Integrating with NeXpose
In the previous recipe, we discussed Nessus as a potential vulnerability scanner. In this recipe, we will cover another important vulnerability scanner called NeXpose.
NeXpose is a popular tool by Rapid7, which performs the task of vulnerability scanning and importing results to the Metasploit database. The usage of NeXpose is similar to Nessus, but let's have a quick look at how to get started with NeXpose. I will leave the task of exploring it deeper as an assignment for you.
Getting ready
You can download NeXpose Community from http://www.rapid7.com/products/metasploit/metasploit-community-registration.jsp. After installing NeXpose, you can start using it the from the msfconsole
, but first, we need to load the plugin to connect to the NeXpose server. Let's execute these steps in the command line:
![](https://static.packt-cdn.com/products/9781788623179/graphics/d0ca38ff-8ed0-4615-8fc5-9411c9d99db0.png)
To connect with the NeXpose server, use the nexpose_connect
command followed by the credentials, hostname, port, and verify the SSL certificate:
msf > nexpose_connect NexposeUser...