πHow to Write Up a Finding
π― Overview
π Essential Finding Components
π Required Elements
# Minimum finding information:
1. Description # Vulnerability explanation and affected platforms
2. Impact # Risk if left unresolved
3. Affected Systems # Specific hosts/networks/applications
4. Remediation # Actionable fix recommendations
5. References # External resources for additional information
6. Reproduction Steps # Evidence and step-by-step validation
# Optional elements:
- CVE numbers
- OWASP/MITRE IDs
- CVSS scores
- Ease of exploitation
- Attack probability
- Additional contextπ Finding Structure Template
π Evidence Best Practices
π Reproduction Steps Guidelines
π· Screenshot Standards
π» Terminal Output Presentation
π Remediation Best Practices
β
Good Remediation Examples
β Bad Remediation Examples
π― Sample Finding Examples
π Kerberoasting Finding
π Web Application Finding
π Quality Reference Selection
β
Good Reference Sources
β Poor Reference Sources
π― HTB Academy Lab Solution
Lab Question
WriteHat Tool Practice
π§ Professional Writing Guidelines
π Language Standards
π― Client Consideration
π‘ Key Takeaways
Last updated