Part 4 of the series will focus on what a penetration testing report should contain and how we use the penetration engagement, the testing activities carried out, and the information, vulnerability, and/or exploit data we documented to populate the penetration testing report.
Hacking is the fun part; now, for the business end of things, it is the most crucial output.