Forum Replies Created
February 7, 2012 at 12:22 pm #45767
Exactly what Maxe point out … for example, reading RFCs and being expert in one or few protocols is my point of topic. I have done some team-work pen tests and what I can say is, that there are a lot of basics, working with out-of-box tools, using msf, core impcat, nessus. I think those tools should be used by security engineers inside company.
I would think you can specialize in say Wireless communications, this would include Wi-Fi, Bluetooth and RFID.
I don’t think so. Wireless communications are much more than Wi-Fi, BT etc. For example, there are some known attacks on GSM and GPRS. You can attack it with available technology but this is not black-box expertises. Being that mean, that you can built your own attacks or slightly diverse current attacks. Both demand great knowledge in cryptography (specially in stream ciphers), cryptanalysis and also sound knowledge in physical quantities.
But trying to freelance, it may be much more difficult to get work.
This can be a matter of discussion. Anyway I think that being black-box http://en.wikipedia.org/wiki/Black_box expert should give you more work as freelancer.
December 22, 2011 at 8:57 pm #44700
If I understand that right, you want the traffic needing to be watched to go out over the exiting WAN connection without going through the existing border router? can you create down time to set things up?
Also I have time to set-up things, it’s not continuous process 24/7. For the beginning would be ok, if the device (tap) could have option to save filtered traffic and send it via smtp on every X hours. In that way the device could be plugged directly in current switch. Ofcourse I don’t know if I get such smart Tap device (having laptop in rack for that is not an option).
December 16, 2011 at 3:30 pm #44697
October 17, 2010 at 11:54 am #35507
I have tried Maltego V3, great tool.
One questions: Is it possible to get a good book which will teach python from basic, but has to be focused more on python scripting for data, text and web mining?
October 4, 2010 at 11:00 am #34864
When do you think, will courses/tutorials/reviews go forward with wireless security?
I still see a lot of contents about WEP cracking and easy bluetooth trick. I think that today to much people use WPA2 and producer’s added protections.
There are more and more apps for mobile phones, mobile OS, business wireless technologies etc. Maybe I’m wrong but I think that pentesting on wireless should be more focused on new softare/hardware standards.
October 4, 2010 at 10:49 am #35504
Googling with “Open Source IG” has given me lots of results. It kept me busy for weekend. 8)
Before posting I was wondering how to go “beyond” information gathering, since I’m doing OSCP and already saw Chris Gates presentation.
So thanks for replies, they have given me more to work on.
September 11, 2010 at 5:30 pm #21043
Does anyone know when will 3rd edition be released?
August 27, 2010 at 10:57 am #33789
I think about protecting on Operator Work station and HMI Web/DB server level. I believe (but i don’t know yet) that Operator Work station isn’t segregated from corporate network at small local plants in my area.
August 26, 2010 at 8:21 am #34567
Is metasploit banned at OSCP exam? I find metasploit auxiliary scanners quite useful.
August 26, 2010 at 8:02 am #33786
I have heard lot about Suricata…Maybe they should set up web forum for users and those who want to give it a try. Also some tutorials would be great.
I plan to start with OSSIM in next two months. I will need to buy one used machine for that purpose. Otherwise I always read documentation first and look for some good tutorial or reviews.
One more question: Did anyone work on securing SCADA? What I mean is a small scada, which runs in small facilities. It is possible, that I will work on one project about protecting SCADA environtmen. For now I was thinking about implementing Host IDS and remote logs reading.
July 30, 2010 at 2:04 pm #34022
What do you think about ISO/IEC 27001:2005 ? After passing final exams, participants receive accredited certification with title “Information Security Manager” and “Information Security Auditor”.
July 25, 2010 at 2:15 pm #33887
Thank you both for advice.
I decided to take PWB online course. I have read some topics about PWB online course and all things were so positive. I haven’t had any experience with online learning. So it will be something new.
I have one basic question about pre-made Backtrack VMware image. Do I have to use it, or can I use my already installed Backtrack 4 Final Release on my computer?
July 22, 2010 at 9:31 am #33884
It looks like PWB-online from offensive security is the best option. I agree, courses in our area are overpriced. I would like to take one of available courses which could show me, how to made depth pentest on network with 20-30 hosts with fail/smtp server from start to end.
July 21, 2010 at 3:11 pm #33882
I forgot to mention that I’m interested for “live” course with tutor in the room. I’m looking for course which will take place in Austria/Germany/Italy.
If I took a course from offensive-security online, I would take “PWN”. This one also looks good: http://www.ssr-i.com/courses/certified_penetration_testing_consultant.html
July 18, 2010 at 5:32 pm #33783
Thanks for response. Yesterday I set up Ossec HIDS, but I’m not sure if it is useful. Modern internet security programs have some kind of “hids” already built in. And I think that HIDS is only useful for client host.
I also played with HoneyBOT, and it is cool, but to easy in some way. Do you know any european producer of modern honeypots and honeypot’s like IDS software?
I checked OSSIM. It looks great. If I understood correctly, is all in one platform. But tell me, does make some program settings easier? Or will I have to spend few days configuring different programs which comes with OSSIM?