A complete guide on Penetration Testing Report

July 2024 · 11 minute read

What is Penetration Testing?

A penetration test, also known as a pen test, is a simulated cyber attack against a computer system to identify exploitable flaws. In the context of web application security, penetration testing is typically employed to complement a web application firewall (WAF).

These vulnerabilities may exist for a variety of reasons, including misconfiguration, insecure code, inadequately designed architecture, or disclosure of sensitive information. The output is an actionable report that describes each vulnerability or chain of vulnerabilities exploited to obtain access to a target, along with the exploit steps, details on how to fix the vulnerabilities, and additional recommendations. Each discovered vulnerability is designated a risk rating that can be used to prioritise remediation tasks.

Table of Contents

Why is Penetration Testing Important?

Penetration testing reveals vulnerabilities that would not have been discovered by other methods, such as vulnerability scanning. As a result of the manual, human analysis, false positives are filtered out. In addition, it demonstrates what access can be acquired and what data can be obtained by attempting to exploit discovered vulnerabilities as a real-world attacker would. This effectively demonstrates the actual risk of a successful exploit given each vulnerability exploited to obtain entry.

Penetration Testing will also examine the cyber defenses of an organization. It can be utilized to evaluate the efficacy of web application firewalls (WAF), intrusion detection systems (IDS), and intrusion prevention systems (IPS). When a penetration test is in progress, these systems should generate alerts and activate the organization’s internal procedures, resulting in a response from the internal security operations teams.

From the perspective of the management team, committing to an ongoing cyber security budget may be viewed as yet another expense with limited return on investment (ROI) visibility.

This is especially true for organizations that are not engaged in the riskier areas of application development or ecommerce, such as mid-sized manufacturing, transport, or construction companies, and believe they are not a desirable target for cybercriminals.

Cyber security vulnerabilities that make national or even international headlines are frequently the result of a targeted, malicious hacking attack. Less widely reported are the ubiquitous, low-profile breaches (often inadvertent and opportunistic in nature) that increasingly affect small and medium-sized businesses.

This trend appears to be the result of the increased automation of cyber-attacks (targeting anyone and everyone) and the introduction of new vulnerabilities as a result of the adoption of new technology and working practices, such as remote working and Bring Your Own Device (BYOD), such as laptops, tablets, and smartphones.

In a rapidly evolving technological landscape, organizations of all sizes must not only keep up with the rate of innovation, but also the resultant information security risks.

Cyber security and information security management are rapidly becoming the responsibility of management teams, not just the IT department.

These organizations recognize that cyber security and information security are, ultimately, the same as any other risk they encounter in their business and must be managed accordingly, regardless of whether the risk is legal, operational, financial, etc. They recognize that not only can they not afford to bury their heads in the sand, but that excellent security practices and compliance are a competitive advantage.

For businesses (mostly SMEs) that have not yet adopted a more proactive approach to cyber security, complacency can be catastrophic. With the rise of automated cyberattacks, you can no longer assume that cybercriminals will not target your company.

The amended Australian Privacy Act mandated disclosure of cyber vulnerabilities to regulators and shareholders beginning in February 2018 and can result in sanctions of up to $1.8 million for organisations and up to $360,000 for each board member.

What is the Penetrating Testing Report format

A penetration test report provides a comprehensive summary of the system’s vulnerabilities. In addition, it includes recommendations for patching, hardening, and restricting the functionality of systems when necessary. The objective is to identify problem areas and implement a solution.  

Consider the following elements prior to writing a pentest report: 

The following sections should be included in the penetration testing report:

For instance, when performing penetration testing on a financial application, describe what each vulnerability would enable attackers to do. What particular files would they be able to view, and what operations would be permitted? They might be able to conduct financial transactions. It is essential for decision-makers to comprehend this in order to effectively manage remediation efforts.

How to write Penetrating Testing Report efficiently: Example

This section will deal with the effective presentation of a Penetration testing report:

1. The Executive Summary

The executive summary must contain an overview of the engagement and the high-level test outcomes. It can also provide an overall risk rating dependent on a particular risk matrix, and some risk recommendations.

Client X contracted company Y to perform Penetration testing for the security controls in their IT systems to understand how effective those controls are. The company will also provide estimates of how susceptible the system is to data exploitation or breach.

The purpose of the internal penetration test is to simulate the network-level actions of a malicious actor who has obtained access to the internal network zone.

Overall, CLIENT’s critical infrastructure presents a high-risk attack surface with major critical vulnerabilities that enable complete root access to multiple systems.

Both the EPO server and the Remote Desktop Server were vulnerable to EternalBlue; a remote terminal was opened on both by exploiting the SMBv1 vulnerability with a publicly available exploit module that remotely attacked the spoolsv.exe service over port 445 (SMB). 

It can be represented using risk matrix as shown below:

Security risk MatrixSecurity Risk Matrix

Have a point-wise, prioritised list of recommendations, for e.g

  • Patch essential systems (Microsoft Security Bulletin MS17-010 – Essential).
  • Conduct Vulnerability Scans at least monthly (scan-patch-scan) 
  • Change passwords (10+ complex characters) on all systems containing ePHI. 
  • 2. Test Scope and Method

    This section details the scope of the penetration tests carried out as well as the exact methods followed.

    The Client commissioned the Testing Company to perform the following penetration testing services:

  • Technical pen testing at the network level against nodes in internal networks.
  • Technical network-level penetration testing of internet-facing hosts.
  • Social Engineering and phone-based phishing against CLIENT staff.
  • Social Engineering and email phishing directed at CLIENT employee accounts. 
  • Within the parameters of the penetration test were the following information environment zones:

  • Internal Network: Example, the general internal networks of the Client
  • External Network: The publicly accessible networks of the Client
  • Internal Phase Summary and Actions Taken

    The ISA of TEST COMPANY conducted various reconnaissance and enumeration operations. Scanners for ports and vulnerabilities, along with other reconnaissance operations, uncovered significant security flaws. 

    The most worrisome vulnerabilities allow complete system takeover on critical servers, most notably the McAfee Security server, which if compromised could render the endpoint security for the entire internal network inoperable or ineffectual.

    After compromising the server, a directory traversal was performed to seek for crucial data. The analyst was able to identify a large number of directories containing private patient information as well as a large number of other data that would fall under HIPAA and PCI compliance. 

    External Phase Summary and Actions Taken

    The external phase of the penetration test focused on publicly accessible assets. Reconnaissance and monitoring were performed to identify potential entry points and malicious modifications to the systems.

    Using Burp Suite and the network scanner NMAP, attacks were launched from the TEST COMPANY network over the Internet against CLIENT’s externally accessible assets. 

    3. Conclusions

    The Conclusions section will contain a summary of the most likely scenarios for security compromise, and the implications of the same.

    For example, represented below is a likely scenario and its implication to the client: 

    Best Practices to write Penetration Testing Report 

    The following recommended practices can assist teams in producing a successful pentesting report:

    Conclusion

    Over the next ten years, penetration testing is likely to evolve from straightforward attack paths to multi-attack chain scenarios that flow into adversarial emulation, requiring penetration testers to adapt to the threat landscape (Red Team engagements). 

    As a result of enhanced secure coding techniques, active defences, and oversight, external exploitation will decline. Over the past five to seven years, we have witnessed a significant increase in the use of fraud to gain the initial access required to cause damage and effect.

    Regardless of Penetration testing, QA processes rely heavily on the utilization of a real device cloud. It is impossible to identify all potential flaws that a user may encounter without actual device testing. Bugs that are not discovered cannot be monitored, traced, or resolved. In addition, without accurate defect data, software quality assurance metrics cannot be used to establish baselines or measure success. This applies to both manual and automated testing methods.

    The majority of large organizations use BrowserStack’s cloud-based Selenium grid of more than 3000 actual browsers and devices to execute all necessary tests under real-world conditions. On the BrowserStack cloud, manual testing is also straightforward to perform. Register for free, choose the appropriate device-browser combinations, and begin testing.

    Try BrowserStack for Free

    ncG1vNJzZmivp6x7o77OsKqeqqOprqS3jZympmeXqralsY6pnKedpKeutbXOp2StnaOptq%2BzjKucqaeiqXqowcidnA%3D%3D