Table of Contents

Post-Engagement: Report

Review

The six steps/stages of a PenTest…

  1. Pre-Engagement: Planning & Scope
  2. Recon: Information Gathering
  3. Scanning
  4. Exploitation
  5. Post-Exploitation
  6. Post-Engagement: Report

Overview

Outline of the Post-Exploitation Stage:

  1. Prepare the Report
    1. Executive Summary Report (for management)
    2. Technical Report (for IT and InfoSec geeks)
  2. Present the Report

The Report

The six sections of a PenTest report:

  1. Executive Summary
  2. Scope Details
  3. Methodology
  4. Findings & Remediation
  5. Conclusion
  6. Appendix / Appendices

1. Executive Summary

The executive summary is by far the most important section of the report. It is the only section most people will read. It should be written in clear, non-techie language.

2. Scope Details

Document the scope…

  1. The original scope of the Statement of Work (SOW).
  2. Any scope adjustments that were made along the way.

3. Methodology

The methodology sections contains all the nitty-gritty technical details.

4. Findings & Remediation

Here you describe the security issues and offer suggestions for remediation.

5. Conclusion

  1. Summarize your conclusions (wrap it up)
  2. Make recommendations for future work.

Try to identify common themes or root causes discovered during the PenTest.