Skip to content

A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation or a troubleshooting event

License

Notifications You must be signed in to change notification settings

massaermbengue/Navi

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Navi Pro - The Tenable.io Swiss Army Knife

A command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common in Cyber Exposure or Vulnerability Management.

*** This is not Supported by Tenable ***

Important Notes

Navi Pro will download the entire data-set(90 days) locally after API keys are entered and the update command is used! To download Vuln and Asset data you have to be an Administrator in Tenable.io.

All Vulns and All Assets are downloaded into a SQLLITE database named navi.db in the current directory.

Most of the API calls nessessary to make navi work require access to your all of the available data. Tenable.io has a 5000 record limit so Navi Pro utilizes the Export API.

The data will not be updated until you run the update command. Keep this in mind when adding elements to Tenable.io like Tags.

navi update

Alternatively you can select which export you want to update:

navi update -assets

navi update -vulns

Furthermore, you can limit how much data is downloaded by using the --days command

navi update -assets --days 2

You can even specify your export id.

navi update -vulns --exid 123456-987654-asdfgh-jklopi-ididis

My container keeps getting "Killed"

To speed up downloads navi uses threading. It pulls 500 asset chunks on 10 threads and since the vulnerabilities per asset fluctuate this can spike the memory above 2G. If this happens increase your memeory to 4G.

Directions for Mac

Directions for Windows

What is the biggest Tenable.io instance Navi has been tested on?

Navi 5.1.4 was recently tested on a container with 100,000 assets and 13 million vulnerabilties.
It took 30 mins for t.io to prepare the download and 30 mins to download and parse the data into navi.db. On another internet connection the entire process too 2.5 hours.

Download and Configure navi in a Docker Container

docker pull silentninja/navi:latest

docker run -it -p 8000:8000 silentninja/navi:latest /bin/bash 

navi keys

navi update

Detach from Container

CTR+Q+P - CTR+Q+P

Attach to Contianer

docker attach <container id>

<press enter>

Configure For Reporting

Navi has a few reporting capabilities where a CSV is the output. To extract this data from the container you will need to launch the container with port 8000 exposed and use the 'http' command to extract the reports.

docker run -it -p 8000:8000 silentninja/navi:latest /bin/bash

Extract Data

To extract data from the container you need to run an http server. Use the below built in command.

navi http
  • Navigate to the website: http://0.0.0.0:8000
  • Simply download the item you want by clicking on it.

Download and Configure Navi using Python3 Setup file

Prepare your Machine

Clone the Repo

Create a new Directory

mkdir tenable

Change into your new directory

cd tenable

Clone the repo

git clone https://github.com/packetchaos/Navi.git

Install Navi

cd Navi
python3 setup.py install

Usage

Before you begin you need the Keys! The program will continue to error out without valid API keys

navi keys

Each command has two parts: the Command and the Option/Request. Double-Dash(--) commands expect a text value. Single-Dash commands do not have an expected input.

There are thirteen core commands:

  • api - query api endpoints
  • ip - find details on Specific IPs
  • find - Find information: credential failures, containers, etc
  • report - Report on Information: Latest scan information, Container vulns
  • display - List details: users, logs, etc
  • group - Create Target groups based off of Plugin ID, Plugin Name or Plugin Output
  • export - Export Agent or Asset data into a CSV
  • delete - Delete an object by it's ID
  • mail - Mail a report
  • tag - Create a Category/Value Pair
  • lumin - Bulk adjust ACRs based on a tag
  • add - Manually Add an asset to Tenable.io or a list of assets via CSV
  • delete - Delete a scan by Scan ID
  • agroup - Create an Access Group by Tag or Agent Group

There are thirteen single use commands:

  • scan - Create and launch a scan
  • start - Start a scan by Scan-ID
  • pause - Pause a scan by Scan-ID
  • resume - Resume a scan by Scan-ID
  • stop - Stop a scan by Scan-ID
  • spider - Create a WebApp scan for every URL in a CSV
  • update - Update local Export Vuln and Asset data.
  • status - Get the latest status by Scan ID
  • mac - Get the manufacture by Mac Address
  • keys - Add or update your keys
  • http - Run an http server to extract files from the container
  • listen - Run a netcat listener to receive a single file
  • smtp - Enter or update your SMTP information

Explore the Tenable.io API - 'api'

Enter in a API endpoint and get a pretty print json ouput. Try some of the below endpoints:

  • /scans
  • /scanners
  • /users

Examples

navi api /scans

navi api /scanners

IP address queries - 'ip'

  • --plugin TEXT --> Find Details on a particular plugin ID
  • -n --> Netstat Established and Listening and Open Ports
  • -p --> Patch Information
  • -t --> Trace Route
  • -o --> Process Information
  • -c --> Connection Information
  • -s --> Services Running
  • -r --> Local Firewall Rules
  • -d --> Scan Detail: 19506 plugin output
  • -patches --> Missing Patches
  • -software --> Find software installed on Unix of windows hosts
  • -outbound --> Display outbound connections found by NNM
  • -exploit --> Display exploitable vulnerabilities
  • -critical --> Display critical vulnerabilities
  • -details --> Details on an Asset: IP, UUID, Vulns, etc

Examples

navi ip 192.168.1.1 --plugin 19506

navi ip 192.168.1.1 -details -software

Find information - 'find'

  • --plugin TEXT --> Find Assets where this plugin fired
  • -docker --> Find Running Docker Containers
  • -webapp --> Find Web Servers running
  • -creds --> Find Credential failures
  • --time TEXT --> Find Assets where the scan duration is over X mins
  • -ghost --> Find Assets found by a Connector and not scanned by Nessus(AWS ONLY)
  • --port TEXT ---> Find assets with an the open port provided

Examples

navi find --plugin 19506

navi find -docker

navi find --time 10

Reports - Information - 'report'

  • -latest --> Report the Last Scan Details
  • --container TEXT --> Report Vulns of CVSS 7 or above by Container ID.
  • --docker TEXT --> Report Vulns of CVSS 7 or above by Docker ID
  • --comply TEXT --> Check to see if your container complies with your Policy
  • --details TEXT --> Report Scan Details including Vulnerability Counts by Scan ID
  • --summary TEXT --> Report Scan Summary by Scan ID
  • --network TEXT --> Report Assets of a given Network

Examples

navi report -latest

navi report --container 48b5124b2768

navi report --docker 48b5124b2768

navi report --comply 48b5124b2768

navi report --summary 13

Display - Common Information - 'display'

  • -scanners --> List all of the Scanners
  • -users --> List all of the Users
  • -exclusions --> List all Exclusions
  • -containers --> List all containers and their Vulnerability Scores
  • -logs --> List The actor and the action in the log file
  • -running --> List the running Scans
  • -scans --> List all Scans
  • -nnm --> Nessus Network Monitor assets and their vulnerability scores
  • -assets --> Assets found in the last 30 days
  • -policies --> Scan Policies
  • -connectors --> Displays information about the Connectors
  • -agroup --> Displays information about Access Groups
  • -status --> Displays Tenable.io License and Site information
  • -agents --> Displays information on Agents
  • -webapp --> Displays information on Web app Scans
  • -tgroup --> Displays information about Target Groups
  • -licensed --> Displays All of your Licensed assets
  • -tags --> Displays Tag Categories, Values and Value UUID
  • -categories --> Displays Tag Categories and the Category UUID
  • -cloud --> Displays Cloud assets found in the last 30 days
  • -networks --> Displays Network IDs

Examples

navi display -scanners

navi display -running

navi display -nnm

Add assets manually or via a CSV file - 'add'

To add an asset you need an IP address; Everything else is optional. If you are going to use a CSV file you need to structure it in this order: IP, Mac, Hostname, FQDN. This is the order the information is parsed so getting it incorrect will cause errors.

  • --ip TEXT IP address(s) of new asset
  • --mac TEXT Mac Address of new asset
  • --netbios TEXT NetBios of new asset
  • --fqdn TEXT FQDN of new asset
  • --hostname TEXT Hostname of new asset
  • --list - TEXT Import all assets in the CSV file
  • --source - TEXT Add the Source

Tag assets by Plugin Name, or Plugin ID - 'tag'

  • --c --> Create a Tag with this Category - Required
  • --v --> Create a Tag with this Value - Required
  • --d --> Create a description for your Tag - Optional (TEXT"
  • --plugin --> Define a Tag by a plugin ID - Optional (TEXT)
  • --name --> Define a tag by text found in a plugin Name - Optional (TEXT)
  • --group --> Define a tag by a Agent Group Name - Optional (TEXT)
  • --output TEXT Create a Tag based on the text in the output. Requires --plugin

Examples

navi tag --c "My Category" --v "My Value" --d "My description" --plugin 93561
navi tag --c "Application Vulns" --v "Java vulns" --name java
navi tag --c "Agent Group" --v "Linux Agents" --group "Linux"

Note on Tagging assets

If you created a new Tag you will need to run an update on the assets to download the new Tag relationships. This is especially important if you want to export using your newly created tag.

navi update -assets

Create Access Groups by Tags or Agent Groups - 'agroup'

  • --name TEXT Create an Access group with the following Name
  • -tag Create a Access Group by a Tag
  • --c TEXT Category name to use
  • --v TEXT Tag Value to use; requires --c and Category Name
  • --group TEXT Create a Tag based on a Agent Group

Examples

navi agroup --name "My New Group" -tag --c "OS" --v "Linux"

navi agroup --name "My Other Group" --group "Linux

Bulk Adjust ACRs based on a Tag - 'lumin'

  • --acr --> The new ACR value (1-10)
  • --c --> The Tag Category to use
  • --v --> The Tag value to use
  • --note --> Justification for ACR change

Note - ACR Exceptions?

Tag your assets with "NO:UPDATE" if you don't want to be affected by bulk ACR changes
Category = NO
Value = UPDATE

Examples

navi lumin --acr 10 --c "Applications" --v "Core Business" --note "Main application"

Export Asset, Agent, Consec, or Webapp Data - 'export'

  • -assets --> Export Assets data into CSV: IP, Hostname, FQDN, UUID, exposure, etc
  • -agents --> Export Asset data into CSV: IP, Last Connect, Last scanned, Status
  • -webapp --> Export Web applications into a CSV: FQDN, Critical, High, Medium, Low
  • -consec --> Export Container Security summary info into a CSV.
  • -licensed --> Export a List of all Licensed Assets into a CSV.
  • -lumin --> Export all Asset data including ACR and AES into a CSV. This will take some time
  • --network --> Export all Assets of a given network
  • -bytag Export all assets by tag; Include ACR and AES into a CSV
  • --c TEXT Export bytag with the following Category name
  • --v TEXT Export bytag with the Tag Value; requires --c and Category Name
  • --ec TEXT Exclude tag from export with Tag Category; requires --ev
  • --ev TEXT Exclude tag from export with Tag Value; requires --ec

Examples

navi export -assets

navi export -agents -assets -webapp -consec -licensed

navi export --network 00000000-0000-0000-0000-000000000000

Export into a CSV, but include the ACR and AES of each asset. This takes a bit of time.

navi export -lumin

Export into a CSV via a Tag

navi export -bytag --c "OS" --v "Linux"

Export into a CSV via a Tag; but exclude a specific Tag.

navi export -bytag --c "OS" --v "Linux" --ec "OS" --ev "AWS"

Delete an Object by an ID

  • scan - Delete a scan by ID
  • agroup - Delete an Access group
  • tgroup - Delete a Target Group
  • policy - Delete a Policy
  • asset - Delete an asset
  • container - Delete a container by container ID
  • tag - Delete a Tag value by Value UUID
  • category - Delete a Tag category by the Category UUID

Examples

navi delete 1234 -scan

navi delete 4567 -agroup

navi delete 8910 -tgroup

navi delete 12345 -asset

navi delete 6789 -policy

Mail a Report

  • latest - Mail a report of the latest scan: Same output as "report -latest"
  • consec - Mail a report of the ConSec Summary: Same output as "list -containers"
  • webapp - Mail a report of the WebApp Summary

Use Cases

What was last scanned?

navi report -latest

What scans are running right now?

navi display -running

Find a Scan id by Scan Name

navi display -scan | grep -b2 <ScanName>

Create a Scan

navi scan 192.168.128.1

navi scan 192.168.128.0/24
  • Choose your scan type: Basic or Discovery
  • Pick your scanner by ID: scanners will be displayed
  • Scan will immediately kick off

Control your scans

navi pause 13

navi resume 13

navi stop 13

navi start 13

Find Available scanners

navi display -scanners

Create 100s of Webapp Scans from a CSV File

To Receive a file for Navi Pro to use you must push the file to the container. Netcat is installed on the container to do this, or you can use the 'listen' command to accomplish this.

navi spider <your_csv_file.csv>
  • Choose your Scan type : Webapp Overview or Webapp Scan
  • Choose your scanner: A list will be displayed
  • Scans will be created but not started.
  • An output of the Webapp URL and Scan ID will be displayed on completion

Getting Data into the Container

From the container - Prepare your container to receive a file

navi listen

or

nc -l -p 8000 > yourfilename.csv

From the computer with the file - Send the file

nc containerhostIP 8000 < yourfilename.csv

About

A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation or a troubleshooting event

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 95.4%
  • HTML 4.3%
  • Dockerfile 0.3%