.

eLearnSecurity opinions?

<<

impelse

Hero Member
Hero Member

Posts: 585

Joined: Mon Feb 16, 2009 3:40 pm

Post Fri Nov 12, 2010 11:39 am

Re: eLearnSecurity opinions?

I havd to admit, it is a real penetration, for the first time
I learnt how to make a report
CCNA, Security+, 70-290, 70-291
CCNA Security
Taking Hackingdojo training

Website: http://blog.thehost1.com/
<<

MindOverMatter

Jr. Member
Jr. Member

Posts: 62

Joined: Wed Oct 27, 2010 7:57 pm

Post Fri Nov 12, 2010 4:30 pm

Re: eLearnSecurity opinions?

Hey thanks Armando, for posting the certification, it's actually really nice, I like it!  I'm gonna frame it and put it next to my others when acheived.

I look forward to getting mine soon as the course is very engrossing, makes you want to keep going and going, although I like to go back a re-fresh the previous before continuing.

One of the things I really like about the course (that at first I wasn't sure about) are the slides.. It's very clear, sharpe looking fonts that are easy to read and not too much info is on each slide, so you don't get bored or overwhelmed.  It's a very effecient learning technique I think, especially for anyone with short attention spans.
A+, Network+, Security+, CIW Associate, CCNA, C|EH
<<

MindOverMatter

Jr. Member
Jr. Member

Posts: 62

Joined: Wed Oct 27, 2010 7:57 pm

Post Fri Nov 12, 2010 4:33 pm

Re: eLearnSecurity opinions?

I also gotta say, learning aside that the logo and color scheme for eLearnSecurity is pretty awesome.  Whoever came up with it is a darn good social engineer / marketeer.
A+, Network+, Security+, CIW Associate, CCNA, C|EH
<<

SephStorm

User avatar

Hero Member
Hero Member

Posts: 569

Joined: Sat Apr 17, 2010 12:12 pm

Post Fri Nov 12, 2010 7:56 pm

Re: eLearnSecurity opinions?

Nice certificate, oh god, if Paris Hilton was a pentester.... well, I guess theres nothing to fear.

If you guys haven't already, you might want to consider printed certificates and a nice card, professionals like to have a little card to show off. They've been begging for them over at the EC-Council forums every now and again.
Last edited by SephStorm on Fri Nov 12, 2010 8:06 pm, edited 1 time in total.
sectestanalysis.blogspot.com/‎
<<

eternal_security

Newbie
Newbie

Posts: 36

Joined: Thu Nov 13, 2008 10:35 am

Post Mon Nov 15, 2010 10:52 am

Re: eLearnSecurity opinions?

alucian wrote:I just got the results today from the exam, so from now on I am an eCPPT!

I really liked the course. It is very well structured, and a very important advantage is that you can access it any time.

Now I am doing some checks for work and I use the course as a guide for the most important steps. I recommend following the course multiple times, because there is so much information so you can't digest it in a single shot.

I just wait for the new course they will produce (supposed to be an advanced one).

I found this course to take you from the novice to an intermediate level for the web application part, and this is what I wanted. The other two modules are at an intermediate level.


Congrats!  And thanks for your feedback!

eternal_security
<<

caissyd

User avatar

Hero Member
Hero Member

Posts: 894

Joined: Thu Dec 31, 2009 11:20 am

Location: Ottawa, Canada

Post Mon Nov 15, 2010 11:36 am

Re: eLearnSecurity opinions?

Congrats alucian!

I found this course to take you from the novice to an intermediate level for the web application part

To who would you recommend this course? Novice?
OSCP, GPEN, GWAPT, GSEC, CEH, CISSP
(aka H1t.M0nk3y)
<<

alucian

User avatar

Full Member
Full Member

Posts: 228

Joined: Mon Dec 29, 2008 2:01 pm

Location: Montreal, Canada

Post Mon Nov 15, 2010 3:31 pm

Re: eLearnSecurity opinions?

H1t M0nk3y wrote:
To who would you recommend this course? Novice?


I would definitely recommend the web part for the novice students (as I was). The course is taking you from the beginning and it teaches you a lot. Each chapter contains theory and then the tools that help you automate the attacks.
The videos of the tools are very useful, too.
This course opened a new world for me, in an easy way. I will try to continue the exploration by myself, but it is always easier when you have a “master” that points you on the good direction.
CISSP ISSAP, CISM/A, GWAPT, GCIH, GREM, GMOB, OSWP
<<

Solinus

Newbie
Newbie

Posts: 31

Joined: Mon Sep 03, 2007 6:33 pm

Location: Cape Cod

Post Thu Dec 02, 2010 8:29 am

Re: eLearnSecurity opinions?

Thanks for the original post and the responses. This is the information I had been looking for myself. I have been excited about this course from the day I read the review on EH.
Kerry
MCITP:EA | MCTS(x5) | MCSA+ | MCSE+ | Security + | CCNA | WCSP |
DSCE | PCT |CIW Security Analyst | CSSA
<<

pentestnoob

Newbie
Newbie

Posts: 1

Joined: Sun Dec 19, 2010 3:41 pm

Post Sun Dec 19, 2010 3:51 pm

Re: eLearnSecurity opinions?

I just have to add my $.02 after reading these posts. I purchased this course from eLearnsecurity and, being a beginner pentester, I find that it is MUCH more challenging to actually do this stuff than first thought. In my duties and speaking to many of the folks in the business, we spend the bulk of our time searching for vulnerabilities. This course "does" teach that, but it also attempts to focus on exploiting the vulnerabilities. In a typical engagement, I have not been asked to attempt to exploit a production system.

That being said, I have found that I was better off mentoring with a senior pentester than what I got from the slideshow that is this course. I never could get any of the exploits to work and honestly did not feel that I got much help, nor did I feel that it was worth $600 bucks for slides. Use your best judgment - it's especially tough with not too much on the market of this type of on-line training.

Good luck!
<<

Armando

User avatar

Jr. Member
Jr. Member

Posts: 93

Joined: Sun Sep 13, 2009 11:15 am

Location: Italy

Post Sun Dec 19, 2010 4:07 pm

Re: eLearnSecurity opinions?

Funny
In your "pentesting" engagements you are not asked to exploit vulnerabilities.
Curious.
You talk about mentoring...we provide FREE support from our instructors. Maybe we should advertise this better.
Please log in in our community forum where you will find me and the other instructors there to help you.

Interesting.
This was your first post.
Founder and Lead Author of eLearnSecurity
Training for Penetration Testers
http://www.elearnsecurity.com

Founder of HACK.ME Free community based web app security virtual labs
https://hack.me
<<

SephStorm

User avatar

Hero Member
Hero Member

Posts: 569

Joined: Sat Apr 17, 2010 12:12 pm

Post Sun Dec 19, 2010 9:13 pm

Re: eLearnSecurity opinions?

He may be referring to vulnerability scanning. Many companies perform scanning, but do not allow full on penetration testing.
sectestanalysis.blogspot.com/‎
<<

MaXe

User avatar

Hero Member
Hero Member

Posts: 671

Joined: Tue Aug 17, 2010 9:49 am

Post Mon Dec 20, 2010 5:27 am

Re: eLearnSecurity opinions?

pentestnoob wrote:I just have to add my $.02 after reading these posts. I purchased this course from eLearnsecurity and, being a beginner pentester, I find that it is MUCH more challenging to actually do this stuff than first thought. In my duties and speaking to many of the folks in the business, we spend the bulk of our time searching for vulnerabilities. This course "does" teach that, but it also attempts to focus on exploiting the vulnerabilities. In a typical engagement, I have not been asked to attempt to exploit a production system.

That being said, I have found that I was better off mentoring with a senior pentester than what I got from the slideshow that is this course. I never could get any of the exploits to work and honestly did not feel that I got much help, nor did I feel that it was worth $600 bucks for slides. Use your best judgment - it's especially tough with not too much on the market of this type of on-line training.

Good luck!


Realistic penetration testing, includes exploitation of the target but usually on a cloned network or not mission critical equipment / production equipment. (It wouldn't be good, if the server crashes while people are working.)

If you don't perform any actual attacks, it's rather a vulnerability assessment, because if you can only "guess", based on version banners and heuristics, that a target may be vulnerable, then you're just guessing and assuming the version banners are right, which can be easily spoofed / changed. (Security by obscurity, fools some people.)

Guessing that a target is safe, is not equivalent to that it really is. In some pentests, I did them after work hours to evade problems in case the server(s) shut down by accident (it can happen, even if you're very careful). In others it was possible for me to replicate parts of their services locally and then pentest those (hunt for bugs), and in case I found a bug (especially in web apps), it would be possible to confirm the bug and report it.
I'm an InterN0T'er
<<

sil

User avatar

Hero Member
Hero Member

Posts: 551

Joined: Thu Mar 20, 2008 8:01 am

Location: ::1

Post Mon Dec 20, 2010 10:07 am

Re: eLearnSecurity opinions?

MaXe wrote:Realistic penetration testing, includes exploitation of the target but usually on a cloned network or not mission critical equipment / production equipment. (It wouldn't be good, if the server crashes while people are working.)


Sorry I have to disagree with this MaXe and ultimately it all boils down to your SOW between you and your client. Trying to mimic a target is a bad move since you will unlikely be able to obtain an exact replica, patch revisions, installed software, system configurations.

In the last 4 years that I remember with clarity, I've performed to the tune of 50+ active zero knowledge tests with the vast majority of those have the go ahead to perform full exploits. Want to know how many services I crashed? None. This is because of me testing parameters in labs time and time again. Prior to going on a clients machine blindly, I know which tools are noisy, which tools consume a lot of resources (HP Webinspect anyone?) and when to use them.

From my point of view: "You wouldn't use a sledgehammer to drive a nail would you?" It boils down to understanding what tools do what, which are good alternative tools to use, how to attack your target.

The whole: "you may crash the server" is a moot point and it needs to be understood by the client: "Do you think an attacker from China (Advanced Persistent Annoyance) is going to worry about crashing your server?" A good tester from my POV will illustrate the risk of NOT being allowed to perform a REAL test. A good tester will also know what works and what doesn't. What offsets to use (timing variables, iffy exploits, etc.)

Most of the exploits one can find or write on their own will often contain information about the exploit and whether or not USING the exploit will leave a service unusable. It's up to the tester to weed out those exploits and NOT use ones that will crash services. This is my two cents.

Long ago it was a common popular belief that: "well if I clone their W2K, NT4 machine, run this exploit in my lab... It should run on their machine... Autopwnage!" This would be inconsistent with reality. You could never know what say Windows Updates a server has on it, what's in their IIS/ASP/C# pages to mimic a machine to exactness. What you'd be doing is selling them a pentest of YOUR server under the theory that: "if it affects mine, it can affect yours"
<<

MaXe

User avatar

Hero Member
Hero Member

Posts: 671

Joined: Tue Aug 17, 2010 9:49 am

Post Mon Dec 20, 2010 10:16 am

Re: eLearnSecurity opinions?

sil wrote:Long ago it was a common popular belief that: "well if I clone their W2K, NT4 machine, run this exploit in my lab... It should run on their machine... Autopwnage!" This would be inconsistent with reality. You could never know what say Windows Updates a server has on it, what's in their IIS/ASP/C# pages to mimic a machine to exactness. What you'd be doing is selling them a pentest of YOUR server under the theory that: "if it affects mine, it can affect yours"


If they're using a Web Application which is freely available for download or purchase and you find a 0day in that, allowing you to get within the corporation from the outside world, the chance of that it works on the target network is high if there isn't any IPS's and / or WAF's imho :-) Of course, in some cases, configurations of the webserver, PHP, MySQL has to be taken into consideration, such as safe_mode, but even that can be broken in some versions.

But you're right that it's impossible to get exact replicas of machines really, since it doesn't stop at software level, it goes all the way down to the hardware and network equipment including configurations used.

Sorry for being unclear on my opinions, I didn't want to write an overly long reply where I might be misunderstood  ;D
Last edited by MaXe on Mon Dec 20, 2010 10:18 am, edited 1 time in total.
I'm an InterN0T'er
<<

caissyd

User avatar

Hero Member
Hero Member

Posts: 894

Joined: Thu Dec 31, 2009 11:20 am

Location: Ottawa, Canada

Post Mon Dec 20, 2010 11:28 am

Re: eLearnSecurity opinions?

Hey,

I agree with both of you. I generally test web applications in a dev environment. I would normally find quite a few vulnerabilities. Once the developpers are done fixing them, I check again in dev before giving my "ok". Then, once in production, I test the application again in order to check the "production" problems and validate the whole package.

Being not experienced like sil, I was glad twice so far that I was working in dev...  ;D

But on the other end, I always found something in prod after (mainly configuration issues).

So for me, test a clone/copy image first (if you have this luxury) then validate in prod.
OSCP, GPEN, GWAPT, GSEC, CEH, CISSP
(aka H1t.M0nk3y)
PreviousNext

Return to eCPPT - eLearnSecurity Certified Professional Penetration Tester

Who is online

Users browsing this forum: No registered users and 1 guest

cron
.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software