What does an AVORD pentest report look like?

AVORD uses globally recognised standards such as the Penetration Testing Execution Standard (PTES). All reports are inputted directly into the platform in set fields and cannot be sent until completed correctly to our standards. We strive to increase quality and consistency across the reporting process.



Example of the headings that can be found in the AVORD reporting page

The Executive Summary

This section will communicate to the reader the specific goals of the Penetration Test and the high-level findings of the testing exercise. The intended audience will be those who are in charge of the oversight and strategic vision of the security program as well as any members of the organization which may be impacted by the identified/confirmed threats.

The executive summary should contain most if not all of the following sections:

1

Background

The background section should explain to the reader the overall purpose of the test.

2

Overall posture

This area will be a narrative of the overall effectiveness of the test and the pentesters ability to achieve the goals set forth within the pre engagement sessions.

3

Risk Ranking/Profile

the overall risk ranking/profile/score will be identified and explained in this area.
Risk Appetite/Tolerance

Quality and Consistency


4

General Findings

The general findings will provide a synopsis of the issues found during the penetration test in a basic and statistical format.
Risk Chart

5

Strategic Roadmap

Roadmaps should include a prioritized plan for remediation of the insecure items found and should be weighed against the business objectives/ level of potential impact.

Technical Report

This section will communicate to the reader the technical details of the test and all of the aspects/components agreed upon as key success indicators within the pre engagement exercise.

The technical summary should contain most if not all of the following sections:

6

Introduction

Intended to be an initial inventory of:
Personnel involved in the testing from both the Client and Penetration Testing Team, Contact information, Assets involved in testing, Objectives of Test, Scope of Test, Strength of Test Approach, Threat/Grading Structure.

7

Information Gathering

Intelligence gathering and information assessment are the foundations of a good penetration test. Tester locates publicly available information related to the client and seeks ways that could be exploited to get into the systems.

8

Passive Intelligence

Intelligence gathered from indirect analysis such as DNS, Google dorking for IP/infrastructure related information. Can use specifc tools to collect emails about targeted domains then use these emails to initiate social engineering or launch other attacks 

9

Active Intelligence

This section will show the methods and results of tasks such as infrastructure mapping, port scanning, and architecture assessment and other foot printing activities.

10

Corporate Intelligence

Information about the structure of the organization, business units, market share, vertical, and other corporate functions should be mapped to both business process and the previously identified physical assets being tested.

11

Personnel Intelligence

Any and all information found during the intelligence collection phase which maps users to the CLIENT organization.

12

Vulnerability Assessment

Vulnerability assessment is the act of identifying the POTENTIAL vulnerabilities which exist in a TEST and the threat classification of each threat.

13

Exploit/Vulnerability

Exploitation or Vulnerability confirmation is the act of triggering the vulnerabilities identified in the previous sections to gain a specified level of access to the target asset.

14

Post Exploitation

One of the most critical items in all testing is the connection to ACTUAL impact on the CLIENT being tested

15

Risk/Exposure

Once the direct impact to the business is qualified through the evidence existing in the vulnerability, exploitation and post exploitation sections, the risk quantification can be conducted.

16

Conclusion

Final overview of the test. It is suggested that this section echo portions of the overall test as well as support the growth of the CLIENT security posture.

Quality and consistancy is at the heart of everything we do