diff --git a/monkey_island/cc/services/report.py b/monkey_island/cc/services/report.py index 830197444..048e2fb12 100644 --- a/monkey_island/cc/services/report.py +++ b/monkey_island/cc/services/report.py @@ -89,7 +89,7 @@ class ReportService: @staticmethod def get_stolen_creds(): - PASS_TYPE_DICT = {'password': 'Clear Password', 'lm_hash': 'LM', 'ntlm_hash': 'NTLM'} + PASS_TYPE_DICT = {'password': 'Clear Password', 'lm_hash': 'LM hash', 'ntlm_hash': 'NTLM hash'} creds = [] for telem in mongo.db.telemetry.find( {'telem_type': 'system_info_collection', 'data.credentials': {'$exists': True}}, diff --git a/monkey_island/cc/ui/src/components/pages/ReportPage.js b/monkey_island/cc/ui/src/components/pages/ReportPage.js index e29d9388f..f1daa6d3c 100644 --- a/monkey_island/cc/ui/src/components/pages/ReportPage.js +++ b/monkey_island/cc/ui/src/components/pages/ReportPage.js @@ -367,11 +367,11 @@ class ReportPageComponent extends React.Component { this.state.report.glance.exploited.length > 0 ? (

- Critical security issues found by Infection Monkey! + Critical security issues were detected!

) : (

- Infection Monkey did not find any critical security issues. + No critical security issues were detected.

) } { @@ -386,8 +386,8 @@ class ReportPageComponent extends React.Component { }

- To improve the monkey's success rate, try adding users and passwords, and enabling the "Local - network scan" config value under "Basic - Network" + To improve the monkey's detection rates, try adding users and passwords and enable the "Local network + scan" config value under Basic - Network.

The first monkey run was started on 0 ?

- Use the following exploit methods: + Used the following exploit methods:

    {this.state.report.overview.config_exploits.map(x =>
  • {x}
  • )}
@@ -450,7 +450,7 @@ class ReportPageComponent extends React.Component { '' :

- Monkeys were configured to not scan local network + Monkeys were configured to avoid scanning of the local network.

}

@@ -468,12 +468,12 @@ class ReportPageComponent extends React.Component { During this simulated attack the Monkey uncovered {this.state.report.overview.issues.filter(function (x) { return x === true; - }).length} issues, detailed below. The security issues uncovered include: + }).length} issues:

    {this.state.report.overview.issues[this.Issue.WEAK_PASSWORD] ?
  • Users with weak passwords.
  • : null} {this.state.report.overview.issues[this.Issue.STOLEN_CREDS] ? -
  • Stolen passwords/hashes were used to exploit other machines.
  • : null} +
  • Stolen credentials were used to exploit other machines.
  • : null} {this.state.report.overview.issues[this.Issue.ELASTIC] ?
  • Elastic Search servers not patched for CVE-2015-1427. diff --git a/monkey_island/cc/ui/src/components/report-components/StolenPasswords.js b/monkey_island/cc/ui/src/components/report-components/StolenPasswords.js index 7c42b6ea5..fde46f85a 100644 --- a/monkey_island/cc/ui/src/components/report-components/StolenPasswords.js +++ b/monkey_island/cc/ui/src/components/report-components/StolenPasswords.js @@ -7,7 +7,7 @@ const columns = [ columns: [ { Header: 'Username', accessor: 'username'}, { Header: 'Type', accessor: 'type'}, - { Header: 'Origin', accessor: 'origin'} + { Header: 'Stolen From', accessor: 'origin'} ] } ];