Reports
BlackRainbow produces structured reports from engagement results. Every finding links back to raw evidence, maps to ATT&CK techniques, and includes remediation guidance.
What Reports Include
Executive Summary
High-level overview for stakeholders. Total findings by severity, attack path summary, overall risk assessment.
Findings
Each finding includes:
| Section | What It Contains |
|---|---|
| Title | What was found |
| Severity | Critical, High, Medium, Low, Info |
| Description | What the vulnerability is and why it matters |
| Evidence | Raw tool output, screenshots, configuration snippets |
| Attack path | How this finding was reached (which kill chain stage, which plugin) |
| ATT&CK mapping | MITRE technique IDs and tactic categories |
| Remediation | How to fix it |
| Detection | How to detect exploitation attempts |
Example Finding
## Finding: SMB Signing Disabled
**Severity:** High
**ATT&CK:** T1557.001 (LLMNR/NBT-NS Poisoning and SMB Relay)
### Description
SMB signing is not required on 3 hosts in the target environment.
This allows relay attacks where captured authentication can be forwarded
to other hosts without detection.
### Evidence
Discovered during recon stage (plugin: recon, sequence: nmap-smb-scan):
```
Host: 192.168.1.20 - SMB signing: disabled
Host: 192.168.1.21 - SMB signing: disabled
Host: 192.168.1.25 - SMB signing: disabled
```
### Remediation
1. Enable SMB signing via Group Policy:
Computer Configuration → Policies → Windows Settings →
Security Settings → Local Policies → Security Options →
"Microsoft network server: Digitally sign communications (always)" = Enabled
2. Apply to all domain-joined systems via the Default Domain Policy.
3. Test with: `nmap --script smb2-security-mode -p 445 <host>`
### Detection
Monitor for SMB relay indicators:
- Multiple authentication attempts from the same source to different targets
- NTLM authentication from unexpected source IPs
- Sigma rule: `win_smb_relay_detection`
Artifact Collection
BlackRainbow captures everything during execution:
| Artifact Type | What It Captures |
|---|---|
| Tool output | stdout and stderr from every executed command |
| Output files | XML reports, JSON output, screenshots |
| Timing data | Duration of every step |
| Configuration | The exact config used for the engagement |
| Context state | Discovered services, credentials, grades at each stage |
Artifacts are stored in the captures/ directory (configurable in your YAML):
captures/
├── recon/
│ ├── nmap-full-scan.xml
│ ├── nmap-vuln-scan.xml
│ └── stdout-recon-001.txt
├── credential-access/
│ ├── kerberoast-hashes.txt
│ └── stdout-cred-001.txt
└── engagement-context.json
Every finding in the report links to its source artifacts. Reviewers can trace any claim back to the raw evidence.
Remediation Suite
Findings do not just say "this is broken." Each remediation section includes:
What was exploited. The specific vulnerability, misconfiguration, or weakness.
Why it was vulnerable. Root cause analysis: missing patch, default configuration, architectural flaw.
How to fix it. Step-by-step remediation with exact commands, Group Policy paths, or configuration changes.
Detection rules. How to detect exploitation attempts in the future:
- Sigma rules for SIEM detection
- Snort/Suricata rules for network detection
- Log queries for specific indicators
- Monitoring recommendations
# Example detection rule in report output
detection:
sigma:
title: "Kerberoasting Activity Detected"
status: experimental
logsource:
category: security
product: windows
detection:
selection:
EventID: 4769
TicketEncryptionType: "0x17"
TicketOptions: "0x40810000"
condition: selection
level: high
MITRE ATT&CK Mapping
Every attack sequence maps to ATT&CK techniques. Reports include:
Technique coverage matrix. Which techniques were tested and their results.
Tactic summary. Findings grouped by ATT&CK tactic (Initial Access, Execution, Persistence, etc.).
Heat map. Visual representation of technique coverage across the engagement.
ATT&CK Coverage
Initial Access: 2 techniques tested, 1 exploited
Execution: 3 techniques tested, 2 exploited
Persistence: 1 technique tested, 0 exploited
Privilege Escalation: 2 techniques tested, 1 exploited
Credential Access: 4 techniques tested, 3 exploited
Lateral Movement: 2 techniques tested, 2 exploited
Export Formats
# Markdown (default)
br report --format markdown
# Structured JSON
br report --format json
# Standalone HTML
br report --format html
# PDF for stakeholder delivery
br report --format pdf
| Format | Use Case |
|---|---|
markdown | Internal review, Git-friendly, CI/CD pipelines |
json | Programmatic consumption, dashboard integration, data analysis |
html | Self-contained report with styling, shareable without tooling |
pdf | Stakeholder delivery, formal documentation |
Report Configuration
Control report output in your engagement config:
output:
report: ./reports/
capture: ./captures/
format: markdown
Or override at generation time:
br report --format pdf --output ./deliverables/