How to Write a High-Scoring Penetration Testing Exam Report (OSCP, PNPT, eJPT & More)
An instructor-level, practical, conversational guide for exam-takers and aspiring penetration testers
If you’re preparing for a hands-on penetration testing exam like OSCP, PNPT, or eJPT, there is one skill that determines whether you pass or fail, even if you rooted every machine:
🔥 Your ability to write a clear, professional, reproducible penetration testing report.
In the real world, this is what clients judge you on. In exams, this is what graders score you on. A beautiful chain of exploits means nothing if the reviewer can’t reproduce the steps or can’t understand the impact.
This guide walks you through exactly how to write an exam-ready pentest report, using a structure that works for both industry consulting and certification exams.
1. Introduction & Exam Context
If exploitation is the “fun” part of penetration testing, reporting is the skill that pays your salary—and earns you your certification.
In both real-world engagements and exam labs, reporting serves three purposes:
✅ 1. Demonstrate Your Methodology
Exams (especially OSCP) grade you heavily on whether you followed a structured process:
enumeration
exploitation
privilege escalation
post-exploitation
documentation
Your report should reflect that professional methodology.
✅ 2. Prove Impact
Exploit alone doesn't matter. You must show:
“What did this vulnerability let me do?”
“Why does it matter to the organization?”
“Could it lead to lateral movement, data exposure, domain takeover?”
✅ 3. Show Reproducible Evidence
Examiners expect:
clear steps
commands
screenshots
flags or proof files
remediation recommendations
Even small jumps like “I got root” without proof will lose points.
Exams With High Reporting Weight
OSCP – report can make or break your score
PNPT – report + debrief required
eJPT – more structured but still needs clarity
CRTO – heavy emphasis on documentation of tradecraft
GPEN – real-world consulting-style reports
Because the rubrics differ but the structure stays similar, we will use a master skeleton you can adapt to any exam.
2. High-Level Report Structure (Professional Template)
Here is the universal pentest report layout you can use for exams and consulting work.
📌 1. Title Page & Document Control
Include:
Exam name (OSCP, PNPT, etc.)
Candidate name + exam ID
Date of submission
Version number (“v1.0 Submitted”)
Confidentiality statement
📌 2. Table of Contents
Auto-generated with page numbers.
This is critical for long reports (OSCP graders appreciate fast navigation).
📌 3. Executive Summary
One or two pages written for managers:
What was tested?
What was found?
How bad was it?
What should be fixed immediately?
📌 4. Introduction, Scope & Rules of Engagement
Document:
machines/domains in scope
flags required
what you're allowed or not allowed to attack
exam restrictions (e.g., “no automated exploitation”)
time window
📌 5. Methodology (Mapped to a Framework)
Structure your workflow using:
PTES
NIST
SANS
This adds professionalism and earns exam points.
📌 6. Detailed Findings & Exploitation Walkthroughs
The largest portion of the report:
enumeration
exploitation
privilege escalation
lateral movement
proof files
Every vulnerability should look like a mini case study.
📌 7. Risk Ratings & Business Impact
Use:
qualitative ratings (High/Medium/Low)
CVSS scores when appropriate
impact expressed in business language
📌 8. Recommendations & Remediation Plan
Clear, specific fixes:
configs
patches
architectural controls
detection/monitoring guidance
📌 9. Appendices
Everything bulky goes here:
full nmap outputs
dirsearch/bruteforce output
screenshots
commands
proof.txt flags
3. Writing the Executive Summary Section
Think of the Executive Summary as a manager reading your report during an Uber ride.
It should be:
simple
non-technical
actionable
concise (1–2 pages max)
What to Include
1. High-Level Posture
Example:
“During the assessment, 3 High-Risk and 4 Medium-Risk vulnerabilities were identified. Two of these issues enabled full domain compromise.”
2. Main Attack Path
Explain the kill chain like a story:
foothold on a web server
privilege escalation
credential harvesting
lateral movement
domain dominance
Keep it human-friendly.
3. Business Impact
Explain risks in real-world terms:
data theft
system downtime
regulatory penalties
full domain compromise
4. Top 3–5 Priority Actions
A mini action plan:
Patch vulnerable Apache Struts service
Implement proper AD password policies
Disable SMBv1
Apply least privilege on service accounts
4. Scope, Objectives, and Engagement Details
This section ensures exam reviewers know exactly what you tested.
Include:
1. In-Scope Assets
Example (OSCP style):
192.168.171.0/24 network
5 Linux machines
1 Windows domain controller
Proof files required per host
2. Out of Scope
Example:
No DoS attacks
No brute forcing beyond specified rate limits
No automated exploitation tools unless allowed
3. Objectives
Examples:
“Obtain proof.txt and local.txt from each host.”
“Identify vulnerabilities that lead to privilege escalation.”
“Demonstrate lateral movement within AD.”
4. Assumptions
Sometimes exams simulate:
“User clicked a phishing link”
“Standard user credentials were captured”
“Default credentials present”
State them transparently.
5. Methodology and Tools
Your methodology proves you performed a professional assessment, not random hacking.
Core Phases
Reconnaissance
Enumeration
Vulnerability mapping
Exploitation
Privilege escalation
Lateral movement
Post-exploitation
Cleanup & documentation
Map to Frameworks
Use one:
PTES
NIST 800-115
SANS Penetration Testing Methodology
This earns points in OSCP/PNPT and looks extremely professional.
Tooling Explanation
You don’t need a giant list of tools. Instead:
name the tool
explain why you used it
note manual verification
Example:
“Nmap was used for initial port discovery and service fingerprinting. All results were manually validated before attempting exploitation.”
This shows examiners you know what you’re doing.
6. Technical Findings & Exploitation Walkthroughs
This is the heart of the report — the part that determines your score.
Each finding should follow this structure:
Finding Structure
1. Title & ID
Example:
WEB-01: SQL Injection in Login Form
2. Description
Explain the vulnerability in human language.
3. Affected Assets
IP
hostname
URL
parameters
4. Risk Rating + CVSS
Qualitative + CVSS score if appropriate.
5. Proof of Concept (PoC)
Include:
commands
payloads
screenshots
Write it as if someone else must reproduce it using only your instructions.
6. Impact
Tie the exploit to business consequences:
data breach
privilege escalation
domain compromise
7. Evidence
Include:
screenshots
truncated output
flags
key command snippets
Exam-Specific Advice for Findings
✔ Reproducibility Is Everything
For OSCP/PNPT graders:
every enumeration step matters
every exploit chain must be documented
do NOT skip steps
If you can't reproduce it, they won't believe it.
✔ Avoid “Magic Jumps”
Write:
❌ “I got a shell.”
✅ “Uploaded webshell → executed netcat reverse shell → gained foothold as www-data.”
✔ Show Key Enumeration Output
Show:
misconfigurations
privilege escalation hints
accessible shares
kernel versions
Examiners want to see you followed a professional workflow.
7. Risk Ratings & Business Impact
Risk ratings shouldn’t just be “High/Medium/Low.”
Explain why.
Use at least two dimensions:
Likelihood (ease of exploitation)
Impact (damage if exploited)
Examples
“This SQL injection can be exploited with no authentication, making likelihood high.”
“Successful exploitation exposes all customer records stored in the CRM database.”
This shows maturity and real consulting skill.
8. Recommendations & Remediation
Remediation is graded in many exams.
Write:
Clear
Specific
Prioritized
Actionable
Format
Short-Term Fixes (patching, config changes)
Long-Term Fixes (network segmentation, hardening)
Example:
“Implement parameterized SQL queries to eliminate SQL injection. Validate all input server-side.”
Bonus:
reference CIS benchmarks
link vendor advisories
9. Appendices: Evidence & Artifacts
This is where all the “noise” goes so your main report stays readable.
Include:
full nmap scans
gobuster/dirsearch output
exploit scripts
command history
screenshots not used in the main section
proof.txt and local.txt flags
Cleanup Section
Document:
users created
files uploaded
scheduled tasks created
system changes
On OSCP: documenting cleanup is essential.
10. Writing Style & Formatting Best Practices
Your writing should be:
clear
simple
professional
Tips
✔ Use active voice
✔ Use consistent headings
✔ Use tables for assets and vulnerabilities
✔ Use code blocks for commands
✔ Redact sensitive data
✔ Keep screenshots sharp and cropped
✔ Number your findings
Example asset table:
Host | IP | OS | Role | Status |
|---|---|---|---|---|
DC01 | 192.168.1.10 | Windows Server 2019 | Domain Controller | Compromised |
11. Exam-Specific Tips & Common Pitfalls
Here are the most common reasons students fail:
❌ Missing proof files
❌ Missing steps in exploitation chains
❌ Missing or blurry screenshots
❌ No privilege escalation explanation
❌ No remediation suggestions
❌ Commands not shown
❌ Enumeration not documented
✔ Use a prebuilt template
Prepare your report structure before the exam.
✔ Take notes in real-time
Tools:
Obsidian
CherryTree
OneNote
Notion
Typora
✔ Screenshot everything
If you think “should I screenshot this?” — yes, you should.
✔ Track timestamps
Examiners appreciate clear chronological flow.
12. Suggested Overview Table
Section | Purpose |
|---|---|
Executive Summary | High-level business overview |
Scope & Objectives | Defines what was tested and why |
Methodology | Shows professional approach |
Technical Findings | Exploitation story with evidence |
Risk & Impact | Business-level interpretation |
Recommendations | Actionable fixes |
Appendices | Full evidence and raw data |