diff --git a/lynis_report.pl b/lynis_report.pl index 78eedb9..fdb7cdf 100755 --- a/lynis_report.pl +++ b/lynis_report.pl @@ -60,16 +60,18 @@ if (( -e $lynis_report) and ( ! -z $lynis_report )) { } if (($audit_run) and ($audit_run >= 1)) { - print "Looks like the audit has been run. \n"; + print colored("Looks like the audit has been run.", "bold green"); + print "\n"; } else { print colored("Couldn't find one or more of the lynis output files. Try running the audit again. \n", "bold red"); } -print "Outputting report to $output, in "; -if ($excel) { print "Excel "; } -elsif ($pdf) { print "PDF "; } -else { print "HTML "; } -print "format. \n"; +print colored("Outputting report to $output, in ", "bold green"); +if ($excel) { print colored("Excel ", "bold green"); } +elsif ($pdf) { print colored("PDF ", "bold green)"); } +else { print colored("HTML ", "bold green"); } +print colored("format.", "bold green");\ +print "\n"; # the report is easy to process, and actually doesn't contain the "audit findings"....just the data. # but it is not our job to draw conclusions here, just present the findings of the tool. @@ -393,7 +395,7 @@ END foreach my $p ( @{$lynis_report_data{'vulnerable_package[]'}} ) { print OUT "\t\t\t\t\t
  • $p
  • \n"; } print OUT "\t\t\t\t
    \n"; } else { - warn colored("Vulnerable package pbject not an array! \n", "yellow"); + warn colored("Vulnerable package object not an array!", "yellow"); print Dumper($lynis_report_data{'vulnerable_package[]'}); } } @@ -535,6 +537,11 @@ END print OUT <uptime (secs):$lynis_report_data{'uptime_in_seconds'} +END + if (exists($lynis_report_data{'notebook'})) { + print OUT "is notebook/laptop:$to_bool{$lynis_report_data{'notebook'}}\n"; + } + print OUT < binary paths:$lynis_report_data{'binary_paths'} END @@ -605,6 +612,16 @@ END foreach my $lf ( @{$lynis_report_data{'open_logfile[]'}} ) { print OUT "\t\t\t\t\t\t