O'Reilly logo

Social Engineering Penetration Testing by Richard Ackroyd, Andrew Mason, Gavin Watson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13

Writing the Report

Andrew Mason,    Technical Director, RandomStorm Limited

This chapter will look at the main deliverable to the client, which takes the form of a written report. The importance of report clarity and business drivers will be covered and a sample template for social engineering assessment reports will be presented along with a presentation template that summarizes the findings for stakeholders.

Keywords

Data collection; mind mapping; report writing

Information in this chapter

• Data collection

• OS folder structures and text editor

• Mind mapping

• Document management tools

• Writing the report

• Cover page

• Title page

• Disclaimer page

• Table of contents

• Social engineering overview

• Social engineering methodology

• Threat modeling ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required