πŸ”How to Write Up a Finding

🎯 Overview

Findings are the "meat" of penetration testing reports - showcasing discovered vulnerabilities, exploitation evidence, and remediation guidance. Detailed findings help technical teams reproduce issues, validate fixes, and support post-remediation assessments.

πŸ“‹ Essential Finding Components

πŸ” Required Elements

# Minimum finding information:
1. Description           # Vulnerability explanation and affected platforms
2. Impact               # Risk if left unresolved
3. Affected Systems     # Specific hosts/networks/applications
4. Remediation         # Actionable fix recommendations
5. References          # External resources for additional information
6. Reproduction Steps  # Evidence and step-by-step validation

# Optional elements:
- CVE numbers
- OWASP/MITRE IDs
- CVSS scores
- Ease of exploitation
- Attack probability
- Additional context

πŸ“Š Finding Structure Template

πŸ” Evidence Best Practices

πŸ“Š Reproduction Steps Guidelines

πŸ“· Screenshot Standards

πŸ’» Terminal Output Presentation

πŸ“ Remediation Best Practices

βœ… Good Remediation Examples

❌ Bad Remediation Examples

🎯 Sample Finding Examples

πŸ”‘ Kerberoasting Finding

🌐 Web Application Finding

πŸ” Quality Reference Selection

βœ… Good Reference Sources

❌ Poor Reference Sources

🎯 HTB Academy Lab Solution

Lab Question

WriteHat Tool Practice

πŸ”§ Professional Writing Guidelines

πŸ“ Language Standards

🎯 Client Consideration

πŸ’‘ Key Takeaways

  1. Detailed findings enable technical team reproduction and validation

  2. Evidence quality must be completely defensible

  3. Remediation recommendations should be specific and actionable

  4. Professional language essential for client credibility

  5. Multiple solution options accommodate different budgets and capabilities

  6. Reference quality affects long-term finding usefulness

  7. Consistent formatting improves report readability and professionalism


Well-written findings combine technical accuracy with clear communication, providing clients with actionable intelligence for vulnerability remediation and security improvement.

Last updated