sil

  • sil replied to the topic Nmap Grep Help in the forum Programming 9 years, 6 months ago

    Should have added the example beforehand:

    # more nmap.scanned
    # Nmap 6.00 scan initiated Mon May 21 16:56:39 2012 as: nmap -sS -p 80,442 -oG nmap.scanned 10.4.4.72
    Host: 10.4.4.72 (kenji.infiltrated.net) Status: Up
    Host: 10.4.4.72 (kenji.infiltrated.net) Ports: 80/open/tcp//http///, 442/closed/tcp//cvc_hostd///
    # Nmap done at Mon May 21 16:56:41…[Read more]

  • sil replied to the topic Nmap Grep Help in the forum Programming 9 years, 6 months ago

    Your cat is what is known as a UUOC https://www.google.com/search?q=uuoc You don’t need it.

    # cat nmap.scan | grep http
    80/tcp  open  http
    443/tcp closed https

    # grep http nmap.scan
    80/tcp  open  http
    443/tcp closed https

    When using awk, you won’t even need to bother with grep either:

    # awk ‘/http/’ nmap.scan
    80/tcp  open  http…[Read more]

  • @24772433 wrote:

    Should pentesters be runing these types of exploits against live servers? Sure, I understand any Ethical hacker worth his salt will go at great length to explain the risks involed with testing in a production environment and the need for system backups, and no doubt there will be wording in any agreement to this effect, but should…

    [Read more]

  • sil replied to the topic CISSP ISSAP in the forum General Certification 9 years, 6 months ago

    Nah its all good 😉 Personally I think the comment will answer any question anyway. I just did an interesting “Partial Pentest” at a financial house’s videoconferencing/VoIP infrastructure. Monda/Tues/Wed. Partial because they did an OMFG and called a time out. Requester: Snake Oil “the boogeyman is coming” CRISC, CISSP, CEH *yawn* *yawn*…[Read more]

  • sil replied to the topic CISSP ISSAP in the forum General Certification 9 years, 6 months ago

    ISACA is actually oldschool (60s or something) and focused almost exclusively on auditing. They are more granular than ISC but they too are altogether like a nutty professor (scatterbrained). So… ISC2 10 miles wide 2 ft deep… ISACA = 2 FT wide and ten miles deep. ISACA will focus more on the business equations of security, compliance and…[Read more]

  • sil replied to the topic CISSP ISSAP in the forum General Certification 9 years, 6 months ago

    @alucian wrote:

    🙂
    For someone who is not interested in isc2 you know a lot about them  ;D

    I probably know as much about ISC as their own board of directors know about them 😉 I know a lot of people who have developed stuff for them, are authorized trainers, content providers, and so on. I also know (and I mean physically have met, know) many…[Read more]

  • sil replied to the topic CISSP ISSAP in the forum General Certification 9 years, 6 months ago

    @sil wrote:

    I should mess with ISC and nominate myself then have all my friends nominate me for their ISLA awards (awards.isc2.org)

    While doing so, try to do it using my moniker/nick instead of my name. That would just be funny

  • sil replied to the topic CISSP ISSAP in the forum General Certification 9 years, 6 months ago

    I should mess with ISC and nominate myself then have all my friends nominate me for their ISLA awards (awards.isc2.org)

  • sil replied to the topic CISSP ISSAP in the forum General Certification 9 years, 6 months ago

    Firstly. congrats on the pass. Now on to the rambling 😉

    ISSAP and even ISSEP material can be covered almost exclusively by experience with design and architecture experience (building networking, systems, interconnections). Another one of the reasons why I always tell people to learn everything from the ground up not solely web based stuff, not…[Read more]

  • @jason wrote:

    I’ve been listening to alot of these guys lately:

    Man… I use Gunther 😉 Tra-la-la

  • sil replied to the topic CEH and other questions in the forum Security 9 years, 6 months ago

    I prefer to stick with networking, programming and systems based reading. For the most part, there are under one handful of books that are alright when it comes to pentesting. The problems I have are:

    1) Content is tailored for your reading pleasure
    In most books, they’re using loaded examples. Similar to shooting fish in a barrel. What are you…[Read more]

  • sil replied to the topic CEH and other questions in the forum Security 9 years, 6 months ago

    @omegaflare wrote:

    Now I am focusing on Offensive Warfare as my main specialty. So I want to specialize in Penetration Testing and get licensed. I want to get certified in OSCP, or LPT.

    Get licensed by whom? In a conventional licensing scheme, one takes exams and is certified by a governing body who sets forth parameters of checks and balances…[Read more]

  • @ajohnson wrote:

    The official guide was an extremely difficult read. It felt like it was hundreds of pages of bullet points, and it’s hard to tell if that resource was of any value. It’s been a couple years though, so maybe that’s better now.

    Hrmm yea… No its not better. I often got tunnel vision going through CISM stuff and wasn’t sure if I…[Read more]

  • My suggestion is to file a stalking and harassment report with your local authorities. They will (theoretically) be in a better position to assist you. Anything anyone does will likely tamper with potential evidence should you want to go to the legal system so if your ultimate goal is to that (somehow seek prosecution), then literally call the…[Read more]

  • sil replied to the topic CPTE Vs CEH in the forum Network Pen Testing 9 years, 7 months ago

    @jason wrote:

    Someone should offer an astroturfing certification (Perhaps the Astroturfing Super Specialist?). Then there would be a standard to measure against when hiring these folks and we wouldn’t have to suffer through unfortunate incidents like this.

    Then have those with the ASS certification would need to follow strict RMBSS guidelines…[Read more]

  • The overall goal was to keep it symmetric and working across the differing platforms:

    # uname -a
    FreeBSD kenji 9.0-RELEASE FreeBSD 9.0-RELEASE #0: Tue Mar 20 10:42:10 EDT 2012    root@kenji:/usr/obj/usr/src/sys/SARU  i386
    # netstat -t
    netstat: illegal option -- t

    -t never works on any BSD nor Solaris and in HPUX it wouldn’t work either. I th…[Read more]

  • Maxe +1 at the Snowflake remix. As far as the rap is concerned, reminded me of when I lived in Sweden and would listen to Petter 😉

    K since dynamik named names here is a brief list of whats on my laptop:

    Assembage 23
    VNV Nation
    KMFDM
    Vinny Paz
    Jedi Mind Tricks
    Immortal Technique
    Slaine
    DJ Kentaro
    Beborn…[Read more]

  • His interrogators were surprised to find that hidden in his underpants were a digital storage device and memory cards

    Utter stupidity… Had he simply kept it in his pocket, they’d of likely NOT looked at it and brushed it off as porn. Had they wanted to TRULY keep it secret, they’d of posted it to something like the Pirate Bay under a random…[Read more]

  • @ZeroOne wrote:

    I have a good background of ISO so decided to take the CCNA course, is that a good start to get into the second level in network field? And would that be enough to move to network security?

    A CCNA will give you enough to become a minor router admin and is not enough to get into security. Networking is important as a whole as it…[Read more]

  • Load More

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?