Forge Home

nessus_agent

The nessus_agent module provides tasks and plans to allow you to upload, install, link and unlink nessus agents across Linux and Windows

3,136 downloads

1,402 latest version

5.0 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Version information

  • 1.1.3 (latest)
  • 1.1.2
  • 1.1.1
  • 1.1.0
  • 1.0.8
  • 1.0.7
  • 1.0.6
  • 1.0.5
  • 1.0.4
  • 1.0.3
  • 1.0.2
  • 1.0.1
  • 1.0.0
released Mar 6th 2021
This version is compatible with:
  • Puppet Enterprise 2019.8.x, 2019.7.x, 2019.5.x, 2019.4.x, 2019.3.x, 2019.2.x, 2019.1.x, 2019.0.x, 2018.1.x, 2017.3.x, 2017.2.x, 2016.4.x
  • Puppet >= 4.10.0 < 7.0.0
  • , , , , Debian, Ubuntu,
Tasks:
  • generatelogs
  • install
  • link
  • unlink
Plans:
  • generatelogs
  • install_link

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'kinners00-nessus_agent', '1.1.3'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add kinners00-nessus_agent
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install kinners00-nessus_agent --version 1.1.3

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Download

Documentation

kinners00/nessus_agent — version 1.1.3 Mar 6th 2021

nessus_agent

Table of Contents

  1. Description
  2. Bolt Quickstart
  3. Gotchas/Limitations
  4. Tasks
    1. install
    2. link
    3. unlink
    4. generatelogs
  5. Plans
    1. install_link
    2. generatelogs
  6. Contributions - Guide for contributing to the module

Description

The nessus_agent module allows you to install, link nessus agents as well as perform other nessus agent tasks such as generating bug reports across linux and windows targets.

Bolt Quickstart

If you're a bolt aficionado, you can skip this section.

If you've never used bolt before, the easiest way to get started is with a bolt project. Bolt projects allow you to keep/organise your bolt automation in a single space. I've created a skeleton of a bolt project here: https://github.com/kinners00/bolt_sandbox.

  1. Download Bolt here and install
  2. Download/clone repo above
  3. Populate your own target inventory information in the inventory.yaml file (make sure and remove what you don't need and delete #s)
  4. Navigate to the bolt_sandbox directory in your shell
  5. Install this module in your project by running bolt module add kinners00-nessus_agent
  6. Run bolt task show and bolt plan show to find out what tasks and plans are available within this module
  7. Running bolt <automation_type> show <myautomationitem> will give you more detailed info on how to use a given task or plan including required and optional parameters. Try it out by running bolt task show nessus_agent::link within the bolt_sandbox directory/project.

As projects are self contained, this command will only work when your current working directory is the bolt_sandbox directory (if cloned) or bolt_sandbox-master (if downloaded).

Cloned:

~/code/bolt_sandbox > bolt task show nessus_agent::link

Downloaded:

~/code/bolt_sandbox-master > bolt task show nessus_agent::link

Ps. There's some learning/sample tasks and a plan included in the bolt_sandbox that'll help you get started with building your own tasks and plans. You can start by creating tasks and plans in their relevant directories within the bolt_sandbox!

Gotchas

Bolt tasks are copied and executed under /tmp

If you can't execute scripts under that directory, you can pass --tmpdir flag on your bolt command followed by your chosen directory for example --tmpdir /var/tmp

Escalating privilege - Linux only

Depending on your targets user level permissions, you may have to pass --run-as=root and --sudo-password='mysudopassword' or --sudo-password-prompt flags on your bolt command. You can also add run-as: root and sudo-password: 'mysudopassword' to your config in your inventory.yaml file to enable you to keep your bolt command shorter/neater.

Example

Bolt Command

bolt task run nessus_agent::install -t rhel installer_path="/tmp/NessusAgent-8.2.2-es7.x86_64.rpm" --user=rheluser --password='myregularpassword' --run-as=root --sudo-password='mysudopassword'

inventory.yaml

 groups:
   - name: rhel
     targets:
       - 192.168.1.234
     config:
       transport: ssh
       ssh:
         user: rheluser
         password: 'myregularpassword'
         run-as: root
         sudo-password: 'mysudopassword'

Usage

Tasks

Tasks are cross platform so you only need to specify your targets and the task will work out what needs to be done per supported OS across *nix & windows. Whilst they are cross platform tasks, you can only run the nessus_agent::link, nessus_agent::unlink & nessus_agent::generatelogs tasks on a mix of targets comprising of disparate oses at the same time.

install

nessus_agent::install

Windows

bolt task run nessus_agent::install -t <targets> installer_path="C:\tmp\NessusAgent-8.2.2-x64.msi"

Linux

RPM & DEB are both supported

bolt task run nessus_agent::install -t <targets> installer_path="/tmp/NessusAgent-8.2.2-es7.x86_64.rpm"

link

nessus_agent::link

If you're using tenable.io then at the very minimum, you'll only need to pass your linking key and your Nessus agents will pair with your tenable instance however they're a bunch of optional parameters you can take advantage of such agent name, groups, offline install and more.

Pair with Tenable.io

bolt task run nessus_agent::link -t <targets> key=836e1c023f20601162f908234835c0aa1c61c91a4c750a1f094b4adfc396cdde

Pair with Nessus Manager

Due to issues with use of the $host variable on windows, I've named equivalent bolt parameter server, which directly translates to --host flag.

bolt task run nessus_agent::link -t <targets> key=<yourkey> server="216.58.198.174" port=8834

Groups

bolt task run nessus_agent::link -t <targets> key=<yourkey> groups="mygroup"

Multiple Groups

bolt task run nessus_agent::link -t <targets> key=<yourkey> groups="mygroup,mygroup2,mygroup3"

Name

bolt task run nessus_agent::link -t <targets> key=<yourkey> name="mynode.nodecorp.com"

Offline Install

bolt task run nessus_agent::link -t <targets> key=<yourkey> offline_install=yes

Proxy host & Port

There are also additional flags around proxy usage with Tenable such as pass proxy_username, proxy_password and proxy_agent.

bolt task run nessus_agent::link -t <targets> key=<yourkey> server=<myhost> port=<hostport> proxy_host="host.corp.com" proxy_port="8834"

unlink

nessus_agent::unlink

bolt task run nessus_agent::unlink -t <targets>

generatelogs

nessus_agent::generatelogs

bolt task run nessus_agent::generatelogs -t <targets>

Full log report

bolt task run nessus_agent::generatelogs -t <targets> level=full

Scrub

The scrub functionality will sanitise the first two octets of IPV4 addresses.

bolt task run nessus_agent::generatelogs -t <targets> scrub=true

Plans

install_link

nessus_agent::install_link

All of the parameters found in nessus_agent::install and nessus_agent::link tasks are supported in this "complete workflow" plan. This plan will allow you to specify a Nessus agent install package locally on your bolt workstation for upload to your remote targets. Once uploaded, it will then install the Nessus agent using the package provided and link the Tenable agent to tenable.io or Nessus Manager, depending on the flags passed.

bolt plan run nessus_agent::install_link -t <targets> install_file_local="/home/user/NessusAgent-8.2.2-x64.msi" install_file_destination="C:\tmp" installer_path="C:\tmp\NessusAgent-8.2.2-x64.msi" key=<yourkey> groups=<mygroups>

Skipping upload step

You can set upload=false to skip the upload step and only install and link agents if you've already uploaded the Nessus agent installer to the target node(s) via alternate methods.

bolt plan run nessus_agent::install_link -t <targets> upload=false installer_path=<pathtoinstaller> key=<yourkey> groups=<mygroups> 

generatelogs(plan)

nessus_agent::generatelogs

When a Nessus agent log tarball is generated on linux, it has root ownership as default. This means that bolt can't download logs directly using SCP. To get around this, the nessus_agent::generatelogs plan changes the ownership of these logs to a user you specify via the user parameter which enables bolt to download them to your workstation. Once logs are downloaded, they are deleted from the target node.

Linux

bolt plan run nessus_agent::generatelogs -t rhel file_destination="tenablelogs" user=myuser level=full scrub=true

Windows

bolt plan run nessus_agent::generatelogs -t windows file_destination="tenablelogs" level=full scrub=true

Contributions

If anyone would like to contribute to the module, that would be awesome and very much welcomed. Repo: https://github.com/kinners00/nessus_agent

If you're experiencing any bugs, please raise an issue below. Issues link: https://github.com/kinners00/nessus_agent/issues