Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Kali Linux Wireless Penetration Testing Essentials

You're reading from  Kali Linux Wireless Penetration Testing Essentials

Product type Book
Published in Jul 2015
Publisher Packt
ISBN-13 9781785280856
Pages 164 pages
Edition 1st Edition
Languages

Table of Contents (17) Chapters

Kali Linux Wireless Penetration Testing Essentials
Credits
Disclaimer
About the Author
About the Reviewers
www.PacktPub.com
Preface
1. Introduction to Wireless Penetration Testing 2. Setting Up Your Machine with Kali Linux 3. WLAN Reconnaissance 4. WEP Cracking 5. WPA/WPA2 Cracking 6. Attacking Access Points and the Infrastructure 7. Wireless Client Attacks 8. Reporting and Conclusions References Index

Chapter 8. Reporting and Conclusions

So far, we have analyzed the planning, discovery, and attack phases of wireless penetration testing. All these phases are equally important to achieve accurate and reliable results but need to be completed with the final phase, which is the reporting phase.

In this phase, all the information and findings that emerged from the penetration test are gathered and described in a report to be submitted to the customer.

The topics covered in this chapter are as follows:

  • The four stages of report writing

  • The report format

In the next section, we will analyze the process of planning and writing a professional report.

The four stages of report writing


The reporting phase is often underestimated in its importance and considered as the boring, though necessary, part of a penetration test. Of course, the discovery and attack phases are the core and most exciting parts as it is when the penetration tester's technical skills are applied in practice. Penetration testers could be very skilled and might do an excellent job, but if they somehow fail to communicate their achievements to the customer effectively, their job is (at least in part) in vain.

Writing good reports is a required ability, almost an art, for penetration testers, and as for all the skills, can be improved through practice.

The process of writing a professional penetration test report comprises four stages:

  • Report planning

  • Information collection

  • Writing the first draft

  • Reviewing and finalization

Report planning

In the first stage, report planning, we define the objectives, the target audience and the contents of the report, as well as the estimated...

The report format


In this section, we describe a typical format used to produce professional penetration testing reports.

Before writing the report, we must choose the look of the document; the fonts and the colors for the headings and the text, the margins, the header and footer content, and so on.

A report usually starts with a cover page that contains the report name and version, the date, the service provider, and the organization names. The service provider is the penetration tester or the penetration testing team. In the latter case, it is good practice to include the names of all the team members.

After the cover page, if the report is longer than a few pages, we should include a table of contents to list all the sections of the report with the page numbers.

The contents of the report can be grouped, as we have seen before, in two main sections: the executive summary and the technical report.

The executive summary

The executive summary, as the name suggests, is intended for the management...

Summary


In this chapter, we have covered the reporting phase of wireless penetration testing, analyzing each stage from the report planning to its review and finalization, and describing the typical format of a professional report.

The chapter also underlines the importance of effectively communicating the work done in the penetration test to the customer and a well-written and -presented report is certainly the best way!

Conclusions


We have arrived at the conclusion of our journey into wireless penetration testing. This is a very exciting branch of penetration testing that is rapidly evolving and will certainly be increasingly important in the future, thanks to the ubiquitousness of wireless networks and the wide growth of mobile devices.

Learning and mastering Kali Linux for wireless penetration testing not only provides us with a great set of tools to use but, as they are all open source, also gives us the opportunity to understand the logic of their implementation and of the attacks performed in depth.

lock icon The rest of the chapter is locked
You have been reading a chapter from
Kali Linux Wireless Penetration Testing Essentials
Published in: Jul 2015 Publisher: Packt ISBN-13: 9781785280856
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}