TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

So You Want to Be a Penetration Tester?

172 点作者 turtlegrids大约 6 年前

9 条评论

bjornedstrom大约 6 年前
I think the article overlooks the value of strong fundamentals. If you deeply understand a specific technology it&#x27;s so much easier than if you have scraped the surface by learning the most common exploits. I find that books, courses and resources about security _specifically_ are often superficial and foregoes deep understanding and instead focus on shallow techniques, tips and tricks. Sure, the tricks are useful, but so much more if they rest on strong foundations.<p>For someone that just want to get a foot in the industry and be useful in some real world scenarios (where knowledge of the most common problems will probably be enough to find real problems) I think this article is a useful resource. But in the long term you will be better and more valuable to skip security resources most of the time and instead go deep in a wide set of areas.
评论 #19779659 未加载
basetop大约 6 年前
Rather than working as a pen tester, I&#x27;d rather work on developing pen testing, auditing, intrusion detection software. A lot of security has been and is going to be automated.<p>And pen testing isn&#x27;t a &quot;sexy&quot; job. Not amongst security and software developers anyway. I see on the same level as QA.
评论 #19778089 未加载
jtaft大约 6 年前
Good writeup! Finding bugs is just a portion of a pen tester&#x27;s responsibilities.<p>- You need to have strong technical writing skills. Reporting for each vulnerability should include:<p><pre><code> * Title * Two sentence summary explaining the impact of the finding. * Explanation of the vulnerability. * Where the bug is (code if available). * Proof of concept for exploitation. Clients may want a retest, ensure that the person reading the report can find the vulnerability quickly if need be! A quick explanation of how to navigate the app to the vulnerable page is useful. * Remediation. </code></pre> The reporting should also contain an executive summary, summary of overall security posture, and any strategic recommendations.<p>- Report patterns that can lead to exploitation, but are currently not exploitable, as informational findings. Are they copying and pasting security sensitive code throughout application? Recommend a useful abstraction in the remediation! You don&#x27;t want to play wack-a-mole and try to find all locations to update these scenarios.<p>- Does the client have sufficient logging and monitoring capabilities to detect an attack? The client may be interested in knowing if the security team can detect an intrusion is or has occurred.<p>- Recommend automation when possible! A Continuous Integration System should automatically be scanning for out of date dependencies.<p>- Time management skills are vital. Is a finding really convoluted to exploit, and would take a while to develop a Proof of Concept? Save the proof of concept for the end of the project. Ensure you try and get as much coverage as possible during your available given time.<p>- Project management skills are important. Test credentials early, and request whatever else you may need as soon as possible (buffer up questions to avoid email spam). Double check to ensure information hasn&#x27;t been given to you already. You don&#x27;t want to wait until the last couple days to request additional access if possible.
koblas大约 6 年前
This is a really good writeup for anybody interested in getting in the field. But, also a really good reminder for people who don&#x27;t do security on a daily basis all of the components that go into keeping things secure.
dsfyu404ed大约 6 年前
&gt;Now, being a Pentester doesn’t mean you only focus on one thing - such as Network Pentesting or Web Apps<p>I disagree. There are people who&#x27;s entire jobs are just to break web apps (most banks probably have a couple on the payroll) or just to get into and around a network (though the latter is slowly becoming less common as network architecture is changing).
doktrin大约 6 年前
&gt; It goes without saying that being a Professional Penetration Tester is one of the “sexier” jobs in InfoSec<p>I thought this was mostly the perception from people outside infosec. The vibe I tend to get from people within infosec is that pentesting is a low status specialization.
评论 #19777963 未加载
webgoat大约 6 年前
Got any insights to offer into the NCC hiring process or what type of work&#x2F;freedom you have in security research and pentesting?
评论 #19815316 未加载
ddeokbokki大约 6 年前
What an amazing writeup.<p>From personal experience, Root-Me is easily one of the best way to get into infosec for someone with no prior knowledge of infosec or even information technologies in general.
Iwan-Zotow大约 6 年前
Good office porno