It looks to me like your syntax used to start the scan is incorrect. You're
supposed to specify the output file on the command line.  Since you're not
doing that, you're getting no output.  Try this:

nessus -V -T nbe -q localhost 1241 jpiterak password location.nsr
results.nbe

That'll output the results to results.nbe in nbe format (the -T parameter
can change the format).

--
Jared



                                                                                       
                                 
                    Jason Piterak                                                      
                                 
                    <Jason_Piterak@c-i       To:     "'[EMAIL PROTECTED]'" 
<[EMAIL PROTECTED]>                
                    -s.com>                  cc:                                       
                                 
                    Sent by:                 Subject:     Commandline scan not 
generating report                        
                    owner-nessus@list.                                                 
                                 
                    nessus.org                                                         
                                 
                                                                                       
                                 
                                                                                       
                                 
                    06/20/2002 04:57                                                   
                                 
                    PM                                                                 
                                 
                                                                                       
                                 
                                                                                       
                                 




Hello all,

  I'm having trouble with a scan from the commandline not creating a
report.
The entire scan appears to run, but the /tmp/nessus-XXXXXX file does not
exist and the .nsr report is never generated.

  I apologize for the message length... just wanted to be thorough.

  Some questions, too:
    o  I remember seeing something searching through the mail list where
Renaud described using the KB to create a session, and using restore to
create the report... Since restore is part of my problem, here... Is there
any way to create a report either from the raw KB data or from the
<user>/sessions/*-data file?
      o  Are there any mail list archives other than msgs.securepoint.com
that have a better search engine? :-)


TROUBLESHOOTING:
Original scan command:
     nessus -V -q localhost 1241 jpiterak password location.nsr
...This failed, as I mentioned above

Attempted restore command:
     [root@scanner location]# nessus -V -R 20020619-172115 -q localhost
1241 jpiterak password location.nsr

The restore appears to go well, ending with:

     attack|10.5.5.10|836|845|WFTP RNTO DoS
     attack|10.5.5.10|837|845|wu-ftpd SITE NEWER vulnerability
     attack|10.5.5.10|838|845|Too long authorization
     attack|10.5.5.10|839|845|Too long POST command
     attack|10.5.5.10|840|845|wwwwais
     attack|10.5.5.10|841|845|XMail APOP Overflow
     attack|10.5.5.10|842|845|XTramail control denial
     attack|10.5.5.10|843|845|XTramil MTA 'HELO' denial
     attack|10.5.5.10|844|845|Xtramail pop3 overflow
     attack|10.5.5.10|845|845|Apache chunked encoding

     [1]+  Done  nessus -V -R 20020619-172115 -q localhost 1241 jpiterak
password location.nsr

... But this does not write an output file.

     [root@scanner location]# updatedb
     [root@scanner location]# locate .nsr
     /root/reports/location/location_partial.nsr
...Which is an older report (ie: this build WAS producing reports at one
time...)


So I tried an strace on the process
     [root@scanner location]# strace -o nessus.trace -f -s 256 nessus -V
-R 20020619-172115 -q localhost 1241 jpiterak password location.nsr
   (...This of course ended with the same output and same result)

Some configuration information:

     [root@scanner /etc]# cat redhat-release
     Red Hat Linux release 7.1 (Seawolf)

     [root@scanner linux]# uname -a
     Linux scanner.c-i-s.net 2.4.5 #3 Fri Dec 28 11:50:25 EST 2001 i686
unknown

     [root@scanner location]# gcc --version
     2.96

     [root@scanner location]# nessusd -v
     nessusd (Nessus) 1.2.2 for Linux
     (C) 1998, 1999, 2000 Renaud Deraison <[EMAIL PROTECTED]>

     [root@scanner location]# nessus -v
     nessus (Nessus) 1.2.2 for Linux

     (C) 1998, 1999, 2000 Renaud Deraison <[EMAIL PROTECTED]>
                 SSL used for client - server communication


>From ~/.nessusrc:

     begin(SERVER_PREFS)
      detached_scan_email_address = [EMAIL PROTECTED]
      save_session = yes
      save_empty_sessions = yes
      detached_scan = no
      continuous_scan = no
      diff_scan = no
      max_checks = 20
      log_whole_attack = yes
      cgi_path = /cgi-bin:/scripts
      port_range = 1-45000
      optimize_test = yes
      language = english
      per_user_base = /usr/local/var/nessus/users
      checks_read_timeout = 15
      delay_between_tests = 1
      non_simult_ports = 139
      plugins_timeout = 160
      safe_checks = yes
      auto_enable_dependencies = no
      save_knowledge_base = yes
      kb_restore = yes
      only_test_hosts_whose_kb_we_dont_have = no
      only_test_hosts_whose_kb_we_have = no
      kb_dont_replay_scanners = no
      kb_dont_replay_info_gathering = no
      kb_dont_replay_attacks = no
      kb_dont_replay_denials = no
      kb_max_age = 864000
      plugin_upload = no
      plugin_upload_suffixes = .nasl
      max_hosts = 20
     end(SERVER_PREFS)



---------------------

Now for some session information...:

     [root@scanner sessions]# tail -25 20020620-101955-data

     s:a:10.5.5.10:829:845
     SERVER <|> HOLE <|> 10.5.5.10 <|> ftp (21/tcp) <|> You seem to be
running an FTP server which is vulnerable to the\n'glob heap corruption'
flaw.\nAn attacker may use this problem to execute arbitr
     ary commands on this host.\n\n*** As Nessus solely relied on the
banner of the server to issue this warning,\n*** so this alert might be a
false positive\n\nSolution : Upgrade your ftp server softwar
     e to the latest version.\nRisk factor : High\n\nCVE :
CAN-2001-0550\n <|> 10821 <|> SERVER
     s:a:10.5.5.10:830:845
     s:a:10.5.5.10:831:845
     s:a:10.5.5.10:832:845
     s:a:10.5.5.10:833:845
     s:a:10.5.5.10:834:845
     s:a:10.5.5.10:835:845
     s:a:10.5.5.10:836:845
     s:a:10.5.5.10:837:845
     s:a:10.5.5.10:838:845
     s:a:10.5.5.10:839:845
     s:a:10.5.5.10:840:845
     s:a:10.5.5.10:841:845
     s:a:10.5.5.10:842:845
     s:a:10.5.5.10:843:845
     s:a:10.5.5.10:844:845
     s:a:10.5.5.10:845:845
     SERVER <|> HOLE <|> 10.5.5.10 <|> http (80/tcp) <|> \nThe remote
host is using a version of Apache which is\nolder than 1.3.26 or
2.0.39\n\nThis version is vulnerable to a bug which may allow an\n
     attacker to gain a shell on this system or to disable this\nservice
remotely.\n\n\nSolution : Upgrade to version 1.3.26 or 2.0.39 or newer\nSee
also : http://httpd.apache.org/info/security_bulletin_2
     0020617.txt\nRisk factor : High\nCVE : CAN-2002-0392\n <|> 11030 <|>
SERVER
     SERVER <|> FINISHED <|> 10.5.5.10 <|> SERVER
      <|> SERVER

Note: I also tried lopping off the last line, which looked extraneous
(looking at the pattern of the file) to no effect

     [root@scanner sessions]# cat 20020620-101955-index

10.5.5.1,10.5.5.9,10.5.5.10,10.5.5.12,10.5.5.13,10.5.5.15,10.5.5.18,10.5.5.2

0,10.5.5.21,10.5.5.23,10.5.5.40-45,10.5.5.51,10.5.5.96,10.5.5.149,10.5.5.238

     10.5.5.12
     10.5.5.18
     10.5.5.41
     10.5.5.13
     10.5.5.15
     10.5.5.20
     10.5.5.23
     10.5.5.40
     10.5.5.42
     10.5.5.43
     10.5.5.44
     10.5.5.45
     10.5.5.51
     10.5.5.96
     10.5.5.238
     10.5.5.9
     10.5.5.1
     10.5.5.21
     10.5.5.149
     10.5.5.10

...So, the scanner looks like it finished everything.



     [root@scanner sessions]# tail -25
/usr/local/var/nessus/logs/nessusd.messages
     [Wed Jun 19 18:16:50 2002][22164] user jpiterak : launching
apache_chunked_encoding.nasl against 10.5.5.10 [22806]
     [Wed Jun 19 18:16:51 2002][22164] apache_chunked_encoding.nasl
(process 22806) finished its job in 0.44 seconds
     [Wed Jun 19 18:17:01 2002][22164] ntp_overflow.nasl (process 22791)
finished its job in 15.10 seconds
     [Wed Jun 19 18:17:01 2002][22164] Finished testing 10.5.5.10. Time :
2797.31 secs
     [Wed Jun 19 18:17:01 2002][22142] user jpiterak : test complete
     [Wed Jun 19 18:17:01 2002][22142] user jpiterak : Kept alive
connection
     [Wed Jun 19 18:17:01 2002][22142] Communication closed by client
     [Wed Jun 19 18:21:53 2002][21709] connection from 127.0.0.1
     [Wed Jun 19 18:21:54 2002][21709] same client 127.0.0.1 has
connected twice - blocking for a while
     [Wed Jun 19 18:21:54 2002][22828] Client requested protocol version
12.
     [Wed Jun 19 18:21:54 2002][22828] successful login of jpiterak from
127.0.0.1
     [Wed Jun 19 18:22:01 2002][22828] Redirecting debugging output to
/usr/local/var/nessus/logs/nessusd.dump
     [Wed Jun 19 18:22:05 2002][22828] user jpiterak : session will be
saved as
/usr/local/var/nessus/users/jpiterak/sessions/20020619-182205-index
     [Wed Jun 19 18:22:05 2002][22828] user jpiterak restores session
20020619-172115, with max_hosts = 20
     [Wed Jun 19 18:32:38 2002][22828] user jpiterak : Kept alive
connection
     [Wed Jun 19 18:32:38 2002][22828] Communication closed by client
     [Thu Jun 20 10:15:31 2002][21709] connection from 127.0.0.1
     [Thu Jun 20 10:15:33 2002][21709] same client 127.0.0.1 has
connected twice - blocking for a while
     [Thu Jun 20 10:15:33 2002][25287] Client requested protocol version
12.
     [Thu Jun 20 10:15:33 2002][25287] successful login of jpiterak from
127.0.0.1
     [Thu Jun 20 10:18:54 2002][25287] Redirecting debugging output to
/usr/local/var/nessus/logs/nessusd.dump
     [Thu Jun 20 10:19:55 2002][25287] user jpiterak : session will be
saved as
/usr/local/var/nessus/users/jpiterak/sessions/20020620-101955-index
     [Thu Jun 20 10:19:56 2002][25287] user jpiterak restores session
20020619-172115, with max_hosts = 20
     [Thu Jun 20 10:30:48 2002][25287] user jpiterak : Kept alive
connection
     [Thu Jun 20 10:30:48 2002][25287] Communication closed by client

...And here, too -- Though note the ntp_overflow.nasl test that doesn't
show
up in the *-data file.


>From an earlier posting, Renaud had mentioned that the .nsr report gets
written to a temp file in $TMP or /tmp as it is generated.

>From the strace:
     ...
     25286 unlink("/tmp/nessus-aGihDA")      = 0
     25286 munmap(0x40018000, 4096)          = 0
     25286 _exit(0)       = ?

     Looking through the full strace output shows:

     [root@scanner reports]# grep -n -6 -e '/tmp/nessus-aGihDA'
nessus.trace
     1270553-25286 alarm(20)                         = 0
     1270554-25286 write(3,
"\27\3\1\0P\220\357\306\0\372_8\211\200\307\377<\326~6Z\322\324]
\352XB\213\3
344\10\220\256\215\312\274\373\347\\\267\307\tc\321d!\16\236
_\'\32h\36658\22\312j\344Em8\246\317\320\7\275K\344\232\1771\30\210.
\332%/\3
4\252x\357\213\361", 85) = 85
     1270555-25286 alarm(0)                          = 20
     1270556-25286 rt_sigaction(SIGPIPE, {SIG_IGN}, {0x804cb8c, [PIPE],
SA_RESTART|0x4000000}, 8) = 0
     1270557-25286 gettimeofday({1024582794, 135056}, NULL) = 0
     1270558-25286 getpid()                          = 25286
     1270559:25286 open("/tmp/nessus-aGihDA", O_RDWR|O_CREAT|O_EXCL,
0600) = 4
     1270560-25286 fchmod(4, 0600)                   = 0
     1270561-25286 alarm(20)                         = 0
     1270562-25286 read(3, "\27\3\1\0`", 5)          = 5
     1270563-25286 read(3,
"\35S\303\204\252\300\220\320,
\341\260\355X\351R\253\365\234L\27\0220n\30\26
3\335\2179\264\213\24?\372\23\214O\177\263+;Mm\371\361\326\357hF.
\353a\214\255H\372\35aQ\273~\232\177E\341\236\260\256\333<,
\33\254\210\23\20
\230\322\267A`\nD\200\3570m\250G\216\20\376\221\3766\271", 96) = 96
     1270564-25286 alarm(0)                          = 19
     1270565-25286 alarm(20)                         = 0
     --
     1781106-25286 alarm(0)                          = 20
     1781107-25286 alarm(20)                         = 0
     1781108-25286 alarm(0)                          = 20
     1781109-25286 alarm(20)                         = 0
     1781110-25286 alarm(0)                          = 20
     1781111-25286 close(4)                          = 0
     1781112:25286 unlink("/tmp/nessus-aGihDA")      = 0
     1781113-25286 munmap(0x40018000, 4096)          = 0
     1781114-25286 _exit(0)                          = ?




... So it looks as though the file is created


...But it's not there:
     [root@scanner /tmp]# ll /tmp
     total 20k
     drwxrwxrwt    3 root     root         4.0k Jun 20 10:30 ./
     drwxr-xr-x   21 root     root         4.0k Feb 21 07:09 ../
     -rw-r--r--    1 root     root            0 Jun 18 13:55 down_1
     -rw-r--r--    1 root     root          315 Jun 18 13:00
interfaces.list
     -rw-------    1 root     root         3.1k Jun 14 18:24
nessus-CUc4rs
     drwxr-xr-x    2 root     root         4.0k Jun 18 01:05 plog/

... This only shows a temp file from a previous scan (note date)

Any ideas?

---
Jason Piterak
System Architect
CIS Technical Services
33 Main St., Suite 302
Nashua, NH 03064
(603) 889-4684 - FAX (603) 889-0534




Reply via email to