Organized notes for penetration testing report writing and documentation. Last Updated: 2026-03-27
The penetration testing report is the primary deliverable of any engagement. A poorly written report diminishes the value of even the best technical work. Documentation should begin from day one, not at the end.
β οΈ CPTS Exam Tip: You MUST submit a professional report as part of the CPTS exam. Budget adequate time for report writing (two days at a minimum).
# Start tmux session
tmux new -s pentest
# Enable logging (tmux-logging plugin)
# prefix + Shift+P (toggle logging)
# prefix + Alt+Shift+P (save complete pane history)
# prefix + Alt+p (screenshot current pane)
# Logs are saved to ~/tmux-logging/
π‘ Pro Tip: Enable tmux logging at the START of every session. You can never have too much documentation.
| Tool | Type | Best For |
|---|---|---|
| Obsidian | Markdown-based | Long-term knowledge management, linking |
| CherryTree | Hierarchical | Structured engagement notes |
| Notion | Web-based | Collaborative note-taking |
| Joplin | Markdown-based | Open-source alternative to Obsidian |
| Flameshot | Screenshot | Annotated screenshots |
| Greenshot | Screenshot | Windows screenshot tool |
01_initial_foothold_sqli_10.10.10.5.png1. Cover Page
- Company logo
- Report title
- Client name
- Date
- Author
- Classification (Confidential)
2. Document Control
- Version history
- Distribution list
- Revision table
3. Table of Contents
4. Executive Summary (1-2 pages)
- Engagement overview
- Scope summary
- Key findings summary (high-level)
- Overall risk rating
- Top recommendations
5. Scope & Methodology
- In-scope targets/systems
- Out-of-scope items
- Testing methodology used (PTES, OWASP, etc.)
- Tools used
- Testing timeline
- Limitations encountered
6. Findings Summary
- Table of all findings with severity ratings
- Risk rating methodology (CVSS)
- Statistics (findings by severity, by category)
7. Detailed Findings
For each finding:
- Finding title
- Severity (Critical/High/Medium/Low/Informational)
- CVSS score
- Affected systems/URLs
- Description of the vulnerability
- Proof of Concept (step-by-step with screenshots)
- Impact assessment
- Remediation recommendations
- References (CVE, CWE, OWASP)
8. Attack Narrative / Kill Chain
- Step-by-step attack path from external to domain admin
- Network diagram showing pivot points
- Timeline of attack progression
9. Recommendations Summary
- Prioritized remediation list
- Quick wins vs. long-term improvements
10. Appendices
- Full scan results
- Tool output
- Credential list (redacted if needed)
- Network diagrams
- Glossary of terms
| Severity | CVSS Score | Description |
|---|---|---|
| Critical | 9.0 - 10.0 | Immediate exploitation possible, full system compromise |
| High | 7.0 - 8.9 | Significant impact, likely exploitable |
| Medium | 4.0 - 6.9 | Moderate impact, requires specific conditions |
| Low | 0.1 - 3.9 | Minor impact, limited exploitation |
| Informational | 0.0 | Best practice recommendation |
π CVSS Calculator: https://www.first.org/cvss/calculator/3.1
| Resource | URL |
|---|---|
| TCM Security Report Template | https://github.com/hmaverickadams/TCM-Security-Sample-Pentest-Report |
| OSCP Report Templates | https://github.com/noraj/OSCP-Exam-Report-Template-Markdown |
| Offensive Security Report Template | https://www.offensive-security.com/reports/ |
| Public Pentesting Reports | https://github.com/juliocesarfort/public-pentesting-reports |