certificate. Do this as your own risk, it will be a trade-off between SSL verification and upstream support.


(Replacing 123 with the appropriate keys) does this return the same content as the previous commands? If not and you receive a login denied message instead, validate that your credentials are correct and API key login is enabled on the SC instance.


If you suspect that you ran the linking command from the wrong directory, then you'll need to run it again. This time, make sure that you're either in the folder where nessuscli is installed, or add the path to the command.


The agent hasn't installed

It is possible that your original install command contained errors (wrong filename, wrong path, name / NESSUS_NAME etc) so we would recommend going back and trying the installation process again.


Your system cannot reach out to tenable

You need to check that you are connected to the internet and that the agent can reach out to cloud.tenable.com on port 443. (This is the only relevant firewall rule). When you are certain that the system is connected to the internet, try running the command again. If it still says "not linked to a manager" then you will need to try the installation process again.


An internet proxy/filter is getting in the way

The agent cannot connect to the manager, this could be due to internal network controls such as an outbound proxy. If your environment has these types of controls, please refer to documentation here, and use the proxy parameters on install to ensure the agent connects to the manager via the proxy.


The Nessus Attack Scripting Language, usually referred to as NASL, is a scripting language that is used by vulnerability scanners like Nessus and OpenVAS. With NASL specific attacks can be automated, based on known vulnerabilities.


Tens of thousands of plugins have been written in NASL for Nessus and OpenVAS.[1] Files that are written in this language usually get the file extension .nasl. For the exploitation of a zero day attack it is possible for an end user of Nessus or OpenVAS to write custom code in NASL which is executed by these vulnerability scanners.

3a8082e126
Reply all
Reply to author
Forward
0 new messages