-
Notifications
You must be signed in to change notification settings - Fork 21
Commit
- Loading branch information
There are no files selected for viewing
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,192 @@ | ||
<!DOCTYPE html> | ||
<html class="writer-html5" lang="en" data-content_root="../"> | ||
<head> | ||
<meta charset="utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /> | ||
|
||
<!-- Google tag (gtag.js) --> | ||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-R21NVEB2EY"></script> | ||
<script> | ||
window.dataLayer = window.dataLayer || []; | ||
function gtag(){dataLayer.push(arguments);} | ||
gtag('js', new Date()); | ||
gtag('config', 'G-R21NVEB2EY'); | ||
</script> | ||
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" /> | ||
<title>Reporting — tech.bitvijays.com 2.0.0 documentation</title> | ||
<link rel="stylesheet" type="text/css" href="../_static/pygments.css?v=80d5e7a1" /> | ||
<link rel="stylesheet" type="text/css" href="../_static/css/theme.css?v=19f00094" /> | ||
|
||
|
||
<!--[if lt IE 9]> | ||
<script src="../_static/js/html5shiv.min.js"></script> | ||
<![endif]--> | ||
|
||
<script src="../_static/jquery.js?v=5d32c60e"></script> | ||
<script src="../_static/_sphinx_javascript_frameworks_compat.js?v=2cd50e6c"></script> | ||
<script src="../_static/documentation_options.js?v=51b770b3"></script> | ||
<script src="../_static/doctools.js?v=888ff710"></script> | ||
<script src="../_static/sphinx_highlight.js?v=dc90522c"></script> | ||
<script src="../_static/debug.js"></script> | ||
<script src="../_static/js/theme.js"></script> | ||
<link rel="index" title="Index" href="../genindex.html" /> | ||
<link rel="search" title="Search" href="../search.html" /> | ||
<link rel="next" title="Configuration Review" href="LFF-IPS-P6-ConfigurationReview.html" /> | ||
<link rel="prev" title="Post Exploitation" href="LFF-IPS-P4-PostExploitation.html" /> | ||
</head> | ||
|
||
<body class="wy-body-for-nav"> | ||
<div class="wy-grid-for-nav"> | ||
<nav data-toggle="wy-nav-shift" class="wy-nav-side"> | ||
<div class="wy-side-scroll"> | ||
<div class="wy-side-nav-search" > | ||
|
||
|
||
|
||
<a href="../index.html" class="icon icon-home"> | ||
tech.bitvijays.com | ||
</a> | ||
<div role="search"> | ||
<form id="rtd-search-form" class="wy-form" action="../search.html" method="get"> | ||
<input type="text" name="q" placeholder="Search docs" aria-label="Search docs" /> | ||
<input type="hidden" name="check_keywords" value="yes" /> | ||
<input type="hidden" name="area" value="default" /> | ||
</form> | ||
</div> | ||
</div><div class="wy-menu wy-menu-vertical" data-spy="affix" role="navigation" aria-label="Navigation menu"> | ||
<p class="caption" role="heading"><span class="caption-text">The Essentials</span></p> | ||
<ul> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_The_Essentials/LFF-ESS-P0A-CyberSecurityEnterprise.html">Cybersecurity in an Enterprise</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_The_Essentials/LFF-ESS-P0B-LinuxEssentials.html">Linux Basics</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_The_Essentials/LFF-ESS-P0C-CloudEssentials.html">Cloud Infrastructure Technologies</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_The_Essentials/LFF-ESS-P0E-OpenSource.html">Open Source Concepts</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_The_Essentials/LFF-ESS-P0D-SecureSoftware.html">Secure Software Development Fundamentals</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_The_Essentials/LFF-ESS-P0F-IndustrialControlSystems.html">Industrial Control Systems</a></li> | ||
</ul> | ||
<p class="caption" role="heading"><span class="caption-text">Infrastructure Pentest</span></p> | ||
<ul class="current"> | ||
<li class="toctree-l1"><a class="reference internal" href="LFF-IPS-P1-IntelligenceGathering.html">Intelligence Gathering</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="LFF-IPS-P2-VulnerabilityAnalysis.html">Vulnerability Analysis</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="LFF-IPS-P3-Exploitation.html">Exploitation</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="LFF-IPS-P4-PostExploitation.html">Post Exploitation</a></li> | ||
<li class="toctree-l1 current"><a class="current reference internal" href="#">Reporting</a><ul> | ||
<li class="toctree-l2"><a class="reference internal" href="#open-source-reporting-tools">Open-Source Reporting Tools</a><ul> | ||
<li class="toctree-l3"><a class="reference internal" href="#serpico">Serpico</a></li> | ||
<li class="toctree-l3"><a class="reference internal" href="#dart">DART</a></li> | ||
</ul> | ||
</li> | ||
<li class="toctree-l2"><a class="reference internal" href="#open-source-data-management-tools">Open-Source Data-Management Tools</a><ul> | ||
<li class="toctree-l3"><a class="reference internal" href="#cisco-kvasir">Cisco Kvasir</a></li> | ||
<li class="toctree-l3"><a class="reference internal" href="#threadfix">Threadfix</a></li> | ||
<li class="toctree-l3"><a class="reference internal" href="#salesforce-vulnreport">Salesforce Vulnreport</a></li> | ||
</ul> | ||
</li> | ||
</ul> | ||
</li> | ||
<li class="toctree-l1"><a class="reference internal" href="LFF-IPS-P6-ConfigurationReview.html">Configuration Review</a></li> | ||
</ul> | ||
<p class="caption" role="heading"><span class="caption-text">Vulnerable Machines</span></p> | ||
<ul> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_Vulnerable_Machines/LFC-VM-P0-InitialRecon.html">Initial Recon</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_Vulnerable_Machines/LFC-VM-P1-FromNothingToUnprivilegedShell.html">From Nothing to a Unprivileged Shell</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_Vulnerable_Machines/LFC-VM-P2-UnprivilegedToPrivilegedShell.html">Unprivileged Shell to Privileged Shell</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_Vulnerable_Machines/LFC-VM-P3-TipsAndTricks.html">Tips and Tricks</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_Vulnerable_Machines/LFC-VM-P4-Appendix.html">Appendix</a></li> | ||
</ul> | ||
<p class="caption" role="heading"><span class="caption-text">CTF - Challenges</span></p> | ||
<ul> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_Capture_The_Flag/LFC-BinaryExploitation.html">Binary Exploitation</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_Capture_The_Flag/LFC-Forensics.html">Forensics</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_Capture_The_Flag/LFC-ReverseEngineering.html">Reverse Engineering</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_Capture_The_Flag/LFC-Cryptography.html">Cryptography</a></li> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_Capture_The_Flag/LFC-CodingQuickRef.html">Coding Quick Reference</a></li> | ||
</ul> | ||
<p class="caption" role="heading"><span class="caption-text">Critical Infrastructure</span></p> | ||
<ul> | ||
<li class="toctree-l1"><a class="reference internal" href="../Series_Critical_Infrastructure/LFF-CIS-ElectricalGrid.html">Electrical Grid</a></li> | ||
</ul> | ||
|
||
</div> | ||
</div> | ||
</nav> | ||
|
||
<section data-toggle="wy-nav-shift" class="wy-nav-content-wrap"><nav class="wy-nav-top" aria-label="Mobile navigation menu" > | ||
<i data-toggle="wy-nav-top" class="fa fa-bars"></i> | ||
<a href="../index.html">tech.bitvijays.com</a> | ||
</nav> | ||
|
||
<div class="wy-nav-content"> | ||
<div class="rst-content"> | ||
<div role="navigation" aria-label="Page navigation"> | ||
<ul class="wy-breadcrumbs"> | ||
<li><a href="../index.html" class="icon icon-home" aria-label="Home"></a></li> | ||
<li class="breadcrumb-item active">Reporting</li> | ||
<li class="wy-breadcrumbs-aside"> | ||
</li> | ||
</ul> | ||
<hr/> | ||
</div> | ||
<div role="main" class="document" itemscope="itemscope" itemtype="http://schema.org/Article"> | ||
<div itemprop="articleBody"> | ||
|
||
<section id="reporting"> | ||
<h1>Reporting<a class="headerlink" href="#reporting" title="Link to this heading"></a></h1> | ||
<p>This blog would explore different open-source reporting tools and data-management tools which can be utilized to during Penetration Test.</p> | ||
<section id="open-source-reporting-tools"> | ||
<h2>Open-Source Reporting Tools<a class="headerlink" href="#open-source-reporting-tools" title="Link to this heading"></a></h2> | ||
<section id="serpico"> | ||
<h3>Serpico<a class="headerlink" href="#serpico" title="Link to this heading"></a></h3> | ||
<p><a class="reference external" href="https://github.com/SerpicoProject/Serpico">Serpico</a> : SimplE RePort wrIting and CollaboratiOn tool - Serpico is a penetration testing report generation and collaboration tool. It was developed to cut down on the amount of time it takes to write a penetration testing report.</p> | ||
<p>Serpico is at its core a report generation tool but targeted at creating information security reports. When building a report the user adds “findings” from the template database to the report. When there are enough findings, click ‘Generate Report’ to create the docx with your findings. The docx design comes from a Report Template which can be added through the UI; a default one is included. The Report Templates use a custom Markup Language to stub the data from the UI (i.e. findings, customer name, etc) and put them into the report.</p> | ||
</section> | ||
<section id="dart"> | ||
<h3>DART<a class="headerlink" href="#dart" title="Link to this heading"></a></h3> | ||
<p><a class="reference external" href="https://github.com/lmco/dart/blob/master/README.md">DART</a> : DART is a test documentation tool created by the Lockheed Martin Red Team to document and report on penetration tests in isolated network environments.</p> | ||
</section> | ||
</section> | ||
<section id="open-source-data-management-tools"> | ||
<h2>Open-Source Data-Management Tools<a class="headerlink" href="#open-source-data-management-tools" title="Link to this heading"></a></h2> | ||
<section id="cisco-kvasir"> | ||
<h3>Cisco Kvasir<a class="headerlink" href="#cisco-kvasir" title="Link to this heading"></a></h3> | ||
<p><a class="reference external" href="https://github.com/KvasirSecurity/Kvasir">Cisco Kvasir</a> : Kvasir is a web-based application with its goal to assist “at-a-glance” penetration testing. Disparate information sources such as vulnerability scanners, exploitation frameworks, and other tools are homogenized into a unified database structure. This allows security testers to accurately view the data and make good decisions on the next attack steps. More Information at <a class="reference external" href="https://blogs.cisco.com/security/introducing-kvasir">Introducing Kvasir</a></p> | ||
</section> | ||
<section id="threadfix"> | ||
<h3>Threadfix<a class="headerlink" href="#threadfix" title="Link to this heading"></a></h3> | ||
<p><a class="reference external" href="https://github.com/denimgroup/threadfix">Threadfix</a> : ThreadFix is a software vulnerability aggregation and management system that helps organizations aggregate vulnerability data, generate virtual patches, and interact with software defect tracking systems.</p> | ||
</section> | ||
<section id="salesforce-vulnreport"> | ||
<h3>Salesforce Vulnreport<a class="headerlink" href="#salesforce-vulnreport" title="Link to this heading"></a></h3> | ||
<p><a class="reference external" href="https://github.com/salesforce/vulnreport">SalesForce Vulnreport</a> : Vulnreport is a platform for managing penetration tests and generating well-formatted, actionable findings reports without the normal overhead that takes up security engineer’s time. The platform is built to support automation at every stage of the process and allow customization for whatever other systems you use as part of your pentesting process.</p> | ||
</section> | ||
</section> | ||
</section> | ||
|
||
|
||
</div> | ||
</div> | ||
<footer><div class="rst-footer-buttons" role="navigation" aria-label="Footer"> | ||
<a href="LFF-IPS-P4-PostExploitation.html" class="btn btn-neutral float-left" title="Post Exploitation" accesskey="p" rel="prev"><span class="fa fa-arrow-circle-left" aria-hidden="true"></span> Previous</a> | ||
<a href="LFF-IPS-P6-ConfigurationReview.html" class="btn btn-neutral float-right" title="Configuration Review" accesskey="n" rel="next">Next <span class="fa fa-arrow-circle-right" aria-hidden="true"></span></a> | ||
</div> | ||
|
||
<hr/> | ||
|
||
<div role="contentinfo"> | ||
<p>© Copyright Vijay Kumar & Contributors.</p> | ||
</div> | ||
|
||
|
||
|
||
</footer> | ||
</div> | ||
</div> | ||
</section> | ||
</div> | ||
<script> | ||
jQuery(function () { | ||
SphinxRtdTheme.Navigation.enable(false); | ||
}); | ||
</script> | ||
|
||
</body> | ||
</html> |