I was going through the “Blind Penetration Test” lab (Lab 6 - Network Security), and I’m extremely curious how you document your report after the pentest was done.
Please don’t hesitate to drop your ideas and opinions, would lovee to hear from everyone.
Again, I really appreciate your valuable supports.