N-Stalker allows you to choose what sections you want to include in the technical report. N-Stalker provides a wide range of technical information, from object details to vulnerability information, you may compose your own report. Here are the options:
Show Scan Session Statistics
|
When enabled, report will contain a table of statistics of the entire scan session.
|
Show Scan Policy Details
|
When enabled, report will contain a summary of the security checks used in the scan session.
|
Show Graphical Statistics of Scan Session
|
When enabled, report will contain a table of graphics displaying statistics about the scan session.
|
• | Items that require your attention |
Show Infrastructure Issues
|
When enabled, report will contain an executive summary of infrastructure vulnerabilities found within the scan session. This summary will contain a suggested plan of action (light technical information).
|
Show Confidentiality Issues
|
When enabled, report will contain an executive summary of confidentiality vulnerabilities found within the scan session. This summary will contain a suggested plan of action (light technical information).
|
Show Application Issues
|
When enabled, report will contain an executive summary of application vulnerabilities found within the scan session. This summary will contain a suggested plan of action (light technical information).
|
• | Object Technical Details |
Show Objects Summary
|
When enabled, report will contain a summary of all objects found during the scanning session.
|
Show Hidden Directories
|
When enabled, report will contain a list of all hidden directories found.
|
Show HTML Hidden Fields
|
When enabled, report will contain a list of all hidden fields found in Web Forms within the target's web application.
|
Show Web Forms Structure
|
When enabled, report will contain a list of all web forms found (in a structure form).
|
Show HTTP Cookies
|
When enabled, report will contain a list of all HTTP cookies used within the scanning session.
|
Show E-mail Address
|
When enabled, report will contain a list of all e-mail addresses found within the application.
|
Show Information Exposure
|
When enabled, report will contain a list of all information exposure found.
|
• | Vulnerability Technical Details |
Show Infrastructure Issues
|
When enabled, report will contain a list of all infrastructure vulnerabilities found within the scan session. This list will contain technical details on how did N-Stalker find out and how to fix.
|
Show Confidentiality Issues
|
When enabled, report will contain a list of all confidentiality vulnerabilities found within the scan session. This list will contain technical details on how did N-Stalker find out and how to fix.
|
Show Application Issues
|
When enabled, report will contain a list of all application vulnerabilities found within the scan session. This list will contain technical details on how did N-Stalker find out and how to fix.
|
Aggregate similar vulnerabilities
|
When enabled, N-Stalker will attempt to aggregate all similar vulnerabilities in a simple table, reducing the overall size of the report while maintaining its main characteristics (HTTP evidence will be shown for the first URI only).
|
Show HTTP Request & Response
|
When enabled, report will contain a detailed evidence of all HTTP communications that have caused the vulnerability. If "Aggregate similar vulnerability" is on (see above section), only evidence for the first URI will be shown.
|
Show Header Only
|
When enabled, only HTTP request and response headers will be shown.
|
Show Header/Body
|
If enabled instead, all HTTP data will be shown.
|
Restrict to
|
If not set to 0 (zero), this will impose a limit of bytes for HTTP request and response data (to avoid large reports).
|
|