Reporting
Overview
The red team report is the primary deliverable of an engagement. Unlike pentest reports that list vulnerabilities with severity ratings, red team reports tell the story of an attack — what the team did, what was detected, and what was missed. The report should be actionable for both technical defenders and executive leadership. A brilliant engagement with a poor report is a wasted engagement.
Techniques
Report Structure
1. Executive Summary (1-2 pages)
- Engagement objective and scope
- Key findings in business terms
- Overall security posture assessment
- Top 3-5 recommendations
2. Engagement Overview
- Timeline (start/end dates)
- Threat model emulated
- Rules of engagement summary
- Team members involved
3. Attack Narrative
- Chronological story of the operation
- Each phase: what was attempted, what succeeded, what was detected
- Screenshots and evidence for each step
- ATT&CK technique mapping for every action
4. Detection Analysis
- What the SOC/blue team detected
- What was missed and why
- Time-to-detect for each phase
- Detection coverage score (ATT&CK heatmap)
5. Findings and Recommendations
- Each finding: description, impact, evidence, remediation
- Prioritized by risk (not just CVSS)
- Short-term vs. long-term remediation
- Detection engineering recommendations
6. Technical Appendix
- Full timeline with timestamps
- IOCs generated (domains, IPs, hashes, user agents)
- Tools and techniques used
- Raw evidence and logs
Attack Narrative Writing
The narrative should read like a story, not a vulnerability list:
BAD:
"Finding 1: Weak password on service account svc_backup (Password1).
Risk: High."
GOOD:
"On Day 3, the team Kerberoasted the svc_backup service account
(T1558.003) and cracked its password offline in 4 minutes using
hashcat with the rockyou wordlist. This account had local admin
rights on 47 servers including the file server containing PCI
cardholder data. The SOC did not alert on the TGS request spike.
Recommendation: Rotate svc_backup to a 25+ character password or
migrate to a Group Managed Service Account (gMSA). Enable detection
for high-volume Kerberos TGS requests (Event 4769)."
Detection Scorecard
Create a matrix comparing red team actions to blue team detections:
| Day/Time | Red Team Action | ATT&CK | Detected? | Time to Detect |
|----------|----------------|--------|-----------|----------------|
| Day 1 09:00 | Phishing email sent | T1566.001 | Yes | 2 hours |
| Day 1 11:30 | Payload executed | T1204.002 | No | — |
| Day 1 12:00 | C2 beacon established | T1071.001 | No | — |
| Day 2 10:15 | Kerberoasting | T1558.003 | No | — |
| Day 2 14:00 | Lateral movement (WMI) | T1047 | Yes | 6 hours |
| Day 3 09:30 | DCSync | T1003.006 | Yes | 45 min |
ATT&CK Heatmap
Use the ATT&CK Navigator to visualize detection coverage:
Color coding:
- Green: Detected and alerted
- Yellow: Logged but no alert (detection gap)
- Red: Not logged at all (visibility gap)
- Gray: Not tested during this engagement
Export the navigator layer as part of the report appendix.
Evidence Collection During the Engagement
Log everything as you go — reconstructing later is error-prone:
For each action, capture:
- Timestamp (UTC)
- Source and destination hosts
- Tool/command used
- ATT&CK technique ID
- Screenshot of the result
- Whether the action was detected (check with deconfliction if needed)
Use a shared log (Markdown file, wiki, or C2 framework's built-in logging):
[2026-02-10 14:23 UTC] Operator: Tristan
Host: WS01 -> DC01
Action: impacket-secretsdump DCSync (T1003.006)
Result: Obtained krbtgt hash
Detected: Unknown at this time
Delivery and Debrief
1. Technical debrief (SOC/IR team)
- Walk through the attack narrative step by step
- Discuss each detection gap
- Provide IOCs for retroactive hunting
- Review and improve detection rules together
2. Executive debrief (CISO/leadership)
- Focus on business impact, not technical details
- "An attacker could access X data in Y days without detection"
- Prioritized recommendations with estimated effort
- Compare to previous engagements (trend analysis)
3. Report delivery
- Encrypt the report (contains sensitive IOCs and attack paths)
- Deliver via secure channel (not unencrypted email)
- Agree on data retention and destruction timeline