Все поля обязательны для заполнения
A high-level overview of the systems compromised.
Don't fluff the report with generic definitions of SQL injection. Focus on this specific SQL injection. 2. Structuring Your OSWE Report
OSWE rarely involves a single-step exploit. Clearly document how you used a "low-severity" bug (like an Authentication Bypass) to reach a "high-severity" bug (like RCE). 4. Essential Screenshots and Proofs
While OffSec provides a formal report template, you need to populate it strategically. Your report should generally follow this flow: