ElementDescription
Executive summary- Date range of the assessment  
- Purpose and scope of the assessment 
- General status of the assessment and summary of your findings regarding risk to the client 
- Disclaimer
Scan results- Explanation of the scan results, such as how you’ve categorized and ordered vulnerabilities 
- Overview of the types of reports provided
Methodology- Tools and tests you used for vulnerability scanning, such as penetration testing or cloud-based scans 
- Specific purpose of each scan, tool, and test 
- Testing environments for each tool used in the assessment
Findings- Which systems identified by the client you successfully scanned and which you did not 
- Whether any systems were not scanned and, if so, the reasons why
Risk assessment- Index of all vulnerabilities identified, categorized as critical, high, medium, or low severity 
- Explanation of the above risk categories 
- List of all vulnerabilities with details on the plugin name, description, solution, and count information
Recommendations- Full list of actions the client should take 
- Recommendations of other security tools the client can use to assess the network’s security posture 
- Security policy and configuration recommendations
Sample Technical Report: RootKid - Github

Hack The Box Sample Report

My First VA Report