Report Creation

Objectives: By the end of this topic, you will be able to…

  • Properly document a technical activity
  • Organize findings with clarity and order
  • Produce reproducible and exportable reports
  • Recognize the importance of professional reports in audits and pentests

Why is it important to know how to write cybersecurity reports?

  • An excellent technical analysis loses value if it is not communicated well
  • In cybersecurity, reports are the primary means of:
    • Documenting findings in audits, pentests, or forensic analysis
    • Recommending mitigation actions
    • Communicating risks to non-technical individuals (executives or management)
  • Reports serve as evidence records in legal or regulatory contexts

“If it is not documented, it does not exist.”


Structure of a cybersecurity technical report

SectionContents
Cover / TitleName of analysis, author, date, confidentiality
Table of contentsFor fast navigation of the document
IntroductionObjective of the analysis, scope, client context
MethodologyTechniques, tools and sources used
FindingsDetailed list of vulnerabilities with description, evidence, impact, severity, and mitigation
ConclusionsTechnical summary of the security status
AppendicesExtensive details, complete outputs, scripts, configuration

Differences between technical and executive reports

CharacteristicTechnical ReportExecutive Report
AudienceSecurity teams, sysadminsManagers, directors, customers
LanguageSpecific, with technical terminologyClear, simplified, impact oriented
ContentsTechnical details, commands, evidencesSummary of findings and business implications
LengthLong (may include appendices)Short (2-4 pages max.)

Both reports may be derived from the same work, but should be written with different objectives in mind.


Best practices for technical writing

  • Clarity: use precise, direct, and unambiguous language
  • Consistency: use consistent terminology throughout the document
  • Objectivity: base your work on facts and evidence, avoiding judgments or speculation
  • Professional format: clean structure, tables, numbering, styles
  • Reproducibility: include exact commands, tools, versions, configurations
  • References: cite CVEs, standards (OWASP, MITRE), tool documentation

A good report not only shows a problem, but also how it was discovered and how to solve it.


Evidence collection and organization

Types of technical evidence:

  • Screenshots of terminals, browsers, or tools
  • File hashes, traffic logs, or activity logs
  • Configuration files or scripts used
  • Command output (nmap, whois, dig, etc.)

Best practices:

  • Name files clearly and in an orderly manner
  • Include a timestamp or context for each piece of evidence
  • Avoid altering the evidence (capture it at the moment)
  • Use SHA256 hash to ensure the integrity of relevant files
  • Include a screenshot accompanied by explanatory text

Tools for generating professional reports

ToolDescription
MarkdownLightweight language ideal for reproducible technical documentation
Typora / Obsidian / VS CodeMarkdown-friendly editors with PDF export
LaTeXFor academic reports or reports with complex formatting
LibreOffice / WordVisual templates for executive or formal reports
CherryTreeStructured technical notes during the analysis
FlameshotQuick screenshots with annotations

Document from the beginning of the analysis, not at the end. The report is a process that runs parallel to the technical investigation.


Hands-on lab

Requirements: Kali Linux, Metasploitable 2 (deployment guide), CherryTree

Part 1: Structure and analysis of technical reports

  1. Review the example of a simulated technical report
  2. With your partner, identify and discuss the purpose of each section

Part 2: Capturing and documenting evidences

  1. Deploy the Metasploitable 2 machine using the attached guide
  2. Execute a controlled network scan:
nmap -sS -A -T4 192.168.1.10 -oN nmap_scan.txt
  1. Analyze and highlight findings: open ports, service versions, known vulnerabilities
  2. Create a findings table:
PortServiceShort descriptionEstimated risk
22SSHService accessible from local networkMedium
80HTTPWebsite with possibly sensitive informationHigh

Part 3: Organization with CherryTree

  1. Create a .ctd file with the following hierarchy:
Project: Host scanning and analysis
 -- Methodology
 -- Results
 -- Evidences
 -- Recommendations
 -- Notes by tool
  1. Insert screenshots, text snippets with tool outputs, notes and observations
  2. Export to .pdf or .html

Part 4: Best practices for technical writing

  1. Review a draft of a technical finding with your partner and improve clarity, objectivity, and references
  2. Write at least one full finding using:
Finding title
---------------------
Summary:
Technical description:
Attached evidence:
Recommendations:

Submission

  • PDF report generated using CherryTree (or original .ctd file)
  • Screenshots used as evidence
  • Generated nmap_scan.txt file
  • Technical findings table
  • Personal reflection (max. 1 paragraph)

Key concepts

TermDefinition
CVEStandardized identification system for known vulnerabilities
PentestingAuthorized security assessment that simulates real attacks
HashFunction that generates a unique fingerprint of a file to verify its integrity
NmapNetwork scanning tool for host and service discovery

Test yourself

  1. Structure: What sections are essential in a pentest technical report? What is the key difference between a technical report and an executive report?

  2. Evidence: Why is it important to calculate the SHA256 hash of evidence files? What would happen if the evidence were altered?

  3. Practice: Given a finding of open port 21 (FTP) with anonymous access, write a complete finding entry with description, evidence, impact, and recommendation.


Navigation:Previous | Home | Next