Search

Report Writing

  • Severity is subjective based on impact but also likelihood
    • Like web app critical bug where you can do XSS and gain admin
    • BUT it’s only accessible from specific IPs (IP whitelisting)
    • It won’t be a critical. Maybe moderate to high because low likelihood
    • It’s normal to go back and forth with the client to agree on the actual severity of something like this
  • Scope (already did this before)
  • Scope Exclusions
  • Scoping and Time Limitation
  • Testing Summary
    • What we did, overview, without the tools.
    • Findings “insufficient authentication controls (Finding EPT-num)”
    • What that gave us access to. Information, applications,
    • Additional stuff like the passwords sheet
    • Moderate, low, or informational don’t get included in this
      • Unless their pentest was clean, then you can fill this with these findings
  • Key Strengths and Weaknesses
  • External Penetration Test Findings (Report Card)
    • Finding, Severity, Recommendation
  • Technical Findings
    • From most critical to least critical
    • Description, Risk, Tools Used, References, Evidence screenshot with figure caption, Remediation
      • Under risk: Likelihood + Impact
  • Additional Scans and Reports
    • Nessus scan (DC_External.nessus)
    • Summary PDF
    • Detailed PDF
    • Detailed HTML