Create actionable data from your vulnerability scans
VulnWhisperer is a vulnerability data and report aggregator. VulnWhisperer will pull all the reports and create a file with a unique filename which is then fed into logstash. Logstash extracts data from the filename and tags all of the information inside the report (see logstash_vulnwhisp.conf file). Data is then shipped to elasticsearch to be indexed. [](https://travis-ci.org/austin-taylor/VulnWhisperer) [](http://choosealicense.com/licenses/mit/) Currently Supports ----------------- ### Vulnerability Frameworks - [X] Nessus (v6 & **v7**) - [X] Qualys Web Applications - [ ] Qualys Vulnerability Management (_in progress_) - [ ] OpenVAS - [ ] Nexpose - [ ] Insight VM - [ ] NMAP - [ ] More to come Getting Started =============== 1) Follow the [install requirements](#installreq) 2) Fill out the section you want to process in example.ini file 3) Modify the IP settings in the logstash files to accomodate your environment and import them to your logstash conf directory (default is /etc/logstash/conf.d/) 4) Import the kibana visualizations 5) [Run Vulnwhisperer](#run) Requirements ------------- #### * ElasticStack 5.x * Python 2.7 * Vulnerability Scanner * Optional: Message broker such as Kafka or RabbitMQ Install Requirements -------------------- ```python Install dependant modules cd deps/qualysapi python setup.py install Using requirements file: sudo pip install -r /path/to/VulnWhisperer/requirements.txt cd /path/to/VulnWhisperer sudo python setup.py install ``` Configuration ----- There are a few configuration steps to setting up VulnWhisperer: * Configure Ini file * Setup Logstash File * Import ElasticSearch Templates * Import Kibana Dashboards example.ini file