πŸ“Notetaking & Organization

🎯 Overview

Thorough notetaking is critical during assessments. Notes and tool output become the raw inputs for reports - typically the only deliverable clients see. Organized documentation saves time during reporting and provides essential references for client questions and team collaboration.

πŸ“‹ Essential Notetaking Structure

Core Categories

# Primary sections for comprehensive documentation:
1. Attack Path           # Complete exploitation chain with screenshots
2. Credentials          # Centralized credential tracking
3. Findings            # Individual vulnerabilities with evidence
4. Vulnerability Scan Research    # Scanner analysis and research
5. Service Enumeration Research   # Service investigation notes
6. Web Application Research      # Web app discoveries and testing
7. AD Enumeration Research       # Active Directory investigation
8. OSINT                # Open source intelligence gathering
9. Administrative Information    # Contacts, objectives, RoE
10. Scoping Information         # IP ranges, URLs, provided credentials
11. Activity Log               # High-level activity tracking
12. Payload Log               # Uploaded files and cleanup tracking

Folder Structure

Notetaking Applications

Session Logging

πŸ“Ί Tmux Logging Setup

Installation

Usage

Key Bindings

πŸ“Š Evidence Collection

What to Capture

Screenshot Best Practices

Terminal Output Formatting

πŸ“ Artifact Tracking

Payload Documentation

System Modifications

Sample Tracking Format

🎯 HTB Academy Lab Solutions

Lab Questions

Practical Exercises

πŸ”„ Assessment Workflow

Pre-Assessment Setup

During Assessment

Post-Assessment

⚠️ Data Handling Guidelines

What NOT to Collect

Compliance Considerations

πŸ’‘ Key Takeaways

  1. Structured approach essential for comprehensive documentation

  2. Tmux logging provides complete session recording

  3. Evidence organization saves time during reporting

  4. Proper redaction protects sensitive information

  5. Terminal output preferred over screenshots when possible

  6. Artifact tracking critical for professional assessments

  7. Tool selection should match company policies and client requirements


Effective notetaking and organization form the foundation of professional penetration testing deliverables and ensure comprehensive evidence collection throughout assessments.

Last updated