Rumble 2.2 HP iLO Analysis, Virtual Machine Fingerprinting, and VLAN Tracking

|
Updated

Rumble Network Discovery 2.2 #

Rumble 2.2 is available with improved analysis capabilities for HP iLOs, virtual machine fingerprinting support, automatic VLAN membership tracking through switch enumeration, and much more.

Track HP iLO warranties and find outdated firmware #

The Rumble scan engine now enumerates detailed information from HP Integrated Lights-Out (iLO) modules and includes a new iLO-specific CSV export that allows enterprise customers to track warranties across the environment.

The inventory now includes detailed information for HP iLOs, including host names, MAC addresses, detailed hardware model information, iLO firmware version, and health status. The HP iLO CSV export includes everything necessary for warranty tracking as well as additional fields including:

  • The configured Insight Remote Support server
  • The health status of the module
  • All active MAC addresses
  • Authentication methods

In addition to the inventory, there are also three new asset attribute reports to help you find HP iLOs based on the server model, firmware version, and iLO model. You can use the firmware version report to quickly find outdated iLOs across the organization.

HP iLO Inventory

Virtual machine fingerprinting #

This release includes first-class reporting of virtual machine vendors and virtual hardware fields. A new asset attribute, virtual, identifies the virtual machine vendor of each asset in your environment. You can use this attribute to query vendor-specific virtual machines, like VMware or VirtualBox. To list all virtual machines, you can use a query like alive:t AND has:virtual. A new icon in the asset inventory indicates that a system is a virtual machine. Please note that these changes only take affect after your next scan completes.

For a quick breakdown by vendor, you can use the new virtual asset attribute report.

Virtual Machine Inventory

Virtual LAN tracking #

The new VLAN Membership Report breaks down all identified virtual LANs and the number of assets associated with each. Rumble reports VLAN associations for assets connected to a managed switch where SNMP credentials are available.

To help assess gaps, you can query has:vlan to show all assets with a VLAN, or a query like not has:vlan, to find assets where switch VLAN data is not available. You can also use a query like vlan:40 to find all assets associated with a specific VLAN.

VLAN Membership Report

Find Exim servers on your network #

The Rumble Query Library helps you find things fast, which is particularly useful when a vulnerability disclosure requires immediate action. Recently, the Qualys research reported 21 new vulnerabilities in the Exim mail server software. Security updates are available, but getting a comprehensive list of affected systems can be tricky. You can use our pre-built query to find all Exim servers in your environment, fast.

Exim Email Server Query

Release Notes #

This release includes a ton of other changes, including bug fixes, user experience tweaks, and other small udpates. Read the full changelog to see all improvements in Rumble 2.2.

Don't have access to Rumble yet? Sign up for a free trial to try out these new capabilities.

Written by runZero Team

Due to the nature of their research and out of respect for their privacy, runZero team members prefer to remain anonymous. Their work is published under the runZero name.

More about runZero Team
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Explore more

Webcasts
The Unreasonable Effectiveness of Inside Out Attack Surface Management
HD Moore, founder of runZero (and previously Metasploit), presents new research that will forever redefine how you approach attack surface...
Webcasts
Safeguarding OT/ICS Assets: Insights from the U.S. Department of Energy
Security experts from the National Renewable Energy Lab’s (NREL) Clean Energy Cybersecurity Accelerator™ (CECA) program join runZero to discuss...
runZero Insights
Ensure compliance with DORA’s ICT risk framework using runZero
Learn how to uncover unmanaged and unknown assets— including IT, OT, and IoT— to meet DORA's hidden risk requirements using runZero.
Talks
DEF CON 32: SSHamble: Unexpected Exposures in SSH (Video)
This talk digs deep into SSH, the lesser-known implementations, many of the surprising security issues found along the way, and how to exploit them.

See Results in Minutes

Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

© Copyright 2025 runZero, Inc. All Rights Reserved