...
This report contains our findings as well as detailed explanations of exactly how ROS performed the penetration test.
The scope of the penetration test was limited to the following target:
...
The Security Audit took place between X and Y, 2016.
Through automated scans we were able to gain the following information about the software and infrastructure. Detailed scan output can be found in the sections below.
As part of our active reconnaissance we used the following automated scans:
We have identified the following issues:
In this section we list some of the things that were tried but turned out to be dead ends.