scheduling and jobs, new dataclasses and such better UDP handling

This commit is contained in:
2025-10-17 16:49:30 -05:00
parent 9956667c8f
commit 41306801ae
13 changed files with 771 additions and 169 deletions

View File

@@ -1,5 +1,6 @@
name: Corp WAN
scan_options:
cron: 5 3 * * *
udp_scan: true
tls_security_scan: false
tls_exp_check: false
@@ -8,8 +9,14 @@ reporting:
report_name: Corporate WAN Perimeter
report_filename: corp-wan.html
full_details: true
email_to: soc@example.com # single string is fine; or a list
email_cc: [] # explicitly none
scan_targets:
- ip: 10.10.20.4
expected_tcp: [22, 53, 80]
expected_udp: [53]
- ip: 10.10.20.5
expected_tcp: [22, 80]
expected_tcp: [22, 53, 80]
expected_udp: [53]

View File

@@ -1,5 +1,7 @@
name: DMZ
scan_options:
cron: 5 4 * * *
udp_scan: false
tls_security_scan: true
tls_exp_check: true
@@ -8,6 +10,10 @@ reporting:
report_name: Sneaky Geek Labs DMZ Report
report_filename: dmz-report.html
full_details: false
email_to:
- ptarrant@gmail.com
email_cc:
- matarrant@gmail.com
scan_targets:
- ip: 10.10.99.6

View File

@@ -0,0 +1,142 @@
name: Corp WAN
scan_options:
cron: 5 3 * * *
udp_scan: true
tls_security_scan: false
tls_exp_check: false
reporting:
report_name: RWEU
report_filename: RW-EU.html
full_details: true
email_to: soc@example.com # single string is fine; or a list
email_cc: [] # explicitly none
scan_targets:
- ip: 81.246.102.192
expected_tcp: []
expected_udp: []
- ip: 81.246.102.193
expected_tcp: []
expected_udp: []
- ip: 81.246.102.194
expected_tcp: []
expected_udp: []
- ip: 81.246.102.195
expected_tcp: []
expected_udp: []
- ip: 81.246.102.196
expected_tcp: []
expected_udp: []
- ip: 81.246.102.197
expected_tcp: []
expected_udp: []
- ip: 81.246.102.198
expected_tcp: []
expected_udp: []
- ip: 81.246.102.199
expected_tcp: []
expected_udp: []
- ip: 81.246.102.200
expected_tcp: []
expected_udp: []
- ip: 81.246.102.201
expected_tcp: []
expected_udp: []
- ip: 81.246.102.202
expected_tcp: []
expected_udp: []
- ip: 81.246.102.203
expected_tcp: []
expected_udp: []
- ip: 81.246.102.204
expected_tcp: []
expected_udp: []
- ip: 81.246.102.205
expected_tcp: []
expected_udp: []
- ip: 81.246.102.206
expected_tcp: []
expected_udp: []
- ip: 81.246.102.207
expected_tcp: []
expected_udp: []
- ip: 81.246.102.208
expected_tcp: []
expected_udp: []
- ip: 81.246.102.209
expected_tcp: []
expected_udp: []
- ip: 81.246.102.210
expected_tcp: []
expected_udp: []
- ip: 81.246.102.211
expected_tcp: []
expected_udp: []
- ip: 81.246.102.212
expected_tcp: []
expected_udp: []
- ip: 81.246.102.213
expected_tcp: []
expected_udp: []
- ip: 81.246.102.214
expected_tcp: []
expected_udp: []
- ip: 81.246.102.215
expected_tcp: []
expected_udp: []
- ip: 81.246.102.216
expected_tcp: []
expected_udp: []
- ip: 81.246.102.217
expected_tcp: []
expected_udp: []
- ip: 81.246.102.218
expected_tcp: []
expected_udp: []
- ip: 81.246.102.219
expected_tcp: []
expected_udp: []
- ip: 81.246.102.220
expected_tcp: []
expected_udp: []
- ip: 81.246.102.221
expected_tcp: []
expected_udp: []
- ip: 81.246.102.222
expected_tcp: []
expected_udp: []
- ip: 81.246.102.223
expected_tcp: []
expected_udp: []

View File

@@ -0,0 +1,17 @@
name: Corp WAN
scan_options:
udp_scan: true # if UDP ports are configured for a host, we will scan those ports.
tls_security_scan: false # if 443 is found, we will attempt TLS probes to check TLS versions.
tls_exp_check: false # if a cert is found, we will check and report the cert expiration date.
reporting:
report_name: Corporate WAN Perimeter # Report Name
report_filename: corp-wan.html # Report Filename
full_details: true # Show full details for ALL hosts (if nothing out of the ordinary is expected, still show ports)
email_to: soc@example.com # single string is fine; or a list
email_cc: [] # explicitly none
scan_targets: # a list of hosts to scan
- ip: 10.10.20.5
expected_tcp: [22, 80]
expected_udp: [53]