How to Create a Penetration Test Report

Share this post:

In the realm of cybersecurity, one of the more exciting jobs is that of a Penetration Tester. You get to legally hack real production networks looking for vulnerabilities and hopefully gaining rootsystem/nt authority, or DomainAdmin(DA) access.  

This can conjure up images of firing off your latest exploits to pop a reverse shell, then running your best privesc scripts, and finally issuing that whoami command to reveal your admin level access. What a job! But… 

The job isn’t over yet, now you need to write up your findings into a professional-looking report for the client. This, after all, is ultimately the final product you sold them when bidding on the job.  I’m going to show you what many clients are looking for in reports and give you a sample report that I created.

Continue reading How to Create a Penetration Test Report