Skip to content

Instantly share code, notes, and snippets.

View jfrantz1-r7's full-sized avatar

Josh Frantz jfrantz1-r7

  • Rapid7
View GitHub Profile
SELECT to_char(fav.date, 'Mon-YY') AS date, COUNT(*) AS count,
CASE
WHEN age(dv.date_published) < '30 days' THEN '<30 days'
WHEN age(dv.date_published) <= '60 days' THEN '30-60 days'
ELSE '60+ days'
END AS vuln_age
-- The fav table has the asset test date...
FROM fact_asset_vulnerability_instance AS fav
-- and the dv table has the vulnerability release date
INNER JOIN dim_vulnerability AS dv
<User id="nxadmin" name="nxadmin" email="" salt="53cc6cc9a389d832" passwordHash="3983B1F7D66AC4C9B17F871DB2FE174C10F285C9" enabled="1">
<Roles>
<role name="nexposeadmin"/>
</Roles>
</User>
<User id="nxadmin" name="nxadmin" email="" salt="53cc6cc9a389d832" passwordHash="3983B1F7D66AC4C9B17F871DB2FE174C10F285C9" enabled="1">
<Roles>
<role name="nexposeadmin"/>
</Roles>
</User>
This file has been truncated, but you can view the full file.
chmod 0755 /opt/rapid7 -c >> output_text.txt
chmod 0755 /opt/rapid7/nexpose -c >> output_text.txt
chmod 0644 /opt/rapid7/nexpose/icon.ico -c >> output_text.txt
chmod 0644 /opt/rapid7/nexpose/thirdpartynotices.txt -c >> output_text.txt
chmod 0644 /opt/rapid7/nexpose/jre.version -c >> output_text.txt
chmod 0755 /opt/rapid7/nexpose/updates -c >> output_text.txt
chmod 0644 /opt/rapid7/nexpose/updates/updatetable -c >> output_text.txt
chmod 0755 /opt/rapid7/nexpose/plugins -c >> output_text.txt
chmod 0755 /opt/rapid7/nexpose/plugins/pck -c >> output_text.txt
chmod 0755 /opt/rapid7/nexpose/plugins/pck/builtin -c >> output_text.txt
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [
"cloudtrail:LookupEvents",
"cloudtrail:DescribeTrails"
],
"Resource": "*"
},
cloudtrail.us-east-2.amazonaws.com
cloudtrail.us-east-1.amazonaws.com
cloudtrail.us-west-1.amazonaws.com
cloudtrail.us-west-2.amazonaws.com
cloudtrail.ap-east-1.amazonaws.com
sts.us-east-2.amazonaws.com
sts.us-east-1.amazonaws.com
sts.us-west-1.amazonaws.com
sts.us-west-2.amazonaws.com
ec2.us-east-2.amazonaws.com
chown -R nxpgsql:nxpgsql /opt/rapid7/nexpose/nsc/nxpgsql/nxpdata/ -c >> output_changes.txt
chown nxpgsql:root /opt/rapid7/nexpose/nsc/nxpgsql/nxpdata -c >> output_changes.txt
chown nxpgsql:root /opt/rapid7/nexpose/nsc/nxpgsql/nxpdata/nxpgsql.log -c >> output_changes.txt
chown -R nxpgsql:root /opt/rapid7/nexpose/nsc/nxpgsql/pgsql/ -c >> output_changes.txt
chown nxpgsql:nxpgsql /opt/rapid7/nexpose/nsc/nxpgsql/.gnupg/private-keys-v1.d -c >> output_changes.txt
chown nxpgsql:nxpgsql /opt/rapid7/nexpose/nsc/nxpgsql/.gnupg -c >> output_changes.txt
chown nxpgsql:root /opt/rapid7/nexpose/nsc/nxpgsql -c >> output_changes.txt
+ Criteria: OR |SERVICE| CONTAINS |Shell Backdoor|
+ Criteria: OR |VULN_CATEGORY| IS |Spyware|
+ Criteria: OR |VULN_CATEGORY| IS |Backdoor|
+ Criteria: OR |VULN_CATEGORY| IS |Trojan|
+ Criteria: OR |VULN_CATEGORY| IS |Virus|
+ Criteria: OR |VULN_CATEGORY| IS |Worm|
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [
"cloudtrail:LookupEvents",
"cloudtrail:DescribeTrails"
],
"Resource": "*"
},
{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": "arn:aws:iam::ACCOUNT-ID:role/TEST*"
}
}