Notice: This page requires JavaScript to function properly.
Please enable JavaScript in your browser settings or update your browser.
Lernen Documenting Findings | Reporting and Remediation
Practical Penetration Testing

bookDocumenting Findings

Swipe um das Menü anzuzeigen

Documenting Findings

Properly recording vulnerabilities is one of the most important steps in a penetration test. When you document your findings clearly and accurately, you help organizations understand their security risks and take action to fix them. Good documentation ensures:

  • All discovered vulnerabilities are tracked;
  • Each issue is described in a way that anyone can understand;
  • Evidence and details are included for verification;
  • Remediation steps are suggested to help address the problems.

Accurate documentation is essential for both technical teams and decision-makers. It provides a clear record of what was found, why it matters, and how to improve security. By carefully documenting your findings, you support better communication, accountability, and long-term security improvements.

Collecting Evidence During a Penetration Test

Collecting evidence is a critical part of a penetration test. You need to document every finding with clear, reliable proof. This helps organizations understand the risks and take action. Use these practical methods to gather strong evidence:

Screenshots

  • Capture images of important steps, such as when you access a restricted area or trigger a vulnerability;
  • Highlight key details in the screenshot, like URLs, error messages, or user information;
  • Use built-in screenshot tools or third-party software to save images securely.

Example: If you bypass a login page, take a screenshot showing the restricted dashboard with your username visible.

Logs

  • Save relevant log files that show suspicious activity or successful exploits;
  • Collect logs from applications, system events, or network devices;
  • Make sure timestamps and source information are included for context.

Example: Export a web server log that records your SQL injection attempt, showing the exact request and response codes.

Code Snippets

  • Copy and paste important pieces of code or script output that demonstrate vulnerabilities;
  • Use clear formatting to show commands you entered and responses from the system;
  • Redact any sensitive data before sharing the evidence.

Example: Show the exact curl command you used to exploit an API and the resulting JSON response that reveals sensitive data.

Always organize your evidence clearly and securely. This ensures your findings are credible and easy for others to understand.

question mark

Which approach should you follow to ensure your penetration test findings are useful for the client?

Wählen Sie die richtige Antwort aus

War alles klar?

Wie können wir es verbessern?

Danke für Ihr Feedback!

Abschnitt 3. Kapitel 1

Fragen Sie AI

expand

Fragen Sie AI

ChatGPT

Fragen Sie alles oder probieren Sie eine der vorgeschlagenen Fragen, um unser Gespräch zu beginnen

Abschnitt 3. Kapitel 1
some-alt