πTypes of Reports
π― Overview
Report structure varies based on assessment type and client requirements. Understanding different assessment methodologies and their corresponding report formats ensures appropriate deliverables for vulnerability assessments, penetration tests, attestation reports, and specialized assessments.
π Assessment Types
π Vulnerability Assessment
# Characteristics:
- Automated scanning (authenticated/unauthenticated)
- No exploitation attempted
- Scanner result validation
- False positive identification
# Scope variations:
- External: Internet-facing systems
- Internal: Behind-firewall network scan
- Credentialed: Domain account context
- Anonymous: Unauthenticated scanningβοΈ Penetration Testing
π Report Categories
π Internal Penetration Test Report
π External Penetration Test Report
π Vulnerability Assessment Report
π Specialized Assessment Types
π Inter-Disciplinary Assessments
π§ Hardware Penetration Testing
π Additional Deliverables
π Attestation Report/Letter
π Presentation Slide Deck
π Findings Spreadsheet
π¨ Vulnerability Notifications
π Report Lifecycle
π Draft Report Process
π Post-Remediation Testing
π― HTB Academy Lab Solutions
Lab Questions
Assessment Perspective Matrix
β οΈ Professional Considerations
π Client Communication
π Ethical Boundaries
π‘ Key Takeaways
Assessment type determines report structure and content
Client perspective (black/grey/white box) affects methodology
Draft report process enables client collaboration
Specialized assessments require interdisciplinary expertise
Post-remediation testing needs strict scope control
Ethical boundaries must be maintained throughout
Professional communication essential for client success
Understanding different report types and assessment methodologies ensures appropriate deliverables that meet client needs while maintaining professional standards and ethical boundaries.
Last updated