Forum Replies Created
-
AuthorPosts
-
-
June 20, 2013 at 9:47 pm #53147
cd1zz
ParticipantAll of my physical testing at data centers has been unsuccessful. They pretty much have the physical part figured out so the easy stuff wont work. The only time we had “some success” was when we used some pre texting with it. I had “momentary” access and then was quickly escorted out.
-
June 18, 2013 at 1:51 pm #53125
-
June 14, 2013 at 2:15 pm #53123
cd1zz
Participantlooks like -m 3100 will get it done in hashcat
-
June 13, 2013 at 9:44 pm #53120
cd1zz
ParticipantNo matter how bad you root a company up, you have to find some good and tell them about it. You can also spin the bad findings and say things like “it’s a good thing we caught this before someone else did” or “the good news is that these issues are easy to fix.” Reporting style is important too. You cannot get emotional, your report should be based on data and be very matter of fact. Keeping the tone of the report this way is easier for people to digest.
-
May 9, 2013 at 2:47 am #52925
cd1zz
ParticipantThis is kind of a tough situation because most of these products are crappy. Burp is the best, but only for one site at a time. It doesn’t do well even with large, single sites.
The problem you’re going to face is that the “right” product you find that can handle such a huge workload is probably going to give you the same marginal results, at best.
The only product that really comes to mind that you might want to consider is Nexpose. It does web app scanning, although I’m not sure how well, and it can get pricey but it’s worth a look. You can schedule and it seems to perform well on larger engagements. I was also going to say appscan but you already don’t like that product.
-
May 8, 2013 at 11:23 pm #52923
cd1zz
ParticipantAppscan is like 30K and up, is that an option?
-
May 8, 2013 at 1:42 am #52917
cd1zz
ParticipantIf you got every box, you should be good. No idea what this other challenge is you’re talking about. My advice is to sleep well before and knock off the easy stuff first in the challenge.
-
May 1, 2013 at 8:17 pm #52889
cd1zz
ParticipantNice work!!
-
April 30, 2013 at 12:58 pm #52881
cd1zz
ParticipantYour path will be unique, but as long as you achieve your milestones you can get there. To begin, those milestones should be certs. You certainly don’t need a college degree to pentest, some of the best don’t have a degree. My personal opinion is that if you can find a IA or IS degree that is a balance between “credibility” and cost, it cant hurt. Who knows, in 10 years you may need that college degree for some type of management gig.
To over simplify the process, and if money is no object here is how I would do it:
CCNA or MCSE -> GPEN -> OSCP …
You will need to learn how to troubleshoot, that is probably the most important skill that does not come with a cert. As an electrician, you probably already have a knack for this. The ability to quickly analyze and fix issues is imperative.
-
April 29, 2013 at 11:56 pm #52876
cd1zz
ParticipantThis is probably the most common question here. Seems it comes up at least every week or two, search around and you’ll find the same answers on each one.
Where are you located? Depending on your current salary, the strategy may be different.
-
April 25, 2013 at 1:34 pm #52839
cd1zz
ParticipantFirst of all, “Backtrack” has a million tools on it, you need to know which tool to use for the task at hand. Otherwise its like trying to screw in a bolt with a tool box.
For OWASP, the likely tool to begin with is Burp. The “wireless grid” has no impact on OWASP, that is simply the network medium.
You can start here: http://www.securityninja.co.uk/hacking/burp-suite-tutorial-the-intruder-tool/
You cant just “run commands” an expect magic to happen. Web apps are usually custom written, so you need to know what you’re looking for and subsequently plan your next steps. Learn about what each of the top 10 really mean.
Go read this book cover to cover: http://www.amazon.com/The-Web-Application-Hackers-Handbook/dp/1118026470/ref=sr_1_1?ie=UTF8&qid=1366896847&sr=8-1&keywords=web+application+hackers+handbook
-
April 25, 2013 at 1:02 pm #52818
cd1zz
ParticipantKeepass
-
April 18, 2013 at 4:03 pm #52725
cd1zz
Participant20% is a pretty big hit, but depending on where you are now, you could make it up. Feel free to PM me with specific numbers and I can give you a better idea (at least at US rates).
App security is exploding just like the rest of security. There are companies that will allow you to stay as a practitioner by doing something like this: associate -> consultant -> senior consultant -> principal or super senior, or whatever the term is.
It really depends on what you’re trying to accomplish. If its for the love of the work, or if its to try and position your self for another position in 5 years, whatever, MY advice would depend on a number of other factors.
-
April 10, 2013 at 1:31 pm #52385
cd1zz
ParticipantThey’re both awesome for pen testing. Core impact has exploits in it that are not public and Meta Pro can help automate large pentests, it is a phishing platform and does some other stuff. Not sure about web app scanning, I doubt it. That would be be creeping into their other product, Nexpose. I always turn the Nexpose spidering/scanning option off. In my opinion, web app scanners are only as good as the guy using it. Burp is the only option + someone who knows what they’re doing.
For network, you need a good vuln scanner. I like Nexpose. However, there are a billion vulns that dont show up in a vuln scanner either. Again, it depends on the person driving. I guess what I’m saying is that you need multiple tools. Meta pro and core are expensive, the rest are not. What you give up in the pro, you can make up with old school metasploit.
-
April 6, 2013 at 11:19 pm #52378
cd1zz
ParticipantI completely disagree. Just gave Acunetix another shot this week on a client and hate it even more. Worst. Product. Ever.
If all you need are pretty reports with false positives, Acunetix is your tool.
-
-
AuthorPosts