SlideShare a Scribd company logo
The Pentester Blueprint:
A Guide to Becoming a Pentester
whoami:
Phillip Wylie, CISSP, OSCP, GWAPT
Principal Pentester @ US Bank
Adjunct Professor @ Richland College
Ambassador @ Bugcrowd
The Pwn School Project Founder
• 21+ years IT and InfoSec experience
• 6+ years system administration
• 8 years network security & AppSec
• 7 years pentesting (5 years consulting)
"With great power
comes great
responsibility."
-Voltaire
Only hack if you have permission and even
better written permission. Hacking
without permission is illegal.
What Is Pentesting?
• Assessing security from an adversarial
perspective, attempting to exploit
vulnerabilities to gain unauthorized access to
systems and sensitive data (aka hacking).
Why Pentesting?
Security posture from an adversarial
perspective
• Better understanding of security risk severity
• Exploitable vulnerabilities are higher risk and
a higher priority for remediation as well as
justification for budgeting.
Why Pentesting?
• Regulatory Compliance - Required for PCI DSS
(Payment Card Industry Data Security Standard)
• Fun job
• A lot of job opportunities
Pentesting Jobs
• Penetration Testers aka Pentesters
• Security Consultants, Analysts and
Engineers
Pentesting Synonyms
• Ethical Hackers
• Offensive Security
• Adversarial Security
• Threat and Vulnerability Management
Pentesting Skills In
Other Areas
• SOC (Security Operations Center) Analysts
• DFIR (Digital Forensics and Incident
Response)
• Network Security Analysts and Engineers
• Purple Teams (where defensive and offensive
security is combined)
• Application Security
Types of Pentests:
Targets
• Network – Internal, External, Wireless
• Application – Web App, Thick Client, Mobile,
Cloud
• Hardware –Network Hardware (routers, switches,
etc.),IoT (Internet of Things), Medical Devices
(pacemakers, insulin pumps, etc.)
• Transportation – Vehicles of all types
• People – Social Engineering
• Buildings – Physical Security (often Included
in Social Engineering
Types of Pentests:
Target Knowledge
• Black Box – limited to target IP’s, more of an
attacker approach
• White Box (aka Crystal Box) – detailed system
info including accounts for app testing,
documentation
• Gray Box – partial knowledge of target, A cross
Between the other two methods
Types of Tests: Testing
Depth
• Vulnerability Scans – just running
a vulnerability scanner.
• Vulnerability Assessments –
vulnerability scanning plus vulnerability
validation.
• Pentest – Vulnerability Test plus exploitation
(aka hacking)
• Red Team/Adversarial Tests – testing blue
teams, attack simulation, less restrictive
scope
Specializations
• Generalist – Network, WiFi, Light Web App
• Application – Web App, Mobile, Thick
Client
• Social Engineering - People
• Physical - Buildings
• Transportation – Vehicles, Airplanes
• Red Team – Adversarial Simulation
How Do I Become a
Pentester?
Technological Knowledge
• Network
• Operating Systems (especially Windows and
Linux)
• Security
• Application
• Hardware
How Do I Become a
Pentester?
Hacking Knowledge
• Classes
• Conferences
• Meetings/Meetups
• Self-Study
• Home labs
• Videos
• Tutorials
• Blogs and Articles
• Twitter
How Do I Become a
Pentester?
Hacker Mindset
The Hacker Mindset is the ability to think like a
hacker and be able to find ways to exploit
vulnerabilities. The Hacker Mindset is a culmination
of creative and analytical thinking. Developing this
mindset is similar to learning how to troubleshoot.
The Hacker Mindset takes time and repetition to
develop and is best developed by hands on hacking
experience.
Pentester Blueprint
Formula
Technology Knowledge
+
Security Knowledge
+
Hacker Mindset
Where to start?
?
Developing a Plan
Filling the Gaps
• No IT Experience: Start with the basics, Operating
Systems, Hardware, Networking
• IT Experience: Learn Linux, security and Networking
• InfoSec Experience: Fill in the gaps of any basics
you’re missing, start learning pentesting/ethical
hacking, participate in CTFs (capture The Flag) and
bug bounties
• Everyone: Build a lab!
Lab
• Minimalist Lab – Virtualized Hosts (aka VMs)
using VMWare, VirtualBox, Hypervisor, Etc.
• Dedicated Lab – Computer dedicated to lab
purposes with VMs
• Advanced Lab – Servers, computers, routers and
switches
Home Lab:
Attack Platform
• Kali Linux
• Parrot OS (Linux)
• Ubuntu w/ Pen Tester Framework (PTF)
• Windows 10 w/ Commando VM
Home Lab:
Targets
• Create VM (Virtual Machine) Targets using VulnHub.com
• Metasploitable 2 & 3
• OWASP Webgoat
• Create your own VM Targets with vulnerable software from
Exploit-DB.com
Recommended Reading
Penetration Testing
A Hands-On Introduction to Hacking
The Hackers Playbook 2 & 3
The Web Application Hacker's
Handbook: Discovering and Exploiting
Security Flaws
RTFM: Red Team Field Manual
Learning Resources
• SANS Institute: sans.org
• eLearn Security: eLearnSecurity.com
• Virtual Hacking Labs: virtualhackinglabs.com
• Pentester Academy: pentesteracademy.com
• Pentester Lab: pentesterlab.com
• Practical Pentest Labs: practicalpentestlabs.com
• Bugcrowd University: bugcrowd.com/university/
• SANS Pentesting Blog: pen-testing.sans.org/blog/
• HackingTutorials.org
• Cybrary.it
• Web Security Academy: https://portswigger.net/web-security
• owasp.org
• Hack The Box: hackthebox.eu
• Over The Wire CTF: overthewire.org/wargames/
https://thehackermaker.com/learning-resources/
Certifications
Entry Level
• CEH - eCCouncil
• PenTest+ - CompTIA
Intermediate
• GPEN – SANS/GIAC
• OSCP – Offensive Security
Advanced
• GxPN – SANS/GIAC
• OSCE – Offensive Security
Job Tips
• Professional Networking
• Community: Clubs/groups and conferences
• LinkedIn
• Interview Tips
• Prepare for interviews
• Know the OWASP Top 10
• Be able to explain the basics like 3-way TCP
handshake and OSI Model
Contact
Phillip.Wylie@gmail.com
@PhillipWylie
/ln/PhillipWylie
Ethical Hacking Class &
Web App Pentesting
@ Richland College
TheHackerMaker.com
The Pwn School Project
PwnSchool.com

More Related Content

Similar to The_Pentester_Blueprint.pdf

Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
ESET
 
Pentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated TestingPentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated Testing
Andrew McNicol
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming Operation
Satria Ady Pradana
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
What is penetration testing and career path
What is penetration testing and career pathWhat is penetration testing and career path
What is penetration testing and career path
Vikram Khanna
 
What is pentest
What is pentestWhat is pentest
What is pentest
itissolutions
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
TEST Huddle
 
How To Start Your InfoSec Career
How To Start Your InfoSec CareerHow To Start Your InfoSec Career
How To Start Your InfoSec Career
Andrew McNicol
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
Ammar WK
 
DEF CON 23 - Wesley McGrew - i hunt penetration testers
DEF CON 23 - Wesley McGrew - i hunt penetration testersDEF CON 23 - Wesley McGrew - i hunt penetration testers
DEF CON 23 - Wesley McGrew - i hunt penetration testers
Felipe Prado
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
David Lindner
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive Security
Andy Hoernecke
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
Anant Shrivastava
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
Claus Cramon Houmann
 
Security Training: Making your weakest link the strongest - CircleCityCon 2017
Security Training: Making your weakest link the strongest - CircleCityCon 2017Security Training: Making your weakest link the strongest - CircleCityCon 2017
Security Training: Making your weakest link the strongest - CircleCityCon 2017
Aaron Hnatiw
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
TriNimbus
 
Owasp joy of proactive security
Owasp joy of proactive securityOwasp joy of proactive security
Owasp joy of proactive security
Scott Behrens
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 
Thick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptxThick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptx
Anurag Srivastava
 

Similar to The_Pentester_Blueprint.pdf (20)

Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
 
Pentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated TestingPentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated Testing
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming Operation
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
What is penetration testing and career path
What is penetration testing and career pathWhat is penetration testing and career path
What is penetration testing and career path
 
What is pentest
What is pentestWhat is pentest
What is pentest
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
 
How To Start Your InfoSec Career
How To Start Your InfoSec CareerHow To Start Your InfoSec Career
How To Start Your InfoSec Career
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
 
DEF CON 23 - Wesley McGrew - i hunt penetration testers
DEF CON 23 - Wesley McGrew - i hunt penetration testersDEF CON 23 - Wesley McGrew - i hunt penetration testers
DEF CON 23 - Wesley McGrew - i hunt penetration testers
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive Security
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
Security Training: Making your weakest link the strongest - CircleCityCon 2017
Security Training: Making your weakest link the strongest - CircleCityCon 2017Security Training: Making your weakest link the strongest - CircleCityCon 2017
Security Training: Making your weakest link the strongest - CircleCityCon 2017
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
Owasp joy of proactive security
Owasp joy of proactive securityOwasp joy of proactive security
Owasp joy of proactive security
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Thick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptxThick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptx
 

Recently uploaded

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

The_Pentester_Blueprint.pdf

  • 1. The Pentester Blueprint: A Guide to Becoming a Pentester
  • 2. whoami: Phillip Wylie, CISSP, OSCP, GWAPT Principal Pentester @ US Bank Adjunct Professor @ Richland College Ambassador @ Bugcrowd The Pwn School Project Founder • 21+ years IT and InfoSec experience • 6+ years system administration • 8 years network security & AppSec • 7 years pentesting (5 years consulting)
  • 3. "With great power comes great responsibility." -Voltaire Only hack if you have permission and even better written permission. Hacking without permission is illegal.
  • 4. What Is Pentesting? • Assessing security from an adversarial perspective, attempting to exploit vulnerabilities to gain unauthorized access to systems and sensitive data (aka hacking).
  • 5. Why Pentesting? Security posture from an adversarial perspective • Better understanding of security risk severity • Exploitable vulnerabilities are higher risk and a higher priority for remediation as well as justification for budgeting.
  • 6. Why Pentesting? • Regulatory Compliance - Required for PCI DSS (Payment Card Industry Data Security Standard) • Fun job • A lot of job opportunities
  • 7. Pentesting Jobs • Penetration Testers aka Pentesters • Security Consultants, Analysts and Engineers
  • 8. Pentesting Synonyms • Ethical Hackers • Offensive Security • Adversarial Security • Threat and Vulnerability Management
  • 9. Pentesting Skills In Other Areas • SOC (Security Operations Center) Analysts • DFIR (Digital Forensics and Incident Response) • Network Security Analysts and Engineers • Purple Teams (where defensive and offensive security is combined) • Application Security
  • 10. Types of Pentests: Targets • Network – Internal, External, Wireless • Application – Web App, Thick Client, Mobile, Cloud • Hardware –Network Hardware (routers, switches, etc.),IoT (Internet of Things), Medical Devices (pacemakers, insulin pumps, etc.) • Transportation – Vehicles of all types • People – Social Engineering • Buildings – Physical Security (often Included in Social Engineering
  • 11. Types of Pentests: Target Knowledge • Black Box – limited to target IP’s, more of an attacker approach • White Box (aka Crystal Box) – detailed system info including accounts for app testing, documentation • Gray Box – partial knowledge of target, A cross Between the other two methods
  • 12. Types of Tests: Testing Depth • Vulnerability Scans – just running a vulnerability scanner. • Vulnerability Assessments – vulnerability scanning plus vulnerability validation. • Pentest – Vulnerability Test plus exploitation (aka hacking) • Red Team/Adversarial Tests – testing blue teams, attack simulation, less restrictive scope
  • 13. Specializations • Generalist – Network, WiFi, Light Web App • Application – Web App, Mobile, Thick Client • Social Engineering - People • Physical - Buildings • Transportation – Vehicles, Airplanes • Red Team – Adversarial Simulation
  • 14. How Do I Become a Pentester? Technological Knowledge • Network • Operating Systems (especially Windows and Linux) • Security • Application • Hardware
  • 15. How Do I Become a Pentester? Hacking Knowledge • Classes • Conferences • Meetings/Meetups • Self-Study • Home labs • Videos • Tutorials • Blogs and Articles • Twitter
  • 16. How Do I Become a Pentester? Hacker Mindset The Hacker Mindset is the ability to think like a hacker and be able to find ways to exploit vulnerabilities. The Hacker Mindset is a culmination of creative and analytical thinking. Developing this mindset is similar to learning how to troubleshoot. The Hacker Mindset takes time and repetition to develop and is best developed by hands on hacking experience.
  • 19. Developing a Plan Filling the Gaps • No IT Experience: Start with the basics, Operating Systems, Hardware, Networking • IT Experience: Learn Linux, security and Networking • InfoSec Experience: Fill in the gaps of any basics you’re missing, start learning pentesting/ethical hacking, participate in CTFs (capture The Flag) and bug bounties • Everyone: Build a lab!
  • 20. Lab • Minimalist Lab – Virtualized Hosts (aka VMs) using VMWare, VirtualBox, Hypervisor, Etc. • Dedicated Lab – Computer dedicated to lab purposes with VMs • Advanced Lab – Servers, computers, routers and switches
  • 21. Home Lab: Attack Platform • Kali Linux • Parrot OS (Linux) • Ubuntu w/ Pen Tester Framework (PTF) • Windows 10 w/ Commando VM
  • 22. Home Lab: Targets • Create VM (Virtual Machine) Targets using VulnHub.com • Metasploitable 2 & 3 • OWASP Webgoat • Create your own VM Targets with vulnerable software from Exploit-DB.com
  • 23. Recommended Reading Penetration Testing A Hands-On Introduction to Hacking The Hackers Playbook 2 & 3 The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws RTFM: Red Team Field Manual
  • 24. Learning Resources • SANS Institute: sans.org • eLearn Security: eLearnSecurity.com • Virtual Hacking Labs: virtualhackinglabs.com • Pentester Academy: pentesteracademy.com • Pentester Lab: pentesterlab.com • Practical Pentest Labs: practicalpentestlabs.com • Bugcrowd University: bugcrowd.com/university/ • SANS Pentesting Blog: pen-testing.sans.org/blog/ • HackingTutorials.org • Cybrary.it • Web Security Academy: https://portswigger.net/web-security • owasp.org • Hack The Box: hackthebox.eu • Over The Wire CTF: overthewire.org/wargames/ https://thehackermaker.com/learning-resources/
  • 25. Certifications Entry Level • CEH - eCCouncil • PenTest+ - CompTIA Intermediate • GPEN – SANS/GIAC • OSCP – Offensive Security Advanced • GxPN – SANS/GIAC • OSCE – Offensive Security
  • 26. Job Tips • Professional Networking • Community: Clubs/groups and conferences • LinkedIn • Interview Tips • Prepare for interviews • Know the OWASP Top 10 • Be able to explain the basics like 3-way TCP handshake and OSI Model
  • 27. Contact Phillip.Wylie@gmail.com @PhillipWylie /ln/PhillipWylie Ethical Hacking Class & Web App Pentesting @ Richland College TheHackerMaker.com The Pwn School Project PwnSchool.com