Reports : Standard Reports

Standard Reports

A standard report provides default report formats that you can use to generate a report.
Metasploit Pro provides the following report formats:
·
Audit reports – Covers all high-level data for the project, combining many available details into one unified view.
·
Compromised reports – Details all hosts on which Metasploit was able to open a session, hosts on which a Metasploit module was successfully run, and hosts where a vulnerability was recorded.
·
Authentication token reports – Details all cracked hosts, passwords, SMB hashes, and SSH keys that were collected and discovered.
·
Services reports – Details all available network services discovered
·
Collected evidence reports – Covers all looted hosts. Describes the files and screenshots that were collected from compromised hosts.
·
Campaigns reports – Details all social engineering campaigns that were launched as part of the project.
·
Web app reports – Enumerates all web sites and their vulnerabilities, forms, and pages.
·
PCI compliance reports – Uses PCI compliance criteria to analyze the hosts.
·
FISMA compliance reports – Uses FISMA compliance criteria to analyze the hosts.