-
Notifications
You must be signed in to change notification settings - Fork 0
/
report.html
112 lines (96 loc) · 4.02 KB
/
report.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<script src="https://code.jquery.com/jquery-3.2.1.slim.min.js" integrity="sha384-KJ3o2DKtIkvYIK3UENzmM7KCkRr/rE9/Qpg6aAZGJwFDMVNA/GpGFF93hXpG5KkN" crossorigin="anonymous"></script>
<script src="https://cdn.jsdelivr.net/npm/[email protected]/dist/umd/popper.min.js" integrity="sha384-ApNbgh9B+Y1QKtv3Rn7W3mgPxhU9K/ScQsAP7hUibX39j7fakFPskvXusvfa0b4Q" crossorigin="anonymous"></script>
<script src="https://cdn.jsdelivr.net/npm/[email protected]/dist/js/bootstrap.min.js" integrity="sha384-JZR6Spejh4U02d8jOt6vLEHfe/JQGiRRSQQxSfFWpi1MquVdAyjUar5+76PVCmYl" crossorigin="anonymous"></script>
<title>Title</title>
<style>
.center-block {
display: block;
margin-left: auto;
margin-right: auto;
}
.figure {display: table;margin-right: auto;margin-left: auto;}
.figure-caption {display: table-caption;caption-side: bottom;text-align: center;}
</style>
</head>
<body>
<div class="jumbotron jumbotron-fluid">
<div class="container">
<h1 class="display-4">CySET</h1>
<p class="lead">Network Security Report</p>
</div>
</div>
<div class="container">
<div class="row">
<div class="col">
<p id="scan_title"> This report shows the results of a security / vulnerability Scan performed on {DATE} on {IP}</p>
</div>
</div>
<div class="row">
<div class="col">
<h3> 1. Host Discovery:</h3>
</div>
</div>
<div class="row">
<div class="col">
<p id="host_discover_title"> We scanned the network to identify devices that are on the network. We found a total of {n}
devices. The below figure visualizes the devices that are connected to your network {Name/IP}.</p>
</div>
</div>
<div class="row">
<div class="col-md-3">
<figure class="figure">
<img class = "figure-img" id="network_diagram_img" src = "scan_results/scan1/imgs/network_diagram_auto.png" width="500" height="400">
<figcaption class="figure-caption center-block">Host Discovery Diagram</figcaption>
</figure>
</div>
</div>
<div class="row">
<div class="col">
<h3> 2. Port Scan:</h3>
</div>
</div>
<div class="row">
<div class="col">
<p> The device was scanned for open ports, the findings are:</p>
<ul><li id="number_of_open_ports">{N} number of open ports. </li></ul>
<p> The below figure shows the ports that are open, the protocol in use and the service it is currently running.</p>
</div>
</div>
<div class="row">
<div class="col-md-3">
<figure class="figure">
<img class = "figure-img" id="port_scan_image" src = "scan_results/scan1/imgs/open_ports.png" width="500" height="400">
<figcaption class="figure-caption center-block">List of open ports</figcaption>
</figure>
</div>
</div>
<div class="row">
<div class="col">
<h3> 3. Vulnerability Scan:</h3>
</div>
</div>
<div class="row">
<div class="col">
<p id = "vulnerabilaty_scan"> There are {n} vulnerabilities that have been identified from the open ports. </p>
<p> Below are some Visualizations showing the distribution of vulnerabilities by varius netrics:</p>
</div>
</div>
<div class="row-fluid">
<div class="col-xs-6">
<img class id="base_score_image" src = "scan_results/scan1/imgs/base_score_count.png" width="600" height="400">
<!-- <figcaption>Distribution of Base Score</figcaption>-->
</div>
<div class="col-xs-6">
<div>
<img src = "scan_results/scan1/imgs/base_score_count.png" width="600" height="400">
<!-- <figcaption>Distribution of Base Score</figcaption>-->
</div>
</div>
</div>
</div>
</body>
</html>