09.12.2012 Views

Hack Attacks Testing How to Conduct Your - Back to Home

Hack Attacks Testing How to Conduct Your - Back to Home

Hack Attacks Testing How to Conduct Your - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 5.7 Viewing the scan report.<br />

Reporting<br />

Cerberus Internet Scanner 147<br />

When a scan is complete, <strong>to</strong> view the report (shown in Figure 5.7), simply click View<br />

Report from the File menu or click the third icon on the main screen. The report function<br />

should call up your default Web browser and load a report with hyperlinks <strong>to</strong> each<br />

vulnerability module output.<br />

The following is an example of the report generated from our testing target, given in<br />

the following sections:<br />

Web Service. It appears that ISM.DLL has not been unlinked from .htr. Using a<br />

buffer truncation vulnerability, it is possible <strong>to</strong> use this <strong>to</strong> get the source of ASP<br />

pages back. For more information, see the following advisory:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!