diff --git a/monkey_island/cc/ui/src/components/pages/ReportPage.js b/monkey_island/cc/ui/src/components/pages/ReportPage.js index 2c6551f53..e6becee6d 100644 --- a/monkey_island/cc/ui/src/components/pages/ReportPage.js +++ b/monkey_island/cc/ui/src/components/pages/ReportPage.js @@ -334,8 +334,7 @@ class ReportPageComponent extends React.Component {
  • Weak segmentation - Machines from different segments are able to communicate.
  • : null} {this.state.report.overview.warnings[this.Warning.TUNNEL] ? -
  • Lack of machine hardening, machines successfully tunneled monkey traffic using unused - ports.
  • : null} +
  • Weak segmentation - machines were able to communicate over unused ports.
  • : null} : @@ -441,7 +440,7 @@ class ReportPageComponent extends React.Component { className="label label-info" style={{margin: '2px'}}>{issue.ip_address}) is vulnerable to a SMB attack.
    - The attack succeeded by authenticating over SMB protocol with user {issue.username} and its password. @@ -458,7 +457,7 @@ class ReportPageComponent extends React.Component { className="label label-info" style={{margin: '2px'}}>{issue.ip_address}) is vulnerable to a SMB attack.
    - The attack succeeded by using a pass-the-hash attack over SMB protocol with user {issue.username}. @@ -475,7 +474,7 @@ class ReportPageComponent extends React.Component { className="label label-info" style={{margin: '2px'}}>{issue.ip_address}) is vulnerable to a WMI attack.
    - The attack succeeded by authenticating over WMI protocol with user {issue.username} and its password. @@ -492,7 +491,7 @@ class ReportPageComponent extends React.Component { className="label label-info" style={{margin: '2px'}}>{issue.ip_address}) is vulnerable to a WMI attack.
    - The attack succeeded by using a pass-the-hash attack over WMI protocol with user {issue.username}. @@ -509,7 +508,7 @@ class ReportPageComponent extends React.Component { className="label label-info" style={{margin: '2px'}}>{issue.ip_address}) is vulnerable to a SSH attack.
    - The attack succeeded by authenticating over SSH protocol with user {issue.username} and its password. @@ -526,7 +525,7 @@ class ReportPageComponent extends React.Component { className="label label-info" style={{margin: '2px'}}>{issue.ip_address}) is vulnerable to a RDP attack.
    - The attack succeeded by authenticating over RDP protocol with user {issue.username} and its password. @@ -545,8 +544,8 @@ class ReportPageComponent extends React.Component { className="label label-info" style={{margin: '2px'}}>{issue.ip_address}) is vulnerable to a SambaCry attack.
    - The attack succeeded by authenticating over SMB protocol with user {issue.username} and its password, and by using the SambaCry + The Monkey authenticated over the SMB protocol with user {issue.username} and its password, and used the SambaCry vulnerability. @@ -562,7 +561,7 @@ class ReportPageComponent extends React.Component { className="label label-info" style={{margin: '2px'}}>{issue.ip_address}) is vulnerable to an Elastic Groovy attack.
    - The attack succeeded because the Elastic Search server is not patched against CVE-2015-1427. + The attack was made possible because the Elastic Search server was not patched against CVE-2015-1427. ); @@ -577,8 +576,8 @@ class ReportPageComponent extends React.Component { className="label label-info" style={{margin: '2px'}}>{issue.ip_address}) is vulnerable to a ShellShock attack.
    - The attack succeeded because the HTTP server running on TCP port {issue.port} is vulnerable to a shell injection attack on the + The attack was made possible because the HTTP server running on TCP port {issue.port} was vulnerable to a shell injection attack on the paths: {this.generateShellshockPathListBadges(issue.paths)}. @@ -594,8 +593,8 @@ class ReportPageComponent extends React.Component { className="label label-info" style={{margin: '2px'}}>{issue.ip_address}) is vulnerable to a Conficker attack.
    - The attack succeeded because the target machine uses an outdated and unpatched operating system vulnerable to - Conficker. + The attack was made possible because the target machine used an outdated and unpatched operating system + vulnerable to Conficker. );