?>
Livid_Nail8736

How do you write up vulns for reports?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

Livid_Nail8736

How do you approach report writing after identifying a vuln?

Dedicated to those passionate about security.

Livid_Nail8736

Is report writing actually bad?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

Livid_Nail8736

Is report writing actually bad?

Dedicated to those passionate about security.

Livid_Nail8736

I co-founded a pentest report automation startup and the first launch flopped. What did we miss?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

Livid_Nail8736

I co-founded a pentest report automation startup and the first launch flopped. What did we miss?

Dedicated to those passionate about security.