1 00:00:10,440 --> 00:00:17,430 Let us start the last lecture, of course, that is the penetration testing report, and in this lecture 2 00:00:17,430 --> 00:00:23,640 I will show you the components of report, for example, called Page Index, and it will also explain 3 00:00:23,640 --> 00:00:25,320 all of these concepts in detail. 4 00:00:25,890 --> 00:00:32,190 Now, I will be taking the report of the hacker community, which is one of the most well-known community 5 00:00:32,190 --> 00:00:33,990 for bug bounty and report writing. 6 00:00:34,380 --> 00:00:37,430 So I will explain the report and the components as well. 7 00:00:37,830 --> 00:00:42,270 And after the lecture, you will find the report attached in the resources section. 8 00:00:42,850 --> 00:00:44,960 So let us start with the first component. 9 00:00:44,970 --> 00:00:46,410 That is the garbage. 10 00:00:46,680 --> 00:00:52,140 So as you can see on the screen, the hacker one penetration testing report, you can even find this 11 00:00:52,140 --> 00:00:57,210 report from the official website, but they haven't explained each and every component. 12 00:00:57,220 --> 00:01:03,170 So I will explain what is meant by the components of a testing report. 13 00:01:03,600 --> 00:01:07,250 The page that is this is the first page that you are seeing on the screen. 14 00:01:07,260 --> 00:01:08,720 It is known as the code picture. 15 00:01:09,510 --> 00:01:13,020 Now, you always start a report with this cover page. 16 00:01:13,450 --> 00:01:19,860 Now, this is where you would include details such as your company logo title and a shorter description 17 00:01:19,860 --> 00:01:21,330 about the penetration test. 18 00:01:22,110 --> 00:01:27,600 I would suggest you to hire a good designer and work on a professional and appealing garbage, because 19 00:01:27,600 --> 00:01:33,320 if your garbage looks great, it will make a good impression upon the customer who is reading it. 20 00:01:36,190 --> 00:01:44,110 Now, as I said, this is the description of your company next on the table of contents, on the very 21 00:01:44,110 --> 00:01:50,200 next page, you should have an index so that the audience interested in reading a particular portion 22 00:01:50,200 --> 00:01:53,510 of the report can easily get to that portion. 23 00:01:53,800 --> 00:02:01,360 Make sure you highlight or bold the main titles in the table of contents, as well as the page numbers 24 00:02:01,360 --> 00:02:02,620 should be mentioned properly. 25 00:02:07,000 --> 00:02:12,300 The next is the executive summary, we have already discussed what this means about executive summary. 26 00:02:13,140 --> 00:02:20,040 Now, as the name suggests, an executive summary is the portion that is specifically addressed to executives 27 00:02:20,040 --> 00:02:23,350 such as the CEO or the CEO of the company. 28 00:02:24,090 --> 00:02:28,410 The executive summary is the most essential part of meditation testing report. 29 00:02:29,040 --> 00:02:33,930 A good executive summary can make all the difference between a good report and a bad one. 30 00:02:34,830 --> 00:02:41,040 Now, since the executive summary is specifically written to address the non-technical audience, you 31 00:02:41,040 --> 00:02:47,790 should make sure that it's presented in such a way that it is easily comprehensible and understandable. 32 00:02:48,750 --> 00:02:53,340 I will tell you some of the essential points that you should take into consideration while writing an 33 00:02:53,340 --> 00:02:54,210 executive summary. 34 00:02:54,570 --> 00:02:56,580 Make sure you listen to them properly. 35 00:02:57,330 --> 00:03:03,600 The first an important point is since executives are very busy and they have a tight schedule, they 36 00:03:03,600 --> 00:03:07,620 have really minimal time to invest into reading your reports. 37 00:03:08,040 --> 00:03:14,550 Therefore, you should make sure that your executive summary is precise and to the point that executive 38 00:03:14,550 --> 00:03:19,820 summary should start with defining the purpose of engagement and how it was carried out. 39 00:03:20,400 --> 00:03:23,680 Things such as scope should be defined very precisely. 40 00:03:24,300 --> 00:03:30,570 You can see on the screen the goal of this engagement was to conduct a targeted testing and to ensure 41 00:03:30,570 --> 00:03:36,330 the broad coverage of the most common types of vulnerabilities as defined by the website. 42 00:03:36,870 --> 00:03:42,600 So this defines the executive summary in the goal of engagement is also mentioned. 43 00:03:44,450 --> 00:03:49,650 Next, we should explain the results of the penetration testing and the findings in the next paragraph. 44 00:03:49,670 --> 00:03:56,250 You can see on the screen during this assessment, three vulnerabilities were found that had a sevices 45 00:03:56,270 --> 00:04:00,730 rating of seven point zero or higher, either critical or high. 46 00:04:00,740 --> 00:04:06,230 Following this, you should discuss the overall weakness in general and the countermeasures that were 47 00:04:06,230 --> 00:04:10,220 not implemented that caused the vulnerability in the first place. 48 00:04:11,360 --> 00:04:17,290 And finally, you should write about the overall risk that was determined based upon your findings. 49 00:04:17,570 --> 00:04:23,000 You can see they have clearly mentioned how many civil liberties are critical, how many of them are 50 00:04:23,000 --> 00:04:24,920 high, medium and low. 51 00:04:26,010 --> 00:04:32,900 And lastly, you should write about what to what extent the risk would decrease after addressing the 52 00:04:32,900 --> 00:04:37,040 issues and implementing the appropriate countermeasures. 53 00:04:37,190 --> 00:04:39,850 So in short, this is the executive summary. 54 00:04:40,310 --> 00:04:43,220 You can see they have also maintained the state of security. 55 00:04:43,220 --> 00:04:51,530 As I have said, maintaining a healthy security posture requires constant review and refinement of existing 56 00:04:51,530 --> 00:04:52,730 security processes. 57 00:04:53,210 --> 00:05:00,530 Running a hacker on Pantheist allows XCOM internal security team to not only uncover specific, but 58 00:05:00,530 --> 00:05:03,890 gain a better understanding of the security threat landscape. 59 00:05:04,280 --> 00:05:07,430 So this was the state of security for a report. 60 00:05:09,100 --> 00:05:11,060 Now, these are the recommendations now. 61 00:05:11,080 --> 00:05:18,220 What was the key issue for the vulnerability so you can see they have mentioned the key issue, recommendation 62 00:05:18,220 --> 00:05:19,300 and resources. 63 00:05:19,840 --> 00:05:23,550 This is the correct way of telling the recommendations. 64 00:05:23,560 --> 00:05:25,300 So there are three recommendations. 65 00:05:25,300 --> 00:05:29,100 Recommendation one, recommendation two, they might not have included the third one. 66 00:05:29,470 --> 00:05:31,180 They've also mentioned the resources. 67 00:05:31,750 --> 00:05:34,820 You should also provide some images or links if you can. 68 00:05:35,230 --> 00:05:39,070 Next comes the Methodology of Penetration Testing Report. 69 00:05:39,970 --> 00:05:45,430 We have discussed a wide variety of methodologies during this course of penetration testing, such as 70 00:05:45,850 --> 00:05:53,440 or SDMI, NIST and UPS, I would also like to include the methodology that was followed for conducting 71 00:05:53,440 --> 00:05:54,520 the penetration test. 72 00:05:55,330 --> 00:06:00,760 Though its inclusion in the report is optional, it could add a greater value to your penetration testing 73 00:06:00,760 --> 00:06:01,270 report. 74 00:06:01,840 --> 00:06:07,630 In a scenario where you have been asked to follow a certain standard, talking about the methodology 75 00:06:07,630 --> 00:06:09,520 and its steps is a good idea. 76 00:06:11,410 --> 00:06:18,220 Or you can see on the screen of our penetration testing report which methodology was followed in order 77 00:06:18,220 --> 00:06:20,020 to conduct a penetration test. 78 00:06:20,170 --> 00:06:26,680 So you can see they have proper defined the scope and the scope of the assets that which means the websites 79 00:06:26,680 --> 00:06:28,780 in which which are in scope. 80 00:06:28,780 --> 00:06:36,010 They are also included that the assets, otoscope included and other things such as test plan, testing 81 00:06:36,010 --> 00:06:36,340 phase. 82 00:06:36,370 --> 00:06:40,510 Now, this is one of the most important part of penetration testing report. 83 00:06:43,430 --> 00:06:49,460 Not testing phase in which which is the phase which describes the exact process of figuring out the 84 00:06:49,460 --> 00:06:55,670 penetration test, so the first phase is the information gathering and reconnaissance phase in which 85 00:06:55,670 --> 00:06:59,600 you gather as much as information about the target, which is possible. 86 00:06:59,810 --> 00:07:01,200 You document the findings. 87 00:07:01,610 --> 00:07:07,160 Now, in this report, they have just included in half page where if you find more critical information, 88 00:07:07,160 --> 00:07:11,980 you're always welcome to write in detail about the critical information. 89 00:07:12,230 --> 00:07:18,320 The next phase of the testing phase that is the second phase is the penetration testing and the exploitation 90 00:07:18,320 --> 00:07:25,010 phase in which you carry out different attacks, use different exploits and queries to get access to 91 00:07:25,010 --> 00:07:25,610 the system. 92 00:07:26,150 --> 00:07:29,210 Now, you mention about this in the penetration testing phase. 93 00:07:30,220 --> 00:07:38,200 And finally comes the retesting phase and the report is now in the retesting phase, you again confirm 94 00:07:38,410 --> 00:07:40,850 over the week when the results are present or not. 95 00:07:40,870 --> 00:07:47,470 As I said, there are a lot of false positives during a penetration test as a penetration test. 96 00:07:47,770 --> 00:07:53,260 Your job is to verify them manually and finally report phase, which we are doing it now. 97 00:07:53,270 --> 00:08:01,700 We have to report the findings of the vulnerability and you have to always present which when abilities 98 00:08:01,700 --> 00:08:04,120 were present in the system and others. 99 00:08:05,410 --> 00:08:07,830 Now, this is the detailed findings. 100 00:08:07,840 --> 00:08:14,980 Now you can see critical vulnerabilities is a rating of nine to 10 highs from seven to eight point nine. 101 00:08:15,190 --> 00:08:17,400 You have to mention all of these. 102 00:08:18,100 --> 00:08:24,520 This is where you address the technical audience, specifically the security manager and the developers. 103 00:08:25,200 --> 00:08:30,780 Also, this is where you are allowed to talk in depth about how the vulnerabilities were discovered, 104 00:08:31,270 --> 00:08:36,880 root causes of the vulnerabilities, the associated risks and the necessary recommendations. 105 00:08:37,570 --> 00:08:41,000 Now, let's now briefly talk about the findings. 106 00:08:41,020 --> 00:08:44,290 But, you know, these are the findings. 107 00:08:44,920 --> 00:08:50,530 Now, the first and the most important item in the findings is the description. 108 00:08:51,460 --> 00:08:57,820 Description is where you talk about the vulnerability itself, a brief explanation that should be provided 109 00:08:58,210 --> 00:08:59,050 in this section. 110 00:09:00,400 --> 00:09:04,460 So you can see assets, somebody's assets, somebody is in charge. 111 00:09:04,510 --> 00:09:12,040 The description the explanation part is the very reveal the vulnerability was found and how it was found, 112 00:09:12,040 --> 00:09:16,270 the root cause of the vulnerability, the proof of concept and others. 113 00:09:18,170 --> 00:09:25,070 Invulnerability, somebody basically you have to talk about the different types of vulnerabilities you 114 00:09:25,070 --> 00:09:31,710 found a picture speaks a thousand words, is a brilliant quotation that all of us should remember from 115 00:09:31,760 --> 00:09:33,130 childhood, don't we? 116 00:09:33,140 --> 00:09:36,690 Because it always helps us to include the charts in your report. 117 00:09:36,720 --> 00:09:43,850 So if we can see these are the types of charts and tables which are attractive and which help are security 118 00:09:43,850 --> 00:09:50,510 develop or the manager to get a clear idea, things such as the overall strengths and weaknesses and 119 00:09:50,720 --> 00:09:51,800 risk assessment. 120 00:09:51,800 --> 00:09:54,660 Somebody can also be included under this section. 121 00:09:55,130 --> 00:10:01,220 Now, security executives might be interested in this portion of the report as they would need to enforce 122 00:10:01,220 --> 00:10:02,190 the countermeasures. 123 00:10:02,510 --> 00:10:06,270 So just consider yourself as a security expert and reading this speech. 124 00:10:07,040 --> 00:10:09,020 OK, injection test result was good. 125 00:10:09,230 --> 00:10:10,000 So selection. 126 00:10:10,700 --> 00:10:11,180 Yes. 127 00:10:11,180 --> 00:10:20,060 It it didn't find any flaw that was there in broken authentication, synthetic marks or no flaw wherever 128 00:10:20,060 --> 00:10:23,090 there are crosses at that point when the treaties are present. 129 00:10:23,120 --> 00:10:24,800 So this is very critical. 130 00:10:24,980 --> 00:10:32,180 Cyesis over for findings, security, misconfiguration, one finding and below is the RiskMetrics. 131 00:10:33,120 --> 00:10:40,800 I will not tell you what is meant by RiskMetrics, so in short, this is all mentioned in tables, right, 132 00:10:41,010 --> 00:10:46,610 or tabular summary is a great way to present the findings of a vulnerability assessment to a customer. 133 00:10:47,730 --> 00:10:54,210 The following screen comes directly from the report and summarizes the when the assessment based upon 134 00:10:54,210 --> 00:11:00,780 the number of risks and findings, risk assessment is defined as before the analysis of the report. 135 00:11:00,810 --> 00:11:08,100 It is very crucial for the customer because they will want to know the intensity of the damage of the 136 00:11:08,100 --> 00:11:08,930 vulnerabilities. 137 00:11:09,270 --> 00:11:13,380 Now, the risk assessment matrix is in terms of a penetration test. 138 00:11:13,380 --> 00:11:20,100 We compare the likelihood of occurring and impact caused by the risk assessment matrix. 139 00:11:20,980 --> 00:11:25,980 You can see on the screen the following is the following table, which demonstrates critical, high, 140 00:11:25,980 --> 00:11:26,880 medium, low. 141 00:11:27,180 --> 00:11:31,710 And the names of the vulnerabilities is nothing but the risk assessment metrics. 142 00:11:32,100 --> 00:11:35,780 Now in detailed findings, overview of. 143 00:11:36,820 --> 00:11:42,200 Basically, a recommendation is where you address the developers on how to fix the vulnerability. 144 00:11:42,640 --> 00:11:48,160 You may also include general suggestions to avoid that particular class of vulnerability in future. 145 00:11:49,090 --> 00:11:55,960 You can see on the screen the asset, which is the third website, Ippei, dot com, dot com. 146 00:11:56,880 --> 00:12:04,300 This was the asset asset summary is a description when somebody is just we have discussed and, you 147 00:12:04,300 --> 00:12:10,750 know, security is mentioned, CW is mentioned, vulnerability title is mentioned and recommendations 148 00:12:10,930 --> 00:12:12,280 were also mentioned earlier. 149 00:12:13,060 --> 00:12:20,110 You can see the recommendations are mentioned here and the sources and recommendations, not that you 150 00:12:20,110 --> 00:12:25,780 know the basics and the structure of how penetration testing report is basically carried out. 151 00:12:26,290 --> 00:12:31,090 I would urge you to spend some more time removing the following penetration testing reports. 152 00:12:31,090 --> 00:12:37,440 I have attached feelings of offensive security, simplexity report and as well as the hacker report. 153 00:12:37,840 --> 00:12:39,650 These are very good reporting. 154 00:12:39,670 --> 00:12:45,750 Before exploding anything, your job is to write a report and provide it in a proper way. 155 00:12:46,600 --> 00:12:52,960 So in this section we talked about the basic terminologies that we will encounter on a daily basis as 156 00:12:52,960 --> 00:12:53,840 a penetration test. 157 00:12:54,370 --> 00:12:59,230 We discussed about the different types of penetration tests and different types of penetration testing 158 00:12:59,230 --> 00:13:05,800 reports, components of the report, and how to write a perfect report based upon the different target 159 00:13:05,800 --> 00:13:06,310 audience. 160 00:13:07,180 --> 00:13:13,120 Me and my colleague Josh is really glad that you have come through the scores and you've successfully 161 00:13:13,120 --> 00:13:14,380 completed the scores. 162 00:13:14,830 --> 00:13:19,540 Tell this part of the day and I really hope that you like our course. 163 00:13:19,810 --> 00:13:25,930 And before moving ahead, I would just like to urge you to please leave a rating for this course as 164 00:13:25,930 --> 00:13:29,200 it will really boost our confidence in creating more courses. 165 00:13:30,070 --> 00:13:35,980 We have really great courses in our minds, like security auditors, computer network and many more. 166 00:13:35,980 --> 00:13:40,180 So if you want to see more courses, please read rating for us. 167 00:13:40,420 --> 00:13:40,930 Thank you.