Now that all the tests have been performed and evidence has been collected, it is time to gather all of our data. Hopefully, you have been keeping it well organized on your C&C server, as that will make the entire process much easier. Typically, I start the entire process by breaking down the data into three parts. This will start the process of getting me to that final structure that will allow me to turn all that data into the finalized product.
Here are the first three categories I break the information down into:
- Reports
- Diagrams
- Vulnerability/findings information
I then take the vulnerability evidence that contains screenshots, scripts, and notes and move them into their respective vulnerabilities, sorted by the vulnerability. This allows for an easier migration to writing.
For example, looking back on the Chapter 8, Web Application Attacks,...