9.1.9 Lab - Explore PenTest Reports - ILM
9.1.9 Lab - Explore PenTest Reports - ILM
Objectives
Review examples of penetration testing reports and build your own report format based on
examples and pentesting notes.
Part 1: Review Publicly Available Penetration Testing Reports
Part 2: Develop Your Own Report Format
Part 3: Create your Pentesting Report
Background / Scenario
At the conclusion of a security test, a penetration testing report is produced that presents a
detailed analysis of the organization’s security risks. The report will cover many aspects of the
organization’s security posture, vulnerabilities, high and low priority concerns, and suggested
remediations. In addition, penetration testing reports are an important part of maintaining
regulatory compliance. The reports provide evidence that the organization takes measures to
assess its infrastructure and sensitive data security.
When it comes to creating the penetration testing report, most penetration testing
professionals will start with a company template and then customize the tone and organization
based on the type of testing conducted and the desired deliverable. However, care still needs
to be taken to use the preferred tone and style.
In this lab, you will complete a report from the relevant information gathered during a
penetration testing engagement performed by Protego Security Solutions. The client who will
receive the report is Pixel Paradise Inc. an electronic games creator.
Required Resources
PC or mobile device with internet access
Instructions
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 1 of
Cisco Public
Executive Summary – Provides a high-level overview of the findings, impact, and main
recommendations for non-technical stakeholders.
Scope and Objectives – Details the scope of the test, including the systems and areas
covered, and the objectives set for the assessment.
Methodology – Describes the testing approach and tools used, often referencing frameworks
like NIST, PTES, or OWASP.
Findings and Analysis – Lists discovered vulnerabilities, categorized by severity, with technical
details for each.
Conclusion – Summarizes the outcomes, reiterates key vulnerabilities, and may include
follow-up recommendations for future testing.
What is the purpose of the executive summary? Who do you think that section is intended
for?
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 2 of
Cisco Public
Lab - Explore PenTest Reports
Title Page, Executive Summary, Table of Contents, Scope and Objectives, Methodology,
Findings and Analysis, Recommendations, Conclusion, Appendices.
b. Create your outline in the table below using your major sections or headings. If you need
more space, recreate the table on another piece of paper. You can also use outline
numbering if you wish.
For each heading or subheading, describe the contents that will be found under that
heading. One approach is shown in the sample answer. You are free to use other
formats if you want.
Heading/Subheading Contents
Title Page Contains report title, date, client name (e.g., Pixel
Paradise Inc.), and penetration testing provider’s
information (e.g., Protego Security Solutions).
Executive Summary Overview of test objectives, significant findings,
and major recommendations. Geared towards
senior management and non-technical
stakeholders.
Table of Contents Lists all major sections and sub-sections with page
numbers.
Scope and Objectives Describes what systems, applications, and
networks were tested. Outlines testing goals, such
as identifying vulnerabilities and assessing security
awareness.
Methodology Explains the testing approach, including tools used
(e.g., Nmap, ZAP) and frameworks (e.g., OWASP).
Provides a high-level overview of the steps taken.
Findings and Analysis Detailed vulnerabilities section, with each finding
labeled as high, medium, or low risk. Includes
descriptions, impact, affected areas, and proof of
concept.
Recommendations Specific steps to mitigate each vulnerability. For
example, enhancing password policies, configuring
firewalls, or securing IoT devices.
Conclusion Summarizes the effectiveness of the current
security measures and emphasizes any urgent
actions.
Appendices Raw data, screenshots, vulnerability scan outputs,
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 3 of 12
Cisco Public
Lab - Explore PenTest Reports
or other supporting materials. Provides technical
data for IT/security teams.
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 4 of 12
Cisco Public
Lab - Explore PenTest Reports
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 5 of 12
Cisco Public
Lab - Explore PenTest Reports
Recommendations General:
Hire cybersecurity manager.
Strengthen admin security controls – policies
and user agreements, penalize unauthorized
devices and pages.
Specific:
Annual user security awareness training
Periodical testing with phishing emails and other SE
attacks
Remove rogue server and hidden page.
Investigate who modified firewall rules.
Discipline personnel involved.
Establish and enforce Windows policies regarding
ad hoc shares.
Create an enforce password policy within
Windows domains.
Further audit AD and SMB for other vulnerabilities
Implement secure coding training.
Improve input form validation to mitigate injection.
Use parameterized queries to segregate
backend databases from web input.
Use randomized GUIDs for user ids, do not expose
user ID info in user profiles.
Change default credentials and remove banner
info from video controller.
Replace cameras with secure models that enable
software updates, implement update program
Executive Summary
Company has growing pains that have led to some
severe vulnerabilities, this must change with new
success.
Security posture must be modernized to ensure
continued success and business continuity.
New staff will implement comprehensive security
program
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 6 of 12
Cisco Public
Lab - Explore PenTest Reports
Scope and Objectives
Goals:
Assess web platform security.
Test employee security awareness.
Assess web applications: community forum and
digital store.
Internal network vulnerability for sensitive file
access, damage, and theft
Possible vulnerabilities from IoT or other devices
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 7 of 12
Cisco Public
Lab - Explore PenTest Reports
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 8 of 12
Cisco Public
Lab - Explore PenTest Reports
Recommendations
General:
Hire cybersecurity manager.
Strengthen admin security controls – policies
and user agreements, penalize unauthorized
devices and pages.
Specific:
Annual user security awareness training
Periodical testing with phishing emails and other SE
attacks
Remove rogue server and hidden web page.
Investigate who modified firewall rules.
Discipline personnel involved.
Establish and enforce Windows policies regarding
ad hoc shares.
Create an enforce password policy within
Windows domains.
Further audit AD and SMB for other vulnerabilities
Implement secure coding training.
Improve input form validation to mitigate injection.
Use parameterized queries to segregate
backend databases from web input.
Use randomized GUIDs for user ids, do not expose
user ID info in user profiles.
Change default credentials and remove banner
info from video controller.
Replace cameras with secure models that enable
software updates, implement update program
Executive Summary
Company has growing pains that have led to some
severe vulnerabilities, this must change with new
success.
Security posture must be modernized to ensure
continued success and business continuity.
New staff will implement comprehensive security
program.
Testing Scope
Contracted to comprehensive black box training.
Black box testing
Security personnel aware of some tests
All internet devices and networks in scope,
intrusive testing and exploitation on dev servers,
notify staff of intensive scans of external servers
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 9 of 12
Cisco Public
Lab - Explore PenTest Reports
Reflection Question
Why are good reporting and documentation skills important to a penetration tester?
Note: The Sample Report is provided to show you one way of transforming notes into a final report.
There are many ways that you can do this using your own style and structure. Most penetration
testing companies have their own standards for the style and structure of their reports and will
likely require your work to conform to those standards.
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 10 of
Cisco Public
Lab - Explore PenTest Reports
Executive Summary
Protego Security Solutions was engaged by Pixel Paradise Inc. to provide comprehensive block-
box penetration testing of their web servers, web applications, internal network, and employee
security awareness. Most testing was black-box except in some cases access was provided to
the developer platform for more disruptive tests. In addition, security personnel were aware
that vulnerability scanning of their web servers was to occur so that the scans were not
blocked.
Purpose and Scope
Pixel Paradise is concerned about cybersecurity preparedness because they anticipate that a
new product, to be released soon, will greatly increase their internet exposure. According to
Pixel Paradise’s stated concerns, we defined the goals of the penetration test as follows:
Assess security of the Pixel Paradise web platform including all internet-facing services.
Assess security of the Pixel Paradise customer community and digital storefront applications.
Assess security of Pixel Paradise sensitive data and product builds on their internal network.
Determine security awareness of employees at Pixel Paradise through social engineering
tests.
Determine any vulnerabilities introduced by the use of other connected (IoT) devices in the
Pixel Paradise facility.
All internet-facing devices and internal networks were approved as subject to testing. The web
applications were approved for scanning, but more intrusive testing was to be conducted in an
internal development environment. Security staff required notification regarding intense
scanning of external servers, so the scans were not blocked.
Summary of Results and Recommendations
A high-level summary of the results of the penetration tests appears here. For more detailed
information, refer to the Test Results and Recommendations sections of this report.
Seven personnel clicked on various phishing links including one that executed
remote code. The possibility of successful malware attacks is high.
A rogue webserver (unknown to IT and security personnel) was found running in the internal
network; however, it appears that the corporate firewall had been configured to permit
external access. This server had various vulnerabilities that permitted access to the internal
network and disclosure of a password file. This presents an unacceptable level of risk to the
company and steps should be taken to remove the server from the network and investigate
personnel responsible for its presence.
A hidden webpage that included an insecure input field was discovered. The insecure
field permitted various SQL and code injection attacks and disclosure of sensitive
information.
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 11 of
Cisco Public
Lab - Explore PenTest Reports
Video surveillance equipment was found to use well-known default login credentials.
Embedded software is not updatable/patchable.
Due to the level of risk discovered in the network and applications, we recommend that a Pixel
Perfect create and staff the position of Director of Cybersecurity, or similar, to enhance security
operations and policies.
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 12 of
Cisco Public
Lab - Explore PenTest Reports
Test Results
Test results revealed a number of serious vulnerabilities that present serious risk to Pixel
Perfect. While these vulnerabilities are serious, they are fairly easily mitigated.
a. Staff Security Awareness
A multi-pronged phishing campaign resulted in seven employees clicked potentially
malicious links. Several employees also visited imitation websites that were constructed to
lure employees into to submitting user credentials.
b. Internet-Connected Servers
Public address block scanning revealed the presence of an undocumented webserver that
was reachable over the internet. The server was easy to penetrate though automated
password challenges that followed a common passwords rainbow table. Admin access
provided. Once inside, investigation indicated that the server was setup for personal use by
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 13 of
Cisco Public
Lab - Explore PenTest Reports
[name redacted]. The server housed personal information, family pictures, and other
information that led to identification of the server owner. The server hosted a server for an
insecure remote access application that eventually provided testers with access to the
internal network. This should be a serious breach of policy.
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 14 of
Cisco Public
Lab - Explore PenTest Reports
A hidden webpage that was apparently used by developers for connectivity testing was
found on the primary corporate webserver. This page included an input form for IP
addresses that was meant to execute the ping command when the input was posted. The
input box was not protected with any sort of input validation. The field was vulnerable to
command, code, and SQL injection attacks. The backend database contains sensitive user
data that was fully available to SQL commands injected into the form.
c. Web Applications
Web application scans and manual testing indicated vulnerabilities in the community forum
and storefront applications. Testing indicated that inputs in the login form were only
partially implemented through HTML tag removal. However, more advanced SQL injected
yielded an error message that identified the SQL server type and version. While it was
outside of the scope of the test to access real user data through the form, further testing
indicated that SQL injection vulnerabilities are present.
The community forum was tested for vulnerabilities. It was found that the forum is
vulnerable to insecure direct object reference attacks. After login, users are identified by a
GUID that is included with every web transaction. The GUIDs are exposed in the URLs for
user profile pages meaning that the GUID can be lifted and used in forged URLs that permit
actions to be executed as other users.
d. Internal Network
Access was gained to the network through a remote access vulnerability that was
discovered on the rogue webserver described above. From there enumeration of
network devices was achieved using Active Directory and SMB enumeration tools.
These tools revealed unprotected or weakly protected shares that could be exploited to
enable lateral movement through the network.
e. Other Connected Devices
Shodan scans indicated the presence of an internet-connected security monitoring system.
Banner information divulged the model number and version of this device, which acts as a
server for five video surveillance cameras that are distributed around the facility. Following
this information, the default passwords were found for this device. A script automated to
challenge the login using the passwords and default usernames available on the network
provided access to the cameras. Further work would have probably resulted in access to the
general internal network through this device. The cameras were found to be a model that is
not capable of software updates or patches. While the current revision of the camera
software does not appear to have known vulnerabilities, there is no guarantee that this will
be the case in the future.
Recommendations
The following recommendations should be considered to enhance the Pixel Paradise overall
security posture. Each recommendation is assigned a priority that corresponds to the severity of
the vulnerability and the urgency with which it should be remediated. The priority ratings are as
follows:
Rating Meaning
2 Urgent – Remediation should be undertaken after high priority issues are addressed.
a. General Recommendations.
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 15 of
Cisco Public
Lab - Explore PenTest Reports
1) Staff a dedicated cybersecurity manager position. Considering the current haphazard
security posture and the increased risks associated with increasing success of the
company’s products, a formal dedicated security position is strongly recommended.
Priority 2.
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 16 of
Cisco Public
Lab - Explore PenTest Reports
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 18 of
Cisco Public
Lab - Explore PenTest Reports
Summary
Pixel Paradise faces security challenges as it scales up. Previous flexibility in network
management has led to vulnerabilities that could disrupt operations if exploited. To protect
assets and ensure business continuity, Pixel Paradise must adopt a robust cybersecurity
program, led by dedicated personnel.
Reflection
Good reporting and documentation skills are essential for penetration testers as they communicate critical security
insights and recommendations in an accessible manner. Clear documentation ensures that technical findings are
understood by all stakeholders, enabling informed decision-making and effective remediation planning.
ã 2023 - 2024 Cisco and/or its affiliates. All rights reserved. Page 19 of
Cisco Public