-
Notifications
You must be signed in to change notification settings - Fork 79
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Retrieve Vulnerability Results from JSON/Pickle #10
Comments
Hi @nstarke! After a Discover and Dump is run four files should be created:
The If you want the same STDOUT as Discover and Dump I'd recommend stealing the I just moved the import pickle
from firmware_slap.ghidra_handler import print_function
pickle_name = "Your_results.pickle"
with open(pickle_name, 'rb') as f:
results = pickle.load(f)
for result in results:
print_function(result) |
Works like a charm, would there be any value in adding this snippet as a script in |
I'm close to having #2 ready and I imagine the main use of the JSON will be loading it into Kibana, so you get a vulnerability dashboard. We could add the script to the bin folder, but no export it in the setup.py so it'd be there if you wanted it. |
I'll probably just hold off until the ELK stuff is finished and consume the vuln data that way. Just as an aside, I've had some really great results running firmware slap against firmware images for my day job. Thanks for all the hard work! Closing now. |
Is there currently a way to retrieve the vulnerability output that is displayed on STDOUT during a Discover_and_Dump session? I would assume all the information is in the json output, but there is a lot of data there. Any suggestions you might have would be greatly appreciated, and as always, I'll be happy to send a PR with documentation updates with any information provided. Thanks again!
The text was updated successfully, but these errors were encountered: