Analysis and Report Writing Phase
Analysis Phase
- Data Consolidation
- Logs, screenshots, and notes.
-
Vulnerability Assessment - Analyze the identified
vulnerabilities, their impact, and the ease of exploitation.
Categorizing vulnerabilities based on severity (e.g., critical, high,
medium, low).
-
Root Cause Analysis
- Determine the underlying cause of the vulnerabilities to provide
meaningful recommendations for mitigation
- Risk Assessment
- Assess the risk posed by each vulnerability, considering factors
such as the likelihood of exploitation and the potential impact on the
organization.
- Mapping to Compliance Standards
- Map the findings to relevant compliance standards and frameworks
(e.g., PCI-DSS, GDPR, ISO 27001) to highlight areas of
non-compliance.
Auditing.
This phase occurs after the initial penetration testing and
exploitation of vulnerabilities have taken place.
-
Assessment of Security Posture evaluate the effectiveness of
security controls and policies.
-
Review of Logs and Configurations: Auditing involves analyzing
system logs, configurations, and access controls to identify any
anomalies or weaknesses that could be exploited.
-
Compliance Checks
- Organization complies with relevant regulations and standards.
- Recommendations for Improvement
- Based on the findings from the audit, ethical hackers provide
recommendations for enhancing security measures, addressing
vulnerabilities, and improving overall security policies.
Report writing.
A report is the primary record for future tests.
Tools
1. LaTex (for Professional Reports)
2. Document editing like tools Microsoft word Google docs
3. Diagramming tools app.diagrams.net
LucidChart
4.Scam reports - scamadviser.com , - gasa.org
Dradis MagicTree Faraday Lynis
Component of a Good Report
- Description of the vulnerability
- Evidence and proof of concept (e.g., screenshots, logs, req/res
captures, PoC examples)
- Impact assessment
- Reproduction steps
- Recommended remediation
Executive-level reporting
- Appendix with terms for risk rating
- Bussiness impact
- Customization
- Strategic roadmap
Technical report
- Technical root cause analysis.
- Maturity model
- Technical findings
- Incident response and monitoring capabilities
To be continued….