diff --git a/monkey_island/cc/ui/src/components/pages/ReportPage.js b/monkey_island/cc/ui/src/components/pages/ReportPage.js index cea8c8d87..4e34dd3a8 100644 --- a/monkey_island/cc/ui/src/components/pages/ReportPage.js +++ b/monkey_island/cc/ui/src/components/pages/ReportPage.js @@ -3,10 +3,10 @@ import {Col} from 'react-bootstrap'; import BreachedServers from 'components/report-components/BreachedServers'; import ScannedServers from 'components/report-components/ScannedServers'; import {ReactiveGraph} from 'components/reactive-graph/ReactiveGraph'; -import {options, edgeGroupToColor} from 'components/map/MapOptions'; +import {edgeGroupToColor, options} from 'components/map/MapOptions'; import StolenPasswords from 'components/report-components/StolenPasswords'; import ScannedBreachedChart from 'components/report-components/ScannedBreachedChart'; -import CollapsibleWellComponent from "../report-components/CollapsibleWell"; +import CollapsibleWellComponent from 'components/report-components/CollapsibleWell'; class ReportPageComponent extends React.Component { @@ -338,13 +338,16 @@ class ReportPageComponent extends React.Component { } else { content = ( -
- The first monkey run was started on {this.state.report.overview.monkey_start_time}. After {this.state.report.overview.monkey_duration}, all monkeys finished propagation attempts. + The first monkey run was started on {this.state.report.overview.monkey_start_time}. After {this.state.report.overview.monkey_duration}, all monkeys finished + propagation attempts.
A full report of the Monkeys activities follows. @@ -358,14 +361,31 @@ class ReportPageComponent extends React.Component {
- The Monkey discovered {this.state.report.glance.scanned.length} machines and successfully breached {this.state.report.glance.exploited.length} of them.
-
- In addition, while attempting to exploit additional hosts , security software installed in the network should have picked up the attack attempts and logged them.
-
+ The Monkey discovered {this.state.report.glance.scanned.length} machines and
+ successfully breached {this.state.report.glance.exploited.length} of them.
+
+ In addition, while attempting to exploit additional hosts , security software installed in the
+ network should have picked up the attack attempts and logged them.
+
Detailed recommendations in the next part of the report.
From the attacker's point of view, the network looks like this:
-