Standard Reports
· Audit reports – Covers all high-level data for the project, combining many available details into one unified view.
· Compromised reports – Details all hosts on which Metasploit was able to open a session, hosts on which a Metasploit module was successfully run, and hosts where a vulnerability was recorded.
· Authentication token reports – Details all cracked hosts, passwords, SMB hashes, and SSH keys that were collected and discovered.
· Services reports – Details all available network services discovered
· Collected evidence reports – Covers all looted hosts. Describes the files and screenshots that were collected from compromised hosts.
· Campaigns reports – Details all social engineering campaigns that were launched as part of the project.
· Web app reports – Enumerates all web sites and their vulnerabilities, forms, and pages.
· PCI compliance reports – Uses PCI compliance criteria to analyze the hosts.
· FISMA compliance reports – Uses FISMA compliance criteria to analyze the hosts.
![]() |