Jump to content

2341

Members
  • Posts

    2
  • Joined

  • Last visited

Everything posted by 2341

  1. stig. hey! Not sure if this directly answers your question, sortajust went on a tangent. I've have a year of work experience in the field. Stay up to date in Information Security Current Events. Hak5Threatwire is a great show for that as you may already know. (sic, aesthetics) Check other sources such as SANS, read InfoSec blogs, perhaps even consider getting involved in writing one of your own! Research exploits from different services, applications, operating systems, etc... that are written in various languages (python, shell, php) or that are used in environments such as HTML login screens / web hosted SQL databases / Cross-Site Scripting ... Understand what makes these services vulnerable, and how the exploit works. Many times, you will have to modify an exploit code for it to properly execute. This could be simple as changing the listening port or it could be more complicated such as generating a payload and inserting it into the PoC code. GET HANDS ON! Find hack challenges online.. there are plenty of ones provided, check out the OWASP community, they have some great web app based challenges. Get your hands on a vm from VulnHub or such, set it up, run it-- and see how much you can hack, for lack of a much better description that you indubitably can fill in. If you cannot complete the challenge, or simply have problems getting started, there are often tutorials submitted by various users on how they worked through it... Research Security Standards such as ISO27000, and try to understand Security as a big picture and not just the cool 'sexy' ub3r 1337 red team pentesting techniques. Think about how companies choose convenience over security. It is difficult to convince a CEO, often these days, to invest in security (ROI in Security is immeasurable) Understand the concepts of social engineering, and that the prime source of security errors is usually due to human error. People can be manipulated to lax security. tl;dr What would I assume security experts to know? To patch their systems. To lock their screens when they walk away ^_^ Command Line / Terminal -- With excellent proficiency in at least one Familiarization with programming languages -- With excellent proficiency in at least one Networking Advanced Concept Understanding, Strong knowledge of Basic Networking Information Security Current Events ... Also, Attending Events Regularly (Conferences) Exploits & How they work and how to run the exploits manually, not just Metasploiting Hope this was concise and complete enough to provide you with sufficient guidance. Looking forward to what others have to offer on this subject-- always willing to learn! 2341 h4ck th3 pl4n3t
  2. My name is Derek aka 2341 (REAL) Favourite game: UT2004 Favourite OS: Debian-Based Linux Favourite console: N64 Nationality: US Accent: Yes I do plenty of accents. I like my Russian one the best. Sex: Male Age: 11100 Race: White American Height: 6.076923 feet Status: Pleasantly Single Build: Super Fast Metabolism... Sometimes Very Energetic Sometimes Very Lethargic Favourite band: System of a Down Favourite book: Neverwhere by Neil Gaiman Favourite author: H.P. Lovecraft Favourite movie: 1951 Alice in Wonderland Favourite director: Harmony Korine Favourite TV Show: Futurama Favourite Comedian: Mitch Hedberg Other hobbies: Freestyle Rapping, Breakdancing, Bending Time, Computer Art (Mostly Abstract, gimp), Languages, Scripts, Scripts, All the Instruments, Roller Hockey Occupation: Cyber Security Engineer
×
×
  • Create New...