os_eol_expired:true
os_eol:<now AND os_eol_extended:<now
os_eol:<now AND os_eol_extended:>now
(os_eol:>now AND and os_eol:<6months) OR (os_eol:<now AND os_eol_extended:>now AND os_eol_extended:<6months)
os:linux AND os_eol:<now
os:windows AND os_eol:<now
first_seen:"<2weeks"
os:windows AND protocol:smb1 OR protocol:smb2
has_mac:f AND has_name:f AND os:= AND hardware:= AND detected_by:icmp AND service_count:<2
alive:t AND protocol:"ftp" AND banner:"=%Microsoft FTP%”
has_public:t OR has_public:t AND alive:t AND (protocol:rdp OR protocol:vnc OR protocol:teamviewer)
protocol:rdp OR protocol:vnc OR protocol:teamviewer OR protocol:ssh OR protocol:telnet
port:21 OR port:23 OR port:80 OR port:139 OR port:445 OR port:3306 OR port:1433 OR port:161 OR port:8080 OR port:3389 OR port:5900
multi_home:t AND has_public:f
alive:t AND has_public:t AND has_private:t
attribute:virtual
has:unmapped
virtual:azure OR virtual:ec2 OR virtual:gcp
virtual:vmware OR virtual:"Hyper-V" OR virtual:xen
source:runzero AND NOT (source:ms365defender OR source:intune OR source:azuread)
attribute:"ip.ttl.hops" AND ip.ttl.hops:>"8"
first_seen:<"2weeks"
created_at:<"2weeks"
last_seen:>"2weeks"
updated_at:>"2weeks"
software:sql OR software:mariadb OR software:oracledb OR software:mongodb OR software:database OR (software:redis NOT software:redistributable)
alive:t AND port:17472 AND (type:server OR type:desktop OR type:laptop)
NOT edr.name:Crowdstrike AND (type:server OR type:desktop OR type:laptop) OR NOT edr.name:Sentinelone AND (type:server OR type:desktop OR type:laptop)
NOT miradore.name:"%" AND (type:desktop OR type:laptop OR type:mobile)
@crowdstrike.dev.provisionStatus:"NotProvisioned"
@crowdstrike.dev.reducedFunctionalityMode:"yes"
@crowdstrike.dev.status:"normal"
((type:laptop or type:server or type:desktop) and (OS:"Windows" or OS:"linux" or OS:"mac") and not source:crowdstrike)
(ntlmssp.dnsDomain:"DOMAINNAME" and not source:crowdstrike)
(has:"@crowdstrike.dev.agentVersion" AND not @crowdstrike.dev.agentVersion:"<current version>")
(@crowdstrike.dev.lastLoginTS:=>60d)
has:"@sentinelone.dev.appsVulnerabilityStatus" AND @sentinelone.dev.appsVulnerabilityStatus:"=patch_required"
@tenable.dev.hasAgent:="true"
@tenable.dev.lastScanTimeTS:>"2weeks"
@tenable.dev.lastAuthenticatedScanDateTS:>30d
source:tenable and ((@tenable.dev.lastAuthenticatedScanDateTS:>30d) or (not @tenable.dev.lastAuthenticatedScanDateTS:>0))
@tenable.dev.operatingSystems:%Linux% and not OS:%linux%
@tenable.dev.operatingSystems:="Microsoft Windows"
(alive:t OR scanned:f) AND has:"@tenable.dev.acrScore" AND @tenable.dev.acrScore:"=8"
@rapid7.dev.report.endTimeTS:">2weeks"
@qualys.dev.host.lastScannedDateTimeTS:">2weeks"
source:qualys AND @qualys.dev.host.trackingMethod:="AGENT"
source:qualys AND source:qualys AND NOT @qualys.dev.host.trackingMethod:="AGENT"
source:qualys AND @qualys.dev.host.trackingMethod:="IP"
NOT @qualys.dev.host.trackingMethod:="AGENT" AND (type:server OR type:laptop OR type:desktop)
source:qualys AND @qualys.dev.host.trackingMethod:="IP" AND (type:server OR type:laptop OR type:desktop)
@googleworkspace.endpoint.enabledDeveloperOptions:="true"
@googleworkspace.endpoint.enabledUsbDebugging:="true"
os:Linux AND (source:VMware OR attribute:virtual)
os:Windows AND (source:VMware OR attribute:virtual)
@vmware.vm.config.tools.syncTimeWithHost:"=false"
@vmware.vm.config.extra.guestinfo.vmtools.versionString:”_”
@vmware.vm.runtime.maxMemoryUsage:"16384"
@vmware.vm.config.extra.floppy0.autodetect:"true”
type:bacnet
type:dvr AND os:hikvision
type:"IP Camera" OR type:"thermostat" OR type:"Amazon Device" OR hw:"Google Chromecast" OR type:"Game Console" OR type:"Robotic Cleaner" OR type:"Nest Device" OR type:"Network Audio" OR type:"Smart TV" OR type:"VR Headset" OR type:"Voice Assistant"
type:bacnet OR protocol:bacnet OR os:"%liebert%" OR os:"%avtech%" OR os:ebmgr OR type:thermostat
type:"access control"
type:"network audio" OR type:"ip phone" OR type:"voice assistant" OR type:"SIP gateway"
type:"ethernet io module" OR os.vendor:"lantronix" OR os:"%adam%" OR hw:"advantech"
type:"IP Camera" OR type:"DVR" OR type:"Video Encoder"
type:"ip camera" AND has_public:t AND (protocol:rtsp OR protocol:http)
alive:t AND has:"ssh.authMethods" AND protocol:"ssh" AND (ssh.authMethods:"=password" OR ssh.authMethods:"=password%publickey")
type:switch AND (_asset.protocol:http AND NOT _asset.protocol:tls) AND ( html.inputs:"password:" OR last.html.inputs:"password:" OR has:http.head.wwwAuthenticate OR has:last.http.head.wwwAuthenticate )`
protocol:telnet AND NOT port:23
protocol:ssh AND banner:"SSH-1"
_service.product:="OpenSSL:OpenSSL:3.0"
product:php OR banner:"%php%" OR cookie:phpsessid OR html.forms:"%.php" OR http.body:"%php%" OR http.head.location:"%.php" OR http.head.setCookie:"%phpsessid%" OR last.http.uri:"%.php" OR last.http.body:"%php%" OR last.html.forms:"%.php"
protocol:rdp AND (rdp.auth.rdp:supported OR rdp.auth.ssl:supported OR rdp.auth.sspeua:supported OR rdp.auth.tls:supported OR rdp.auth.nla:supported) AND(has_public:t OR has_ipv6:t)
protocol:snmp has:snmp.serialNumbers OR hw.serialNumber:t OR ilo.serialNumber:t
protocol:snmp has:snmp.serialNumbers
type:switch and not has:"snmp.auth"
has:unmapped
snmp.arpcache.ports:"lo"
snmp.arpcache.ports:"lo" AND snmp.interfaceAddrs:"<loopback IP>"
e.g.
snmp.arpcache.ports:"lo" AND snmp.interfaceAddrs:"192.168.100.1"
snmp.arpcache.ports:"lo" AND snmp.interfaceAddrs:"192.168.100.1/255.255.255.0"
_asset.protocol:tls AND tls.notAfterTS:<6weeks AND NOT tls.notAfterTS:<now
_asset.protocol:http AND protocol:http AND (_service.last.http.body:="%FileCatalyst%" OR _service.last.html.title:="%FileCatalyst%" OR _service.last.http.url:="%/workflow/jsp/logon.jsp%" OR _service.last.http.uri:="%/workflow/jsp/logon.jsp%" OR _service.last.http.head.contentSecurityPolicy:="%filecatalyst%")
product:openssl AND version:3.0
product:sql OR product:mariadb OR product:oracledb
product:sql OR product:mariadb OR product:mongodb OR product:oracledb OR product:database OR (product:redis NOT product:redistributable)
epss_score:>0.6
kev:cisa
kev:vulncheck
kev:any
name:crypto or name:exposure
test.pciComplianceStatus:"fail"
Tenable - High and Critical severity vulnerabilities that are on CISA's Known Exploited Vulnerability (KEV) list:
source:tenable AND (plugin.xrefs.type:"CISA-KNOWN-EXPLOITED" OR kev:cisa) AND (severity:high OR severity:critical)
Tenable - Newly reported critical severity vulns on the KEV with 15 days to remediate per CISA guidance:
source:tenable AND (plugin.xrefs.type:"CISA-KNOWN-EXPLOITED" OR kev:cisa) AND severity:critical AND firstFoundTS:<24hours
source:tenable AND (plugin.xrefs.type:"CISA-KNOWN-EXPLOITED" OR kev:cisa) AND severity:high AND firstFoundTS:<24hours
source:tenable AND (plugin.xrefs.type:"CISA-KNOWN-EXPLOITED" OR kev:cisa) AND firstFoundTS:<24hours
source:tenable AND plugin.exploitabilityEase:"Exploits are available" AND severity:critical
source:tenable AND plugin.exploitabilityEase:"No exploit is required" AND (severity:critical OR severity:high)
source:tenable AND plugin.vpr.score:"6.0"
source:tenable AND plugin.vpr.score:>"6.0"
source:tenable AND plugin.vpr.score:<"6.0"
source:tenable AND plugin.hasPatch:"true"
source:qualys AND vulnerability.threatIntel:"%Easy_Exploit%"
source:qualys AND vulnerability.threatIntel:"%Exploit_Public%"
source:qualys AND vulnerability.threatIntel:"%High_Lateral_Movement%"
source:qualys AND vulnerability.threatIntel:"%High_Data_Loss%"
source:qualys AND vulnerability.threatIntel:"%Denial_of_Service%"
source:qualys AND vulnerability.threatIntel:"%Predicted_High_Risk%"
source:qualys AND vulnerability.threatIntel:"%unauthenticated_Exploitation%"
source:qualys AND vulnerability.threatIntel:"%Remote_Code_Execution%"
source:qualys AND vulnerability.threatIntel:"%Wormable%"
source:qualys AND vulnerability.threatIntel:"%Ransomware%"
source:qualys AND (vulnerability.threatIntel:"%Cisa_Known_Exploited_Vulns%" OR kev:cisa)
os:"mitsubishi electric air conditioning system" and (_service.banner:"%AG-150%" OR _service.banner:"%G-50%" OR _service.banner:"%GB-50%" OR _service.banner:"%GB-24%" OR _service.banner:"%G-150%" OR _service.banner:"%EB-50%" OR _service.banner:"%CMS-RMD-J%")
essid:<ssid name> AND NOT authentication:<wifi security standard>
e.g.
essid:"Corporate_network" AND NOT authentication:"wpa2-enterprise"
essid:="2WIRE640" AND NOT (bssid:"14:ed:bb:e0:99:1d" OR bssid:"15:ea:cd:e4:78:2f")