You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
From Tenable security center, I downloaded the result of a scan (a zip archive with a .nessus file in it) and I uploaded this .nessus file in Faraday.
The vulnerabilities are partially imported:
The severity is always set to INFO (even for medium, high or critical vulnerabilities)
The description is not imported (only the technical details)
Expected results
Maybe I'm not using the correct workflow (Tenable Security Center does not permet direct export to XML, only PDF and CSV) but as far as most of the data are well imported, I guess that the missing severity and description are bugs.
Debugging tracebacks (current results)
# faraday-client --cli --workspace audit_xxx --report /home/xxx/137.nessus
_____ .___
_/ ____\_____ ____________ __| _/_____ ___.__.
\ __\ \__ \ \_ __ \__ \ / __ | \__ \ < | |
| | / __ \_| | \// __ \_/ /_/ | / __ \_\___ |
|__| (____ /|__| (____ /\____ | (____ // ____|
\/ \/ \/ \/ \/
[*[ Open Source Penetration Test IDE ]*]
Where pwnage goes multiplayer
2020-09-30T10:39:25+0200 - faraday_client.start_client - INFO {MainThread} [start_client.py:323 - printBanner()] Starting Faraday IDE.
2020-09-30T10:39:25+0200 - faraday_client.start_client - INFO {MainThread} [start_client.py:435 - main()] Dependencies met.
2020-09-30T10:39:25+0200 - faraday_client.start_client - INFO {MainThread} [start_client.py:279 - checkConfiguration()] Checking configuration.
2020-09-30T10:39:25+0200 - faraday_client.start_client - INFO {MainThread} [start_client.py:280 - checkConfiguration()] Setting up ZSH integration.
2020-09-30T10:39:25+0200 - faraday_client.start_client - INFO {MainThread} [start_client.py:282 - checkConfiguration()] Setting up user configuration.
2020-09-30T10:39:25+0200 - faraday_client.start_client - INFO {MainThread} [start_client.py:268 - setupXMLConfig()] Using custom user configuration.
2020-09-30T10:39:25+0200 - faraday_client.start_client - INFO {MainThread} [start_client.py:183 - setConf()] Setting configuration.
Please provide your valid Faraday credentials for http://localhost:5985
You have 3 attempts.
Username (press enter for faraday):
Password:
2020-09-30T10:39:57+0200 - faraday_client.start_client - INFO {MainThread} [start_client.py:416 - login()] Login successful: faraday
2020-09-30T10:39:58+0200 - faraday_client.start_client - INFO {MainThread} [start_client.py:215 - start_faraday_client()] All done. Opening environment.
2020-09-30T10:39:58+0200 - faraday_client.start_client - INFO {MainThread} [start_client.py:221 - start_faraday_client()] Main application ExceptHook enabled.
2020-09-30T10:39:58+0200 - faraday_client.start_client - INFO {MainThread} [start_client.py:224 - start_faraday_client()] Starting main application.
2020-09-30T10:39:58+0200 - faraday_client.model.api - INFO {MainThread} [api.py:117 - _setUpAPIServer()] XMLRPC API server configured on ('localhost', 9876)
2020-09-30T10:39:58+0200 - faraday_client.apis.rest.api - INFO {MainThread} [api.py:66 - startAPIs()] REST API server configured on ('localhost', 9977)
2020-09-30T10:39:58+0200 - faraday_client.managers.reports_managers - INFO {MainThread} [reports_managers.py:99 - sendReport()] The file is /home/xxx/137.nessus, nessus
2020-09-30T10:39:58+0200 - faraday_client.plugins.controller - INFO {MainThread} [controller.py:256 - processReport()] Processing report with plugin nessus
2020-09-30T10:40:26+0200 - faraday_client.plugins.controller - INFO {MainThread} [controller.py:139 - processOutput()] Sent command duration 200
2020-09-30T10:40:26+0200 - faraday_client.model.api - INFO {MainThread} [api.py:499 - log()] Closing Faraday...
Tenable support gave me the answer : "You may need to turn on the "XML Enable Plugin Attributes" setting on your Nessus scanners. This is a setting that needs to be configured directly on the scanner, and not from Tenable.sc"
Issue Type
Faraday version
Faraday 3.12
Component Name
Nessus plugin
Steps to reproduce
From Tenable security center, I downloaded the result of a scan (a zip archive with a .nessus file in it) and I uploaded this .nessus file in Faraday.
The vulnerabilities are partially imported:
Expected results
Maybe I'm not using the correct workflow (Tenable Security Center does not permet direct export to XML, only PDF and CSV) but as far as most of the data are well imported, I guess that the missing severity and description are bugs.
Debugging tracebacks (current results)
requirements_freeze.txt
Screenshots
OS
Linux 5.7.0-kali3-amd64 #1 SMP Debian 5.7.17-1kali1 (2020-08-26) x86_64 GNU/Linux
The text was updated successfully, but these errors were encountered: