How to learn Cybersecurity: Part 3 – Documentation

📄 Documentation: Principles of Clarity and Reproducibility

Effective documentation starts with identifying the report’s audience. The way we record internal activities differs significantly from how we present final results to a client or stakeholder. The primary purpose of documentation is to communicate the gathered information in a comprehensible manner and to ensure that any specific activity or finding is easily reproducible.

The essential characteristics of high-quality documentation are:

  • Overview: Providing the necessary context and scope upfront.
  • Structure: Organizing information logically and hierarchically.
  • Clarity: Ensuring the language is unambiguous and the presentation is easy to follow.

As we progress through learning and practical exercises, we encounter numerous situations and resources, requiring us to manage and process substantial amounts of information.


🛠️ Tools for Organization and Evidence

To manage and structure this large volume of data effectively, dedicated tools are highly recommended. A hierarchical note-taking application like CherryTree (or a similar knowledge management tool) is excellent for maintaining an organized structure.

To achieve maximum clarity, always remember the adage: A picture is worth a thousand words. Tools like FlameShot (or equivalents) are invaluable, as they facilitate taking, annotating, and editing screenshots quickly to capture visual evidence directly.


📖 Guidelines for Effective Reporting

Regardless of the intended audience—whether internal or external—adhering to certain guidelines will ensure your documentation is impactful and useful:

  • Adopt the Reader’s Perspective: Designing the documentation becomes significantly easier when you place yourself in the reader’s shoes, ensuring the appropriate level of technical detail and necessary context are provided.
  • Avoid Repetition and Ambiguity: Be concise and direct. Redundant or unclear statements only lead to reader confusion and waste time.
  • Prioritize Readability: The documentation must be easy to scan and follow. Reports that are dense or poorly laid out are likely to be ignored or misunderstood.
  • Focus on Client Priorities: Before finalizing documentation for a client, clarify which aspects are most important to them (e.g., business impact, remediation steps, or technical reproduction details).

🔎 Optional Exercise: Penetration Test Report Analysis

Conduct research to find examples of publicly available penetration test report templates or sample reports. Analyze these examples to identify and outline their core features. Create a comprehensive overview covering the following points:

  1. What topics are typically covered? (e.g., Executive Summary, Methodology, Scope, Detailed Findings, Risk Rating, Recommendations).
  2. How are they structured? (e.g., flow from high-level summary to technical detail, use of sections and appendices).
  3. How are they presented? (e.g., use of professional language, clear distinction between technical and non-technical sections, use of visual aids like charts and tables).

🗺️ Organization: The Power of the Overview

We have encountered the term overview repeatedly, and to grasp its critical importance, let us visualize the following situation:

Imagine you are standing atop a large mountain, looking down upon a vast forest that stretches toward a second mountain on the horizon—your ultimate destination. The difficulty lies in this: the moment you descend into the forest, your destination will vanish from sight. The only way to navigate and reach the second mountain is to orient yourself using the interim landmarks visible from above, such as lakes, rivers, and clearings.

This journey necessitates preparation: you must bring essential tools (e.g., a compass, map, lighter) and meticulously plot all the necessary interim orientation points to avoid getting lost. If you become disoriented, you cannot simply wander aimlessly through the forest hoping to stumble upon the goal. You would be forced to retreat to the starting mountain to reorient yourself and redraw your plan.

This analogy demonstrates the dependency between key concepts and the absolute necessity of having a map for orientation. By diligently completing previous reflective exercises, you have already sketched the initial drawings on your map, which will guide your understanding of your current location and desired direction.


⏱️ Efficiency Through Preparation

Being highly organized is paramount in penetration testing because the entire process, from initial reconnaissance to final report writing, must be structured and systematic.

It is common to take over several systems within a short timeframe. You do not want to waste time repeatedly searching for the same source files, commands, or pieces of information. The essence of organization and efficiency is beautifully captured in this example:

An inexperienced woodcutter spends 30 minutes sharpening his axe and then takes 3 hours to cut down the tree.

The experienced woodcutter will spend 3 hours sharpening his axe and will cut down the tree within 30 minutes.

The principle is clear: adequate preparation and organization drastically reduce the time and effort required for the execution phase.


📋 Management Techniques

There are many different management techniques and methodologies available to structure your learning, practice, and reporting processes. These techniques include:

  • Scrum
  • Agile
  • To-Do Lists
  • Bullet Journaling (BuJo)
  • Kanban, and more.

📝 Optional Exercise: Personalizing Your Workflow

Create a comprehensive list of various management techniques and methods you can find (beyond the examples above). For each technique, list its major negatives and positives.

How to learn Cybersecurity: Part 4 – The Process