summaryrefslogtreecommitdiff
path: root/report
diff options
context:
space:
mode:
authormo khan <mo@mokhan.ca>2016-02-16 17:15:59 -0700
committermo khan <mo@mokhan.ca>2016-02-16 17:15:59 -0700
commite357ed7d32d00f066bb14511ab9863865d08bf2d (patch)
treed617f7a52685ebc9e335fcb12cf9810d3bc34b8a /report
parent1bdad0d8542bfdce73db359c9a4037bf5b07b5a7 (diff)
change csv columns.
Diffstat (limited to 'report')
-rw-r--r--report/discovery.csv56
-rw-r--r--report/ports.csv2
2 files changed, 29 insertions, 29 deletions
diff --git a/report/discovery.csv b/report/discovery.csv
index 77c9638..8810ee1 100644
--- a/report/discovery.csv
+++ b/report/discovery.csv
@@ -1,28 +1,28 @@
-hostname,ip,vulnerability,exploitable
-bwa,10.2.1.8,/phpmyadmin/: phpMyAdmin directory found,
-bwa,10.2.1.8,/wordpress/: A Wordpress installation was found.,
-bwa,10.2.1.8,OSVDB-3233: /icons/README: Apache default file found.,
-bwa,10.2.1.8,OSVDB-3268: /images/: Directory indexing found.,
-bwa,10.2.1.8,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found.,
-bwa,10.2.1.8,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code.,
-metasploitable,10.2.1.1,/phpMyAdmin/: phpMyAdmin directory found,
-metasploitable,10.2.1.1,OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.,
-metasploitable,10.2.1.1,OSVDB-3092: /phpMyAdmin/: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts.,
-metasploitable,10.2.1.1,OSVDB-3092: /phpMyAdmin/changelog.php: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts.,
-metasploitable,10.2.1.1,OSVDB-3092: /test/: This might be interesting...,
-metasploitable,10.2.1.1,OSVDB-3233: /icons/README: Apache default file found.,
-metasploitable,10.2.1.1,OSVDB-3233: /phpinfo.php: Contains PHP configuration information,
-metasploitable,10.2.1.1,OSVDB-3268: /doc/: Directory indexing found.,
-metasploitable,10.2.1.1,OSVDB-3268: /icons/: Directory indexing found.,
-metasploitable,10.2.1.1,OSVDB-3268: /test/: Directory indexing found.,
-metasploitable,10.2.1.1,OSVDB-48: /doc/: The /doc/ directory is browsable. This may be /usr/doc.,
-metasploitable,10.2.1.1,OSVDB-877: HTTP TRACE method is active suggesting the host is vulnerable to XST,
-tomcat-apache,10.2.1.6,Apache/2.2.16 appears to be outdated (current is at least Apache/2.2.19). Apache 1.3.42 (final release) and 2.0.64 are also current.,
-tomcat-apache,10.2.1.6,OSVDB-3233: /icons/README: Apache default file found.,
-tomcat-apache,10.2.1.6,OSVDB-3268: /icons/: Directory indexing found.,
-ultimatelamp,10.2.1.3,OSVDB-3268: /images/: Directory indexing found.,
-ultimatelamp,10.2.1.3,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found.,
-ultimatelamp,10.2.1.3,OSVDB-3233: /icons/README: Apache default file found.,
-ultimatelamp,10.2.1.3,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code.,
-ultimatelamp,10.2.1.3,/wordpress/: A Wordpress installation was found.,
-ultimatelamp,10.2.1.3,/phpmyadmin/: phpMyAdmin directory found,
+hostname,vulnerability,exploitable
+bwa,/phpmyadmin/: phpMyAdmin directory found,
+bwa,/wordpress/: A Wordpress installation was found.,
+bwa,OSVDB-3233: /icons/README: Apache default file found.,
+bwa,OSVDB-3268: /images/: Directory indexing found.,
+bwa,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found.,
+bwa,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code.,
+metasploitable,/phpMyAdmin/: phpMyAdmin directory found,
+metasploitable,OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.,
+metasploitable,OSVDB-3092: /phpMyAdmin/: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts.,
+metasploitable,OSVDB-3092: /phpMyAdmin/changelog.php: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts.,
+metasploitable,OSVDB-3092: /test/: This might be interesting...,
+metasploitable,OSVDB-3233: /icons/README: Apache default file found.,
+metasploitable,OSVDB-3233: /phpinfo.php: Contains PHP configuration information,
+metasploitable,OSVDB-3268: /doc/: Directory indexing found.,
+metasploitable,OSVDB-3268: /icons/: Directory indexing found.,
+metasploitable,OSVDB-3268: /test/: Directory indexing found.,
+metasploitable,OSVDB-48: /doc/: The /doc/ directory is browsable. This may be /usr/doc.,
+metasploitable,OSVDB-877: HTTP TRACE method is active suggesting the host is vulnerable to XST,
+tomcat-apache,Apache/2.2.16 appears to be outdated (current is at least Apache/2.2.19). Apache 1.3.42 (final release) and 2.0.64 are also current.,
+tomcat-apache,OSVDB-3233: /icons/README: Apache default file found.,
+tomcat-apache,OSVDB-3268: /icons/: Directory indexing found.,
+ultimatelamp,OSVDB-3268: /images/: Directory indexing found.,
+ultimatelamp,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found.,
+ultimatelamp,OSVDB-3233: /icons/README: Apache default file found.,
+ultimatelamp,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code.,
+ultimatelamp,/wordpress/: A Wordpress installation was found.,
+ultimatelamp,/phpmyadmin/: phpMyAdmin directory found,
diff --git a/report/ports.csv b/report/ports.csv
index c6880a9..7c298e0 100644
--- a/report/ports.csv
+++ b/report/ports.csv
@@ -1,4 +1,4 @@
-Hostname,IP,PORT,SERVICE,VERSION
+Hostname,IP,PORT,PROTOCOL,SERVICE/VERSION
bwa,10.2.1.8,139,netbios-ssn,Samba smbd 3.X (workgroup: WORKGROUP)
bwa,10.2.1.8,143,imap,Courier Imapd (released 2008)
bwa,10.2.1.8,22,ssh,OpenSSH 5.3p1 Debian 3ubuntu4 (protocol 2.0)