forked from jrocia/Search-log4Jvuln-AppScanSTD
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
16 additions
and
15 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,26 +1,27 @@ | ||
# Scanning multiple URLs with AppScan Standard in sequence. | ||
This script is written by jrocia for checking Log4J (CVE-2021-44228). | ||
Modified by Kevin Chia for scanning multiple URLs with AppScan Standard by reading URL in text file and excute scan in sequence. | ||
|
||
This Powershell script run AppScan Standard scans against a list of web sites (URLs.txt) and scan the URLs in sequence. | ||
This script is written by jrocia for checking Log4J (CVE-2021-44228).<br> | ||
Modified by Kevin Chia for scanning multiple URLs with AppScan Standard by reading URL in text file and excute scan in sequence. <br> | ||
<br> | ||
This Powershell script run AppScan Standard scans against a list of web sites (URLs.txt) and scan the URLs in sequence.<br> | ||
|
||
Structure of project:<br> | ||
Policy - You can export the policy settings from AppScan Standard, name the current active policy as scan.policy. | ||
Report - XML and PDF reports will be saved here. If you wish to generate report in different language, please change your AppScan GUI language first. | ||
Scan - the Scan file will be saved here. | ||
Start_Scan.ps - Main Script. | ||
URLs - URLs to be scaned. | ||
|
||
If you wish to edit scanning properties, edit Line 61. | ||
If you wish to export other kinds of report, edit Line 63. | ||
Policy - You can export the policy settings from AppScan Standard, name the current active policy as scan.policy.<br> | ||
Report - XML and PDF reports will be saved here. If you wish to generate report in different language, please change your AppScan GUI language first.<br> | ||
Scan - the Scan file will be saved here.<br> | ||
Start_Scan.ps - Main Script.<br> | ||
URLs - URLs to be scaned.<br> | ||
<br> | ||
If you wish to edit scanning properties, edit Line 61.<br> | ||
If you wish to export other kinds of report, edit Line 63.<br> | ||
<br> | ||
|
||
# How to excute the powershell script | ||
1.Open Windows PowerShell | ||
2.Go to the script location | ||
1.Open Windows PowerShell<br> | ||
2.Go to the script location<br> | ||
``` | ||
cd "C:\Users\username\Desktop\AppScanSTD_scan_by_sequence" | ||
``` | ||
3. Run Script | ||
3. Run Script<br> | ||
``` | ||
.\Start_Scan.ps1 | ||
``` |