O'Reilly logo

Web Penetration Testing with Kali Linux by Aamir Lakhani, Joseph Muniz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Penetration Test Executive Report

Before we get started, we want to point out this chapter touches on subjects of writing reports, clauses, and agreements. These examples should be used as general guidelines. In no way are we advocating having knowledge or techniques that could be accepted in a legal manner. Despite seven of our Facebook profiles being lawyers, and being fans of Boston Legal, we are no Denny Crane. We recommend when you get serious about developing scopes, agreements, and reports, you seek professional legal help.

Network engineers install networks, programmers create applications, and auditors write. As a network Penetration Tester, you are by default an auditor. Unlike a network engineer who will configure routing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required