Below is a redacted sample of the penetration test report structure. Actual reports contain full technical details specific to your infrastructure.
Organization: [REDACTED] Pty Ltd
Target Domain: example.com.au
Assessment Date: March 2026
Report Classification: CONFIDENTIAL
CyberCTRL conducted an external penetration test of the target infrastructure. The assessment identified 5 findings across the target scope, including 1 high-severity issue requiring immediate attention. The overall security posture is assessed as moderate, with several areas for improvement in TLS configuration and HTTP security headers.
The server supports TLS 1.0 and TLS 1.1 which are deprecated protocols with known vulnerabilities. Modern clients should use TLS 1.2 or TLS 1.3.
Disable TLS 1.0 and TLS 1.1 on the web server. Configure the server to support only TLS 1.2 and TLS 1.3 with strong cipher suites.
Several HTTP security headers are missing including Content-Security-Policy, X-Frame-Options, and Strict-Transport-Security.
Implement recommended HTTP security headers: Content-Security-Policy, X-Frame-Options (DENY), Strict-Transport-Security (max-age=31536000), X-Content-Type-Options (nosniff).
The mail server on port 25 accepts connections from any source and may be susceptible to relay abuse if not properly configured.
Verify SMTP relay restrictions are correctly configured. Ensure the mail server only accepts relay from authorized IP addresses and authenticated users.
The authoritative DNS server allows zone transfers (AXFR) from any host, potentially exposing internal network topology.
Restrict DNS zone transfers to authorized secondary name servers only. Configure allow-transfer ACLs on the DNS server.
The web server responds with detailed version information in the Server header, aiding attackers in identifying known vulnerabilities.
Configure the web server to suppress or generalize the Server response header. Remove version numbers from all service banners.
This assessment was conducted in accordance with NIST SP 800-115 and OWASP testing guidelines. The following scanning tools were employed during the engagement:
Ready to assess your external security posture?
Purchase Your Test