Hackuity
Hackuity Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.0.0 and later.
From a war-room, query your Hackuity cockpit in order to seamlessly retrieve information related to your vulnerability stock. This integration was integrated and tested with version 1.25.0 of Hackuity
#
Configure Hackuity on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for Hackuity.
Click Add instance to create and configure a new integration instance.
Parameter Required Corporate server URL True Namespace True Api key True Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
hackuity-search-findingsSearch for findings in Hackuity.
#
Base Commandhackuity-search-findings
#
InputArgument Name | Description | Required |
---|---|---|
asset_name | The name of the asset. | Optional |
asset_type | The type of the asset if the asset name is specified (by default, restricts to IPs & domains). | Optional |
attribute | An attribute value. | Optional |
cvss_min | The minimum CVSS (included). | Optional |
cvss_max | The maximum CVSS (excluded). | Optional |
limit | The maximum number of items to return. Default is 20. | Optional |
trs_min | The minimum TRS (included). | Optional |
trs_max | The maximum TRS (excluded). | Optional |
vuln_type | The vulnerability type (ID). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Hackuity.Findings.Asset.ID | String | The ID of the asset |
Hackuity.Findings.Asset.Name | String | The name of the asset |
Hackuity.Findings.Asset.Type | String | The type of the asset |
Hackuity.Findings.Attributes | Unknown | The attributes of the finding |
Hackuity.Findings.Score.CVSS | Number | The CVSS of the finding |
Hackuity.Findings.Score.TRS | Number | The TRS of the finding |
Hackuity.Findings.ID | String | The ID of the finding |
Hackuity.Findings.Status.Ignored | Boolean | Whether the finding is ignored |
Hackuity.Findings.Status.State | String | The state of the finding |
Hackuity.Findings.Status.SubState | String | The sub-state of the finding |
Hackuity.Findings.Status.LastClosedAt | Date | The date of the last time the finding was closed |
Hackuity.Findings.VulnType.ID | String | The ID of the vulnerability type |
Hackuity.Findings.VulnType.Name | String | The name of the vulnerability type |
#
Command example!hackuity-search-findings asset_name=example.com
#
Context Example#
Human Readable Output#
Findings
Asset VulnType Attributes Score Status ID: NKTVm2RU4606
Name: example.com
Type: DOMAINID: common-vulnerability-exposure
Name: Common Vulnerability and Exposure (CVE)cve_id: CVE-2015-6550 CVSS: 10.0
TRS: 693Ignored: false
State: CLOSED
SubState: FIXEDID: NKTVm2RU4606
Name: example.com
Type: DOMAINID: common-vulnerability-exposure
Name: Common Vulnerability and Exposure (CVE)cve_id: CVE-2015-6551 CVSS: 10.0
TRS: 693Ignored: false
State: CLOSED
SubState: FIXED
#
hackuity-search-vulndb-vulnerabilitiesSearch for vulndb vulnerabilities in Hackuity.
#
Base Commandhackuity-search-vulndb-vulnerabilities
#
InputArgument Name | Description | Required |
---|---|---|
asset_name | The name of the asset. | Optional |
asset_type | The type of the asset if the asset name is specified (by default, restricts to IPs & domains). | Optional |
attribute | An attribute value. | Optional |
cvss_min | The minimum CVSS (included). | Optional |
cvss_max | The maximum CVSS (excluded). | Optional |
limit | The maximum number of items to return. Default is 20. | Optional |
trs_min | The minimum TRS (included). | Optional |
trs_max | The maximum TRS (excluded). | Optional |
vuln_type | The vulnerability type (ID). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Hackuity.Vulnerabilities.Attributes | String | The attributes of the vulnerability |
Hackuity.Vulnerabilities.Score.CVSS | String | The CVSS of the vulnerability |
Hackuity.Vulnerabilities.Score.TRS | String | The TRS of the vulnerability |
Hackuity.Vulnerabilities.Description | String | The description of the vulnerability |
Hackuity.Vulnerabilities.ID | String | The ID of the vulnerability |
Hackuity.Vulnerabilities.Seen.First | Date | The date of the first time the vulnerability has been seen |
Hackuity.Vulnerabilities.Findings.Total | String | The total number of findings on this vulnerability |
Hackuity.Vulnerabilities.Findings.Open | String | The number of open findings on this vulnerability |
Hackuity.Vulnerabilities.Findings.Closed | String | The number of closed findings on this vulnerability |
Hackuity.Vulnerabilities.Findings.Ignored | String | The number of ignored findings on this vulnerability |
Hackuity.Vulnerabilities.VulnType.ID | String | The ID of the vulnerability type |
Hackuity.Vulnerabilities.VulnType.Name | String | The name of the vulnerability type |
#
Command example!hackuity-search-vulndb-vulnerabilities asset_name=example.com
#
Context Example#
Human Readable Output#
VulnDB vulnerabilities
VulnTypes Description Attributes Score Findings Seen {'ID': 'common-vulnerability-exposure', 'Name': 'Common Vulnerability and Exposure (CVE)'} An information disclosure vulnerability exists when the Windows Network Driver Interface Specification (NDIS) improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Network Driver Interface Specification (NDIS) Information Disclosure Vulnerability'. {'key': 'cve_id', 'value': 'CVE-2020-0705'} CVSS: 9.0
TRS: 636Total: 1
Open: 1
Closed: 0
Ignored: 0First: 2021-03-03T07:56:07Z {'ID': 'common-vulnerability-exposure', 'Name': 'Common Vulnerability and Exposure (CVE)'} An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0956, CVE-2020-0957. {'key': 'cve_id', 'value': 'CVE-2020-0958'} CVSS: 9.0
TRS: 636Total: 1
Open: 1
Closed: 0
Ignored: 0First: 2021-03-03T07:56:07Z
#
hackuity-search-provider-vulnerabilitiesSearch for provider vulnerabilities in Hackuity.
#
Base Commandhackuity-search-provider-vulnerabilities
#
InputArgument Name | Description | Required |
---|---|---|
asset_name | The name of the asset. | Optional |
asset_type | The type of the asset if the asset name is specified (by default, restricts to IPs & domains). | Optional |
attribute | An attribute value. | Optional |
cvss_min | The minimum CVSS (included). | Optional |
cvss_max | The maximum CVSS (excluded). | Optional |
limit | The maximum number of items to return. Default is 20. | Optional |
trs_min | The minimum TRS (included). | Optional |
trs_max | The maximum TRS (excluded). | Optional |
vuln_type | The vulnerability type (ID). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Hackuity.Vulnerabilities.Attributes | String | The attributes of the vulnerability |
Hackuity.Vulnerabilities.Score.CVSS | String | The CVSS of the vulnerability |
Hackuity.Vulnerabilities.Score.TRS | String | The TRS of the vulnerability |
Hackuity.Vulnerabilities.Description | String | The description of the vulnerability |
Hackuity.Vulnerabilities.ID | String | The ID of the vulnerability |
Hackuity.Vulnerabilities.Seen.First | Date | The date of the first time the vulnerability has been seen |
Hackuity.Vulnerabilities.Findings.Total | String | The total number of findings on this vulnerability |
Hackuity.Vulnerabilities.Findings.Open | String | The number of open findings on this vulnerability |
Hackuity.Vulnerabilities.Findings.Closed | String | The number of closed findings on this vulnerability |
Hackuity.Vulnerabilities.Findings.Ignored | String | The number of ignored findings on this vulnerability |
Hackuity.Vulnerabilities.VulnType.ID | String | The ID of the vulnerability type |
Hackuity.Vulnerabilities.VulnType.Name | String | The name of the vulnerability type |
#
Command example!hackuity-search-provider-vulnerabilities asset_name=example.com
#
Context Example#
Human Readable Output#
Provider vulnerabilities
VulnTypes Description Attributes Score Findings Seen {'ID': 'common-vulnerability-exposure', 'Name': 'Common Vulnerability and Exposure (CVE)'} KB4561669: Windows 7 and Windows Server 2008 R2 June 2020 Security Update CVSS: 9.0
TRS: 636Total: 10
Open: 8
Closed: 2
Ignored: 0First: 2021-03-03T07:56:07Z {'ID': 'common-vulnerability-exposure', 'Name': 'Common Vulnerability and Exposure (CVE)'} KB4541500: Windows 7 and Windows Server 2008 R2 March 2020 Security Update CVSS: 9.0
TRS: 636Total: 16
Open: 15
Closed: 1
Ignored: 0First: 2021-03-03T07:56:07Z
#
hackuity-dashboard-widgetsList the widgets in the default dashboard of the user.
#
Base Commandhackuity-dashboard-widgets
#
InputThere are no input arguments for this command.
#
Context OutputPath | Type | Description |
---|---|---|
Hackuity.Dashboard.Widgets.ID | String | The ID of the widget |
Hackuity.Dashboard.Widgets.Params | Unknown | The configuration of the widget |
Hackuity.Dashboard.Widgets.Type | String | The type of the widget |
#
Command example!hackuity-dashboard-widgets
#
Context Example#
Human Readable Output#
Dashboard widgets
ID Type Params abcd3fgh1jklmn0pqrstuv ASSETS_OVERVIEW nbDaysToCompare: 28
withTotal: true
#
hackuity-dashboard-dataGet the data of a dashboard widget
#
Base Commandhackuity-dashboard-data
#
InputArgument Name | Description | Required |
---|---|---|
widget_id | The ID of the widget. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Hackuity.Dashboard.Data | Unknown | The data of the widget |
#
Command example!hackuity-dashboard-data widget_id=abcd3fgh1jklmn0pqrstuv
#
Context Example#
Human Readable Output#
Dashboard widget data (abcd3fgh1jklmn0pqrstuv)
currentNbAssets previousNbAssets 456 123