Hello all,
I'm having trouble with a scan from the commandline not creating a report.
The entire scan appears to run, but the /tmp/nessus-XXXXXX file does not
exist and the .nsr report is never generated.
I apologize for the message length... just wanted to be thorough.
Some questions, too:
o I remember seeing something searching through the mail list where
Renaud described using the KB to create a session, and using restore to
create the report... Since restore is part of my problem, here... Is there
any way to create a report either from the raw KB data or from the
<user>/sessions/*-data file?
o Are there any mail list archives other than msgs.securepoint.com
that have a better search engine? :-)
TROUBLESHOOTING:
Original scan command:
nessus -V -q localhost 1241 jpiterak password location.nsr
...This failed, as I mentioned above
Attempted restore command:
[root@scanner location]# nessus -V -R 20020619-172115 -q localhost
1241 jpiterak password location.nsr
The restore appears to go well, ending with:
attack|10.5.5.10|836|845|WFTP RNTO DoS
attack|10.5.5.10|837|845|wu-ftpd SITE NEWER vulnerability
attack|10.5.5.10|838|845|Too long authorization
attack|10.5.5.10|839|845|Too long POST command
attack|10.5.5.10|840|845|wwwwais
attack|10.5.5.10|841|845|XMail APOP Overflow
attack|10.5.5.10|842|845|XTramail control denial
attack|10.5.5.10|843|845|XTramil MTA 'HELO' denial
attack|10.5.5.10|844|845|Xtramail pop3 overflow
attack|10.5.5.10|845|845|Apache chunked encoding
[1]+ Done nessus -V -R 20020619-172115 -q localhost 1241 jpiterak
password location.nsr
... But this does not write an output file.
[root@scanner location]# updatedb
[root@scanner location]# locate .nsr
/root/reports/location/location_partial.nsr
...Which is an older report (ie: this build WAS producing reports at one
time...)
So I tried an strace on the process
[root@scanner location]# strace -o nessus.trace -f -s 256 nessus -V
-R 20020619-172115 -q localhost 1241 jpiterak password location.nsr
(...This of course ended with the same output and same result)
Some configuration information:
[root@scanner /etc]# cat redhat-release
Red Hat Linux release 7.1 (Seawolf)
[root@scanner linux]# uname -a
Linux scanner.c-i-s.net 2.4.5 #3 Fri Dec 28 11:50:25 EST 2001 i686
unknown
[root@scanner location]# gcc --version
2.96
[root@scanner location]# nessusd -v
nessusd (Nessus) 1.2.2 for Linux
(C) 1998, 1999, 2000 Renaud Deraison <[EMAIL PROTECTED]>
[root@scanner location]# nessus -v
nessus (Nessus) 1.2.2 for Linux
(C) 1998, 1999, 2000 Renaud Deraison <[EMAIL PROTECTED]>
SSL used for client - server communication
>From ~/.nessusrc:
begin(SERVER_PREFS)
detached_scan_email_address = [EMAIL PROTECTED]
save_session = yes
save_empty_sessions = yes
detached_scan = no
continuous_scan = no
diff_scan = no
max_checks = 20
log_whole_attack = yes
cgi_path = /cgi-bin:/scripts
port_range = 1-45000
optimize_test = yes
language = english
per_user_base = /usr/local/var/nessus/users
checks_read_timeout = 15
delay_between_tests = 1
non_simult_ports = 139
plugins_timeout = 160
safe_checks = yes
auto_enable_dependencies = no
save_knowledge_base = yes
kb_restore = yes
only_test_hosts_whose_kb_we_dont_have = no
only_test_hosts_whose_kb_we_have = no
kb_dont_replay_scanners = no
kb_dont_replay_info_gathering = no
kb_dont_replay_attacks = no
kb_dont_replay_denials = no
kb_max_age = 864000
plugin_upload = no
plugin_upload_suffixes = .nasl
max_hosts = 20
end(SERVER_PREFS)
---------------------
Now for some session information...:
[root@scanner sessions]# tail -25 20020620-101955-data
s:a:10.5.5.10:829:845
SERVER <|> HOLE <|> 10.5.5.10 <|> ftp (21/tcp) <|> You seem to be
running an FTP server which is vulnerable to the\n'glob heap corruption'
flaw.\nAn attacker may use this problem to execute arbitr
ary commands on this host.\n\n*** As Nessus solely relied on the
banner of the server to issue this warning,\n*** so this alert might be a
false positive\n\nSolution : Upgrade your ftp server softwar
e to the latest version.\nRisk factor : High\n\nCVE :
CAN-2001-0550\n <|> 10821 <|> SERVER
s:a:10.5.5.10:830:845
s:a:10.5.5.10:831:845
s:a:10.5.5.10:832:845
s:a:10.5.5.10:833:845
s:a:10.5.5.10:834:845
s:a:10.5.5.10:835:845
s:a:10.5.5.10:836:845
s:a:10.5.5.10:837:845
s:a:10.5.5.10:838:845
s:a:10.5.5.10:839:845
s:a:10.5.5.10:840:845
s:a:10.5.5.10:841:845
s:a:10.5.5.10:842:845
s:a:10.5.5.10:843:845
s:a:10.5.5.10:844:845
s:a:10.5.5.10:845:845
SERVER <|> HOLE <|> 10.5.5.10 <|> http (80/tcp) <|> \nThe remote
host is using a version of Apache which is\nolder than 1.3.26 or
2.0.39\n\nThis version is vulnerable to a bug which may allow an\n
attacker to gain a shell on this system or to disable this\nservice
remotely.\n\n\nSolution : Upgrade to version 1.3.26 or 2.0.39 or newer\nSee
also : http://httpd.apache.org/info/security_bulletin_2
0020617.txt\nRisk factor : High\nCVE : CAN-2002-0392\n <|> 11030 <|>
SERVER
SERVER <|> FINISHED <|> 10.5.5.10 <|> SERVER
<|> SERVER
Note: I also tried lopping off the last line, which looked extraneous
(looking at the pattern of the file) to no effect
[root@scanner sessions]# cat 20020620-101955-index
10.5.5.1,10.5.5.9,10.5.5.10,10.5.5.12,10.5.5.13,10.5.5.15,10.5.5.18,10.5.5.2
0,10.5.5.21,10.5.5.23,10.5.5.40-45,10.5.5.51,10.5.5.96,10.5.5.149,10.5.5.238
10.5.5.12
10.5.5.18
10.5.5.41
10.5.5.13
10.5.5.15
10.5.5.20
10.5.5.23
10.5.5.40
10.5.5.42
10.5.5.43
10.5.5.44
10.5.5.45
10.5.5.51
10.5.5.96
10.5.5.238
10.5.5.9
10.5.5.1
10.5.5.21
10.5.5.149
10.5.5.10
...So, the scanner looks like it finished everything.
[root@scanner sessions]# tail -25
/usr/local/var/nessus/logs/nessusd.messages
[Wed Jun 19 18:16:50 2002][22164] user jpiterak : launching
apache_chunked_encoding.nasl against 10.5.5.10 [22806]
[Wed Jun 19 18:16:51 2002][22164] apache_chunked_encoding.nasl
(process 22806) finished its job in 0.44 seconds
[Wed Jun 19 18:17:01 2002][22164] ntp_overflow.nasl (process 22791)
finished its job in 15.10 seconds
[Wed Jun 19 18:17:01 2002][22164] Finished testing 10.5.5.10. Time :
2797.31 secs
[Wed Jun 19 18:17:01 2002][22142] user jpiterak : test complete
[Wed Jun 19 18:17:01 2002][22142] user jpiterak : Kept alive
connection
[Wed Jun 19 18:17:01 2002][22142] Communication closed by client
[Wed Jun 19 18:21:53 2002][21709] connection from 127.0.0.1
[Wed Jun 19 18:21:54 2002][21709] same client 127.0.0.1 has
connected twice - blocking for a while
[Wed Jun 19 18:21:54 2002][22828] Client requested protocol version
12.
[Wed Jun 19 18:21:54 2002][22828] successful login of jpiterak from
127.0.0.1
[Wed Jun 19 18:22:01 2002][22828] Redirecting debugging output to
/usr/local/var/nessus/logs/nessusd.dump
[Wed Jun 19 18:22:05 2002][22828] user jpiterak : session will be
saved as /usr/local/var/nessus/users/jpiterak/sessions/20020619-182205-index
[Wed Jun 19 18:22:05 2002][22828] user jpiterak restores session
20020619-172115, with max_hosts = 20
[Wed Jun 19 18:32:38 2002][22828] user jpiterak : Kept alive
connection
[Wed Jun 19 18:32:38 2002][22828] Communication closed by client
[Thu Jun 20 10:15:31 2002][21709] connection from 127.0.0.1
[Thu Jun 20 10:15:33 2002][21709] same client 127.0.0.1 has
connected twice - blocking for a while
[Thu Jun 20 10:15:33 2002][25287] Client requested protocol version
12.
[Thu Jun 20 10:15:33 2002][25287] successful login of jpiterak from
127.0.0.1
[Thu Jun 20 10:18:54 2002][25287] Redirecting debugging output to
/usr/local/var/nessus/logs/nessusd.dump
[Thu Jun 20 10:19:55 2002][25287] user jpiterak : session will be
saved as /usr/local/var/nessus/users/jpiterak/sessions/20020620-101955-index
[Thu Jun 20 10:19:56 2002][25287] user jpiterak restores session
20020619-172115, with max_hosts = 20
[Thu Jun 20 10:30:48 2002][25287] user jpiterak : Kept alive
connection
[Thu Jun 20 10:30:48 2002][25287] Communication closed by client
...And here, too -- Though note the ntp_overflow.nasl test that doesn't show
up in the *-data file.
>From an earlier posting, Renaud had mentioned that the .nsr report gets
written to a temp file in $TMP or /tmp as it is generated.
>From the strace:
...
25286 unlink("/tmp/nessus-aGihDA") = 0
25286 munmap(0x40018000, 4096) = 0
25286 _exit(0) = ?
Looking through the full strace output shows:
[root@scanner reports]# grep -n -6 -e '/tmp/nessus-aGihDA'
nessus.trace
1270553-25286 alarm(20) = 0
1270554-25286 write(3,
"\27\3\1\0P\220\357\306\0\372_8\211\200\307\377<\326~6Z\322\324]\352XB\213\3
344\10\220\256\215\312\274\373\347\\\267\307\tc\321d!\16\236
_\'\32h\36658\22\312j\344Em8\246\317\320\7\275K\344\232\1771\30\210.\332%/\3
4\252x\357\213\361", 85) = 85
1270555-25286 alarm(0) = 20
1270556-25286 rt_sigaction(SIGPIPE, {SIG_IGN}, {0x804cb8c, [PIPE],
SA_RESTART|0x4000000}, 8) = 0
1270557-25286 gettimeofday({1024582794, 135056}, NULL) = 0
1270558-25286 getpid() = 25286
1270559:25286 open("/tmp/nessus-aGihDA", O_RDWR|O_CREAT|O_EXCL,
0600) = 4
1270560-25286 fchmod(4, 0600) = 0
1270561-25286 alarm(20) = 0
1270562-25286 read(3, "\27\3\1\0`", 5) = 5
1270563-25286 read(3,
"\35S\303\204\252\300\220\320,\341\260\355X\351R\253\365\234L\27\0220n\30\26
3\335\2179\264\213\24?\372\23\214O\177\263+;Mm\371\361\326\357hF.
\353a\214\255H\372\35aQ\273~\232\177E\341\236\260\256\333<,\33\254\210\23\20
\230\322\267A`\nD\200\3570m\250G\216\20\376\221\3766\271", 96) = 96
1270564-25286 alarm(0) = 19
1270565-25286 alarm(20) = 0
--
1781106-25286 alarm(0) = 20
1781107-25286 alarm(20) = 0
1781108-25286 alarm(0) = 20
1781109-25286 alarm(20) = 0
1781110-25286 alarm(0) = 20
1781111-25286 close(4) = 0
1781112:25286 unlink("/tmp/nessus-aGihDA") = 0
1781113-25286 munmap(0x40018000, 4096) = 0
1781114-25286 _exit(0) = ?
... So it looks as though the file is created
...But it's not there:
[root@scanner /tmp]# ll /tmp
total 20k
drwxrwxrwt 3 root root 4.0k Jun 20 10:30 ./
drwxr-xr-x 21 root root 4.0k Feb 21 07:09 ../
-rw-r--r-- 1 root root 0 Jun 18 13:55 down_1
-rw-r--r-- 1 root root 315 Jun 18 13:00
interfaces.list
-rw------- 1 root root 3.1k Jun 14 18:24
nessus-CUc4rs
drwxr-xr-x 2 root root 4.0k Jun 18 01:05 plog/
... This only shows a temp file from a previous scan (note date)
Any ideas?
---
Jason Piterak
System Architect
CIS Technical Services
33 Main St., Suite 302
Nashua, NH 03064
(603) 889-4684 - FAX (603) 889-0534