Тёмный

How To Write A Penetration Testing Report 

HackerSploit
Подписаться 941 тыс.
Просмотров 64 тыс.
50% 1

This video outlines the importance of penetration testing reports and what makes up a good penetration testing report.
//LINKS
Penetration Test Reports: pentestreports...
SANS Whitepaper: www.sans.org/w...
//PLATFORMS
BLOG ►► bit.ly/3qjvSjK
FORUM ►► bit.ly/39r2kcY
ACADEMY ►► bit.ly/39CuORr
//SOCIAL NETWORKS
TWITTER ►► bit.ly/3sNKXfq
DISCORD ►► bit.ly/3hkIDsK
INSTAGRAM ►► bit.ly/3sP1Syh
LINKEDIN ►► bit.ly/360qwlN
PATREON ►► bit.ly/365iDLK
MERCHANDISE ►► bit.ly/3c2jDEn
//BOOKS
Privilege Escalation Techniques ►► amzn.to/3ylCl33
Docker Security Essentials (FREE) ►► bit.ly/3pDcFuA
//SUPPORT THE CHANNEL
NordVPN Affiliate Link (73% Off) ►► bit.ly/3DEPbu5
Get $100 In Free Linode Credit ►► bit.ly/39mrvRM
Get started with Intigriti: go.intigriti.c...
//CYBERTALK PODCAST
Spotify ►► spoti.fi/3lP65jv
Apple Podcasts ►► apple.co/3GsIPQo
//WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#cybersecurity #hacking

Наука

Опубликовано:

 

30 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 89   
@justkiddieng6317
@justkiddieng6317 2 года назад
More future videos about this because most of the ethical hacking videos related on other youtube channels focus more on hacking and no writing reports which is the one of the things to conduct a penetration testing or ethical hacking
@justkiddieng6317
@justkiddieng6317 2 года назад
I want to be chosen of one of the eJPTv2 certification for free this coming august 8 - september 8. I hope so.
@spwkdnddjwbwbshdj407
@spwkdnddjwbwbshdj407 2 года назад
Can we hacking server side games? Like Mobile Legends?
@justkiddieng6317
@justkiddieng6317 2 года назад
@@spwkdnddjwbwbshdj407 I think yes if there is vulnerability on the app cause the app or the client communicates to the server, therefore any connection is possible of hacking but I think that would be difficult. I'm beginner to this field so base on my research and understanding, the app is program to what data is sent to the server (when it comes to that online games) so changing the data sent to server wouldn't work (especially when the server handles data and errors very properly). This is broad topic and difficult to explain. But for me, yes, it is possible.
@1teamboy
@1teamboy 2 года назад
@@spwkdnddjwbwbshdj407 you can compromise anything. Nothing is un-hackable. Now, it’s your job to figure out how…
@Aokiyoa
@Aokiyoa 2 года назад
Please do more series of write-ups, etc. IMO, this will fundamentally help a lot of people in writing for Cybersecurity
@pgallovich
@pgallovich 2 года назад
Thanks for releasing this video content which I am really interested in. I am loving your eJPT v2 training at INE.
@spwkdnddjwbwbshdj407
@spwkdnddjwbwbshdj407 2 года назад
Sir,can server side games be hacked?
@cleightthejw2202
@cleightthejw2202 2 года назад
@HACKERSPLOIT That is a great deal with you reviewing on livestream(s) some of those practice reports written by your 'students' that take part in that/those CTF challenges then write up reports (for practice and learning).
@viceowner
@viceowner 2 года назад
Dude please help someone somehow exploited my pc im very poor i cant afford new pc how to remove eternablue 2 from my pc
@capsized8603
@capsized8603 2 года назад
Despite studying med of all things I have to say this channel would be an absolute gold mine if I was studying/practicing in this field.
@mechanisedbeat
@mechanisedbeat 3 месяца назад
This guy dosent just teach but explains and his teachings are best on youtube as he is experienced he knows real word scenarios and from that prospective he explain things.
@techstudio-yt
@techstudio-yt 2 года назад
Dear , @HackerSploit please provide your discord link .
@fedenon5664
@fedenon5664 2 года назад
It would be great to know what software they used to design the penetration test report in the pentestreports examples.
@juliusrowe9374
@juliusrowe9374 2 года назад
HackerSploit great content and awesome topic to go over. Can't until the next vlog of this series!
@arpitpathak7276
@arpitpathak7276 2 года назад
Sir I want to start my journey in hacking world can you plz suggest me from which topic I start my journey from your playlist
@orlandothemaker-vp9xu
@orlandothemaker-vp9xu 2 года назад
Information gathering bro
@franciscolopez2736
@franciscolopez2736 2 года назад
Always love seeing vids that dig in to the aspects of pen testing that might not be as attention grabbing as others
@steinsgate001
@steinsgate001 2 года назад
Is Windows 8.1pro, Amd Sempron s-42 cpu good for Cybersecurity?
@kehdonazara8224
@kehdonazara8224 2 года назад
I was waiting for this from long time, A big Thank u Ahmed👍 When will you start Web App Pentesting series? I am waiting!
@theMadhatter817
@theMadhatter817 2 года назад
Thats awesome! Great way to help others with that challenge
@firosiam7786
@firosiam7786 2 года назад
Wow thought u would be back last week from the post u made on RU-vid. No matter good to see u here again
@robinhood8302
@robinhood8302 2 года назад
Never have I regretted subscribing to this channel ❤️
@robinhood8302
@robinhood8302 Год назад
okay thank you
@ehsanumer2596
@ehsanumer2596 2 года назад
You are always osm and always delived best content...♥️💯
@Shokobala
@Shokobala Год назад
Can I have the powerpoint presentation file?Plz❤❤❤❤
@jesusdacoast872
@jesusdacoast872 2 года назад
Thank you so much for this valuable content.
@orbitxyz7867
@orbitxyz7867 2 года назад
Great video sir 😍😍my fav youtuber
@PentestHint
@PentestHint 2 года назад
Thanks, we need more videos like that for documentation.
@PrashantPurani-j7e
@PrashantPurani-j7e 9 месяцев назад
Thankyou soo much sir from India 🇮🇳 to share such a most valuable knowledge ... Can you please make a full eWPT playlist thank you in advance
@KimputOfficial
@KimputOfficial Год назад
how to create threat map, thanks HackerSploit
@cadeathtv
@cadeathtv 2 года назад
here is my basic outline Coverpage, Document Properties, Table of Content, Executive Summary, Scope and Limitation, Methodology, Technical Findings, Annexes just sharing :)
@kevinlaflamme7984
@kevinlaflamme7984 2 года назад
He said he was working on super very exiting stuff but its not true he was just trying to finish hes fuckin reports on time haha joke this reporting part of the job is making me hate it some times ^^ All those skills and training to finish with WORD, NetSparker and Nessus ^^ and no time to play :/
@mechanisedbeat
@mechanisedbeat 3 месяца назад
Very detailed. Much appreciated
@recepby
@recepby Год назад
* A good penetration testing report will need to communicate your findings in a structured methodological format: 1. Assessment Overview - Outlines how the assessment was planned, organized and orchestratened. What guidelines/testing methodologies were used ( PTES, OWASP etc ) Planning -> Discovery -> Attack -> Reporting 2. Severity Ratings - Explains how vulnerability severity is calculated, displayed and color coded. ( Typically CVSS score ) 3. Risk Factors 4. Scope Clearly defined and agreed upon scope and any exclusions. Specific client allowances need to be documented. 5. Executive Summary - Report tailored for C-Suite/Executives ( what performed and found ) Highlight the strengths and weakness - what the company did right and wrong. Summary - final grade card. 6. Techical Findings Description/summary of vulnerability or finding. Target system/IP/domain Severity Risk(Likelihood, impact) Tools used References Evidence(screenshots, tool output, ensure the exploitation process is verifiable) Remediation/Patching
@pathfinder750
@pathfinder750 2 года назад
Thank you for this topic!
@LT72884
@LT72884 Год назад
im wondering if i should take one of your courses on udemy? per this video, most excellent. I am a technical writer since my degree is in aerospace ad biomedical engineering. I have had papers of mine publised by the IEEE before and its a very important skill to have. I used to be a cyber security professional back in 2007 but then decided to go back to school for areospace and biomedical. HOWEVER, i still do this as a hobby. thanks for all your hard work that you do for making these videos for us.
@akhilbabu649
@akhilbabu649 Год назад
Which programming language should I learn First to Be a Hacker (C , C++ or Python)
@Iampresnt
@Iampresnt 2 года назад
So please I was wondering if let’s say someone doesn’t have a laptop at this moment so please can that person use his phone to study the basics of Linux and python for the meantime? And really understand everything? Please and if that’s possible please show us the roadmap into learning all the basics of ethical hacking with their phone. ( the person is a complete beginner who doesn’t know any thing about both stuffs)
@0Rhiino0
@0Rhiino0 Год назад
Good afternoon When I type htop I see PID# and USER - rtkit What is this???
@Krisler12
@Krisler12 2 года назад
Supposing you installed a Linux system and want to use it as your personal PC doing important stuff on it. How to check if it has backdoors or not for sure? Thank you in advance!
@sergiofiru817
@sergiofiru817 Год назад
Very helpfull man. Thanks a lot. And also, could you make a video about Kodachi Linux ??
@robertwinnicki3185
@robertwinnicki3185 Год назад
Thanks for sharing your wisdom with people. Is there any way to contact you discuss some my idea for really good stuff.?
@FarhanKhan-zt6gr
@FarhanKhan-zt6gr Год назад
Expending this there are two open source tools that can be help full in writing penetration testing reports like ghost writer and petereport bith offers Uniq features.
@Bluek309
@Bluek309 11 месяцев назад
thank you for the video it really help me to have a point to start!
@basit3037
@basit3037 2 года назад
bro iloveyou
@yeshubnrao4862
@yeshubnrao4862 2 года назад
Guys anybody help me i can't scan nmap in linux it's showing error
@shinobi0x1
@shinobi0x1 8 месяцев назад
Thanks! I will use this for eCPPT! On Feb 6th!
@dennisdistrict6205
@dennisdistrict6205 Год назад
who determines the level of the vulnerability or severity? How do I know what level to put it in?
@TheSiRiUs9
@TheSiRiUs9 2 года назад
now that's more like it real world problem many ignores but important how to properly write the report thank man
@suttercane6718
@suttercane6718 Год назад
Guys when and where does he usually stream? Are streams being recorded anywhere?
@darphaprothon20
@darphaprothon20 2 года назад
can you make like a top tier of the safest android phones ? i whant to get something good thats its hard for hackers to exploit
@game_addictions
@game_addictions 2 года назад
How should get a mobile number from mobile ip address is it possible broo then how
@kaineuler
@kaineuler Год назад
Linux > windows
@bryansuello
@bryansuello 2 года назад
thank u, sir. i also enjoy your other channel, Depths of Despair.
@MADVDaily
@MADVDaily 2 года назад
omg man you are a living god .. much love
@scottstewart5425
@scottstewart5425 8 месяцев назад
ive been following for years just subscribed
@heifreind5830
@heifreind5830 Год назад
thank you for this ethicle hacking ful leson , good luck
@davejackson88
@davejackson88 Год назад
im an enthusiastic junior BackEnd dev with a keen of interest about the ethic of penetration testing/bug testing... i wanted to take you a lot of massive thanks for shared this guide.
@leoScorpio97
@leoScorpio97 2 года назад
Which is the best Laptop for penetration testing in 2022
@manishhr4450
@manishhr4450 2 года назад
How to break Android screen lock password
@orbitxyz7867
@orbitxyz7867 2 года назад
Why new videos on hacking coming
@yashgoldsmith9810
@yashgoldsmith9810 2 года назад
Please make a course on Threat Hunting!!
@nazmulhaquee
@nazmulhaquee 2 года назад
nice one
@blazecosko7506
@blazecosko7506 2 года назад
Gonna watch these even though I can’t pentest to write a report on yet lol
@Angular777
@Angular777 2 года назад
On the OSCP are you given the IP?
@onlinewebsites3476
@onlinewebsites3476 2 года назад
Yo man ! Where are you ?
@abudi45
@abudi45 2 года назад
Welcome back brodie!
@davehans9262
@davehans9262 2 года назад
Thanks sploit
@abk072
@abk072 2 года назад
thankyou so much!
@omprasadomprasad4930
@omprasadomprasad4930 2 года назад
Thank bro
@adnanahmad4168
@adnanahmad4168 2 года назад
I want to be a hacker, can someone tell me from where to start and provide good content to follow? I will be thankful and pray for you. 😐
@justkiddieng6317
@justkiddieng6317 2 года назад
Search on this youtube "the cyber mentor how to be ethical hacker", that is a guide but your path will not be exactly what he said, but the foundation of linux, networking is really important. And after you learn the fundamentals, this channel hackersploit is one of the best channel for learning exploit like network and web. Just stay curious and consistent to learn
@h_r7708
@h_r7708 2 года назад
Get a computer with kali linux. Learn and practice using the command line/ terminal. Learn the basics of computer programming theory. This will help you with learning any programming language. Learn python Learn how computers send and receive information. Example. In your computer the information is digital. It goes through your modem (digitized/dedigitized) it is turned in to analog to move along the wires. Then it is turned back into digital at the other end. Learn about servers, ports, routers, how wifi works and the different frequencies. Learn what the kali tools do and how to use them. After you learn theory and python, find the source code for a few programs and break them down and identify what each command is doing. Null byte ,network chuck, engineer man are a few places to start. DO NOT PRACTICE ON SOMEONES MACHINE WITHOUT PERMISSION. get a cheap used computer that nobody wants, put linux on it, connect it to your network and practice finding its vulnerabilities. Once you learn a little, try Hack the Box. Good luck and above all have fun. If it isn't fun it isn't for you. 😎 Take care.
@adnanahmad4168
@adnanahmad4168 2 года назад
@@h_r7708 I appreciate your response. Bro I know the basics of Networking, Websites(I am mern stack developer), Databases, Linux I just want a complete series of videos/any other content to follow. I am unable to find good content that actually teaches hacking rather than wasting my time. Other than this can you tell me how much time will it take me to become a hacker? I can give 3 to 4 hours on daily basis.
@adnanahmad4168
@adnanahmad4168 2 года назад
@@justkiddieng6317 I appreciate your response. Bro I know the basics of Networking, Website Apps(I am mern stack developer), Databases and Linux. I just want a complete series of videos/any other content to follow. I am unable to find good content that actually teaches hacking rather than wasting my time. Thanks for providing the guidance, any other YT channel if you can tell me about? Other than this can you tell me how much time will it take me to become a hacker? I can give 3 to 4 hours on daily basis.
@mdowais6447
@mdowais6447 2 года назад
dope video!
@blackwasp9285
@blackwasp9285 2 года назад
👏👏
@JohnJohn-sf1df
@JohnJohn-sf1df 2 года назад
eJPTv2 !!!
@bashiqali2142
@bashiqali2142 2 года назад
💯
@sweetmelon3365
@sweetmelon3365 2 года назад
The discord invite linked is showing as invalid
@suttercane6718
@suttercane6718 Год назад
Is he having the streams on discord?
@sweetmelon3365
@sweetmelon3365 Год назад
@@suttercane6718 no idea
@msf2610
@msf2610 2 года назад
Really a good content! Thank you Hackersploit!
Далее
Stop Trivializing Cybersecurity
26:38
Просмотров 50 тыс.
How to Write Great Bug Bounty Reports
11:48
Просмотров 16 тыс.
Simple Penetration Testing Tutorial for Beginners!
15:25
3 Year Cybersecurity Career Roadmap
54:32
Просмотров 159 тыс.
Pentesting Diaries 0x1 - SQL Injection 101
1:20:01
Просмотров 31 тыс.
I Played HackTheBox For 30 Days - Here's What I Learned
10:23
Why Cybersecurity Training is a SCAM
10:37
Просмотров 180 тыс.
Introduction To Red Teaming
48:26
Просмотров 30 тыс.
Introduction To Pentesting - Enumeration
39:22
Просмотров 126 тыс.
iPhone vs Samsung
0:25
Просмотров 11 млн
Playstation 2 в квадрате || Anbernic RG Cube
13:03
iPhone vs Samsung
0:25
Просмотров 11 млн