O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter we have explored some basic steps necessary to create the penetration testing report and discussed the core aspects of doing a presentation in front of the client. At first, we fairly explained the ways to document your results from individual tools and suggested not relying on a single tool output. As such, your experience and knowledge counts for verifying the test results before being documented. Afterwards, we shed light on creating different types of reports with their documentation structures. These reports mainly focus on executive, managerial, and technical aspects of a security audit we carried out for our client. Additionally, we also provided a sample table of contents for a network-based penetration testing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required