O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Reporting

The final goal in a penetration test is, ultimately, the reports. The process of planning the reports begins the minute we begin testing and ends the minute we stop. Logging successful steps is not only crucial for the logistics of the target client, but can also lead to further exploitation after close analysis. For instance, port scanning all live hosts, and port service enumeration from Chapter 3, IEEE 802.3 Wired Network Mapping with Perl, can yield recorded results to use with remote exploitation software, such as Metasploit. Also, our target clients might often think of the final reports as what they actually pay for. In fact, it's natural for many institutions to pay for the penetration test to simply obey with compliance ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required