During a penetration test, a client wants a visual report that shows every compromised host, pivot route, and the connections that enabled further access. Which method provides a thorough representation for later analysis?
Split the findings into separate small snippets, each showing only one vulnerability from scanning results
Use minimal notes focusing on a few entry points and disregard minor lateral moves among hosts
Draw a unified chart to highlight important transitions among compromised nodes and show relevant details about infiltration steps
Compile a large table of scan logs referencing potential flaws, without linking how the attacker moved between systems
An in-depth visual layout captures how each host was compromised, how privileges were escalated, and how the adversary navigated through the systems. Simple overviews or multiple fragmented drawings can miss critical stages in the progression. Tables with raw scanner data do not often convey how each compromise was chained together. Depicting each relevant node and infiltration step helps in replication and future defensive measures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What tools can be used to create a unified visual chart for penetration testing results?
Open an interactive chat with Bash
Why is a unified visual chart better than using a table of scan logs?
Open an interactive chat with Bash
What should be included in a detailed penetration test visual report?