Notice: This page requires JavaScript to function properly.
Please enable JavaScript in your browser settings or update your browser.
学ぶ Documenting Findings | Reporting and Remediation
Practical Penetration Testing

bookDocumenting Findings

メニューを表示するにはスワイプしてください

Documenting Findings

Properly recording vulnerabilities is one of the most important steps in a penetration test. When you document your findings clearly and accurately, you help organizations understand their security risks and take action to fix them. Good documentation ensures:

  • All discovered vulnerabilities are tracked;
  • Each issue is described in a way that anyone can understand;
  • Evidence and details are included for verification;
  • Remediation steps are suggested to help address the problems.

Accurate documentation is essential for both technical teams and decision-makers. It provides a clear record of what was found, why it matters, and how to improve security. By carefully documenting your findings, you support better communication, accountability, and long-term security improvements.

Collecting Evidence During a Penetration Test

Collecting evidence is a critical part of a penetration test. You need to document every finding with clear, reliable proof. This helps organizations understand the risks and take action. Use these practical methods to gather strong evidence:

Screenshots

  • Capture images of important steps, such as when you access a restricted area or trigger a vulnerability;
  • Highlight key details in the screenshot, like URLs, error messages, or user information;
  • Use built-in screenshot tools or third-party software to save images securely.

Example: If you bypass a login page, take a screenshot showing the restricted dashboard with your username visible.

Logs

  • Save relevant log files that show suspicious activity or successful exploits;
  • Collect logs from applications, system events, or network devices;
  • Make sure timestamps and source information are included for context.

Example: Export a web server log that records your SQL injection attempt, showing the exact request and response codes.

Code Snippets

  • Copy and paste important pieces of code or script output that demonstrate vulnerabilities;
  • Use clear formatting to show commands you entered and responses from the system;
  • Redact any sensitive data before sharing the evidence.

Example: Show the exact curl command you used to exploit an API and the resulting JSON response that reveals sensitive data.

Always organize your evidence clearly and securely. This ensures your findings are credible and easy for others to understand.

question mark

Which approach should you follow to ensure your penetration test findings are useful for the client?

正しい答えを選んでください

すべて明確でしたか?

どのように改善できますか?

フィードバックありがとうございます!

セクション 3.  1

AIに質問する

expand

AIに質問する

ChatGPT

何でも質問するか、提案された質問の1つを試してチャットを始めてください

セクション 3.  1
some-alt