In this Lab Report file, create a vulnerability assessment report based on the OWASP documents and your analysis of all the issues researched in this lab.
Executive Summary (include a general overview of the security state of the DVWA based on the reports provided)
Summary of testing methods/tools used
Summary of findings (include all issues researched in this lab)
Recommendations (map the researched issues to recommendations outlined by the OWASP and Open SAMM models; cite your work properly)