Skip to content

Commit

Permalink
OSWE noraj template: fix title level
Browse files Browse the repository at this point in the history
  • Loading branch information
noraj committed Aug 5, 2020
1 parent 8e95f36 commit 2fc0458
Show file tree
Hide file tree
Showing 2 changed files with 12 additions and 12 deletions.
Binary file modified output/OSWE-exam-report-template_noraj_v1.pdf
Binary file not shown.
24 changes: 12 additions & 12 deletions src/OSWE-exam-report-template_noraj_v1.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ One thing to remember is that these systems require frequent patching and once p
The penetration testing portions of the assessment focus heavily on gaining access to a variety of systems.
During this penetration test, I was able to successfully gain access to **X** out of the **2** systems.

# 192.168.XX.XX - app_name [language]
## 192.168.XX.XX - app_name [language]

### Local.txt & Proof.txt

Expand All @@ -87,24 +87,24 @@ proof.txt: `xxx`

Provide your debug setup.

## Vulnerability 1 - vulnerability_name
### Vulnerability 1 - vulnerability_name

Provide the method and code used to find the vulnerability 1.

## Vulnerability 2 - vulnerability_name
### Vulnerability 2 - vulnerability_name

Provide the method and code used to find the vulnerability 2.

## Vulnerability X - vulnerability_name
### Vulnerability X - vulnerability_name

Provide the method and code used to find the vulnerability X.

## Steps of exploit writing
### Steps of exploit writing

Provide a detailed account of your methodology in creating the exploits. The steps taken
should be able to be easily followed and reproducible if necessary.

## PoC Code
### PoC Code

To install the dependencies required for PoC execution:

Expand All @@ -120,7 +120,7 @@ Provide the final proof of concept code used to gain access to the server.
puts 'My best PoC'
```

# 192.168.XX.XX - app_name [language]
## 192.168.XX.XX - app_name [language]

### Local.txt & Proof.txt

Expand All @@ -140,24 +140,24 @@ proof.txt: `xxx`

Provide your debug setup.

## Vulnerability 1 - vulnerability_name
### Vulnerability 1 - vulnerability_name

Provide the method and code used to find the vulnerability 1.

## Vulnerability 2 - vulnerability_name
### Vulnerability 2 - vulnerability_name

Provide the method and code used to find the vulnerability 2.

## Vulnerability X - vulnerability_name
### Vulnerability X - vulnerability_name

Provide the method and code used to find the vulnerability X.

## Steps of exploit writing
### Steps of exploit writing

Provide a detailed account of your methodology in creating the exploits. The steps taken
should be able to be easily followed and reproducible if necessary.

## PoC Code
### PoC Code

Provide the final proof of concept code used to gain access to the server.

Expand Down

0 comments on commit 2fc0458

Please sign in to comment.