Introduction

Untitled

The pentesting report is arguably one of the most important documents that come from a pentest. Do not be afraid to spend a significant amount of time to make this document shine and make sure that you use templates. Make your own template based on those you can find online as an example and remove what you do not need and add what you certainly have to.

Most topics of a report are general but there can be some differences depending on the client’s requirements and the type of test. For example, we won’t include a network scan result if we are only supposed to test a web application.

I will mark the items that are required according to me but of course, you can interpret this as you wish, you are the pentest expert.

First page [REQUIRED]

Describe metadata about the document.

Logo:

Untitled

                 Version: x.y DRAFT/REVIEW/FINAL

                 Client: RatInc

                 This report is strictly confidential and should under no circumstances be shared with people that do not need access to the information contained within. All rights pertaining to distribution belong to RatInc. 

Version header [REQUIRED]

In here, you will include a small table indicating the status of the document, who will review it and the dates.

Version Status Author Reviewer Reviewed
0.1 DRAFT Wesley Thijs Uncle Rat NOK - See remarks
0.2 DRAFT Wesley Thijs Uncle Rat OK - Send to client
0.3 CLIENT REVIEW Wesley Thijs Rat Inc - Auntie Rat OK - Please add remarks
1.0 FINAL Wesley Thijs Rat Inc - Auntie Rat OK - Signed

Who is who [REQUIRED]

Note down for both parties who the people are which should be contacted.

The XSS Rat

Wesley Thijs – Founder and pen-tester – [email protected]

Testy MacTest – Pen-tester – t[email protected]