上QQ阅读APP看书,第一时间看更新
Technical report
This section is made for technical managers and information technology staff. It includes detailed information about all the conducted steps and operations. It is structured the following way:
- An introduction
- Information gathering
- Vulnerability assessment
- Vulnerability confirmation
- Post-exploitation
- Risk/exposure
- Conclusion to give a final overview of the test