O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

This concludes our chapter on reporting and note taking for our penetration test. This lesson provides a clear understanding of why the note taking and reporting process is crucial to reflect the hard work we have already done.

Since the PTES is a standard, and standards change or have amendments over time, we should now possess the skill needed to adapt our code to these changes. In fact, it's best to frequently refer to the PTES section on reporting for additional information on any section or the type of report as often as possible. We should now feel confident with generating our own custom reports for our client target from any data source, including comma-separated files, text, or even databases.

In the following, and final, chapter, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required