El33tsamurai

Forum Replies Created

Viewing 14 reply threads
  • Author
    Posts
    • #53806
      El33tsamurai
      Participant

      Welcome, always nice to have new people around. OSCP, awesome class ;D

    • #47111
      El33tsamurai
      Participant

      Using the ElearnSec for work, their stuff is great.

    • #47109
      El33tsamurai
      Participant

      Quick update:

      March 2014 two years later, still never got the class. Don did do right by me, but if this is how they treat members of the info sec community not show how they are still in business.

    • #52052
      El33tsamurai
      Participant

      Just back from DerbyCon 3.0 some great presentations this weekend. The CTF was lots of fun as well. Who went? What did you think? Did you try the CTF? Favorite presentations?

    • #53440
      El33tsamurai
      Participant
    • #53396
      El33tsamurai
      Participant

      http://hackeracademy.com/
      Pro $49 a month student discount.

      http://www.offensive-security.com/information-security-training/penetration-testing-with-backtrack/
      Offensive Security $200 a month.

      http://www.securitytube-training.com/online-courses/securitytube-metasploit-framework-expert/index.html
      Security Tube $200 a month

      His $100 to $300 pending what you need.

      There are many things out there that are free though:

      Packet Analysis
      http://www.cloudshark.org/
      http://www.netresec.com/?page=PcapFiles

      SQL Inject
      https://www.pentesterlab.com/exercises/
      https://github.com/Audi-1/sqli-labs

      Different Kinds Combo
      http://www.mcafee.com/us/downloads/free-tools/
      https://www.hacking-lab.com/Remote_Sec_Lab/vdi.html
      http://vulnhub.com/

      Many different things out there to to choose from. Settle on one and you can lose out on a lot, make sure to look around and search. I have more links if you needs something specific.

    • #53420
      El33tsamurai
      Participant

      What have you tried from your research already, such as things found on good? Don’t want to share something that you have tried already.

    • #53390
      El33tsamurai
      Participant

      There are rumblings out there about his ethics, one such thing is the “borrowing” of security related training material and calling it his own. Not saying its true or not but might want to do some research before signing up.

    • #53384
      El33tsamurai
      Participant

      Just some questions for you so that any suggestions are not redundant on what you already seen. Any education on the subject self taught or education institutes? Any books or online resources you have already read?

    • #53367
      El33tsamurai
      Participant

      Do you have a PDF copy? Maybe a teaser chapter for us to read?

    • #52045
      El33tsamurai
      Participant

      I am going as well, anyone else coming?

    • #53347
      El33tsamurai
      Participant

      Why pay for old when you can get new 😀

    • #53361
      El33tsamurai
      Participant

      Have you done research on this? What have you found so far?

    • #53342
      El33tsamurai
      Participant

      Hello,

      I was going to post this morning about the OSCP, contacted them yesterday and got this:

      Dear El33tsamurai (edited :-D)

      Thank you for contacting us.

      Unfortunately, we do not have a release date for the upgrade from BT to Kali. We estimate that it will be completed before the end of 2013, but there is no guarantee.

      Any updates will be posted in our blog at http://www.offensive-security.com/blog/, so stay tuned!

      Keep us updated if you require additional information.

      Sincerely,

      The Offensive Security Team
      http://www.offensive-security.com

    • #53324
      El33tsamurai
      Participant

      @UKSecurityGuy wrote:

      The issue with scopes for most security professionals at the moment is that the analysis piece is rarely ever done,

      some random paper-based security manager

      who doesn’t really understand the techology, network or threat actors defines the scope, which is then just repeated ad-hoc every single year, making the entire testing next to useless.

      Above is the biggest issue underlined and in bold.

      We have 3 ways the security manager can go:

      1. Understands current information security needs, he/she keeps up with info sec on a day to day basis. Pretty much an all around info sec manager that you want.

      2. A person that has been working info sec since the 80 to 90’s, no don’t me wrong these people can fall under option 1 but some of them do not. All they try to do is what they learn in the early parts of their info sec career, which they try to apply in today’s world ??? . Which causes issues like “who doesn’t really understand the technology”, their biggest problem is they think they know everything about info sec (we all know, you can never know everything about info sec and when you do think so, you are in the wrong career!), they are in charge, and last but most often to happen they don’t want to listen to anyone under them, or when they do they take the credit for the idea.

      3. The big company wants a “manager” in charge of the department. time and time again I have seen people that know nothing about info sec but become info sec managers because they have the management experience.

      By no am I saying this is what happens 100 percent of the time, and not trying to upset anyone but this is what I have noticed.

Viewing 14 reply threads

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?