Depending on your specific needs, here are three common frameworks for developing a professional write-up: 1. The Technical/Cybersecurity Write-up (CTF or Pentest)
Provides context and the importance of the study. Depending on your specific needs, here are three
List tools used (e.g., Nmap) and initial findings like open ports or service versions. Depending on your specific needs
Which company rule or expectation was not met. Depending on your specific needs, here are three
A formal structure for presenting a study or project argument.
What was found after access (flags, sensitive files) and how to fix the issue. 2. The Employee Performance Write-up
Step-by-step walkthrough of the commands or scripts used to gain access.