multiple targets per engagement: missing IP or/and fqdn for host filtering? #11828
Whitehorse2
started this conversation in
General
Replies: 1 comment 3 replies
-
I don't have much experience with importing reports with endpoints, but could you elaborate more with screenshots maybe? I'm not sure I understand your request. Do you just want an extra column with the IP, or do you want to group the findings differently? |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I am currently using DefectDoJo with OpenVAS reports, these have countless hosts per engagement.
What I am missing here in the analysis is e.g. the IP address in findings to search directly for fqdn or IP (#11709 (comment)) inside findings.
In Hosts/Endpoints have fqdn with port, but also without an overview of the criticality. An overview (or some statistics) of which targets/hosts/IPs have how many critical and medium vulnerabilities would be very helpful here.
The fqdn is more likely to change than an IP address, so it is better for tracking, but fqdn is better for a fast identification.
DefectDoJo seems to work somewhat differently in this respect, perhaps also in order to be comparable with other scanner results.
For scans with many different systems, it seems important to be able to filter according to the target and receive statistics about how many critical / medium findings are on one target (not endpoint with only one port).
Is there perhaps a way to get closer to this, e.g. by importing an additional IP column with the parser or something similar?
Thank you very much for your work on this project. I am actually very fond of DefectDoJo, but I would like to describe here my problems with the evaluation of the OpenVAS data. The fact that this data is permanently missing seems to me to be an even bigger problem for my usage.
Beta Was this translation helpful? Give feedback.
All reactions