A penetration test without a report is worthless. Today you learn to write executive summaries, technical findings, and remediation recommendations that both the CISO and a sysadmin can act on.
A professional report has four sections: (1) Executive Summary — business risk in plain English; (2) Scope and Methodology — what was tested, how, and when; (3) Findings — each vulnerability with risk rating, evidence, and remediation; (4) Appendices — raw tool output, screenshots, and CVE references. Use the CVSS 3.1 scoring system for consistency.
Each finding follows a template: Title, CVSSv3 Score, Affected Systems, Description, Evidence (screenshot + command output), Business Impact, and Remediation Steps. Be specific about remediation — 'patch the server' is useless. 'Apply Microsoft Security Update KB5012170 to remediate CVE-2021-34527 (PrintNightmare)' is actionable.
Recommendations must be prioritized by risk and effort. Critical/High findings require immediate patching. Medium findings go on a 30-day remediation plan. Low findings are tracked in a risk register. Always include a re-test recommendation — fixes need validation. Many firms offer a free re-test as part of their engagement fee.
FINDING: Unauthenticated Remote Code Execution via EternalBlue
CVSSv3 Score: 9.8 (Critical)
Affected System: 192.168.1.100 (WIN-DC01)
Description:
The target system is missing MS17-010, allowing an
unauthenticated attacker to execute arbitrary code as
SYSTEM via the SMBv1 protocol (CVE-2017-0144).
Evidence:
[Screenshot: meterpreter shell with 'getuid' output]
Server username: NT AUTHORITY\SYSTEM
Business Impact:
An attacker with SYSTEM access on the domain controller
can extract all Active Directory credentials, enabling
complete domain compromise and ransomware deployment.
Remediation:
1. Disable SMBv1 immediately (Set-SmbServerConfiguration
-EnableSMB1Protocol $false)
2. Apply MS17-010 security update
3. Block inbound TCP/445 at perimeter firewall
Timeline: Immediate (within 24 hours)
Complete a full mock pen-test report for your Metasploitable lab engagement covering all vulnerabilities you found across Days 1-4. Aim for a polished, professional document you could show in a job interview.