Based on OWASP RailGoat
Report Process ➖
1. Report Template
2. Findings
3. Executive Summary
4. Attack Summary
5. Optional Components
6. Closing
Module 1 - 1 : Structure of the report(foundation and Sceleton for the rest of the report)
Module 2 - 1,2 : fill the findings as per the report templates (Attack Scanerio)
Module 3 - 3,4 : creating POCs ans summaries
Module 4 - 5 : focuses on optional features than can be added to your report (includes diff shots, positive findings)
Module 5 - 6 : final step(final preperation with the customers), checks for quality standard report,
Report Sections (covored in this notes)
1. Executive Summary
2. Report Dashboard (optional)
3. Attack walkthrough
4. Findings
5. Appendices
6. Value Adds
1. 1-2 page of non-technical analysis of the assessments & results.
2. In-depth summary of the assessment (incluseds report card, chart analyts of findings,etc)
3. Every POCs (with details), summary of Chained issues.
4. outline every finding from the assessments, steps to recreate an issue, & remedaitation instructions.
5. Attachments
6. -
https://github.com/juliocesarfort/public-pentesting-reports
https://github.com/hmaverickadams/TCM-Security-Sample-Pentest-Report