How do you write up vulns for reports?
Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.
How do you approach report writing after identifying a vuln?
Dedicated to those passionate about security.
Is report writing actually bad?
Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.
Is report writing actually bad?
Dedicated to those passionate about security.
I co-founded a pentest report automation startup and the first launch flopped. What did we miss?
Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.
I co-founded a pentest report automation startup and the first launch flopped. What did we miss?
Dedicated to those passionate about security.