Types of Reports
Let’s look at the key parts of a Detailed Developer Report:
Index of all the vulnerabilities.
Information about what exact URL and parameters are affected.
The payload you used to confirm the vulnerability.
Observations (screenshots/videos) explaining a complete step by step exploitation of each vulnerability.
Outcome (if any) i.e. the data you were able to extract using the vulnerability, commands you were able to run, etc.
Business Impact - A detailed description of the impact of the vulnerability with examples (screenshots/videos).
Recommendations on how to patch the vulnerability.
References about the vulnerability, including links explaining the vulnerability, the patches and the impact.
Let’s look at the key parts of a High Level Management Summary:
Information summarising everything a hacker can do if an attack happens, containing maximum possible impacts of each vulnerability (multiple if they exist).
Information about what exact URL and parameters are affected.
Brief observations containing only the application affected and impact information i.e no step by step guide is required, but only outcome observations.
Detailed business impact with proofs of all kind of information you extracted during the exploitation.
References about the vulnerabilities (not the patches).
Last updated