Skip to content

Latest commit

 

History

History
53 lines (42 loc) · 1.44 KB

File metadata and controls

53 lines (42 loc) · 1.44 KB

AppScan_Parser

Overview

The AppScan parser tool has been made to facilitate faster reporting during penetration testing exercises. This helps the pentesters focus more on the testing aspect of their projects and reduces the cumbersome and repetitive task of making customized client reports.

This python script simply takes two command line arguments:

Information Extracted

From XML Report

  • Vulnerability Name
  • Vulnerability Description
  • Recommendations
  • Affected URLs

From Log File

  • Visited URLs
  • Skipped URLs
  • Vulnerabilities found (the affected URL and the vulnerable parameter)
  • Login endpoints
  • Logout endpoints

Running the tool

Prerequisites

The tool runs on python 3.7.x installation.

Required Module: xlsxwriter

The same can be installed by using pip:

pip install xlsxwriter

If both python 2.x and 3.x are installed, then:

pip3 install xlsxwriter

Command

Tool expects the command in the following order:

python AppScan_parser.py <xml file name> <log file name>

If both python 2.x and 3.x are installed:

python3 AppScan_parser.py <xml file name> <log file name>

Screenshot

The below screenshot shows a sample output.