REPORTING
Last updated
Last updated
Executive Summary: Overview of the report that includes
A chart displaying the in-scope systems, networks, and applications, and the out-of-scope limitations to the test
Methodology: A more in-depth explanation of testing approach, tools and techniques used and a description of the phases that occur.
These charts typically are a part of the summary of findings section which includes definitions of what critical, high, medium, low and informational risks actually are.
Findings: A VAPT style chart that displays the summary of issues found on all the systems
The look and style of these varies depending how the report looks, so you can tailor it as needed. These can be done in various ways, including just writing everything out with screen shots of the process.
A detailed finding should:
Provides an in-depth description of the vulnerability
Explains what, how, where, you found it
Explains your methodology in how you exploited it
Gives the reader nice resources to check out
Explains how to fix the issue
What you were able to do because of your finding
Provides nice screenshots of the process
Helps show what commands you used
Risk Assessment: Detailed risk analysis for each identified vulnerability, the likelihood and potential impact on business and the overall risk rating for the organization
Conclusion
Summary of key findings and their implications.
Appendices: Supporting documentation (scan results, logs and diagrams, or documentation that can be included with the report)
NOTE: Doesn't need to be in a table, since styling is dependent on the template made/used.