Report Types
Executive Summary
High-level overview for non-technical audiences:
- Engagement scope and dates
- Key findings summary
- Risk assessment
- Overall security posture
- High-level recommendations
Audience: C-level executives, management, board members
Technical Report
Detailed findings for technical teams:
- Complete finding descriptions
- Steps to reproduce
- Technical evidence
- Detailed remediation steps
- MITRE ATT&CK mapping
Audience: Security teams, system administrators, developers
Methodology Report
Documentation of testing approach:
- Testing scope
- Tools and techniques used
- Kill chain progression
- Timeline of activities
- Checklist completion
Audience: Security teams, auditors, compliance officers
Generating Reports
- Navigate to Reporting → Reports
- Click Generate Report
- Select report type(s)
- Configure report options
- Click Generate
Report Options
Include sections:
- Executive summary
- Methodology
- Findings (with evidence)
- Network topology
- Kill chain analysis
- MITRE ATT&CK coverage
- Appendices
Severity filter:
- All findings
- Critical and High only
- Exclude Informational
Evidence inclusion:
- Embed screenshots
- Link to evidence
- Appendix only
- Exclude evidence
Format:
- PDF (default)
- Markdown
- HTML
- DOCX (coming soon)
Report Structure
Cover Page
- Report title
- Client name
- Engagement dates
- Report version and date
- Prepared by
- Classification marking
Executive Summary
- Engagement overview
- Scope definition
- Key statistics
- Targets discovered
- Vulnerabilities identified
- Credentials captured
- Systems compromised
- Finding severity breakdown (chart)
- Critical findings highlight
- Risk assessment
- High-level recommendations
Methodology
- Engagement approach
- Testing methodology
- Tools and techniques
- Scope and limitations
- Timeline overview
- Kill chain progression
Findings
For each finding:
- Title
- Severity rating
- CVSS score (if applicable)
- Affected systems
- Description
- Impact analysis
- Steps to reproduce
- Evidence (screenshots, output)
- Remediation recommendations
- References (CVE, vendor docs)
Organized by:
- Severity (Critical → Informational)
- Or by category (Web, Network, System, etc.)
Network Topology
- Network diagram showing:
- Discovered infrastructure
- Compromised systems
- Lateral movement paths
- Attack progression
MITRE ATT&CK Analysis
- Techniques observed
- Tactic coverage
- Technique frequency
- ATT&CK matrix visualization
Remediation Roadmap
- Prioritized remediation plan
- Quick wins (easy, high-impact fixes)
- Long-term improvements
- Defense-in-depth recommendations
Appendices
- Complete evidence catalog
- Full command outputs
- Tool outputs
- Vulnerability details
- Glossary of terms
Report Templates
Creating Templates
- Navigate to Reporting → Reports
- Go to Templates tab
- Click Create Template
- Configure template settings:
- Template name
- Default sections
- Formatting preferences
- Header/footer content
- Branding (logo, colors)
Template Components
Header:
- Company logo
- Report title
- Classification marking
- Page numbers
Footer:
- Copyright notice
- Confidentiality statement
- Contact information
- Page numbers
Styling:
- Font families
- Color scheme
- Heading styles
- Code block formatting
Sections:
- Which sections to include by default
- Section ordering
- Custom sections
Applying Templates
When generating report:
- Select template from dropdown
- Template applies:
- Formatting
- Branding
- Default sections
- Styling
- Override options if needed
- Generate report
Report Customization
Custom Sections
Add engagement-specific sections:
Common additions:
- Client-specific context
- Special testing scenarios
- Engagement challenges
- Lessons learned
- Future testing recommendations
Branding
Customize report appearance:
- Add company logo
- Apply color scheme
- Custom fonts
- Watermarks
- Classification banners
Formatting
Adjust formatting:
- Page size (A4, Letter)
- Margins
- Line spacing
- Code block styles
- Screenshot sizing
Report Review
Pre-Generation Checklist
Before generating final report:
-
Findings review:
- [ ] All findings have clear titles
- [ ] Severity ratings are consistent
- [ ] Evidence is attached
- [ ] Remediation is actionable
- [ ] Steps to reproduce are complete
-
Evidence review:
- [ ] All evidence is linked
- [ ] Screenshots are clear and readable
- [ ] Sensitive data is redacted
- [ ] Evidence descriptions are clear
-
Content review:
- [ ] Scope is accurately documented
- [ ] Timeline is complete
- [ ] Kill chain shows progression
- [ ] Network topology is accurate
- [ ] MITRE mapping is complete
-
Quality review:
- [ ] Grammar and spelling checked
- [ ] Technical accuracy verified
- [ ] Consistent terminology
- [ ] Appropriate audience level
Peer Review
Have another team member review:
- Technical accuracy
- Finding severity ratings
- Remediation recommendations
- Report clarity and completeness
- Professional presentation
Client Review (Optional)
For preliminary reports:
- Share draft with client
- Gather feedback
- Address questions
- Clarify findings
- Adjust recommendations
Report Delivery
PDF Generation
Generate final PDF:
- Review all content
- Select final template
- Generate PDF
- Save with clear filename:
ClientName_RedTeam_Report_YYYY-MM-DD_v1.0.pdf
Encryption
For sensitive reports:
- Encrypt PDF with password
- Use strong password
- Share password via separate channel
- Document encryption method
Delivery Methods
Secure file transfer:
- Encrypted email
- Secure file sharing platform
- Client portal upload
- In-person delivery
Versioning:
v0.1 - Draft for internal review
v0.5 - Draft for client review
v1.0 - Final approved report
v1.1 - Addendum after client questions
Report Sections Detail
Executive Summary Guidelines
Length: 1-2 pages
Language: Non-technical, business-focused
Content:
- What was tested
- What was found
- Why it matters
- What to do about it
Avoid:
- Technical jargon
- Detailed exploitation steps
- Tool names
- Command syntax
Example structure:
[Client] engaged [Company] to perform a red team assessment
from [Start Date] to [End Date].
The assessment identified [X] critical and [Y] high-severity
findings that could allow unauthorized access to sensitive data
and systems.
Key findings include:
1. [Critical Finding 1]
2. [Critical Finding 2]
3. [High Finding 1]
Immediate action is recommended to address critical findings.
Technical Findings Guidelines
Title: Clear, specific vulnerability name
Severity: Justified rating based on impact and exploitability
Description:
- What the vulnerability is
- Where it exists
- How it was discovered
Impact:
- What attacker could achieve
- Business impact
- Data at risk
Evidence:
- Screenshots showing vulnerability
- Command output
- Proof of exploitation
Remediation:
- Specific, actionable steps
- Priority level
- Estimated effort
- References to best practices
Network Topology Guidelines
Include:
- All discovered systems
- Network boundaries
- Compromised systems (highlighted)
- Lateral movement paths
- Initial access point
- Final position
Use color coding:
- Green: Scanned but not compromised
- Yellow: Compromised with user privileges
- Red: Compromised with admin privileges
- Gray: Out of scope
MITRE ATT&CK Guidelines
Include:
- Complete ATT&CK matrix with observed techniques
- Technique descriptions
- How each technique was used
- Affected systems
- Detection opportunities
Best Practices
Writing Style
- Clear and concise: Get to the point
- Audience-appropriate: Technical for tech teams, business language for executives
- Objective: Present facts, not opinions
- Professional: Formal tone throughout
- Consistent: Use same terms and formats throughout
Finding Descriptions
- Specific: Name exact systems, parameters, or configurations
- Complete: Include all information needed to understand
- Evidence-based: Support every claim with evidence
- Actionable: Provide clear remediation steps
- Prioritized: Focus on impact and risk
Remediation Recommendations
- Specific: Exact steps, not generic advice
- Prioritized: Critical items first
- Realistic: Consider client's environment
- Defense-in-depth: Multiple layers of security
- Verifiable: Include how to test the fix
Report Quality
- Proofread: Check grammar and spelling
- Verify: Double-check all technical details
- Format: Consistent formatting throughout
- Complete: No missing sections or TBDs
- Professional: High-quality presentation
Common Workflows
Draft Report
- Complete all findings documentation
- Link all evidence
- Generate draft report (internal review only)
- Review with team
- Make corrections
- Prepare for client
Client Draft
- Generate client-facing draft
- Mark as "DRAFT" on every page
- Share with client for initial feedback
- Schedule review meeting
- Address questions
- Make revisions
Final Report
- Incorporate all feedback
- Final technical review
- Final writing review
- Generate final PDF
- Remove "DRAFT" marking
- Add version number (v1.0)
- Encrypt if required
- Deliver to client
Post-Delivery Updates
If client has questions:
- Document questions and answers
- Generate addendum if needed
- Increment version (v1.1)
- Deliver updated report
Tips
- Start early: Begin report during engagement, not after
- Document as you go: Write finding descriptions when found
- Multiple reviews: Have multiple people review before delivery
- Save versions: Keep all draft versions for reference
- Template consistency: Use same template across engagements
- Executive summary last: Write after technical sections complete
- Visual aids: Use charts, graphs, and diagrams
- Clear evidence: Ensure all screenshots are readable
- Client focus: Write for the client, not for yourself
- Professional polish: Spend time on formatting and presentation
Related Features
- Findings - Document vulnerabilities for reports
- Evidence - Collect supporting proof
- Kill Chain - Show attack progression
- Network Topology - Visualize infrastructure
- MITRE ATT&CK - Technique mapping