Use red rectangles to highlight the vulnerability or key evidence - Use arrows to draw attention to specific fields - Add numbered callouts that match your written description - Use a consistent annotation color scheme (red for vulnerability, green for successful exploitation, blue for reference)