• Welcome
    • Quick Start Guide
    • Getting Started
    • Metasploit Basics
      • What is Penetration Testing?
      • Glossary
      • Keyboard Shortcuts
    • Getting Support
      • Submitting a Request for Enhancement
    • Rapid7's End of Life Policy
  • Installing Metasploit
    • Installing Metasploit Pro
      • System Requirements
    • Setting Up a Vulnerable Target
      • Metasploitable 2
      • Metasploitable 2 Exploitability Guide
  • Discovery
    • Discovery Scan
    • Importing Data
      • Importing Project Sonar
    • Vulnerability Scanning with Nexpose
    • Tracking Real-Time Statistics and Events
  • Validate Vulnerabilities
    • Validating a Vulnerability
    • Working with the Vulnerability Validation Wizard
    • Validating Vulnerabilities Discovered by Nexpose
    • Sharing Validation Results with Nexpose
  • Exploitation
    • Listener
    • Using Exploits
    • Skipping Fragile Devices
  • Payloads
    • Working with Payloads
    • The Payload Generator
  • Post-exploitation
    • About Post-Exploitation
    • Manage Meterpreter and Shell Sessions
    • Meterpreter getsystem
  • Credentials
    • Understanding Credentials
    • Managing Credentials
    • Reusing Credentials
    • Searching Credentials
    • Bruteforce Attacks
      • Understanding Bruteforce Findings
  • Social Engineering
    • About Social Engineering
    • Create a New Campaign
    • Create a Custom Campaign
    • Managing Campaigns
    • Review Your Findings
    • Managing Target Lists
    • Uploading Custom SSL Certificates
    • Modifying the SSL Cipher for Web Servers
    • Best Practices for Social Engineering
  • Automating Tasks
    • About Task Chains
    • Create a Task Chain
    • Managing and Editing Task Chains
    • Scheduling Task Chains
    • Resource Scripts
  • Reporting
    • About Reports
      • Activity Report
      • Audit Report
      • Collected Evidence Report
      • Compromised and Vulnerable Hosts Report
      • Credentials Report
      • FISMA Compliance Report
      • PCI Compliance Report
      • Social Engineering Campaign Details Report
      • Services Report
    • Customizing Standard Reports
    • Working with Custom Templates
    • About MetaModule Reports
      • AD CS Workflows MetaModule Report
      • Credentials Domino MetaModule Report
      • Known Credentials Intrusion Report
      • Single Password Testing MetaModule Report
      • SSH Key Testing MetaModule Report
      • Pass the Hash Report
  • Logs
    • Accessing Logs
    • Rotating Logs
    • Exporting Logs
    • Find Recently Changed Logs
  • MetaModules
    • AD CS Workflows MetaModule
    • Credentials Domino MetaModule
      • Understanding the Credentials Domino MetaModule Findings
    • Single Credential Testing MetaModule
    • SSH Key Testing MetaModule
    • Known Credentials Intrusion MetaModule
    • Segmentation and Firewall Testing MetaModule
  • Tutorials
    • Passing the Hash Tutorial
    • Testing a Single Credential Tutorial
    • Credentials Tutorial
  • Metasploit Pro Web Interface
    • Using the Metasploit Web Interface
    • The Projects Page
    • The Analysis Page
    • The Sessions Page
    • The Campaign Page
    • The Modules Page
    • The Tasks Page
    • The Administration Page
  • Managing Projects
    • Creating and Managing Projects
    • Exporting Project Data
    • Team Collaboration
  • Hosts
    • Managing Hosts
  • Managing and Updating Metasploit
    • Managing User Accounts
    • Managing License Keys
    • Verifying Downloads with SHA-1 Hashes
    • Backing Up and Restoring Metasploit Data
    • Notification Center
    • Updating Metasploit
    • Restarting Metasploit Services
    • Uninstalling Metasploit
    • Replacing the SSL Certificate
    • Set Up a Global SMTP Server
    • Reset Username and Password
  • Pro Console
    • About the Pro Console
    • Auto-Exploitation
    • Exporting and Importing Data
    • Managing Credentials
    • Managing the Database from the Pro Console
    • Managing Notes
    • Managing Tasks
    • Managing Vulnerabilities
    • Manual Exploitation
    • Managing Metasploit
    • Working with Projects
    • Pro Console Reports
    • Scanning and Managing Hosts
  • Troubleshooting
    • Unable to Connect
    • Does Pro include Framework as well?
    • How Are Logins Created?
    • Project Report Taking a Long Time
    • Exploit Has Been Running for a Long Time
    • Installation Troubleshooting
      • Download fails at x% error
      • Anti-virus Interrupts Installation
      • Metasploit service can"t bind to port 3790
      • “Metasploit is initializing” error
      • Metasploit Pro Free Trial
      • Invalid Email/ Domain
      • Register Without Internet Connection
      • Activation Failed Error
      • Prohibited Countries
      • Set the lhost in Metasploit
    • Update Troubleshooting
      • Incremental Updates
      • Items Displaying Incorrectly After Update
      • Installation failed: Signature failure Error
      • Failed to Update
    • Administration Troubleshooting
      • Support for 32-bit Operating Systems
      • Use Meterpreter Locally Without an Exploit
      • Issue Restarting on Windows Due to RangeError
      • Where Is the Activity Log?
      • Logs and Reports after Metasploit 4.9
      • Why Can"t I Add a New User?
    • Database Troubleshooting
      • No Database Connection
      • Automatically Connect the Database
      • Postgres Unable to Connect
    • Payloads Troubleshooting
      • Encoded Payloads Don"t Bypass Anti-virus
      • Getsystem Command
    • Social Engineering Troubleshooting
      • Frequently Asked Questions
      • Social Engineering Campaigns Report Image Broken
      • Social Engineering Campaign Not Working
      • Server Is Not Sending Emails
      • Social Engineering Campaign Taking a Long Time
    • Nexpose Troubleshooting
      • Nexpose host is unreachable
      • Authentication required for API access
      • Nexpose Scan Blackout
      • Scans Are Not Importing
    • Bruteforce Attacks Troubleshooting
      • What Happens When a Credential Fails?
      • Bruteforce Attack Is Not Working
  • Metasploit Framework
    • Metasploit Framework
    • Installing the Metasploit Framework
    • Managing the Database
    • Managing Workspaces
    • Modules
    • Running Metasploit Remotely
    • Tagging Hosts in msfconsole
  • Using APIs
    • Standard API Methods
    • Standard API Methods Reference
    • Pro API Methods Reference
      • Pro General API
      • Pro License API
      • Pro Updates API
      • Pro Task API
      • Pro Feature API
      • Pro Import API
      • Pro Loot API
      • Pro Module API
    • REST API
      • REST API Endpoints
    • RPC API
      • Sample Usage of the RPC API
  • Release Notes
    • Command Platform Release Notes

Nexpose Troubleshooting
Copy link

Nexpose works hand-in-hand with Metasploit to identify vulnerabilities and show how they could be exploited by an attacker.

  • Nexpose host is unreachable
  • Authentication required for API access
  • Nexpose Scan Blackout
  • Scans Are Not Importing

  • © Rapid7
    • Legal Terms
    • Privacy Policy
    • Export Notice
    • Trust