DirtyScripts / ReportToolz /
root authored on 10 Nov 2022
..
classes added some stuff 5 years ago
templates the big return update 2 years ago
README.md burp xml to json files added 4 years ago
bp2json.php burp xml to json files added 4 years ago
config.php the big return update 2 years ago
floss.php improved getDirContents() 4 years ago
ns2json.php why so serious?! 4 years ago
pt2json.php minor fixes and initial floss script 4 years ago
rep2.php updated template to include OWASP 2021 2 years ago
repgen.php always something to fix! 2 years ago
update.php updated template to include OWASP 2021 2 years ago
vdb.php minor fixes and initial floss script 4 years ago
README.md

Report generation scripts

Requirements:

$> apt-get install php-xml php-zip php-mbstring

First copy templates/odt/config.conf to current work dir.

Fill out fields in config.conf (company name, your name, contact, tel etc.)

As pentesting copy vulnerability.json for each issue found to current work dir

End of test generate report:

╰» ./repgen.php -p "/mnt/hgfs/Pentest/pentests/2019/Company/" 
_____ _____ _____ Gen
||_// ||==  ||_// 
|| \  ||___ ||    

[!] path: /mnt/hgfs/Pentest/pentests/2019/Company/
[+] doc extracted
[+] added config values
[!] sorting vulns by CVSS
[+] added Low: Software Version Numbers Disclosed
[+] added Low: Verbose Error Reporting Enabled
[+] added Medium: Mising Security Headers
[+] added Medium: Insescure SSL Certificate Detected
[+] added Medium: Missing Cookie Attributes
[+] added Medium: jQuery Vulnerabilities
[+] added Low: Wildcard SSL Certificate
[=] generated report: /mnt/hgfs/Pentest/pentests/2019/Company/repgen.odt
[+] temp files removed

Tidy up a little, drop in your evidence for each issue etc.

Create all of the tables from that report:

╰» ./rep2.php -d "/mnt/hgfs/Pentest/pentests/2019/Company/repgen.odt" 
_____ _____ _____ 2
||_// ||==  ||_// 
|| \  ||___ ||    

[!] doc: /mnt/hgfs/Pentest/pentests/2019/Company/repgen.odt
[+] doc extracted
[=] fonts found: 23
[+] vulnerabilities identified
[+] temp files removed
[+] created directory /mnt/hgfs/Pentest/pentests/2019/Company/rep2/
[+] medium issues: /mnt/hgfs/Pentest/pentests/2019/Company/rep2/findings_medium.csv
[+] low issues: /mnt/hgfs/Pentest/pentests/2019/Company/rep2/findings_low.csv
[+] all issues: /mnt/hgfs/Pentest/pentests/2019/Company/rep2/findings_all.csv
[+] remediation table: /mnt/hgfs/Pentest/pentests/2019/Company/rep2/remediation.csv
[+] OWASP table: /mnt/hgfs/Pentest/pentests/2019/Company/rep2/owasp.csv
[=] Serious = 0, High = 0, Medium = 4, Low = 3

Ref    | Title                             |  Risk  |  CVSS  |  Remediation  |  OWASP
-------|-----------------------------------|--------|--------|---------------|------------------------------
5.1.1  |Missing Security Headers           |Medium  |5.1     |Configuration  |A6 Security Misconfiguration  
5.1.2  |Insecure SSL Certificate Detected  |Medium  |4.8     |Configuration  |A6 Security Misconfiguration  
5.1.3  |Missing Cookie Attributes          |Medium  |4.7     |Configuration  |A6 Security Misconfiguration  
5.1.4  |jQuery Vulnerabilities             |Medium  |4.3     |Configuration  |A9 Components with Known Vulne
5.2.1  |Software Version Numbers Disclosed |Low     |5.3     |Configuration  |A6 Security Misconfiguration  
5.2.2  |Verbose Error Reporting Enabled    |Low     |5.3     |Configuration  |A6 Security Misconfiguration  
5.2.3  |Wildcard SSL Certificate           |Low     |3.7     |Configuration  |A6 Security Misconfiguration

No longer an issue:
How to copy created csv tables into corresponding parts of report...
This is a bit wierd, but. Click the "table" button and insert a 4 column table, copy and paste into that first.
Now you can delete that table and will be able to copy/pase into the others.. no idea why, bug in libre?

Vulnerability DB script

╰» ./vdb.php -s xss
Ref    | Title                                            |  Description
-------|--------------------------------------------------|----------------------------------------------------------------
125    |Missing HTTP Security Headers                     |- description here -
151    |Reflected Cross-Site Scripting (XSS)              |- description here -
152    |Stored Cross-Site Scripting (XSS)                 |- description here -

╰» ./vdb.php -i 151
151 - Reflected Cross-Site Scripting (XSS)
CVSS: -snip- Risk: -snip- OWASP: -snip-
CVSS2: -snip-
CVSS3: -snip-
Description: -snip-
Technical Description: -snip-
Soluton: -snip-
Impact: -snip-
Remediation: -snip-
Tags: reflected, xss, javascript, injection

╰» ./vdb.php -i 151 -p /tmp
xss-reflected.json copied to /tmp/

Floss script

Tidy up JSON files from VDB and CSV of what to replace

╰» ./floss.php -p /mnt/hgfs/Pentest/pentests/2019/Company/report/
·▄▄▄▄▄▌        .▄▄ · .▄▄ · 
▐▄▄·██•  ▪     ▐█ ▀. ▐█ ▀. 
██▪ ██▪   ▄█▀▄ ▄▀▀▀█▄▄▀▀▀█▄
██▌.▐█▌▐▌▐█▌.▐▌▐█▄▪▐█▐█▄▪▐█
▀▀▀ .▀▀▀  ▀█▄▀▪ ▀▀▀▀  ▀▀▀▀ 
VDB: 598, Vulns: 85
[+] created directory /mnt/hgfs/Pentest/pentests/2019/Company/report/flossed/
[+] created directory /mnt/hgfs/Pentest/pentests/2019/Company/report/to_check/
Flossed: 11 -> 6
To Check: 74

ptreport to JSON files

Convert ptreport reprep output file to JSON files for repgen.php

╰» ./pt2json.php -d /mnt/hgfs/Pentest/pentests/2019/Company/report/Company-9ajgty.ptreport 
            ______   _                  
        _  (_____ \ (_)                 
 ____ _| |_  ____) ) _  ___  ___  ____  
|  _ (_   _)/ ____/ | |/___)/ _ \|  _ \ 
| |_| || |_| (_____ | |___ | |_| | | | |
|  __/  \__)_______)| (___/ \___/|_| |_|
|_|               (__/                  

[!] doc: /mnt/hgfs/Pentest/pentests/2019/Company/report/Company-9ajgty.ptreport
[+] creating json for: SSL/TLS 64-bit Block Size Cipher Suites
[+] creating json for: TLS Version 1.0 Protocol in use
[+] creating json for: Untrustworthy Server Certificate Chain
[+] creating json for: Missing or Permissive HTTP Content-Security-Policy Header
[+] creating json for: Missing or Permissive X-Frame-Options HTTP Response Header
[+] creating json for: No HTTP Strict Transport Security

nessus to JSON files

Convert .nessus output file to JSON files for repgen.php

╰» ./ns2json.php -d /mnt/hgfs/Pentest/pentests/2019/Company/report/Company-9ajgty.nessus -i 
            ______   _                  
           (_____ \ (_)                 
 ____   ___  ____) ) _  ___  ___  ____  
|  _ \ /___)/ ____/ | |/___)/ _ \|  _ \ 
| | | |___ | (_____ | |___ | |_| | | | |
|_| |_(___/|_______)| (___/ \___/|_| |_|
                  (__/     

[!] doc: /mnt/hgfs/Pentest/pentests/2019/Company/report/Company-9ajgty.nessus
[-] Issue: Nessus Scan Information
[-] Issue: Host Fully Qualified Domain Name (FQDN) Resolution
[-] Issue: IPSEC Internet Key Exchange (IKE) Version 2 Detection
[-] Issue: IPSEC Internet Key Exchange (IKE) Version 1 Detection
[-] Issue: Common Platform Enumeration (CPE)
[+] Saving: SSL Medium Strength Cipher Suites Supported (SWEET32)
[-] Issue: SSL Cipher Block Chaining Cipher Suites Supported

burp to JSON files

Convert Burp "report issues" XML file to JSON files for repgen.php

╰» php /opt/RossMarks/DirtyScripts/ReportToolz/bp2json.php -d /tmp/rpt/burp.xml 
 _          ______   _
| |        (_____ \ (_)
| | _  ____  ____) ) _  ___  ___  ____
| || \|  _ \/_____/ | |/___)/ _ \|  _ \ 
| |_) ) | | |______ | |___ | |_| | | | |
|____/| ||_(_______)| (___/ \___/|_| |_|
      |_|         (__/             

[!] doc: /tmp/rpt/burp.xml
[=] 5 vulnerabilities identified
[+] creating file: /tmp/rpt/strict-transport-security-misconfiguration.json
[+] creating file: /tmp/rpt/password-field-with-autocomplete-enabled.json
[+] creating file: /tmp/rpt/lack-or-misconfiguration-of-security-header-s-.json
[+] creating file: /tmp/rpt/interesting-header-s-.json
[+] creating file: /tmp/rpt/software-version-numbers-revealed.json
[!] These are empty JSON files, remember to floss!