Last active
September 21, 2018 17:32
-
-
Save phrz/a30e83a37dd30634096636172ccda480 to your computer and use it in GitHub Desktop.
phlogo.pdf is the logo used in this document.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
% !TEX TS-program = XeLaTeX | |
% DOCUMENT FORMATTING | |
\documentclass[12pt]{article} | |
\usepackage{fullpage} | |
\usepackage{fancyhdr} % better looking title | |
\usepackage[all]{nowidow} | |
% MATH FORMATTING | |
\usepackage{amsmath} | |
\usepackage{amssymb} % \varnothing \nexists \therefore | |
\usepackage{mathtools} % allows \xrightarrow{over-text} | |
% TEXT FORMATTING | |
\usepackage[shortlabels]{enumitem} % allows custom enumerate labels [a.] | |
\usepackage{ulem} % \sout (strikeout) | |
\usepackage{booktabs} % \toprule \midrule \bottomrule in table environment | |
\usepackage[table,x11names]{xcolor} % {\color{} scope} | |
\usepackage{datetime} % \currenttime \today | |
\usepackage{titlesec} % custom title/section formatting | |
% MUST COME AFTER AMSMATH | |
\usepackage{mathspec} % a superset of fontspec that adds \setmathfont | |
% REFERENCES | |
\usepackage[hyphens]{url} | |
\usepackage{cleveref} % better than hyperref, use \cref and \label | |
\crefname{equation}{Equation}{Equations} | |
% TYPOGRAPHY (XeLaTeX) | |
% \setmainfont{CMU Serif} | |
\setmainfont[Ligatures=TeX]{ETBembo} | |
\setsansfont[Scale=0.9]{Noto Sans} | |
\setmathfont(Digits,Latin){CMU Serif} | |
\setmonofont[Scale=0.85]{Menlo} | |
% \sffamily is a reference for sansfont | |
\newfontfamily\mytitlefont[Scale=0.9,BoldFont={* Medium}]{Noto Sans Display} | |
\titleformat*{\section}{\Large\bfseries\mytitlefont} | |
\titleformat*{\subsection}{\large\bfseries\mytitlefont} | |
\titleformat*{\subsubsection}{\mytitlefont} | |
% TABLES | |
% alias for black square | |
\newcommand\x{\cellcolor{black!100}} | |
% alias for mathbf for matrices | |
\newcommand\Mat[1]{\mathbf{{#1}}} | |
% GRAPHING | |
\usepackage{pgfplots} | |
\pgfplotsset{compat=1.15} | |
% remember: \clearpage for a new page | |
%%%%%%%%%%%%%%%%%%%%%%% | |
% FANCY HEADER | |
%%%%%%%%%%%%%%%%%%%%%%% | |
% TITLE FORMATTING | |
\makeatletter | |
\renewcommand{\maketitle}{ | |
% Suppress normal (centered) page numbering on the title page. | |
\pagenumbering{gobble} | |
{ | |
\mytitlefont | |
\begin{flushleft} | |
\vspace{3em} | |
\includegraphics[width=0.6in]{phlogo.pdf} | |
% \vspace{1.75em} | |
\vfill | |
\vspace{-1in} % slightly above vertical center | |
{ | |
\fontsize{36pt}{50pt} % ~1.4 baseline skip | |
\textbf | |
\@title | |
} | |
\\ | |
\vfill | |
% \vspace{1em} | |
{ | |
\Large | |
\@author \\ | |
\@date | |
} | |
\end{flushleft} | |
\clearpage | |
} | |
% Restore normal numbering for fancy pages (to follow) | |
\pagenumbering{arabic} | |
} | |
% We set the fancy header elements here so that | |
% we can have access to the internal @title @author | |
% macros (only in \makeatletter) | |
\fancyhead{} | |
\fancyfoot{} | |
\fancyhead[L]{\sffamily\textit{\@title}} | |
\fancyhead[R]{\sffamily\@author} | |
\fancyfoot[R]{\sffamily Page \thepage} | |
\makeatother | |
% Specific to this document | |
\newcommand*\roundedbox[2][]{\tikz[overlay]\node[draw=black!80, line width=0.3mm, inner sep=2pt, anchor=text, rectangle, rounded corners=1mm,#1] {#2};\phantom{#2}} | |
\newcommand*\highrisk{\mytitlefont\ \roundedbox[draw=red]{\color{red}HIGH}} | |
\newcommand*\mediumrisk{\mytitlefont\ \roundedbox[draw=orange]{\color{orange}MEDIUM}} | |
\newcommand*\lowrisk{\mytitlefont\ \roundedbox[draw=blue]{\color{blue}LOW}} | |
%%%%%%%%%%%%%%%%%%%%%%% | |
\title{Network Vulnerability Assessment} | |
\author{Paul Herz} | |
\date{\today} | |
%%%%%%%%%%%%%%%%%%%%%%% | |
\setlength{\parindent}{2em} | |
\setlength{\parskip}{0em} | |
% make room for the header and footer | |
\setlength{\headheight}{15pt} | |
\setlength{\headsep}{24pt} | |
\begin{document} | |
\maketitle | |
\pagestyle{fancy} | |
\setlength{\baselineskip}{1.4em} | |
{ | |
\mytitlefont | |
\tableofcontents | |
} | |
%%%%%%%%%%%%%%%%% | |
% CONTENT | |
%%%%%%%%%%%%%%%%% | |
\section{Executive summary} | |
This report outlines the results of a search for weaknesses (vulnerabilities) in the targeted systems. It is not a full security evaluation. The vulnerabilities for various endpoints are enumerated and explained below. Additionally, they are followed by a recommended course of action for managing the risk associated with the vulnerability, whether that entails patching the vulnerability, modifying configuration, or other mitigation methodologies.\footnote{This report roughly follows the template of vulnerability reports I have worked on before, but which I cannot cite as they are not public.} | |
\end{document} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment