AutoPentestX generates detailed logs for every scan, capturing all operations, errors, and diagnostic information. Logs are essential for debugging, audit trails, and understanding scan behavior.
[STEP 2] Network Scanning...[*] Detecting operating system for 192.168.1.100...[✓] OS Detected: Linux Ubuntu 20.04 (Accuracy: 95%)[*] Scanning all TCP ports on 192.168.1.100...[✓] Port 22/tcp open - ssh OpenSSH 8.2p1[✓] Port 80/tcp open - http Apache httpd 2.4.41[✓] Port scan completed in 45.23 seconds[✓] Total open ports found: 5
Captures:
OS detection results
Port discovery progress
Service enumeration
Scan duration
Phase 3: Vulnerability Scanning
[STEP 3] Vulnerability Scanning...[*] Checking for common vulnerabilities...[!] Found: Outdated SSH Version on port 22[!] Found: Outdated Apache Server on port 80[*] Running Nikto scan on http://192.168.1.100:80...[✓] Nikto scan completed: 5 vulnerabilities found[*] Scanning for SQL injection...[✓] SQL injection scan completed: 1 vulnerabilities found
[STEP 5] Risk Assessment...[!] HIGH RISK: Port 80 - http (Score: 8.5/10)[!] HIGH RISK: Port 443 - ssl/http (Score: 8.2/10)[!] CRITICAL: SQL Injection vulnerabilities found: 1Overall Risk Level: HIGHTotal Risk Score: 42.3
Captures:
Per-port risk scores
Critical findings
Overall risk calculation
Phase 6: Exploitation Assessment
[STEP 6] Exploitation Assessment (Safe Mode)...[✓] Exploit matched: apache_mod_cgi_bash_env_exec for port 80[*] Running in SAFE MODE - No actual exploitation will occur[*] Simulating exploit: exploit/multi/http/apache_mod_cgi_bash_env_exec[✓] Metasploit RC script saved: exploits/exploit_192.168.1.100_80.rc[*] Port 80: apache_mod_cgi_bash_env_exec - SIMULATED
Captures:
Exploit matching results
Safe mode confirmations
RC script generation
Simulation status
Phase 7: Report Generation
[STEP 7] Generating PDF Report...[*] Adding cover page...[*] Adding executive summary...[*] Adding vulnerabilities...[*] Building PDF document...============================================================PDF REPORT GENERATED SUCCESSFULLY============================================================Report saved to: reports/AutoPentestX_Report_192_168_1_100.pdfFile size: 245.67 KB
[✓] Database connected: database/autopentestx.db[✓] OS Detected: Linux Ubuntu 20.04 (Accuracy: 95%)[✓] Port 80/tcp open - http Apache httpd 2.4.41[✓] Nikto scan completed: 5 vulnerabilities found[✓] PDF REPORT GENERATED SUCCESSFULLY
[!] Metasploit not found - Exploitation features limited[!] Found: Outdated SSH Version on port 22[!] HIGH RISK: Port 80 - http (Score: 8.5/10)[!] CRITICAL: SQL Injection vulnerabilities found: 1[!] Skipping potentially dangerous exploit: ms17_010_eternalblue
[✗] Database connection error: unable to open database file[✗] Error connecting to target: Connection timed out[✗] Nikto scan failed: nikto command not found[✗] Error inserting vulnerability: constraint failed[✗] Error generating PDF report: Permission denied
import refrom datetime import datetimedef parse_log(log_file): with open(log_file, 'r') as f: for line in f: if '[✗]' in line: print(f"Error: {line.strip()}") elif 'CRITICAL' in line or 'HIGH' in line: print(f"Alert: {line.strip()}")parse_log('logs/autopentestx_20251130_143015.log')
import jsonimport redef extract_structured_data(log_file): data = {'errors': [], 'warnings': [], 'vulnerabilities': []} with open(log_file, 'r') as f: for line in f: if '[✗]' in line: data['errors'].append(line.strip()) elif '[!]' in line and 'CVE' in line: data['vulnerabilities'].append(line.strip()) return json.dumps(data, indent=2)print(extract_structured_data('logs/autopentestx_20251130_143015.log'))