template

*PLATFORM NAME*: $PLATFORM

*ANALYST TEAM*
- Name Surname - Launchpad handle - email address
- Name Surname - Launchpad handle - email address
...

*LIST OF IP ADDRESSES/WEBSITES*
- $IP1

  • - $WEBSITE1.1
    - $WEBSITE1.2

- $IP2

  • - $WEBSITE2.1
    - $WEBSITE2.2
    - $WEBSITE2.3

*GENERAL SUMMARY*
In this section you have to describe in few lines the most important vulnerabilities and their impact.

-o-
*DETAILS FOR $IPx*
In this paragraph you have to report the list of vulnerabilities found for every IP address. Attached to this paragraph the portscan report (nmap) and eventually the vulnerability scanner report (nessus), by referencing them with the right code (PS1, VA1).

*VULNERABILITIES DETAILS*
Here you have to write detailed informations for each vulnerability found, by following the template below:

*$VULNERABILITY_TITLE*
Detailed description of the vulnerability, by specifying also the steps to reproduce it (for example the "vulnerable" URL in case of web application vulnerability). Make references also to the screenshot/evidence attached to the report with the right evidence code (E1.x)

*PROPOSED SOLUTION*
Write here some lines to suggest a solution for this vulnerability

*REFERENCES*
- Some links to whitepapers/CVE that refers to the vulnerability, if any
- $URL_2
- $URL_3
-o-

Repeat the part between -o- for each host analyzed.

*ATTACHMENT LIST*
- PS1 PS1_$FILENAME - portscan for IP address X.Y.Z.W
- VA1 VA1_$FILENAME - vulnerability assessment for IP address X.Y.Z.W
- E1.1 E1_1_$FILENAME - screenshot of $VULN
- E1.2 E1_2_$FILENAME - data collected through $VULN

- PS2 PS2_$FILENAME - portscan for IP address Y.X.Z.W
- VA2 VA2_$FILENAME - vulnerability assessment for IP address Y.X.Z.W
- E2.1 E2_1_$FILENAME - data collected through $VULN
- E2.2 E2_2_$FILENAME - screenshot of $VULN

- ...

UbuntuPentest/ptreport/template (last edited 2008-08-06 16:20:44 by localhost)