In this chapter, we explored some of the basic steps necessary for creating a penetration testing report and discussed the core aspects of holding a presentation in front of the client. At first, we fully explained the methods of documenting your results from individual tools and suggested that you don't rely on single tools for your final results. As such, your experience and knowledge count in verifying the test results before they are documented. Make sure to keep your skills updated and sufficient to manually verify the findings when needed.
We then looked at reporting tools, with the main focus being on the Dradis Framework, while touching on Faraday IDE and MagicTree. We encourage you to try them all as you may wish to combine the tools for various purposes and collaborations.
Finally, we hope you enjoyed this book and wish you all the best in your CyberSec...