SlideShare a Scribd company logo
1 of 2
Download to read offline
PENETRATION TESTING

Pentester Career:
How to Begin
Someone starts with talking about degree, another says that
nothing except fundamentals matters. You can get some
significant part of whole knowledge before college even or do not
anything useful after degree even.

T

hat is not a talk about how your degree affects your skills, it does not affect, because
the practical skills might have something
with 'fundamentals' if they are on the same way
and lead you to the same goal. Not every country
has such educational institutes (maybe Germany
has). You are allowed to argue against both sides
or choose your own where there is a place to solve
different problems instead of misplacing them. This
case is often extended by certifications; it matters,
no doubt, especially when you know that someone
who hires you looks for it. However, you may find
another way to tell them you can manage with such
projects that depend on your additional skills such
as programming. I mean you can develop your
own tools/exploit by yourself, participate in opensource groups that aims it too, you can improve
some tool/exploitation mechanism or automatize
it, mix several tools, redevelop it even. It helps to
understand how OS components link and work together as well as break into system. In course of
debates which languages must be learnt, there are
two kinds that depend on OS (under Windows OS
– C/C++, Assembler, under Linux/RedHat/CentOS
– Python, Ruby). However, it does not mean you
should limit yourself to these languages, as a software develops with many other languages, software may have popular add-ons written by someStartKit 01/2013(01)

one who prefers .Net or have to use it.
Besides, do not forget you should not only develop something but pentest too. It does not mean
you should stop to improve your skills; there are
many out-of-box tools or solutions you have to
learn and use, like BackTrack. It must be a need to
improve or custom them in order to network, system or other specifications. Being a part of team,
like Hacker for Charity (http://www.hackersforcharity.org/), helps to collect all skills among system
security, network security, application security, etc.
On the another hand, getting forensics skills may
help too. Therefore, learning and practicing with
home networks, corporate sandboxes, bypassing
NAC, VLANs and finding loopholes in isolated segments that helps understanding stacks, buffer and
memory and their vulnerabilities. In addition, you
can learn specific technology such AVR: this kind
of programming involves a C/C++ knowledge as
well.
Anyway, first steps on this field might involve
reading books, but almost all of books (except Syngress Publishing house) are rewritten, redesigned
of each other that brings old techniques, and old
tools. So, it is better to find books such as shellcoders and grayhat-coders books and Pentest
guidelines (e.g. http://www.pentest-standard.org,
http://www.vulnapps.com/) and standards (NIST

Page 6

http://pentestmag.com
SP 800-42). As said earlier, you can not focus on
certain language, software or technology not to
end with pure knowledge. No one loves Delphi but
enough tools to research applications implement
Delphi libraries (and written too). You should collect information about every technology, system,
software from any possible sources:
•	 Infosecurity blogs, news (like http://www.vulnapps.com/ or http://exploit-exercises.com/)
•	 Books and ebooks (like The Art of Software Security Assessment, or The Art of Exploitation)
•	 Vulnerabilities domains (like http://www.exploitdb.com/)
•	 security conferences/events (each possible,
not only top known such DefCon)
•	 templates and charts (http://pentestmonkey.
net/category/cheat-sheet)
•	 special guidelines and frameworks (like OffSec
guidelines)
It is quite important to have all of these (and not
only them) skills, because the key difference between such tester and someone else is an ability to answer and explain vector attacks, potential ways to attacks, and discreet information you
have per each who you interact. It means don’t
overload CEO with full-detailed technical reports
generated by Nessus or another tool. As final
thoughts, you should have different broad skills on
•	 Networks solutions (software, protocols, and
hardware);
•	 Techniques of attacking and defensing of IDS,
Firewalls, AV, embedded and third party security software;
•	 Top known tools and software to gathering data;
•	 Forensics and intelligence techniques to get
evidence;
•	 Human security techniques (social engineering
and physical security);
•	 Participating at the CTFs and conferences;
•	 Simply be involved to gain and share knowledge with smart guys;
Good luck,

Yury Chemerkin
StartKit 01/2013(01)

More Related Content

Similar to Pen test career. how to begin

How To Get A Blockchain Job?
How To Get A Blockchain Job?How To Get A Blockchain Job?
How To Get A Blockchain Job?101 Blockchains
 
An ideal static analyzer, or why ideals are unachievable
An ideal static analyzer, or why ideals are unachievableAn ideal static analyzer, or why ideals are unachievable
An ideal static analyzer, or why ideals are unachievablePVS-Studio
 
0136 ideal static_analyzer
0136 ideal static_analyzer0136 ideal static_analyzer
0136 ideal static_analyzerPVS-Studio
 
13 Tips to Choose the Perfect Tech Stack
13 Tips to Choose the Perfect Tech Stack13 Tips to Choose the Perfect Tech Stack
13 Tips to Choose the Perfect Tech StackRishavA
 
How to improve Developer Documentations ?
How to improve Developer Documentations ?How to improve Developer Documentations ?
How to improve Developer Documentations ?Utsav Parashar
 
Open Source Content Management Systems for Small and Medium Businesses, Chari...
Open Source Content Management Systems for Small and Medium Businesses, Chari...Open Source Content Management Systems for Small and Medium Businesses, Chari...
Open Source Content Management Systems for Small and Medium Businesses, Chari...Will Hall
 
Technologies for startup
Technologies for startupTechnologies for startup
Technologies for startupDzung Nguyen
 
The right tool / technology for the right job : by Yakup Kalin (ACA IT-Soluti...
The right tool / technology for the right job : by Yakup Kalin (ACA IT-Soluti...The right tool / technology for the right job : by Yakup Kalin (ACA IT-Soluti...
The right tool / technology for the right job : by Yakup Kalin (ACA IT-Soluti...ACA IT-Solutions
 
NET Event - Migrating WinForm
NET Event - Migrating WinFormNET Event - Migrating WinForm
NET Event - Migrating WinFormRaffaele Garofalo
 
Software design.edited (1)
Software design.edited (1)Software design.edited (1)
Software design.edited (1)FarjanaAhmed3
 
The Teams Behind DevSecOps
The Teams Behind DevSecOps The Teams Behind DevSecOps
The Teams Behind DevSecOps Uleska
 
Open Source Project Management
Open Source Project ManagementOpen Source Project Management
Open Source Project ManagementSemen Arslan
 
Chaos Engineering 101: A Field Guide
Chaos Engineering 101: A Field GuideChaos Engineering 101: A Field Guide
Chaos Engineering 101: A Field Guidematthewbrahms
 
Sustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into SoftwareSustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into SoftwareSoftware Sustainability Institute
 
How to become a software developer
How to become a software developerHow to become a software developer
How to become a software developerEyob Lube
 
How To Be a Solr Contributor - Chris Hostetter, Lucidworks
How To Be a Solr Contributor - Chris Hostetter, Lucidworks How To Be a Solr Contributor - Chris Hostetter, Lucidworks
How To Be a Solr Contributor - Chris Hostetter, Lucidworks Lucidworks
 
Paving the road to production
Paving the road to productionPaving the road to production
Paving the road to productionMatthew Reynolds
 

Similar to Pen test career. how to begin (20)

How To Get A Blockchain Job?
How To Get A Blockchain Job?How To Get A Blockchain Job?
How To Get A Blockchain Job?
 
An ideal static analyzer, or why ideals are unachievable
An ideal static analyzer, or why ideals are unachievableAn ideal static analyzer, or why ideals are unachievable
An ideal static analyzer, or why ideals are unachievable
 
0136 ideal static_analyzer
0136 ideal static_analyzer0136 ideal static_analyzer
0136 ideal static_analyzer
 
13 Tips to Choose the Perfect Tech Stack
13 Tips to Choose the Perfect Tech Stack13 Tips to Choose the Perfect Tech Stack
13 Tips to Choose the Perfect Tech Stack
 
How to improve Developer Documentations ?
How to improve Developer Documentations ?How to improve Developer Documentations ?
How to improve Developer Documentations ?
 
Open Source Content Management Systems for Small and Medium Businesses, Chari...
Open Source Content Management Systems for Small and Medium Businesses, Chari...Open Source Content Management Systems for Small and Medium Businesses, Chari...
Open Source Content Management Systems for Small and Medium Businesses, Chari...
 
Technologies for startup
Technologies for startupTechnologies for startup
Technologies for startup
 
The right tool / technology for the right job : by Yakup Kalin (ACA IT-Soluti...
The right tool / technology for the right job : by Yakup Kalin (ACA IT-Soluti...The right tool / technology for the right job : by Yakup Kalin (ACA IT-Soluti...
The right tool / technology for the right job : by Yakup Kalin (ACA IT-Soluti...
 
NET Event - Migrating WinForm
NET Event - Migrating WinFormNET Event - Migrating WinForm
NET Event - Migrating WinForm
 
Software design.edited (1)
Software design.edited (1)Software design.edited (1)
Software design.edited (1)
 
The Teams Behind DevSecOps
The Teams Behind DevSecOps The Teams Behind DevSecOps
The Teams Behind DevSecOps
 
01.intro
01.intro01.intro
01.intro
 
Open Source Project Management
Open Source Project ManagementOpen Source Project Management
Open Source Project Management
 
Chaos Engineering 101: A Field Guide
Chaos Engineering 101: A Field GuideChaos Engineering 101: A Field Guide
Chaos Engineering 101: A Field Guide
 
test
testtest
test
 
Learning Curve
Learning CurveLearning Curve
Learning Curve
 
Sustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into SoftwareSustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into Software
 
How to become a software developer
How to become a software developerHow to become a software developer
How to become a software developer
 
How To Be a Solr Contributor - Chris Hostetter, Lucidworks
How To Be a Solr Contributor - Chris Hostetter, Lucidworks How To Be a Solr Contributor - Chris Hostetter, Lucidworks
How To Be a Solr Contributor - Chris Hostetter, Lucidworks
 
Paving the road to production
Paving the road to productionPaving the road to production
Paving the road to production
 

More from STO STRATEGY

(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedingsSTO STRATEGY
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013STO STRATEGY
 
(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013STO STRATEGY
 
(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013STO STRATEGY
 
(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013STO STRATEGY
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013STO STRATEGY
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedingsSTO STRATEGY
 
(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013STO STRATEGY
 
(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013STO STRATEGY
 
(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012STO STRATEGY
 
Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012STO STRATEGY
 
(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011STO STRATEGY
 
State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensicsSTO STRATEGY
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesSTO STRATEGY
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiSTO STRATEGY
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesSTO STRATEGY
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
Interview with yury chemerkin
Interview with yury chemerkinInterview with yury chemerkin
Interview with yury chemerkinSTO STRATEGY
 

More from STO STRATEGY (20)

(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013
 
(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013(Pdf) yury chemerkin balccon_2013
(Pdf) yury chemerkin balccon_2013
 
(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013(Pdf) yury chemerkin _ath_con_2013
(Pdf) yury chemerkin _ath_con_2013
 
(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013(Pdf) yury chemerkin def_con_2013
(Pdf) yury chemerkin def_con_2013
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings
 
(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013(Pdf) yury chemerkin _confidence_2013
(Pdf) yury chemerkin _confidence_2013
 
(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013(Pdf) yury chemerkin _null_con_2013
(Pdf) yury chemerkin _null_con_2013
 
(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012(Pdf) yury chemerkin _icitst_2012
(Pdf) yury chemerkin _icitst_2012
 
Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012Yury chemerkin _cyber_crime_forum_2012
Yury chemerkin _cyber_crime_forum_2012
 
(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011(Pdf) yury chemerkin info_securityrussia_2011
(Pdf) yury chemerkin info_securityrussia_2011
 
State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensics
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Interview with yury chemerkin
Interview with yury chemerkinInterview with yury chemerkin
Interview with yury chemerkin
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Pen test career. how to begin

  • 1. PENETRATION TESTING Pentester Career: How to Begin Someone starts with talking about degree, another says that nothing except fundamentals matters. You can get some significant part of whole knowledge before college even or do not anything useful after degree even. T hat is not a talk about how your degree affects your skills, it does not affect, because the practical skills might have something with 'fundamentals' if they are on the same way and lead you to the same goal. Not every country has such educational institutes (maybe Germany has). You are allowed to argue against both sides or choose your own where there is a place to solve different problems instead of misplacing them. This case is often extended by certifications; it matters, no doubt, especially when you know that someone who hires you looks for it. However, you may find another way to tell them you can manage with such projects that depend on your additional skills such as programming. I mean you can develop your own tools/exploit by yourself, participate in opensource groups that aims it too, you can improve some tool/exploitation mechanism or automatize it, mix several tools, redevelop it even. It helps to understand how OS components link and work together as well as break into system. In course of debates which languages must be learnt, there are two kinds that depend on OS (under Windows OS – C/C++, Assembler, under Linux/RedHat/CentOS – Python, Ruby). However, it does not mean you should limit yourself to these languages, as a software develops with many other languages, software may have popular add-ons written by someStartKit 01/2013(01) one who prefers .Net or have to use it. Besides, do not forget you should not only develop something but pentest too. It does not mean you should stop to improve your skills; there are many out-of-box tools or solutions you have to learn and use, like BackTrack. It must be a need to improve or custom them in order to network, system or other specifications. Being a part of team, like Hacker for Charity (http://www.hackersforcharity.org/), helps to collect all skills among system security, network security, application security, etc. On the another hand, getting forensics skills may help too. Therefore, learning and practicing with home networks, corporate sandboxes, bypassing NAC, VLANs and finding loopholes in isolated segments that helps understanding stacks, buffer and memory and their vulnerabilities. In addition, you can learn specific technology such AVR: this kind of programming involves a C/C++ knowledge as well. Anyway, first steps on this field might involve reading books, but almost all of books (except Syngress Publishing house) are rewritten, redesigned of each other that brings old techniques, and old tools. So, it is better to find books such as shellcoders and grayhat-coders books and Pentest guidelines (e.g. http://www.pentest-standard.org, http://www.vulnapps.com/) and standards (NIST Page 6 http://pentestmag.com
  • 2. SP 800-42). As said earlier, you can not focus on certain language, software or technology not to end with pure knowledge. No one loves Delphi but enough tools to research applications implement Delphi libraries (and written too). You should collect information about every technology, system, software from any possible sources: • Infosecurity blogs, news (like http://www.vulnapps.com/ or http://exploit-exercises.com/) • Books and ebooks (like The Art of Software Security Assessment, or The Art of Exploitation) • Vulnerabilities domains (like http://www.exploitdb.com/) • security conferences/events (each possible, not only top known such DefCon) • templates and charts (http://pentestmonkey. net/category/cheat-sheet) • special guidelines and frameworks (like OffSec guidelines) It is quite important to have all of these (and not only them) skills, because the key difference between such tester and someone else is an ability to answer and explain vector attacks, potential ways to attacks, and discreet information you have per each who you interact. It means don’t overload CEO with full-detailed technical reports generated by Nessus or another tool. As final thoughts, you should have different broad skills on • Networks solutions (software, protocols, and hardware); • Techniques of attacking and defensing of IDS, Firewalls, AV, embedded and third party security software; • Top known tools and software to gathering data; • Forensics and intelligence techniques to get evidence; • Human security techniques (social engineering and physical security); • Participating at the CTFs and conferences; • Simply be involved to gain and share knowledge with smart guys; Good luck, Yury Chemerkin StartKit 01/2013(01)