Part 2 - Report Creation

Video Activity

This lesson continues the discussion of report creation and specifically covers artifacts, which include: 1. Images 2. Logs 3. Charts 4. Graphs 5. Packets 6. Codes

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
4 hours 20 minutes
Difficulty
Intermediate
CEU/CPE
5
Video Description

This lesson continues the discussion of report creation and specifically covers artifacts, which include: 1. Images 2. Logs 3. Charts 4. Graphs 5. Packets 6. Codes

Video Transcription
00:04
you should include artifacts in your report. So as you're going along and you discover something so say you discover across the scripting vulnerability and you managed to get an alert box to pop up
00:14
well, you're gonna want to take an image of that
00:16
screen. Capture that, and you're gonna want to put that in your report. If you were able to find some kind of anomalous logs while looking at their database, include those logs in your report as well,
00:30
or at least a snippet from those logs to say, Hey, this kind of attacks happening. If you have any charts or graphs that would help explain
00:39
estimated loss or what pages have the most vulnerabilities and things like that you want to include those, the more pretty pictures you have
00:48
Easier is for people understand. If you have things like packets that you may have manipulated, you want to include a little snippet of that packet and say, Hey, in this packet portion, here is the bit of information that we
01:03
had changed and it allowed us to exploit your system.
01:08
And if there's any code that you may have manipulated in the HTML using something like firebug. You want to include that little bit of code in there as well say, Hey,
01:18
this a little bit of code here really messes things up,
01:22
So artifacts are fantastic to have in a report.
01:26
When you're writing a report, you really need to conceal your audience as well.
01:30
Who are you presenting this to exactly? Is this somebody that's highly technical? They have a lot of technical knowledge. Or is this someone who may be a manager or CEO or something like that? You want to consider that one making this? You don't want to put too much high level technical information in the report
01:47
and watched my eyes eyes glaze over.
01:49
So whenever you're writing your port,
01:51
always keep in mind who you're presenting it to. You may want to create a couple different versions of that report to present a different levels. Also, consider how much do they need to know?
02:00
So if you're writing a report for somebody and counting, do they really need to know
02:07
the nitty gritty like somebody in I T.
02:12
Can you really trust them with that kind of information?
02:15
So
02:17
always consider what they need to know. I may be some organizations that you go into who say that
02:23
all vulnerabilities air found should only be reported to some body like the
02:30
says so or something like that. And so you are only going to present that information to them and cut out any kind of vulnerabilities from your report that you may have to give to somebody else if you're presenting technical information. Somebody, How technical are they? Are they somebody who says that the I T help desk
02:49
and answers phones and hands out new laptops and computers to people
02:53
and does minor things? Or are they in the back in the server room writing the code for the Web application? These are things that you need to consider as well, when you're writing your report and what exactly are they allowed to know, where this person sitting, the organization and the totem pole?
03:08
What do they have permission to know about
03:12
vulnerabilities and sensitive information in the company or organization?
03:16
That's a very, very important thing to know. You also want to consider time whenever you're writing a report. How quickly does this wrote? No report need to be created,
03:25
when exactly will it be presented and How long to the presentation B
03:30
do you want? Just a quick overview Thio be given Thio
03:36
individuals higher in the company, or do they want a detailed explanation of everything?
03:40
So whoever you are communicating with an organization to present the
03:46
report to you should ask them about time constraints and how in depth they want to go into the presentation classifications. She also come into consideration when you're writing your report.
03:58
So what kind of organization you're performing us for
04:00
is a government organization, a large corporation or small company.
04:04
You may have to consider actual government classification systems
04:11
when it comes to vulnerabilities.
04:13
Or if you're dealing with something like a medical company, you have to take HIPPA into consideration when writing your report, what you put in your report and how you show that to
04:24
has largely determined by the classifications. So
04:29
when you are building the report, you you wanna ask whoever you're communicating within the company,
04:34
that kind of question,
04:36
because you want to read a report that is something like a larger more of Social Security numbers or medical information. You present that information thio. Hundreds of people who don't have permission to see that kind of information, so take those kinds of things into consideration as well. And then, finally, you will not want to have all supporting documentation, consolidate it
04:57
and made easy toe to deliver. So this includes things like P caps and map results, fuzzier reports, screen captures and any XML files, as well as anything else that you might have
05:08
generated while on the network. You want to put them on something like a hard drive, thumb driver, CD or DVD of some sort to be able to give with the report.
05:17
This supporting documentation will help the company or organization that you're working for fixed the results easier because they're able to look exactly at what you looked at to identify the vulnerability. So it was covered when we talked about what to include things like details and artifacts, what gets there,
05:35
such as time audience classification.
05:39
And we also discussed supporting documentation type B ack and everyone
Up Next
Web Application Penetration Testing

In this web application penetration testing course, SME, Raymond Evans, takes you on a wild and fascinating journey into the cyber security discipline of web application pentesting. This is a very hands-on course that will require you to set up your own pentesting environment.

Instructed By