There are testers who think I’m nutz for insisting that they sort any lists they include in their reports. Let me tell you my side of the story…
The OWASP Top 10 details critical risks associated with web application security and is the defacto standard for web app security.
A good pentest report is supposed to be a teaching tool that provides the folks on the receiving end with information that makes it possible for them to do a lot of the same things we did. Here are a few reasons why we want them to do that.
If you really, honestly, and truly want to take your reports to the next level, hire an editor.
If what you did does not show up in your pentest report, it didn’t happen. So how do you make sure your report captures everything you did? (First in a series of posts.)
The old adage, “knowledge is power,” is true in general, but in infosec, knowledge is mission critical. Luckily, there are a lot of tools to make recon easier.
Building your skill set can seem overwhelming, but if you can break things down into smaller pieces that you share with others, over time you can not only learn a lot of cool stuff, but also help others along the way.