githubEdit

Reporting

Report Structure

Executive Summary

Target Audience: C-level executives, management
Length: 1-2 pages

Include:
- Engagement overview (scope, dates, methodology)
- Key findings summary (critical/high count)
- Overall risk assessment (Critical/High/Medium/Low)
- Top 3-5 recommendations
- Business impact statement

Avoid:
- Technical jargon
- Detailed exploitation steps
- Overwhelming statistics

Technical Findings

Finding Template

Response:

Impact

An attacker could bypass authentication and gain administrative access to the application, potentially leading to:

  • Data breach of customer information

  • Unauthorized financial transactions

  • Complete system compromise

CVSS Score

8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Remediation

  1. Use parameterized queries or prepared statements

  2. Implement input validation

  3. Apply principle of least privilege to database accounts

Secure Code Example:

References

Base Score Range:

  • 0.0 : None

  • 0.1 - 3.9 : Low

  • 4.0 - 6.9 : Medium

  • 7.0 - 8.9 : High

  • 9.0 - 10.0 : Critical

Calculator: https://www.first.org/cvss/calculator/3.1

Key Metrics:

  • Attack Vector (AV): Network/Adjacent/Local/Physical

  • Attack Complexity (AC): Low/High

  • Privileges Required (PR): None/Low/High

  • User Interaction (UI): None/Required

  • Scope (S): Unchanged/Changed

  • Confidentiality Impact (C): None/Low/High

  • Integrity Impact (I): None/Low/High

  • Availability Impact (A): None/Low/High

CRITICAL:

  • Remote code execution

  • Authentication bypass (admin)

  • SQL injection with data exfiltration

  • Unauthenticated access to sensitive data

HIGH:

  • Stored XSS affecting admins

  • SSRF with internal access

  • Privilege escalation

  • Sensitive data exposure

MEDIUM:

  • Reflected XSS

  • CSRF on sensitive functions

  • Information disclosure

  • Missing security headers

LOW:

  • Verbose error messages

  • Directory listing

  • Missing cookie flags

  • Minor information disclosure

INFORMATIONAL:

  • Best practice recommendations

  • Defense in depth suggestions

  • No direct security impact

✓ Be clear and concise ✓ Provide actionable recommendations ✓ Include evidence (screenshots, logs) ✓ Explain business impact ✓ Prioritize findings by risk ✓ Use consistent formatting ✓ Proofread for errors ✓ Test all PoC steps before including ✓ Redact sensitive data appropriately ✓ Include positive observations

✗ Use inflammatory language ✗ Include personal opinions ✗ Provide incomplete findings ✗ Use unexplained jargon ✗ Include raw tool output without context ✗ Make assumptions without evidence ✗ Include out-of-scope findings ✗ Forget to mention failed attacks ✗ Leave credentials in screenshots ✗ Submit without review

Report Generation Tools

Automated Tools

Screenshot Tools

Deliverables Checklist

Common Sections

Methodology Description

Risk Rating Explanation

Resources

Last updated

Was this helpful?