Rumble 1.6.2 Analysis Reports & The Query Library

Updated

Overview #

Today's update comes with two significant features: Analysis Reports and the Query Library. This work brings practical analytic capabilities to the inventory data and makes it easier than ever to create and share custom queries with your team and the wider community.

Analysis Reports #

Analysis Reports are now accessible via the Explore link in the navigation menu. This section includes the three existing reports (Topology, Subnets, Bridges) and introduces two new ones.

The Domain Membership report uses information gathered from the NTLMSSP responses of the SMB and RDP protocols to identify machines that are not joined to the primary domain. This report can quickly highlight unmanaged, misconfigured, and third-party systems.

Analysis Reports & Query Library

The Service Attribute report offers a combination of pre-built and configurable queries for unique service attributes. This report can highlight the most and least common values of a given attribute, using an optional attribute filter. The pre-built service attribute queries cover two-dozen common and noteworthy service attributes.

Service Attribute Report

This report provides one of the most interesting perspectives of a network. Looking at the top entries for a given attribute, as well as the long tail of unique entries, can highlight both the intended configuration and the exceptions in a way that is otherwise difficult to see.

SSH Versions Report

This report can be run against any attribute from the Analysis Reports page or via the Asset Detail page by clicking the green magnifying glass icon next to an attribute name.

Service Attribute Search

Keep in mind that these queries only cover Live Assets, are limited to 1,000 results, and can be a little slow depending on the number of assets involved.

Query Library #

The Inventory search provided by Rumble keeps getting better with each release, but can be tricky to get used to, and the right solution isn't always obvious. To help folks become familiar with the query language and to make it easy to share useful queries, this release introduces the Query Library. Accessible via the tab in the Explore section, this library provides pre-built queries for common tasks and allows new saved queries to be created, imported, and exported.

Query Library

The Public & Private Network Connections query quickly finds any asset that might be bridging the internal network to the open internet.

Public and Private IP Address Query

If you come up with an awesome query and want to see it in the default library, please drop us a line and we can make that happen. We hope you find these updates useful and we would love your feedback.

If you haven't had a chance to try runZero before, or would like to play with the new features, sign up for a free trial and let us know what you think!

-HD

Written by HD Moore

HD Moore is the co-founder and CEO of runZero. Previously, he founded the Metasploit Project and served as the main developer of the Metasploit Framework, which is the world's most widely used penetration testing framework.
More about HD Moore
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Articles

runZero Research
Active Asset Discovery in OT networks: runZero and the NREL/CECA Report
The Cohort 2 report describes how runZero safely discovers devices in a large, complex OT/ICS environment. Learn more about runZero's discovery...
runZero Research
AI in CAASM: The Risks of LLM Data in Security-Critical Workflows
Current generation AI tools provide appealing answers but struggle with a crucial challenge: knowing the truth, which poses great security risks.
runZero Research
SSHamble: Unexpected exposures in the Secure Shell
We conducted a deep dive into the SSH ecosystem and identified vulnerabilities across a wide range of implementations. During the research process,...
runZero Research
Attack Surface Challenges with OT/ICS and Cloud Environments
Learn why successfully navigating changes to operational technology and cloud attack surfaces is critical for successful asset security.

See Results in Minutes

Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

© Copyright 2024 runZero, Inc. All Rights Reserved