diff options
| author | mo khan <mo@mokhan.ca> | 2016-02-16 17:15:59 -0700 |
|---|---|---|
| committer | mo khan <mo@mokhan.ca> | 2016-02-16 17:15:59 -0700 |
| commit | e357ed7d32d00f066bb14511ab9863865d08bf2d (patch) | |
| tree | d617f7a52685ebc9e335fcb12cf9810d3bc34b8a | |
| parent | 1bdad0d8542bfdce73db359c9a4037bf5b07b5a7 (diff) | |
change csv columns.
| -rw-r--r-- | report/discovery.csv | 56 | ||||
| -rw-r--r-- | report/ports.csv | 2 |
2 files changed, 29 insertions, 29 deletions
diff --git a/report/discovery.csv b/report/discovery.csv index 77c9638..8810ee1 100644 --- a/report/discovery.csv +++ b/report/discovery.csv @@ -1,28 +1,28 @@ -hostname,ip,vulnerability,exploitable -bwa,10.2.1.8,/phpmyadmin/: phpMyAdmin directory found, -bwa,10.2.1.8,/wordpress/: A Wordpress installation was found., -bwa,10.2.1.8,OSVDB-3233: /icons/README: Apache default file found., -bwa,10.2.1.8,OSVDB-3268: /images/: Directory indexing found., -bwa,10.2.1.8,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found., -bwa,10.2.1.8,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code., -metasploitable,10.2.1.1,/phpMyAdmin/: phpMyAdmin directory found, -metasploitable,10.2.1.1,OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings., -metasploitable,10.2.1.1,OSVDB-3092: /phpMyAdmin/: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts., -metasploitable,10.2.1.1,OSVDB-3092: /phpMyAdmin/changelog.php: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts., -metasploitable,10.2.1.1,OSVDB-3092: /test/: This might be interesting..., -metasploitable,10.2.1.1,OSVDB-3233: /icons/README: Apache default file found., -metasploitable,10.2.1.1,OSVDB-3233: /phpinfo.php: Contains PHP configuration information, -metasploitable,10.2.1.1,OSVDB-3268: /doc/: Directory indexing found., -metasploitable,10.2.1.1,OSVDB-3268: /icons/: Directory indexing found., -metasploitable,10.2.1.1,OSVDB-3268: /test/: Directory indexing found., -metasploitable,10.2.1.1,OSVDB-48: /doc/: The /doc/ directory is browsable. This may be /usr/doc., -metasploitable,10.2.1.1,OSVDB-877: HTTP TRACE method is active suggesting the host is vulnerable to XST, -tomcat-apache,10.2.1.6,Apache/2.2.16 appears to be outdated (current is at least Apache/2.2.19). Apache 1.3.42 (final release) and 2.0.64 are also current., -tomcat-apache,10.2.1.6,OSVDB-3233: /icons/README: Apache default file found., -tomcat-apache,10.2.1.6,OSVDB-3268: /icons/: Directory indexing found., -ultimatelamp,10.2.1.3,OSVDB-3268: /images/: Directory indexing found., -ultimatelamp,10.2.1.3,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found., -ultimatelamp,10.2.1.3,OSVDB-3233: /icons/README: Apache default file found., -ultimatelamp,10.2.1.3,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code., -ultimatelamp,10.2.1.3,/wordpress/: A Wordpress installation was found., -ultimatelamp,10.2.1.3,/phpmyadmin/: phpMyAdmin directory found, +hostname,vulnerability,exploitable +bwa,/phpmyadmin/: phpMyAdmin directory found, +bwa,/wordpress/: A Wordpress installation was found., +bwa,OSVDB-3233: /icons/README: Apache default file found., +bwa,OSVDB-3268: /images/: Directory indexing found., +bwa,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found., +bwa,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code., +metasploitable,/phpMyAdmin/: phpMyAdmin directory found, +metasploitable,OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings., +metasploitable,OSVDB-3092: /phpMyAdmin/: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts., +metasploitable,OSVDB-3092: /phpMyAdmin/changelog.php: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts., +metasploitable,OSVDB-3092: /test/: This might be interesting..., +metasploitable,OSVDB-3233: /icons/README: Apache default file found., +metasploitable,OSVDB-3233: /phpinfo.php: Contains PHP configuration information, +metasploitable,OSVDB-3268: /doc/: Directory indexing found., +metasploitable,OSVDB-3268: /icons/: Directory indexing found., +metasploitable,OSVDB-3268: /test/: Directory indexing found., +metasploitable,OSVDB-48: /doc/: The /doc/ directory is browsable. This may be /usr/doc., +metasploitable,OSVDB-877: HTTP TRACE method is active suggesting the host is vulnerable to XST, +tomcat-apache,Apache/2.2.16 appears to be outdated (current is at least Apache/2.2.19). Apache 1.3.42 (final release) and 2.0.64 are also current., +tomcat-apache,OSVDB-3233: /icons/README: Apache default file found., +tomcat-apache,OSVDB-3268: /icons/: Directory indexing found., +ultimatelamp,OSVDB-3268: /images/: Directory indexing found., +ultimatelamp,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found., +ultimatelamp,OSVDB-3233: /icons/README: Apache default file found., +ultimatelamp,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code., +ultimatelamp,/wordpress/: A Wordpress installation was found., +ultimatelamp,/phpmyadmin/: phpMyAdmin directory found, diff --git a/report/ports.csv b/report/ports.csv index c6880a9..7c298e0 100644 --- a/report/ports.csv +++ b/report/ports.csv @@ -1,4 +1,4 @@ -Hostname,IP,PORT,SERVICE,VERSION +Hostname,IP,PORT,PROTOCOL,SERVICE/VERSION bwa,10.2.1.8,139,netbios-ssn,Samba smbd 3.X (workgroup: WORKGROUP) bwa,10.2.1.8,143,imap,Courier Imapd (released 2008) bwa,10.2.1.8,22,ssh,OpenSSH 5.3p1 Debian 3ubuntu4 (protocol 2.0) |
