WEBVTT

00:00.880 --> 00:07.400
Hello everyone in the biggest movie we have a recap of the school information gathering process the

00:07.400 --> 00:10.280
vulnerabilities and question decapitation.

00:10.530 --> 00:14.280
So what is the acting that is completed in terms of the beauty.

00:14.390 --> 00:16.790
The next thing is documentation.

00:16.790 --> 00:22.340
So this reader is about the documentation but in this we will understand the importance of the documentation

00:22.710 --> 00:24.280
for the report you can do it.

00:24.340 --> 00:26.510
Also talk about work including the report.

00:26.670 --> 00:29.710
And we go to a sample report a better understanding.

00:29.850 --> 00:35.650
So when I talk about the documentation or the report the report is something of an intrusion testis

00:35.770 --> 00:41.240
least because but hurty merely one of the most important thing penetration testing is different from

00:41.240 --> 00:45.780
the other activities that happens in the company in relation to IP.

00:45.900 --> 00:51.200
But any of that activity there would be some equipment are harboring cit. our software installation

00:51.530 --> 00:54.150
or an upgrade for the hardware and software.

00:54.170 --> 00:57.030
This is something which is this worker decline as an output.

00:57.110 --> 01:02.420
So they can see that this device has been NeuStar or this software has been forced into our work when

01:02.420 --> 01:04.130
it comes to penetration testing.

01:04.160 --> 01:10.010
This is an activity to take the same amount of work to the computer.

01:10.330 --> 01:16.740
But when recoverable the out part nothing is visible with the claim that has happened or data has been

01:17.000 --> 01:18.070
changed in the interval.

01:18.080 --> 01:24.660
So the Reverby the only thing that can help them understand that yes the activity dictates that it will

01:24.660 --> 01:27.340
do that and it open of the distinct process.

01:27.410 --> 01:34.270
And the only evidence there is actually was conducted and also they report back would help you get back

01:34.310 --> 01:35.520
the payments.

01:35.540 --> 01:40.610
It's important to understand how this were to be adopted and what needs to include people less than

01:40.610 --> 01:45.820
10 percent of all the material of the delivery to condition this thing.

01:46.010 --> 01:50.970
You could see it in person is dedicated to reporting 11 disease.

01:51.170 --> 01:56.510
If you go online to go through this and she do to close your media you find that there are any number

01:56.510 --> 02:04.440
of resources which can help you learn DVT and then you'll know how to is up to exploit and so on.

02:04.640 --> 02:10.880
But when it comes to the cooking pot we're 10 percent of all those resources after that it to the people

02:10.950 --> 02:16.260
working we're going to talk about the reporting there while drafting the budget plan.

02:16.370 --> 02:21.180
You need to learn how much time you want to dedicate the day for creation.

02:21.320 --> 02:27.290
Many times more than a ridiculous thing is given to the V.A. with the activity so as to find as many

02:27.700 --> 02:34.250
varieties as possible but only a small fraction of pain as you that is working but it is a common occurrence

02:34.280 --> 02:39.770
among most of the integration just as they don't allow enough time to produce the news and people report

02:39.770 --> 02:47.210
which is easy to understand for the crank has been discussed before or even but that may not be as technical

02:47.240 --> 02:54.720
as V-A So assuming that they also understand the DMs me more bigger than drafting would have worked.

02:54.730 --> 03:00.460
It should be kept in mind that your reports would be easy to understand for the claim it's not so huge

03:00.600 --> 03:01.870
for the clangor to it.

03:01.910 --> 03:07.940
We're only really giving a rip we're glad to be knowing what they want and they will certainly be prepared

03:08.040 --> 03:08.930
in this.

03:08.960 --> 03:15.740
In few cases if the client has garnered objectivity connected previously or if they are into the field

03:16.130 --> 03:18.310
they have a better understanding of the OT.

03:18.320 --> 03:19.830
So in it is.

03:19.910 --> 03:24.540
The decline is ordered into the Iraqi government or has sparked the activity done previously.

03:24.550 --> 03:31.310
They may be having an understanding of all the penetration testing process on 1184 so they may let you

03:31.310 --> 03:37.280
know what they are looking for in the OR rather than getting about what kind of mail to use and what

03:37.280 --> 03:39.100
kind of students or.

03:39.360 --> 03:41.190
You can't be that lucky everything.

03:41.220 --> 03:43.970
So most of the cases you have is in that decline.

03:44.030 --> 03:46.070
We've not been doing what they want in the real world.

03:46.140 --> 03:52.070
And you are proposing what needs to be told that he can mimic Section 2 in good enough condition testing

03:52.070 --> 03:57.480
it if work is a courtesy and a summary of abilities that have been never defined.

03:57.530 --> 04:03.530
The list of tools used and then the main body of the report which is to do is report containing detailed

04:03.530 --> 04:05.240
findings going forward.

04:05.320 --> 04:10.820
If you look at a sample report this is just one of the sample reports which figure you were one of my

04:11.430 --> 04:12.020
assignment.

04:12.110 --> 04:15.250
So you need to include the date findings like this.

04:15.290 --> 04:22.820
So any of the ration that was captured you defined the observation until you wrote a brief description

04:23.090 --> 04:30.260
of what exactly the division was and then supporting Chuck's sharks decline the risk factor to mitigate

04:30.260 --> 04:32.410
the will of your teeth and.

04:32.900 --> 04:39.890
Once you follow up facts like this you can indeed do a report containing all your observations and discussion

04:39.900 --> 04:41.680
of each and every other issue.

04:41.800 --> 04:45.530
No supporting nothing if you have actually expected something.

04:45.530 --> 04:52.630
Then there's the Falkenstein who claim to understand that yes the exploded would have worked for more

04:52.640 --> 04:57.340
control of the machine to screens of the screen and so on.

04:57.470 --> 05:04.160
And then you need to also specify what completion to secure from this one would be how to factor that

05:04.330 --> 05:07.850
needs to the region in the condition of the pool.

05:08.030 --> 05:12.650
For a beginner the starting about building or book you can go through the sample report which has been

05:12.650 --> 05:19.450
forgiven for Hynds if security people behind the development of Cullinan next to this girl on this level

05:19.840 --> 05:24.500
you can see that people are concerned Spizz this have the clangor understand what it is that in the

05:24.500 --> 05:29.940
report and on respites they have post-injury with somebody we were discussing of all things would have

05:29.950 --> 05:32.770
something new to reduce in the series.

05:32.870 --> 05:35.270
And then you can see they have an attack narrative.

05:35.360 --> 05:42.940
So if given a brief about the fact that we're not here in you for each and every of the region region

05:43.080 --> 05:48.760
re-explained when the beauty that was it and divide the scenes or the truth that is just one way to

05:48.770 --> 05:56.010
give us a few pieces that even illustrated the abilities and the scenarios lumps.

05:56.120 --> 06:01.550
If you can do the scene nothing better than that and so on so you'll just fine as it is things you can

06:02.400 --> 06:08.270
nomer this sample for Fundy with two definitions of security coming back beautiful which I was talking

06:08.270 --> 06:14.610
about earlier to have trying to understand Birkie the criteria of development on the list much less

06:14.930 --> 06:21.330
so if you are saying that any validity is a particular vulnerability or a medium an ability then how

06:21.480 --> 06:25.380
you have categorized that needs to be clear to the klank also.

06:25.580 --> 06:29.250
So here I've mentioned that the one liberty that is critical.

06:29.540 --> 06:32.250
If they have a CV is the school of pay.

06:32.460 --> 06:34.540
Now CV is a CV.

06:34.690 --> 06:39.590
Some sunder the scoring methodology is what the broke that up.

06:39.710 --> 06:42.200
I didn't defend her faking BS as a reference.

06:42.200 --> 06:43.600
We define our creativity.

06:43.730 --> 06:46.280
You relish in what you can see.

06:46.280 --> 06:50.310
Similarly you can add something like that in this group.

06:50.560 --> 06:56.030
I've mentioned what were were the days that will be conducted in the school itself.

06:56.030 --> 07:01.910
You can also add that the days of all of the devices that will be tested of the IP addresses that will

07:01.910 --> 07:04.600
be tested are the application and so on.

07:04.730 --> 07:06.680
And then you can also include the.

07:06.860 --> 07:13.120
Talking about all the tools that have been doing the quality with the select case you need to invest

07:13.130 --> 07:20.540
time to get a better understanding of how you can create a full report on an interesting but also report

07:20.540 --> 07:26.340
which is impressive enough for the client to understand you first doing the.

07:26.510 --> 07:32.470
So I hope you have not bought a better understanding of the importance of getting 10:04 how you can

07:32.700 --> 07:33.650
read the report.

07:33.650 --> 07:34.880
You need to start from.

07:35.030 --> 07:41.490
So you have burden of work on the offensive security Sunday-School so finding and exporting your done

07:41.570 --> 07:42.520
abilities.

07:42.560 --> 07:48.930
We had a recap of this whole authentication testing process because of information gathered from the

07:48.920 --> 07:51.540
processes involved in gathering the information.

07:51.590 --> 07:57.740
We then disclosed about the when and replaced that had and defined how to exploit those with abilities

07:58.220 --> 08:01.360
and then the documentation of that report.

08:01.400 --> 08:03.950
For the syndication testing process.

08:03.960 --> 08:10.670
So I hope that through the course you haven't got a good understanding about people what our process

08:10.670 --> 08:13.270
of penetration testing and the documentation for

08:21.690 --> 08:23.690
thank you for watching the videos of the.
