Forum Replies Created
July 15, 2015 at 2:21 pm #54210
Glad to hear there is work on a different distro of hacking tools.
As with ANY distro, a high level of cynicism should exist amongst adopters. It is simplistic to include malicious (or simply annoyance) code that is undesirable in any setting. As I mentioned in my book, I always recommend installing the apps you want on your hacking system; that way you avoid bloat, questionable “administration tasks” and apps running behind the scenes.
This is how paranoid I am… I wait about a YEAR before I upgrade to the latest Kali / Backtrack. That way, others can find any bad apps before I migrate over.
November 1, 2014 at 7:31 pm #53824
So here’s the deal, and I think you’re missing the point –
There are multiple attack vectors we (as instructors) want to provide our students. One attack vector is the process we use as pentesters to exploit known vulnerabilities with exploitable code, which can seem simplistic – find a vulnerable system, run metasploit, own the box. This is true for older systems and new OSes with zero-days. So when we teach students this technique it’s easier to demonstrate against a box with multiple exploits on it.
Let me say this another way. Would you rather learn about a single known exploit against a new OS, or learn about 20 different exploits that behave differently (language packs, injection techniques, etc.) on an older system? By learning multiple exploits on older systems, you learn some of the specifics surrounding each type of exploit and why some work better than others. Showing you a new system with a few number of exploits is actually a worse instructional tool than one with a lot of exploits – not only do you learn different types of attacks (against different services), you learn the history of attacks and which services tend to be more exploitable as time progresses.
Using Windows XP as an target is definitely a good way to teach people how to exploit systems. It shouldn’t be the final step in teaching pentesting techniques, but there is a lot to learn from older, exploitable systems during your journey.
October 11, 2014 at 11:14 pm #53934
October 10, 2014 at 5:05 pm #53922
Did I hear my name? 😉
To the OP… There are entry-level pentesting jobs available – the job market is sooo short of security professionals that I’ve even seen jobs in the pentesting field asking for anyone with a college degree in IT or networking, and the business would teach them the ropes personally.
That said, entry level salaries aren’t 6 figures. I would even say that entry level network security jobs RIGHT NOW are paying slightly higher than entry level pentesters, if you need to take salary into consideration. If not, the top tier pay for pentesters is solidly in the 6 figure range, so long term it is a great field to get into.
Having a CEH is a fine start, and will get you past the HR filters. However, it is the hiring manager that you actually have to convince to hire you. That’s where experience and other courses come into play. Other courses provide you with the hands-on experience… you just have to decide which ones fit your needs.
Since someone already mentioned my course, let me explain how it works. The course isn’t designed to teach to exams – it’s designed to give students hands-on experience on how to conduct a pentest and become a professional penetration tester. We cover methodology and concepts that include deep-dive discussions… like “how does nmap ACTUALLY conduct network discovery… what are the packets it sends out.” We do this so that the students don’t focus on a tool, but rather pick the appropriate tool based on their current situation within the pentest (for those who don’t know (and sticking with my earlier reference to nmap), nmap scans have very obvious signatures and are easy to block with an IPS).
That said, having the CEH is a good start, but you need to know the intricacies of the business to be able to convince the hiring manager you are a professional, and not just a paper tiger.
I hate programming. I cut my teeth using perl as a sysadmin, and rarely wrote more than 20 lines of the stuff. From my experience, coding isn’t required. It helps, but isn’t necessary. Scripting, on the other hand, is invaluable.
Hope this helps.
October 10, 2014 at 4:44 pm #53931
As the author of the challenge, I can tell you that part of the challenge revolves around network scanning – I’m giving up some of the challenge for you by saying this, but ICMP is turned off on the image so your ping definitely won’t work.
October 10, 2014 at 4:37 pm #53942
You could look at HackingDojo.com (yes, I run it, so this is a bit of a bias recommendation).
We have lessons, a lab, and live interaction with an instructor if you have questions (via Skype messaging and desktop sharing as needed).
August 13, 2014 at 4:25 pm #53881
That’s very odd. At this point, I’ll have to write it off as an issue with Win8 or configuration of the VMware app.
I don’t have access to a Win8 machine – if you (or anybody else) figures out what the issue is, or a solution to these, please let me know either here or directly at infoat/hackingdojodot/com.
Thanks for letting me know about this.
– Tom W.
August 13, 2014 at 2:14 am #53878
Can you send me your .vmx file? Also, what host OS are you using?
August 13, 2014 at 12:01 am #53876
Where did you download it from?
August 12, 2014 at 3:25 pm #53858
Why not both?
I started out on the defensive side, and stayed there for about 15 years. Afterwards, I moved onto the offensive side, which I’ve been doing for almost 10. The first 15 years of sysadmin work was a huge benefit for my work in the pentesting field.
I’m also sure that you could flip the scenarios and start out offensive, then move to defensive, which should improve your game on the defensive side.
In short, I don’t think the road has to be divided, but could be intersecting throughout your career.
July 31, 2014 at 6:22 pm #53848
On the front page, just above the “Buy Now” button. Sorry for the smaller font… I tend to get annoyed with web sites that blast info at you in large fonts and bright colors to get people to click on their products, so I keep my sites somewhat subdued. However, the prices are there.
Let me know if you have any further questions.
June 19, 2013 at 3:12 am #53136
I will be there as well – make sure you stop by the “Be the Match” booth in the contest area and say “hi”… and perhaps sign up for the National Bone Marrow Donor registry (which just requires filling out a form and swabbing the inside of your cheek).
May 19, 2013 at 4:48 pm #52981
It has gotten soooo bad, that almost nobody understands how to even use a command line. I had a student at the University ask me “why do I have to put spaces between the words” when running a command with flags.
Definitely learn Linux and scripting (bash, korn, csh, or whichever you prefer). At the minimum, it will get you a deeper understanding of troubleshooting a system or remote administration. I hate GUIs.
May 19, 2013 at 4:42 pm #52993
Those things you mentioned will help get you the knowledge, which is probably the better direction to start (than say perhaps getting your CEH first and then learn how to hack later).
However, down the road you will probably want to start looking at any of the DoD 8570 certs as well, to get past the HR filters.
jjwinter’s questions are extremely relevant; answering those will give you a better idea of what area to focus on, since there are so many different sub-topics within this field (and a ton of knowledge to go with).
May 17, 2013 at 7:33 pm #52968
You can get a job in the pentesting field with no pentesting experience, but harder to do without IT or networking – not impossible.
Be aware that the CEH will get you past the HR filters when applying for a job, but means almost nothing to a hiring manager who is more interested in your ability to use a methodology, your knowledge of protocols and how to exploit them, and your fu with the different tools. That said, get your CEH but spend most of your time learning how to pentest, not just how to use the tools.