Skip to content

Commit

Permalink
去除最后的公司信息,去除特朗普信息
Browse files Browse the repository at this point in the history
  • Loading branch information
Hypdncy committed Dec 17, 2021
1 parent 74f9691 commit 98b2839
Show file tree
Hide file tree
Showing 12 changed files with 76 additions and 109 deletions.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
2 changes: 1 addition & 1 deletion cnf/const.py
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@
# '.:::::' ':'````..
# ------------------------------------------------------------

company_name = "懂王"
company_name = "Hypdncy"

systems_file = "./data/systems.csv"

Expand Down
4 changes: 2 additions & 2 deletions config.py
Original file line number Diff line number Diff line change
Expand Up @@ -31,8 +31,8 @@

config_data = {
"user": {
"name": "懂王", # 客户名称
"acronym": "DW", # 客户名字缩写
"name": "XX客户", # 客户名称
"acronym": "XXKH", # 客户名字缩写
"contacts": "张三", # 客户联系人
"phone": "13838383838", # 手机号
}
Expand Down
25 changes: 1 addition & 24 deletions logs/loops_error.json
Original file line number Diff line number Diff line change
@@ -1,24 +1 @@
{
"30218": {
"name_en": "Terminal Services Encryption Level is not FIPS-140 Compliant",
"name_cn": "",
"risk_en": "Low",
"risk_cn": "低危",
"describe_en": "The encryption setting used by the remote Terminal Services service is not FIPS-140 compliant.",
"describe_cn": "",
"solution_en": "Change RDP encryption level to : 4. FIPS Compliant",
"solution_cn": "",
"cve": ""
},
"999999": {
"name_en": "Microsoft Windows SMBv1 Multiple Vulnerabilities",
"name_cn": "",
"risk_en": "High",
"risk_cn": "高危",
"describe_en": "The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1) enabled. It is, therefore, affected by multiple vulnerabilities : - Multiple information disclosure vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1) due to improper handling of SMBv1 packets. An unauthenticated, remote attacker can exploit these vulnerabilities, via a specially crafted SMBv1 packet, to disclose sensitive information. (CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, CVE-2017-0276) - Multiple denial of service vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1) due to improper handling of requests. An unauthenticated, remote attacker can exploit these vulnerabilities, via a specially crafted SMB request, to cause the system to stop responding. (CVE-2017-0269, CVE-2017-0273, CVE-2017-0280) - Multiple remote code execution vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1) due to improper handling of SMBv1 packets. An unauthenticated, remote attacker can exploit these vulnerabilities, via a specially crafted SMBv1 packet, to execute arbitrary code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278, CVE-2017-0279) Depending on the host's security policy configuration, this plugin cannot always correctly determine if the Windows host is vulnerable if the host is running a later Windows version (i.e., Windows 8.1, 10, 2012, 2012 R2, and 2016) specifically that named pipes and shares are allowed to be accessed remotely and anonymously. Tenable does not recommend this configuration, and the hosts should be checked locally for patches with one of the following plugins, depending on the Windows version : 100054, 100055, 100057, 100059, 100060, or 100061.",
"describe_cn": "",
"solution_en": "Apply the applicable security update for your Windows version : - Windows Server 2008 : KB4018466 - Windows 7 : KB4019264 - Windows Server 2008 R2 : KB4019264 - Windows Server 2012 : KB4019216 - Windows 8.1 / RT 8.1. : KB4019215 - Windows Server 2012 R2 : KB4019215 - Windows 10 : KB4019474 - Windows 10 Version 1511 : KB4019473 - Windows 10 Version 1607 : KB4019472 - Windows 10 Version 1703 : KB4016871 - Windows Server 2016 : KB4019472",
"solution_cn": "",
"cve": "CVE-2017-0279"
}
}
{}
152 changes: 71 additions & 81 deletions logs/loops_global.json

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion modle/docx/loops.py
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ def __init__(self, LOOPHOLES: Loopholes):
self.host = "漏洞排序"

def save(self):
filename = "./{0}主机扫描报告-{1}-漏洞排序.docx".format(cnf_data["user"]["name"], cnf_data["date"]["end"])
filename = "./{0}主机扫描报告-漏洞排序-{1}.docx".format(cnf_data["user"]["name"], cnf_data["date"]["end"])
self.doc.save(filename)
logging.info("---保存漏洞排序文档:{filename}".format(filename=filename))
return filename
Expand Down
Binary file modified template/主机扫描报告模板-202104.docx
Binary file not shown.
Binary file modified 演示图主机排序.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified 演示图漏洞排序.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 98b2839

Please sign in to comment.