官术网_书友最值得收藏!

Technical report

The technical report will include a lot more details compared to the executive summary. In the technical report, you will define the scope, information, attack methods, and remediation steps in full. In this report, you can use technical terms that are easily understood, such as remote shell, pass-the-hash, and NTLM hashes.

The technical report will include the following sections:

  • Introduction: This part will include topics such as the scope of the penetration test, contacts, systems involved, and approach.
  • Information gathering: Here, you will explain how much of information you were able to gather on the targets. In this section, you can dive deeper to highlight what information was obtained by passive intelligence (information publicly available on the internet, DNS records, IP address informationand so on), active intelligence (port scanning, footprintingand so on), personnel intelligence (what information was obtained from social engineering, phishingand so on), and so forth.
  • Vulnerability assessment: In this section, you will define what types of vulnerabilities were discovered, how they were discovered, and provide evidence of the vulnerability. 
  • Exploitation/vulnerability verification: This section provides the detailed steps on how you acted on the vulnerabilities discovered. Details such as a timeline of the attack, targets, success/fail ratio, and level of access obtained should be included.
  • Post exploitation: Details included here would be activities such as escalation paths, data extraction, information value, how effective the countermeasures were (if any), persistence, and pivot points.
  • Risk/exposure: The results from the preceding sections are combined and tied to a risk and exposure rating. This section would contain information such as estimated loss per incident, the skill required to perform a certain attack, countermeasure strength, and risk ranking (critical, high, medium, low).
  • Conclusion: The conclusion should always end on a positive note. Here, you will highlight any guidance for increasing the business' security posture with a final overview of the penetration test.

Now that we have built our foundation on what penetration testing is, its phases, and how it differs from vulnerability assessments and red team assessments, it's time to dive into lab environments.

主站蜘蛛池模板: 澳门| 辉南县| 台中市| 新昌县| 延津县| 临泽县| 芮城县| 莱芜市| 家居| 淮南市| 东安县| 伽师县| 西充县| 巍山| 福建省| 吉木萨尔县| 家居| 静宁县| 赣榆县| 乌鲁木齐县| 大埔区| 襄汾县| 祁门县| 铅山县| 沙洋县| 贡山| 天长市| 丹阳市| 成安县| 左权县| 红河县| 隆化县| 鄂尔多斯市| 邹城市| 河池市| 德阳市| 合山市| 沂南县| 嫩江县| 托克逊县| 论坛|