| Element | Description |
|---|---|
| Executive summary | - Date range of the assessment - Purpose and scope of the assessment - General status of the assessment and summary of your findings regarding risk to the client - Disclaimer |
| Scan results | - Explanation of the scan results, such as how you’ve categorized and ordered vulnerabilities - Overview of the types of reports provided |
| Methodology | - Tools and tests you used for vulnerability scanning, such as penetration testing or cloud-based scans - Specific purpose of each scan, tool, and test - Testing environments for each tool used in the assessment |
| Findings | - Which systems identified by the client you successfully scanned and which you did not - Whether any systems were not scanned and, if so, the reasons why |
| Risk assessment | - Index of all vulnerabilities identified, categorized as critical, high, medium, or low severity - Explanation of the above risk categories - List of all vulnerabilities with details on the plugin name, description, solution, and count information |
| Recommendations | - Full list of actions the client should take - Recommendations of other security tools the client can use to assess the network’s security posture - Security policy and configuration recommendations |
| Sample Technical Report: RootKid - Github |

Hack The Box Sample Report
My First VA Report