diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index ff2e25c..5c155e8 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -36,8 +36,10 @@ jobs: root / 'index.html', root / '404.html', root / 'passive-scanner' / 'index.html', + root / 'passive-scanner' / 'report' / 'index.html', root / 'online-passive-scanner' / 'index.html', root / 'online-passive-scanner' / 'report.html', + root / 'online-passive-scanner' / 'report-legacy.html', ] missing_html = [str(p) for p in html_files if not p.exists()] if missing_html: diff --git a/.github/workflows/main.yml b/.github/workflows/main.yml index 32ccf7a..2cfc12e 100644 --- a/.github/workflows/main.yml +++ b/.github/workflows/main.yml @@ -45,8 +45,10 @@ jobs: Path('index.html'), Path('404.html'), Path('passive-scanner/index.html'), + Path('passive-scanner/report/index.html'), Path('online-passive-scanner/index.html'), Path('online-passive-scanner/report.html'), + Path('online-passive-scanner/report-legacy.html'), ] pattern = re.compile(r'(?:href|src)=["\']([^"\']+)["\']') ignore_exact = {'link', 'link_to_plugin'} diff --git a/README.md b/README.md index 333a6b6..ccb3cf2 100644 --- a/README.md +++ b/README.md @@ -42,3 +42,4 @@ The scanner is vendored at `/online-passive-scanner/` and is accessible at: A Jekyll-native launcher page is available at: - `/passive-scanner/` +- `/passive-scanner/report/` diff --git a/_includes/header.html b/_includes/header.html index 9b5d2ad..4ea35b8 100644 --- a/_includes/header.html +++ b/_includes/header.html @@ -2,5 +2,5 @@ OverviewCapabilitiesStandardsScannerDocs
-Get OWTF +Get OWTF
diff --git a/online-passive-scanner/report-legacy.html b/online-passive-scanner/report-legacy.html new file mode 100644 index 0000000..b0a137a --- /dev/null +++ b/online-passive-scanner/report-legacy.html @@ -0,0 +1,1237 @@ + + + + + + + + + OWASP OWTF Report + + + + + + + + +
+ Fork me on GitHub + + + + +
+ + + + +
+
+
+
+ +
+
+ +

Status Complete

+ +
Command: owtf.py -t passive
+
Target: ( )
+ + + + + +

History

+ + + + + + + + + + + + + + + + + + + + + + +
START END COMMAND STATUS
1 owtf.py -t passive Complete
+ + + + +
+
+
+

Target (1)

+
    + + + + +
  • ( )
  • + + + +
+
+ +
+
+
+
+ +
+
+
+
+ +
+
+ + +
+
+ +
+
+ +
+ +
+ + +
+ +
+ + + + + +
+ +
+ + + + + +
+ +
+ + + +
+ Matches:-- +
+ +
+
+ + + + + + +
+
+ +
+
+ + + + + + + + + +
+ + + + + +
+ + + Subreport is not loaded yet ... click Refresh button! + +
+ +
+ + + + +
+
+ + + + + + +
+
+   +
+ +
+ Export + + + +
+ + + + + + +
+ + +
+ +
+
+ + + +
+
+
+

+ Generated by + OWASP OWTF + - + Version 1.0.1 "Lionheart" + - + @github +

+
+ + + + + + + + + + + + + + + + + + + diff --git a/online-passive-scanner/report.html b/online-passive-scanner/report.html index b0a137a..6bfff66 100644 --- a/online-passive-scanner/report.html +++ b/online-passive-scanner/report.html @@ -1,1237 +1,27 @@ - - - - - - OWASP OWTF Report - - - - - - + + + Redirecting to passive scanner report... + + -
- Fork me on GitHub - - - - -
- - - - -
-
-
-
- -
-
- -

Status Complete

- -
Command: owtf.py -t passive
-
Target: ( )
- - - - - -

History

- - - - - - - - - - - - - - - - - - - - - - -
START END COMMAND STATUS
1 owtf.py -t passive Complete
- - - - -
-
-
-

Target (1)

-
    - - - - -
  • ( )
  • - - - -
-
- -
-
-
-
- -
-
-
-
- -
-
- - -
-
- -
-
- -
- -
- - -
- -
- - - - - -
- -
- - - - - -
- -
- - - -
- Matches:-- -
- -
-
- - - - - - -
-
- -
-
- - - - - - - - - -
- - - - - -
- - - Subreport is not loaded yet ... click Refresh button! - -
- -
- - - - -
-
- - - - - - -
-
-   -
- -
- Export - - - -
- - - - - - -
- - -
- -
-
- - - -
-
-
-

- Generated by - OWASP OWTF - - - Version 1.0.1 "Lionheart" - - - @github -

-
- - - - - - - - - - - - - - - - - +

Redirecting to the modern passive scanner report view...

+

Continue

+ diff --git a/passive-scanner/index.html b/passive-scanner/index.html index baa7044..396e559 100644 --- a/passive-scanner/index.html +++ b/passive-scanner/index.html @@ -11,7 +11,7 @@

Passive scanner

Scan a target URL

-

This Jekyll page launches OWTF's upstream online passive scanner and opens its report view for the URL you provide.

+

Passive scanning reviews publicly exposed signals such as headers, metadata, and client-side behavior to surface likely security misconfigurations without active exploitation.

@@ -54,7 +54,7 @@

Sca try { var parsed = new URL(value); - var destination = '/online-passive-scanner/report.html#q=' + encodeURIComponent(parsed.href); + var destination = '/passive-scanner/report/#q=' + encodeURIComponent(parsed.href); window.location.assign(destination); } catch (err) { showError('The value provided is not a valid URL.'); diff --git a/passive-scanner/report/index.html b/passive-scanner/report/index.html new file mode 100644 index 0000000..a3190e9 --- /dev/null +++ b/passive-scanner/report/index.html @@ -0,0 +1,95 @@ +--- +layout: default +title: "OWTF Passive Scanner Report" +description: "Review passive scan findings in a modern report interface." +--- +
+
+ {% include header.html %} +
+
+
+

Passive scanner report

+

Target Findings

+

This report highlights externally visible signals that can indicate weak security posture, such as risky headers, information disclosure, and client-side findings.

+
+ +
+
+
+

Target

+

No target selected.

+

Enter a URL and reopen the report if you need to switch targets.

+
+ +
+
+ +
+
+

Report View

+

Embedded legacy engine

+
+ +
+
+
+ {% include footer.html %} +
+