root/trunk/scanner/db/scavenger.sql

Revision 7, 21.3 kB (checked in by wisniewski, 2 years ago)

Added some Documentation and changed the db/scavenger.sql file to add the views

Line 
1 SET NAMES latin1;
2 SET FOREIGN_KEY_CHECKS = 0;
3
4 CREATE TABLE `divisions` (
5   `id` int(3) NOT NULL auto_increment,
6   `division` varchar(4) NOT NULL default '',
7   `description` varchar(50) NOT NULL default '',
8   PRIMARY KEY  (`id`)
9 ) ENGINE=MyISAM AUTO_INCREMENT=4 DEFAULT CHARSET=latin1;
10
11 insert into `divisions` values('1','ABC','Test 1'),
12  ('2','DEF','Test 2'),
13  ('3','GHI','Test 3');
14
15 CREATE TABLE `network` (
16   `id` int(3) NOT NULL auto_increment,
17   `subnet` varchar(20) NOT NULL default '',
18   `subnetmask` varchar(10) NOT NULL default '',
19   `fk_color_id` int(11) NOT NULL,
20   `division` varchar(4) NOT NULL default '',
21   PRIMARY KEY  (`id`)
22 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
23
24 insert into `network` values('1','192.168.5.0','24','1','ABC'),
25  ('2','192.168.15.0','25','2','DEF'),
26  ('3','192.168.33.0','24','1','GHI'),
27  ('4','127.0.0.0','24','1','ABC');
28
29 CREATE TABLE `plugins` (
30   `id` int(11) NOT NULL,
31   `name` varchar(255) default NULL,
32   `family` varchar(255) default NULL,
33   `category` varchar(255) default NULL,
34   `copyright` varchar(255) default NULL,
35   `summary` varchar(255) default NULL,
36   `description` blob,
37   `version` varchar(255) default NULL,
38   `cve_id` varchar(255) default NULL,
39   `bugtraq_id` varchar(255) default NULL,
40   `xref` blob,
41   PRIMARY KEY  (`id`)
42 ) ENGINE=MyISAM DEFAULT CHARSET=latin1;
43
44 CREATE TABLE `scanFirewall` (
45   `scanID` int(11) NOT NULL auto_increment,
46   `IP` varchar(16) NOT NULL default '',
47   `MAC` varchar(45) NOT NULL default '',
48   `nmapDate` datetime NOT NULL default '0000-00-00 00:00:00',
49   `nessusDate` datetime NOT NULL default '0000-00-00 00:00:00',
50   PRIMARY KEY  (`scanID`)
51 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
52
53
54 CREATE TABLE `scanScavengerConduit_Post` (
55   `scanID` int(11) NOT NULL auto_increment,
56   `fwinstallDate` varchar(40) NOT NULL default '',
57   `it_arg_ticket_number` varchar(10) default NULL,
58   `IP` varchar(15) NOT NULL default '',
59   `nmapDate` datetime NOT NULL default '0000-00-00 00:00:00',
60   `nessusDate` datetime NOT NULL default '0000-00-00 00:00:00',
61   PRIMARY KEY  (`scanID`)
62 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
63
64
65 CREATE TABLE `scanScavengerConduit_Pre` (
66   `scanID` int(11) NOT NULL auto_increment,
67   `requestDate` varchar(40) NOT NULL default '',
68   `it_arg_ticket` varchar(10) default '',
69   `IP` varchar(15) NOT NULL default '',
70   `nmapDate` datetime NOT NULL default '0000-00-00 00:00:00',
71   `nessusDate` datetime NOT NULL default '0000-00-00 00:00:00',
72   PRIMARY KEY  (`scanID`)
73 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
74
75
76 CREATE TABLE `scanScavengerDaily` (
77   `scanID` int(11) NOT NULL auto_increment,
78   `IP` varchar(16) NOT NULL default '',
79   `MAC` varchar(45) NOT NULL default '',
80   `nmapDate` int(11) NOT NULL default '0',
81   `nessusDate` datetime NOT NULL default '0000-00-00 00:00:00',
82   `entryDate` int(11) NOT NULL default '0',
83   `entryTime` int(11) NOT NULL default '0',
84   PRIMARY KEY  (`scanID`)
85 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
86
87
88 CREATE TABLE `scanScavengerFirewall` (
89   `scanID` int(11) NOT NULL auto_increment,
90   `IP` varchar(16) NOT NULL default '',
91   `MAC` varchar(45) default NULL,
92   `nmapDate` int(11) default '0',
93   `nessusDate` datetime default '0000-00-00 00:00:00',
94   `entryDate` int(11) default '0',
95   `entryTime` int(11) default '0',
96   PRIMARY KEY  (`scanID`)
97 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
98
99
100 CREATE TABLE `scanScavengerManual` (
101   `scanID` int(11) NOT NULL auto_increment,
102   `entryDate` datetime NOT NULL,
103   `scan_requestor_username` varchar(255) NOT NULL,
104   `results` varchar(7) NOT NULL,
105   `scanType` varchar(10) NOT NULL,
106   `IP` varchar(16) default NULL,
107   `nessusDate` datetime default '0000-00-00 00:00:00',
108   PRIMARY KEY  (`scanID`)
109 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
110
111
112 CREATE TABLE `scanScavengerQuick` (
113   `scanID` int(11) NOT NULL auto_increment,
114   `IP` varchar(16) NOT NULL default '',
115   `MAC` varchar(45) NOT NULL default '',
116   `nmapDate` int(11) NOT NULL default '0',
117   `nessusDate` datetime NOT NULL default '0000-00-00 00:00:00',
118   `entryDate` int(11) NOT NULL default '0',
119   `entryTime` int(11) NOT NULL default '0',
120   PRIMARY KEY  (`scanID`),
121   KEY `date` (`nessusDate`)
122 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
123
124 insert into `scanScavengerQuick` values('1','127.0.0.1','001C42C67A48','0','2007-06-21 12:22:42','0','0');
125
126 CREATE TABLE `scanScavengerVPN` (
127   `scanID` int(11) NOT NULL auto_increment,
128   `date_time_connected` varchar(17) default '',
129   `VPNUsername` varchar(30) default '',
130   `IP` varchar(16) default NULL,
131   `nmapDate` int(11) default '0',
132   `nessusDate` datetime default '0000-00-00 00:00:00',
133   `client` varchar(25) default '0',
134   `appversion` varchar(25) default '0',
135   PRIMARY KEY  (`scanID`),
136   KEY `maxclient` (`VPNUsername`,`nessusDate`)
137 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
138
139
140 CREATE TABLE `scan_answer` (
141   `id` int(1) NOT NULL auto_increment,
142   `answer` varchar(25) NOT NULL default '',
143   PRIMARY KEY  (`id`)
144 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
145
146 insert into `scan_answer` values('1','Accept'),
147  ('2','Addressed'),
148  ('3','False-Positive'),
149  ('4','Administrative Cleared');
150
151 CREATE TABLE `scan_global_answers` (
152   `id` int(5) NOT NULL auto_increment,
153   `fk_plugin_id` int(11) default '0',
154   `fk_answer_id` int(1) NOT NULL,
155   `acceptinfo` varchar(255) default NULL,
156   `fk_nessus_id` int(6) default '0',
157   `answerDate` datetime default '0000-00-00 00:00:00',
158   `username` varchar(25) default NULL,
159   `div` varchar(4) default NULL,
160   PRIMARY KEY  (`id`),
161   KEY `answerid_idx` (`fk_answer_id`),
162   KEY `fk_plugin` (`fk_plugin_id`),
163   CONSTRAINT `fk_answers` FOREIGN KEY (`fk_answer_id`) REFERENCES `scan_answer` (`id`)
164 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
165
166
167 CREATE TABLE `scan_responses` (
168   `id` int(5) NOT NULL auto_increment,
169   `fk_nessus_id` int(11) NOT NULL default '0',
170   `fk_answer_id` int(1) NOT NULL default '0',
171   `answerDate` datetime NOT NULL default '0000-00-00 00:00:00',
172   `recurring` tinyint(2) NOT NULL default '0',
173   `acceptinfo` varchar(255) default NULL,
174   `username` varchar(25) default NULL,
175   `autoanswer` varchar(3) default '',
176   PRIMARY KEY  (`id`),
177   KEY `answer` (`fk_answer_id`),
178   KEY `fk_scavenger_nessus` (`fk_nessus_id`),
179   CONSTRAINT `fk_answer` FOREIGN KEY (`fk_answer_id`) REFERENCES `scan_answer` (`id`),
180   CONSTRAINT `fk_scavenger_nessus` FOREIGN KEY (`fk_nessus_id`) REFERENCES `scavenger_nessus` (`id`)
181 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
182
183
184 CREATE TABLE `scan_type` (
185   `pkey` int(11) NOT NULL auto_increment,
186   `type` varchar(25) NOT NULL default '',
187   `description` varchar(75) NOT NULL,
188   `shortdescription` varchar(25) NOT NULL default '',
189   PRIMARY KEY  (`pkey`)
190 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
191
192 insert into `scan_type` values('1','Scavenger Quick','This scan occurs every 15 minutes.','Inside'),
193  ('2','Firewall Scan','This will scan all the conduits in the firewall for All Vulns','Outside'),
194  ('3','Semi-Annual','This is the every 6 months scan to be DOE compliant','Annual'),
195  ('4','Scavenger Daily','This scan occurs once a day.','Daily'),
196  ('5','ScavengerVPN','This is a VPN scan.','VPN'),
197  ('6','Manual Scan','This is a manual scan requested on the web','Manual'),
198  ('7','Verification Scan','This scan verifies \'addressed\' from yesterday.','Verification');
199
200 CREATE TABLE `scavenger_nessus` (
201   `id` int(11) NOT NULL auto_increment,
202   `host` varchar(15) NOT NULL default '',
203   `service` varchar(25) NOT NULL default '',
204   `scriptid` int(11) default NULL,
205   `riskval` tinyint(1) default '0',
206   `msg` text,
207   `mac` varchar(12) default NULL,
208   `scanID` int(11) default NULL,
209   `scanType` int(11) default NULL,
210   `date` datetime NOT NULL default '0000-00-00 00:00:00',
211   `originalID` int(11) default NULL,
212   `instance` int(11) NOT NULL default '0',
213   `dnsName` varchar(255) default NULL,
214   `smbName` varchar(25) default NULL,
215   `color` tinyint(1) default NULL,
216   `fk_division` varchar(4) default NULL,
217   PRIMARY KEY  (`id`),
218   KEY `host_3` (`fk_division`),
219   KEY `host_4` (`instance`),
220   KEY `host` (`host`),
221   KEY `host_2` (`host`,`service`),
222   KEY `fk_scantype` (`scanType`),
223   CONSTRAINT `fk_scantype` FOREIGN KEY (`scanType`) REFERENCES `scan_type` (`pkey`)
224 ) ENGINE=InnoDB DEFAULT CHARSET=latin1 COMMENT='InnoDB free: 5120 kB';
225
226 insert into `scavenger_nessus` values('5','127.0.0.1','mysql (3306/tcp)','10719','1','\nSynopsis :\n\nA Database server is listening on the remote port.\n\nDescription :\n\nThe remote host is running MySQL, an open-source Database server. It\nis possible to extract the version number of the remote installation\nby receiving the server greeting.\n\nSolution :\n\nRestrict access to the database to allowed IPs only.\n\nRisk factor :\n\nNone\n\nPlugin output :\n\nThe remote MySQL version is 5.0.38-Ubuntu_0ubuntu1-log\n\n','001C42C67A48','1','1','2007-06-21 12:22:42',null,'0','localhost',null,'1','ABC'),
227  ('6','127.0.0.1','general/tcp','12634','1','Nessus can run commands on localhost to check if patches are applied\nThe output of \"uname -a\" is :\nLinux ubuntu 2.6.20-16-generic #2 SMP Thu Jun 7 20:19:32 UTC 2007 i686 GNU/Linux\n\nThe remote Debian system is :\n4.0\n\nLocal security checks have been enabled for this host.\n\n','001C42C67A48','1','1','2007-06-21 12:22:42',null,'0','localhost',null,'1','ABC'),
228  ('7','127.0.0.1','general/tcp','25010','3','\nSeveral remote vulnerabilities have been discovered in the MIT reference\nimplementation of the Kerberos network authentication protocol suite,\nwhich may lead to the execution of arbitrary code. The Common \nVulnerabilities and Exposures project identifies the following problems:\n    It was discovered that the krb5 telnet daemon performs insufficient\n    validation of usernames, which might allow unauthorized logins or\n    privilege escalation.\n    iDefense discovered that a buffer overflow in the logging code of the\n    KDC and the administration daemon might lead to arbitrary code\n    execution.\n    It was discovered that a double free in the RPCSEC_GSS part of the \n    GSS library code might lead to arbitrary code execution.\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.3.6-2sarge4.\nFor the upcoming stable distribution (etch) these problems have been fixed\nin version 1.4.4-7etch1.\nFor the unstable distribution (sid) these problems will be fixed soon.\nWe recommend that you upgrade your Kerberos packages.\n\n\nSolution : http://www.debian.org/security/2007/dsa-1276\nRisk factor : High\nThe package libkrb53 is vulnerable in Debian 4.0.\nUpgrade to libkrb53_1.4.4-7etch1\n\nCVE : CVE-2007-0956, CVE-2007-0957, CVE-2007-1216\nOther references : DSA:1276\n\n','001C42C67A48','1','1','2007-06-21 12:22:42',null,'0','localhost',null,'1','ABC'),
229  ('8','127.0.0.1','general/tcp','24819','3','\nGerardo Richarte discovered that GnuPG, a free PGP replacement, provides\ninsufficient user feedback if an OpenPGP message contains both unsigned\nand signed portions. Inserting text segments into an otherwise signed\nmessage could be exploited to forge the content of signed messages.\nThis update prevents such attacks\n the old behaviour can still be\nactivated by passing the --allow-multiple-messages option.\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.4.1-1.sarge7.\nFor the upcoming stable distribution (etch) these problems have been\nfixed in version 1.4.6-2.\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.4.6-2.\nWe recommend that you upgrade your gnupg packages.\n\n\nSolution : http://www.debian.org/security/2007/dsa-1266\nRisk factor : High\nThe package gnupg is vulnerable in Debian 4.0.\nUpgrade to gnupg_1.4.6-2\n\nThe package gnupg is vulnerable in Debian etch.\nUpgrade to gnupg_1.4.6-2\n\nCVE : CVE-2007-1263\nOther references : DSA:1266\n\n','001C42C67A48','1','1','2007-06-21 12:22:42',null,'0','localhost',null,'1','ABC'),
230  ('9','127.0.0.1','nessus (1241/tcp)','21643','1','\nSynopsis :\n\nThe remote service encrypts communications using SSL.\n\nDescription :\n\nThis script detects which SSL ciphers are supported by the remote\nservice for encrypting communications. \n\nSee also :\n\nhttp://www.openssl.org/docs/apps/ciphers.html\n\nRisk factor : \n\nNone\n\nPlugin output :\n\nHere is a list of the SSL ciphers supported by the remote server :\n\n  Medium Strength Ciphers (128-bit key)\n    TLSv1\n      DES-CBC-SHA                Kx=RSA        Au=RSA     Enc=DES(56)      Mac=SHA1   \n\n  High Strength Ciphers (> 128-bit key)\n    TLSv1\n      DES-CBC3-SHA               Kx=RSA        Au=RSA     Enc=3DES(168)    Mac=SHA1   \n      AES128-SHA                 Kx=RSA        Au=RSA     Enc=AES(128)     Mac=SHA1   \n      AES256-SHA                 Kx=RSA        Au=RSA     Enc=AES(256)     Mac=SHA1   \n      RC4-MD5                    Kx=RSA        Au=RSA     Enc=RC4(128)     Mac=MD5    \n      RC4-SHA                    Kx=RSA        Au=RSA     Enc=RC4(128)     Mac=SHA1   \n\nThe fields above are :\n\n  {OpenSSL ciphername}\n  Kx={key exchange}\n  Au={authentication}\n  Enc={symmetric encryption method}\n  Mac={message authentication code}\n  {export flag}\n\n\n','001C42C67A48','1','1','2007-06-21 12:22:42',null,'0','localhost',null,'1','ABC'),
231  ('10','127.0.0.1','nessus (1241/tcp)','10147','1','\nSynopsis :\n\nA Nessus daemon is listening on the remote port.\n\nDescription :\n\nA Nessus daemon is listening on the remote port.  It is not\nrecommended to let anyone connect to this port.\n\nAlso, make sure that the remote Nessus installation has\nbeen authorized.\n\nSolution :\n\nFilter incoming traffic to this port.\n\nRisk factor : \n\nNone\n\n','001C42C67A48','1','1','2007-06-21 12:22:42',null,'0','localhost',null,'1','ABC'),
232  ('11','127.0.0.1','http (80/tcp)','11032','1','The following directories were discovered:\n/doc, /icons\n\nWhile this is not, in and of itself, a bug, you should manually inspect \nthese directories to ensure that they are in compliance with company\nsecurity standards\n\nOther references : OWASP:OWASP-CM-006\n\n','001C42C67A48','1','1','2007-06-21 12:22:42',null,'0','localhost',null,'1','ABC'),
233  ('12','127.0.0.1','ssh (22/tcp)','10881','1','The remote SSH daemon supports the following versions of the\nSSH protocol :\n\n  . 1.99\n  . 2.0\n\n\nSSHv2 host key fingerprint : ac:8d:2a:4a:e6:72:0b:2c:5e:7d:10:8f:93:d3:4b:1b\n\n\n','001C42C67A48','1','1','2007-06-21 12:22:42',null,'0','localhost',null,'1','ABC'),
234  ('13','127.0.0.1','ssh (22/tcp)','11574','1','\nThe remote host seem to be  running an SSH server which can allow\nan attacker to determine the existence of a given login by comparing\nthe time the remote sshd daemon takes to refuse a bad password for a \nnon-existent login compared to the time it takes to refuse a bad password\nfor a valid login.\n\nAn attacker may use this flaw to set up  a brute force attack against\nthe remote host.\n\nSolution : Disable PAM support if you do not use it, upgrade to the newest \nversion of OpenSSH\n\nRisk factor : Low\nCVE : CVE-2003-0190\nBID : 7342, 7467, 7482, 11781\nOther references : OSVDB:2109, OSVDB:2140\n\n','001C42C67A48','1','1','2007-06-21 12:22:42',null,'0','localhost',null,'1','ABC'),
235  ('14','127.0.0.1','http (80/tcp)','10662','1','The following CGI have been discovered :\n\nSyntax : cginame (arguments [default value])\n\n. (C=M\nO [A] C=N\nO [D] C=S\nO [A] C=D\nO [A] )\n\n\nDirectory index found at /\n\n\n','001C42C67A48','1','1','2007-06-21 12:22:42',null,'0','localhost',null,'1','ABC'),
236  ('15','127.0.0.1','http (80/tcp)','10056','2','The /doc directory is browsable.\n/doc shows the content of the /usr/doc directory and therefore it shows which programs and - important! - the version of the installed programs.\n\nSolution : Use access restrictions for the /doc directory.\nIf you use Apache you might use this in your access.conf:\n\n <Directory /usr/doc>\n AllowOverride None\n order deny,allow\n deny from all\n allow from localhost\n </Directory>\n\nRisk factor : High\nCVE : CVE-1999-0678\nBID : 318\n\n','001C42C67A48','1','1','2007-06-21 12:22:42',null,'0','localhost',null,'1','ABC');
237
238 CREATE TABLE `scavenger_nessus_archived` (
239   `id` int(11) NOT NULL auto_increment,
240   `host` varchar(15) NOT NULL default '',
241   `service` varchar(25) NOT NULL default '',
242   `scriptid` int(5) default NULL,
243   `riskval` tinyint(1) default '0',
244   `msg` text,
245   `mac` varchar(12) default NULL,
246   `scanID` int(11) default NULL,
247   `scanType` int(11) default NULL,
248   `date` datetime NOT NULL default '0000-00-00 00:00:00',
249   `originalID` int(11) default NULL,
250   `instance` int(11) NOT NULL default '0',
251   `dnsName` varchar(255) default NULL,
252   `smbName` varchar(25) default NULL,
253   `color` tinyint(1) default NULL,
254   `fk_division` varchar(4) default NULL,
255   `scavenger_nessus_id` int(11) NOT NULL,
256   PRIMARY KEY  (`id`),
257   KEY `host_3` (`fk_division`),
258   KEY `host_4` (`instance`),
259   KEY `host` (`host`),
260   KEY `host_2` (`host`,`service`)
261 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
262
263
264 CREATE TABLE `scavenger_nessus_lowhang` (
265   `pkey` int(3) NOT NULL auto_increment,
266   `id` int(6) default NULL,
267   `lowhang` tinyint(1) default NULL,
268   `description` varchar(50) NOT NULL default '',
269   `dateAdded` datetime default NULL,
270   `siteID` int(10) NOT NULL default '1',
271   `reason` varchar(255) default '',
272   PRIMARY KEY  (`pkey`)
273 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
274
275 insert into `scavenger_nessus_lowhang` values('9','19948','1','Open X server','0000-00-00 00:00:00','1','Because you can pop up a window asking for a username and password.'),
276  ('10','10673','1','MSSQL sa blank pw','0000-00-00 00:00:00','1','Because you can take over a box through a blank SA password.');
277
278 CREATE TABLE `scavenger_nessus_timestamps` (
279   `id` int(6) NOT NULL auto_increment,
280   `unused` char(1) NOT NULL default '',
281   `host` varchar(15) NOT NULL default '',
282   `progress` varchar(25) NOT NULL default '',
283   `timestamp` varchar(40) NOT NULL default '0000-00-00 00:00:00',
284   PRIMARY KEY  (`id`),
285   KEY `host` (`host`)
286 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
287
288 insert into `scavenger_nessus_timestamps` values('1','','','scan_start','Thu Jun 21 12:11:22 2007'),
289  ('2','','127.0.0.1','host_start','Thu Jun 21 12:11:23 2007'),
290  ('3','','127.0.0.1','host_end','Thu Jun 21 12:11:25 2007'),
291  ('4','','','scan_end','Thu Jun 21 12:11:25 2007'),
292  ('5','','','scan_start','Thu Jun 21 12:17:44 2007'),
293  ('6','','127.0.0.1','host_start','Thu Jun 21 12:17:44 2007'),
294  ('7','','127.0.0.1','host_end','Thu Jun 21 12:17:45 2007'),
295  ('8','','','scan_end','Thu Jun 21 12:17:45 2007'),
296  ('9','','','scan_start','Thu Jun 21 12:19:55 2007'),
297  ('10','','127.0.0.1','host_start','Thu Jun 21 12:19:55 2007'),
298  ('11','','127.0.0.1','host_end','Thu Jun 21 12:19:56 2007'),
299  ('12','','','scan_end','Thu Jun 21 12:19:56 2007'),
300  ('13','','','scan_start','Thu Jun 21 12:22:54 2007'),
301  ('14','','127.0.0.1','host_start','Thu Jun 21 12:22:54 2007'),
302  ('15','','127.0.0.1','host_end','Thu Jun 21 12:27:42 2007'),
303  ('16','','','scan_end','Thu Jun 21 12:27:43 2007');
304
305 CREATE TABLE `scavenger_people` (
306   `id` int(11) NOT NULL auto_increment,
307   `firstname` varchar(15) NOT NULL default '',
308   `lastname` varchar(25) NOT NULL default '',
309   `phone` int(4) NOT NULL default '0',
310   `building` varchar(5) default '',
311   `room` varchar(5) default '',
312   `email` varchar(50) default '',
313   `badge` int(6) NOT NULL default '0',
314   `username` varchar(15) NOT NULL default '',
315   `scavengerAdmin` int(2) default NULL,
316   `division` varchar(4) default NULL,
317   PRIMARY KEY  (`id`),
318   KEY `division_idx` (`division`)
319 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;
320
321 insert into `scavenger_people` values('1','Mike','Wisniewski','0','','','wiz@localhost','0','wisniewski',null,'ABC'),
322  ('2','Jim','Smith','0','','','jsmith@localhost','0','jsmith',null,'DEF'),
323  ('3','Bob','Johnson','0','','','bjohnson@localhost','0','bjohnson',null,'ABC'),
324  ('4','Sally','Summers','0','','','ssummers@localhost','0','ssummers',null,'GHI');
325
326 SET FOREIGN_KEY_CHECKS = 1;
327
328 DROP VIEW IF EXISTS `scavenger_nessus_filter`;
329 CREATE ALGORITHM=UNDEFINED DEFINER=`root`@`%` SQL SECURITY DEFINER VIEW `scavenger_nessus_filter` AS select `n`.`riskval` AS `riskval`,`n`.`scanType` AS `scanType`,`n`.`host` AS `host`,`n`.`dnsName` AS `dnsName`,`n`.`smbName` AS `smbName`,`n`.`instance` AS `instance`,`n`.`date` AS `date`,`n`.`id` AS `id`,`n`.`color` AS `color`,`n`.`scriptid` AS `scriptid`,`n`.`fk_division` AS `fk_division` from `scavenger_nessus` `n` where ((`n`.`instance` >= 0) and not(`n`.`id` in (select `r`.`fk_nessus_id` AS `fk_nessus_id` from `scan_responses` `r`)));
330
331 DROP VIEW IF EXISTS `scavenger_nessus_filter_all`;
332 CREATE ALGORITHM=UNDEFINED DEFINER=`root`@`%` SQL SECURITY DEFINER VIEW `scavenger_nessus_filter_all` AS select `n`.`id` AS `id`,`n`.`host` AS `host`,`n`.`service` AS `service`,`n`.`scriptid` AS `scriptid`,`n`.`riskval` AS `riskval`,`n`.`msg` AS `msg`,`n`.`mac` AS `mac`,`n`.`scanID` AS `scanID`,`n`.`scanType` AS `scanType`,`n`.`date` AS `date`,`n`.`originalID` AS `originalID`,`n`.`instance` AS `instance`,`n`.`dnsName` AS `dnsName`,`n`.`smbName` AS `smbName`,`n`.`color` AS `color`,`n`.`fk_division` AS `fk_division` from `scavenger_nessus` `n` where ((`n`.`instance` >= 0) and not(`n`.`id` in (select `r`.`fk_nessus_id` AS `fk_nessus_id` from `scan_responses` `r`)));
333
334 DROP VIEW IF EXISTS `scavenger_nessus_filter_w_plugin`;
335 CREATE ALGORITHM=UNDEFINED DEFINER=`root`@`%` SQL SECURITY DEFINER VIEW `scavenger_nessus_filter_w_plugin` AS select `f`.`riskval` AS `riskval`,`f`.`scanType` AS `scanType`,`f`.`host` AS `host`,`f`.`dnsName` AS `dnsName`,`f`.`smbName` AS `smbName`,`f`.`instance` AS `instance`,`f`.`date` AS `date`,`f`.`id` AS `id`,`f`.`color` AS `color`,`f`.`scriptid` AS `scriptid`,`f`.`fk_division` AS `fk_division`,`p`.`name` AS `name`,`p`.`category` AS `category` from (`scavenger_nessus_filter` `f` left join `plugins` `p` on((`f`.`scriptid` = `p`.`id`)));
Note: See TracBrowser for help on using the browser.