cd1zz

Forum Replies Created

Viewing 14 reply threads
  • Author
    Posts
    • #53147
      cd1zz
      Participant

      All of my physical testing at data centers has been unsuccessful. They pretty much have the physical part figured out so the easy stuff wont work. The only time we had “some success” was when we used some pre texting with it. I had “momentary” access and then was quickly escorted out.

    • #53125
      cd1zz
      Participant

      @m0wgli wrote:

      @cd1zz wrote:

      looks like -m 3100 will get it done in hashcat

      https://hashcat.net/forum/thread-1051-page-2.html

      AFAIK, 3100 is for Oracle 7-10g. Oracle 11g is 112.

      Yep, you’re right!

    • #53123
      cd1zz
      Participant

      looks like -m 3100 will get it done in hashcat

      https://hashcat.net/forum/thread-1051-page-2.html

    • #53120
      cd1zz
      Participant

      No matter how bad you root a company up, you have to find some good and tell them about it. You can also spin the bad findings and say things like “it’s a good thing we caught this before someone else did” or “the good news is that these issues are easy to fix.” Reporting style is important too. You cannot get emotional, your report should be based on data and be very matter of fact. Keeping the tone of the report this way is easier for people to digest.

    • #52925
      cd1zz
      Participant

      This is kind of a tough situation because most of these products are crappy. Burp is the best, but only for one site at a time. It doesn’t do well even with large, single sites.

      The problem you’re going to face is that the “right” product you find that can handle such a huge workload is probably going to give you the same marginal results, at best.

      The only product that really comes to mind that you might want to consider is Nexpose. It does web app scanning, although I’m not sure how well, and it can get pricey but it’s worth a look. You can schedule and it seems to perform well on larger engagements. I was also going to say appscan but you already don’t like that product.

    • #52923
      cd1zz
      Participant

      Appscan is like 30K and up, is that an option?

    • #52917
      cd1zz
      Participant

      If you got every box, you should be good. No idea what this other challenge is you’re talking about. My advice is to sleep well before and knock off the easy stuff first in the challenge.

    • #52889
      cd1zz
      Participant

      Nice work!!

    • #52881
      cd1zz
      Participant

      Your path will be unique, but as long as you achieve your milestones you can get there. To begin, those milestones should be certs. You certainly don’t need a college degree to pentest, some of the best don’t have a degree. My personal opinion is that if you can find a IA or IS degree that is a balance between “credibility” and cost, it cant hurt. Who knows, in 10 years you may need that college degree for some type of management gig.

      To over simplify the process, and if money is no object here is how I would do it:

      CCNA or MCSE -> GPEN -> OSCP …

      You will need to learn how to troubleshoot, that is probably the most important skill that does not come with a cert. As an electrician, you probably already have a knack for this. The ability to quickly analyze and fix issues is imperative.

    • #52876
      cd1zz
      Participant

      This is probably the most common question here. Seems it comes up at least every week or two, search around and you’ll find the same answers on each one.

      Where are you located? Depending on your current salary, the strategy may be different.

    • #52839
      cd1zz
      Participant

      First of all, “Backtrack” has a million tools on it, you need to know which tool to use for the task at hand. Otherwise its like trying to screw in a bolt with a tool box.

      For OWASP, the likely tool to begin with is Burp. The “wireless grid” has no impact on OWASP, that is simply the network medium.

      You can start here: http://www.securityninja.co.uk/hacking/burp-suite-tutorial-the-intruder-tool/

      You cant just “run commands” an expect magic to happen. Web apps are usually custom written, so you need to know what you’re looking for and subsequently plan your next steps. Learn about what each of the top 10 really mean.

      Go read this book cover to cover: http://www.amazon.com/The-Web-Application-Hackers-Handbook/dp/1118026470/ref=sr_1_1?ie=UTF8&qid=1366896847&sr=8-1&keywords=web+application+hackers+handbook

    • #52818
      cd1zz
      Participant

      Keepass

    • #52725
      cd1zz
      Participant

      20% is a pretty big hit, but depending on where you are now, you could make it up. Feel free to PM me with specific numbers and I can give you a better idea (at least at US rates).

      App security is exploding just like the rest of security. There are companies that will allow you to stay as a practitioner by doing something like this: associate -> consultant -> senior consultant -> principal or super senior, or whatever the term is.

      It really depends on what you’re trying to accomplish. If its for the love of the work, or if its to try and position your self for another position in 5 years, whatever, MY advice would depend on a number of other factors.

    • #52385
      cd1zz
      Participant

      They’re both awesome for pen testing.  Core impact has exploits in it that are not public and Meta Pro can help automate large pentests, it is a phishing platform and does some other stuff. Not sure about web app scanning, I doubt it. That would be be creeping into their other product, Nexpose. I always turn the Nexpose spidering/scanning option off. In my opinion, web app scanners are only as good as the guy using it. Burp is the only option + someone who knows what they’re doing.

      For network, you need a good vuln scanner. I like Nexpose. However, there are a billion vulns that dont show up in a vuln scanner either. Again, it depends on the person driving. I guess what I’m saying is that you need multiple tools. Meta pro and core are expensive, the rest are not. What you give up in the pro, you can make up with old school metasploit.

    • #52378
      cd1zz
      Participant

      I completely disagree. Just gave Acunetix another shot this week on a client and hate it even more. Worst. Product. Ever.

      If all you need are pretty reports with false positives, Acunetix is your tool.

Viewing 14 reply threads

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?