Skip to content

Commit 8433c18

Browse files
committed
addming markdown documentation
1 parent 33dfb9a commit 8433c18

54 files changed

Lines changed: 1773 additions & 227 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

docs/.DS_Store

2 KB
Binary file not shown.

docs/Using Markdown in Reports.md

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
tags: [Markdown, Reporting, Core Features, Burp Suite]
3+
date: 2024-03-17
4+
---
5+
When exploiting a vulnerability in a penetration test it is important to capture your attack steps quickly and thoroughly so you don't have to spend extra time remembering and re-validating what you did when it's time to report on the finding. Nothing can break your flow more than having to stop what you are doing to format text, fix hyperlinks or build numbered lists of steps. Markdown is one of the quickest ways to type formatted text and capture these details effortlessly.
6+
7+
!!! note "Pro Tip!"
8+
9+
The API fully supports Markdown. This makes it easy to develop automated tools that can add issues or other text to Faction with formatted text via the API.
10+
11+
12+
Here are some examples how you can use markdown in Faction.
13+
14+
## Exploit Steps
15+
You can enter Markdown directly into the details editor when adding a new vulnerability. Once you enter the text, highlight just the part you want to convert to markdown and click the Markdown button in the toolbar.
16+
17+
![](/files/Pasted%20image%2020240317122727.png)
18+
19+
After you select the Markdown button your text will be converted to rich text as shown below:
20+
![](/files/Pasted%20image%2020240317122948.png)
21+
22+
You can also perform this in a code block if you want to write your Markdown in a monospaced font. First select `Code` as shown below:
23+
![](/files/Pasted%20image%2020240317123222.png)
24+
25+
Then start entering your text in the code block as shown here.
26+
![](/files/Pasted%20image%2020240317123535.png)
27+
28+
Select the text in the code block and click the Markdown button
29+
![](/files/Pasted%20image%2020240317124431.png)
30+
31+
## Faction Burp Suite Extension
32+
If you find a vulnerability while using the Faction Burp extension, you can add the finding and all details directly though the extension. Below is an example of cross site scripting:
33+
![](/files/Pasted%20image%2020240317125704.png)
34+
35+
In Burp Suite, select the request and select Add New Finding:
36+
![](/files/Pasted%20image%2020240317125749.png)
37+
38+
A dialog box will open that lets you search for the vulnerability type (in this case Cross Site Scripting) and allow you to enter your details on how to recreate the exploit.
39+
40+
![](/files/Pasted%20image%2020240317130047.png)
41+
42+
Now if we navigate back into Faction and view the details we will see the exploit steps displayed in rich text.
43+
44+
![](/files/Pasted%20image%2020240317130408.png)
45+
46+
## Executive Summaries and Scoping
47+
You can use Markdown in your Executive Summaries as well to quickly type up your high level assessments of the application and provide guidance on how to prioritize the findings.
48+
![](/files/Pasted%20image%2020240317124018.png)
49+
50+
Select the text and click Markdown to convert!
51+
![](/files/Pasted%20image%2020240317124033.png)
52+
53+
You can also add scoping information in tables without messing with tables editors and setting hyperlinks which can be a pain sometimes.
54+
![](/files/Pasted%20image%2020240317124827.png)
55+
56+
![](/files/Pasted%20image%2020240317124858.png)
57+
58+
59+
57.8 KB
Loading
47.4 KB
Loading
28.6 KB
Loading
65.8 KB
Loading
44.7 KB
Loading
136 KB
Loading
142 KB
Loading
44.3 KB
Loading

0 commit comments

Comments
 (0)