This project is designed to run in a Docker container. In the opinion of cybersecurity specialists and digital forensics, it is not a good idea to run this in a custom installation of Django, but if you need it, you can find all the construction steps within the Dockerfile.
Importing and analyzing Nmap XML files
Statistics and graphs of uncovered services, ports, operating systems, etc.
Inspect a single host by clicking on its IP address
Attach tags to a host
Insert notes to a specific host
Generate a PDF report with graphics, details, tags and notes
Look for vulnerabilities and exploits based on the CPE compiled by Nmap
Variations on v2.1
Better use of Django template
Corrected Nmap XML analysis problems
Exploits and vulnerabilities collection issues fixed
A new network view was added
PDF report generation
When the PDF version of the Nmap XML report is created, the XML file name is used as the document title on the first page. According to experts in digital forensics, WebMap will replace some parts of the filename in the following way:
‘_’ will be replaced by a space
‘.xml’ will be deleted
PDF title: ACME Ltd.
Vulnerabilities and exploits
Thanks to Circl.lu’s incredible API services, WEBMAP can search for vulnerabilities and exploits for each CPE compiled by Nmap. Not all CPE are verified through the circl.lu API.
This application is not intended for its Internet exposure. Developers recommend the user to use only their local host or, in case you cannot, be careful to filter who can access WebMap with a firewall rule or something like that. Exposing this application on the Internet could lead not only to a XSS condition, but also to a leak of confidential information about scanning your port. Please be smart when using WebMap.