This document provided by Magda Chelly from Responsible Cyber, and was downloaded from
[Link]
PENETRATION TESTING
REPORT
TEMPLATE
REVIEWED BY:
APPROVED BY: AeroTech
VERSION: 1.1 DATE:
[Usage Details]
Change history
Date Version Owner Change Description
Table of contents
1. PURPOSE............................................................................................................................................... 3
2. SUMMARY............................................................................................................................................ 3
3. PROJECT DETAILS / SCOPE..................................................................................................................... 3
4. REFERENCE DOCUMENTS....................................................................................................................... 3
5. RESULTS FROM PORT SCAN................................................................................................................... 3
6. FINDINGS.............................................................................................................................................. 3
7. DISCLAIMER.......................................................................................................................................... 3
Penetration Testing Report Powered by Responsible Cyber Pte. Ltd. & Peerlyst version Page 2 of 3
[Usage Details]
1. Purpose
The purpose of this penetration test is to identify vulnerabilities that exist on AeroTech’s in scope
devices.
2. Summary
A penetration test was conducted on AeroTech's infrastructure to identify vulnerabilities,
weaknesses, and potential areas of improvement in their cybersecurity posture. The primary
objective was to simulate real-world cyber-attacks in a controlled environment and provide
actionable insights to bolster AeroTech's defenses. After
3. Project Details / Scope
This engagement was set to take place from October 1 st – October 7th. The project details describe
the project approach and the process used according to the defined scope. The scope defines the
penetration testing scope, for example, WiFi Network Security Penetration Testing on the Corporate
Wireless Network in the Office Region 1.
4. Reference documents
Rapid7 Metasploit Documentation
5. Results From Port Scan
Port Service Version Vulnerable?
6. Findings
Findings Description Details Severity Recommendations
7. DISCLAIMER
This document is confidential and only for use by the company receiving this information from
AeroTech
Penetration Testing Report Powered by Responsible Cyber Pte. Ltd. & Peerlyst version Page 3 of 3