Customizing Report Sections

Top  Previous  Next

N-Stalker allows you to choose what sections you want to include in the technical report. N-Stalker provides a wide range of technical information, from object details to vulnerability information, you may compose your own report. Here are the options:

 

Technical Summary

 

report-3

 

Show Scan Session Statistics

When enabled, report will contain a table of statistics of the entire scan session.

Show Scan Policy Details

When enabled, report will contain a summary of the security checks used in the scan session.

 

Graphic Details

 

report-4

 

Show Graphical Statistics of Scan Session

When enabled, report will contain a table of graphics displaying statistics about the scan session.

 

Items that require your attention

 

report-5

 

Show Infrastructure Issues

When enabled, report will contain an executive summary of infrastructure vulnerabilities found within the scan session. This summary will contain a suggested plan of action (light technical information).

Show Confidentiality Issues

When enabled, report will contain an executive summary of confidentiality vulnerabilities found within the scan session. This summary will contain a suggested plan of action (light technical information).

Show Application Issues

When enabled, report will contain an executive summary of application vulnerabilities found within the scan session. This summary will contain a suggested plan of action (light technical information).

 

Object Technical Details

 

report-6

 

Show Objects Summary

When enabled, report will contain a summary of all objects found during the scanning session.

Show Hidden Directories

When enabled, report will contain a list of all hidden directories found.

Show HTML Hidden Fields

When enabled, report will contain a list of all hidden fields found in Web Forms within the target's web application.

Show Web Forms Structure

When enabled, report will contain a list of all web forms found (in a structure form).

Show HTTP Cookies

When enabled, report will contain a list of all HTTP cookies used within the scanning session.

Show E-mail Address

When enabled, report will contain a list of all e-mail addresses found within the application.

Show Information Exposure

When enabled, report will contain a list of all information exposure found.

 

Vulnerability Technical Details

 

report-7

 

Show Infrastructure Issues

When enabled, report will contain a list of all infrastructure vulnerabilities found within the scan session. This list will contain technical details on how did N-Stalker find out and how to fix.

Show Confidentiality Issues

When enabled, report will contain a list of all confidentiality vulnerabilities found within the scan session. This list will contain technical details on how did N-Stalker find out and how to fix.

Show Application Issues

When enabled, report will contain a list of all application vulnerabilities found within the scan session. This list will contain technical details on how did N-Stalker find out and how to fix.

Aggregate similar vulnerabilities

When enabled, N-Stalker will attempt to aggregate all similar vulnerabilities in a simple table, reducing the overall size of the report while maintaining its main characteristics (HTTP evidence will be shown for the first URI only).

 

HTTP Evidence Details

 

report-8

 

Show HTTP Request & Response

When enabled, report will contain a detailed evidence of all HTTP communications that have caused the vulnerability. If "Aggregate similar vulnerability" is on (see above section), only evidence for the first URI will be shown.

Show Header Only

When enabled, only HTTP request and response headers will be shown.

Show Header/Body

If enabled instead, all HTTP data will be shown.

Restrict to

If not set to 0 (zero), this will impose a limit of bytes for HTTP request and response data (to avoid large reports).