Reporting

After the Run has successfully ended (or not) you can generate a report with every Step's output and result. When you have multiple Plan executions in a single Run (when utilizing multiple Workers), you can compare each execution and use this insight to e.g. score each team in a cybersecurity exercise.

The easiest way to generate a report is to use CLI:

cryton-cli runs report <ID>

Optionally, you can also generate a report for Plan/Stage/Step execution.

You can see an example report here:

id: 7
plan_id: 6
plan_name: Basic example
state: FINISHED
schedule_time: null
start_time: '2022-07-21T20:37:27.650142Z'
pause_time: null
finish_time: '2022-07-21T20:37:28.527673Z'
plan_executions:
- id: 7
  plan_name: Basic example
  state: FINISHED
  schedule_time: null
  start_time: '2022-07-21T20:37:27.661100Z'
  finish_time: '2022-07-21T20:37:28.517554Z'
  pause_time: null
  worker_id: 1
  worker_name: e2e-1
  evidence_dir: /tmp/run_7/worker_e2e-1
  stage_executions:
  - id: 7
    stage_name: get-localhost-credentials
    state: FINISHED
    start_time: '2022-07-21T20:37:27.862354Z'
    pause_time: null
    finish_time: '2022-07-21T20:37:28.504804Z'
    schedule_time: '2022-07-21T20:37:27.762581Z'
    step_executions:
    - id: 11
      step_name: check-ssh
      state: FINISHED
      start_time: '2022-07-21T20:37:27.898861Z'
      finish_time: '2022-07-21T20:37:28.276521Z'
      output: ''
      serialized_output:
        stats:
          args: /usr/bin/nmap -oX - -sV -p22 192.168.61.13
          start: '1658386108'
          scanner: nmap
          version: '7.80'
          startstr: Thu Jul 21 06:48:28 2022
          xmloutputversion: '1.04'
        runtime:
          exit: success
          time: '1658386109'
          elapsed: '0.31'
          summary: Nmap done at Thu Jul 21 06:48:29 2022; 1 IP address (1 host up)
            scanned in 0.31 seconds
          timestr: Thu Jul 21 06:48:29 2022
        192.168.61.13:
          ports:
          - cpe:
            - cpe: cpe:/a:openbsd:openssh:8.4p1
            - cpe: cpe:/o:linux:linux_kernel
            state: open
            portid: '22'
            reason: syn-ack
            scripts: []
            service:
              conf: '10'
              name: ssh
              method: probed
              ostype: Linux
              product: OpenSSH
              version: 8.4p1 Debian 5
              extrainfo: protocol 2.0
            protocol: tcp
            reason_ttl: '64'
          state:
            state: up
            reason: arp-response
            reason_ttl: '0'
          osmatch: {}
          hostname:
          - name: 192.168.61.13
            type: PTR
          macaddress:
            addr: 08:00:27:D4:BF:9E
            vendor: Oracle VirtualBox virtual NIC
            addrtype: mac
      evidence_file: 'No evidence '
      result: ok
      valid: false
    - id: 12
      step_name: bruteforce
      state: FINISHED
      start_time: '2022-07-21T20:37:28.343619Z'
      finish_time: '2022-07-21T20:37:28.479002Z'
      output: ''
      serialized_output:
        password: victim
        username: victim
        all_credentials:
        - password: victim
          username: victim
      evidence_file: 'No evidence '
      result: ok
      valid: false