- Learn Penetration Testing
- Rishalin Pillay
- 360字
- 2021-06-24 14:09:09
Technical report
The technical report will include a lot more details compared to the executive summary. In the technical report, you will define the scope, information, attack methods, and remediation steps in full. In this report, you can use technical terms that are easily understood, such as remote shell, pass-the-hash, and NTLM hashes.
The technical report will include the following sections:
- Introduction: This part will include topics such as the scope of the penetration test, contacts, systems involved, and approach.
- Information gathering: Here, you will explain how much of information you were able to gather on the targets. In this section, you can dive deeper to highlight what information was obtained by passive intelligence (information publicly available on the internet, DNS records, IP address information, and so on), active intelligence (port scanning, footprinting, and so on), personnel intelligence (what information was obtained from social engineering, phishing, and so on), and so forth.
- Vulnerability assessment: In this section, you will define what types of vulnerabilities were discovered, how they were discovered, and provide evidence of the vulnerability.
- Exploitation/vulnerability verification: This section provides the detailed steps on how you acted on the vulnerabilities discovered. Details such as a timeline of the attack, targets, success/fail ratio, and level of access obtained should be included.
- Post exploitation: Details included here would be activities such as escalation paths, data extraction, information value, how effective the countermeasures were (if any), persistence, and pivot points.
- Risk/exposure: The results from the preceding sections are combined and tied to a risk and exposure rating. This section would contain information such as estimated loss per incident, the skill required to perform a certain attack, countermeasure strength, and risk ranking (critical, high, medium, low).
- Conclusion: The conclusion should always end on a positive note. Here, you will highlight any guidance for increasing the business' security posture with a final overview of the penetration test.
Now that we have built our foundation on what penetration testing is, its phases, and how it differs from vulnerability assessments and red team assessments, it's time to dive into lab environments.
推薦閱讀
- 食品毒理學(xué)
- 癲癇的診斷與治療:臨床實(shí)踐與思考
- 實(shí)用化學(xué)藥品檢驗(yàn)檢測(cè)技術(shù)指南
- 梅毒實(shí)驗(yàn)室診斷技術(shù)與質(zhì)量控制
- 圖說超廣角熒光素眼底血管造影
- 中國(guó)臨床腫瘤學(xué)會(huì)(CSCO)常見惡性腫瘤診療指南2021:上冊(cè)
- 紫外線皮膚科實(shí)戰(zhàn)口袋書
- 腫瘤康復(fù)指南
- 臨床麻醉難點(diǎn)解析(第2版)
- 我的自閉癥:發(fā)現(xiàn)自己的隱形天賦
- 慢性意識(shí)障礙
- 癲癇綜合征管理手冊(cè)
- 皮膚激光醫(yī)學(xué)原理及臨床應(yīng)用
- 新型冠狀病毒感染臨床用藥手冊(cè)
- 口腔科常見及多發(fā)病就醫(yī)指南系列:口腔頜面部腫瘤就醫(yī)指南