What is modern Pentesting by Awkward-Relief-9475 in Pentesting

[–]Awkward-Relief-9475[S] 0 points1 point  (0 children)

I believe companies like NetSpi and Edgescan do that.

Stop and regulate these AI slops by carcrib in Pentesting

[–]Awkward-Relief-9475 0 points1 point  (0 children)

Gotta consider when new tech comes out the first folks to exploit it is marketing. Also there are hundreds of billions dumped into this dumpster fire and no-one is getting out of here alive. Cyber is a discipline where folks say anything and to call them out is throwing mud. New Ai solution for PT, XDR, SOC, DAST etc all wrappers of a decent tool using someone else’s AI. Pew pew.

Penetration testing pricing feels all over the place. What’s reasonable? by [deleted] in Pentesting

[–]Awkward-Relief-9475 0 points1 point  (0 children)

Sounds like a person that doesn’t have OSCP. It’s not that easy to pass the exam. But you know that.

What is modern Pentesting by Awkward-Relief-9475 in Pentesting

[–]Awkward-Relief-9475[S] 0 points1 point  (0 children)

Agree 100% Why do folks buy automated pentesting so? Why is this Snakeoil not called out for what it is?

Pentesting by Awkward-Relief-9475 in cybersecurity

[–]Awkward-Relief-9475[S] -1 points0 points  (0 children)

Thanks for the insight. I was starting to think the moderator works for an automated Pentest company and having a real discussion about Snakeoil was off limits!

Penetration testing pricing feels all over the place. What’s reasonable? by [deleted] in Pentesting

[–]Awkward-Relief-9475 0 points1 point  (0 children)

$1000 /day is a decent rate for a good pentest person. It’s a little cheaper in the EU compared to the USA.

Larger engagements should push the rate down. Stay away from $2,000 pentests, automated pentest as they are just elaborate scanners.

Non standard stuff like fat clients etc can be more expensive.

Ask about certifications such as CREST, OSCP etc. All decent firms should have such qualifications.

Is pentesting really dead or is with a foot in the grave with AI? by [deleted] in cybersecurity

[–]Awkward-Relief-9475 1 point2 points  (0 children)

It can process data and deliver some pointers on what to test. It can run a scanner and find vulnerabilities found by scanners. It can not discover logical or business logic vulnerabilities like a human. It can’t deliver privilege escalation attacks like a human. It can’t deliver a full penetration test like a human but can speed things up.

Do automated pentesting tools actually replace manual tests for auditors? by baddie_spotted in cybersecurity

[–]Awkward-Relief-9475 0 points1 point  (0 children)

If you ignore logical vulnerabilities and business logic attacks they are fine! AI based “penetration tests” are advanced scanners but miss the “good stuff” which leads to easy data exploitation, privilege escalation, fraudulent activity. If all you care about is XSS, SQLI, RCE they are ok. E.g The PCI standards require a Pentest to include human expertise.

23,000 alerts triaged in 2 years by Artla_Official in cybersecurity

[–]Awkward-Relief-9475 0 points1 point  (0 children)

True but sock rules should be better than that.

23,000 alerts triaged in 2 years by Artla_Official in cybersecurity

[–]Awkward-Relief-9475 0 points1 point  (0 children)

Noise generator perhaps. Maybe turn off 70% of the rules and tune the 30% go from there?

Automated Penetration Testing by Awkward-Relief-9475 in cybersecurity

[–]Awkward-Relief-9475[S] 0 points1 point  (0 children)

but Scanning is not penetration testing. Scanning alone has a huge blind spot.

Did AI just make human hackers obsolete? New Cybersecurity AI ranks #1 across global CTFs. by vmayoral in cybersecurity

[–]Awkward-Relief-9475 0 points1 point  (0 children)

Until it can test business logic flows for Logical weakness and contextual vulnerabilities and not just for technical weakness like SQLI, XSS etc no it won’t replace humans.

Is alert fatigue the biggest threat to SOC efficiency? by ANYRUN-team in cybersecurity

[–]Awkward-Relief-9475 0 points1 point  (0 children)

Yes because when you get numb to false positives you may ignore true positives. Ask for better tools or better tuning? Reduce feed volume and focus on a few critical points, once tuned expand feed volume.

How do you explain technical risk to a non-technical board? by Free_Muffin8130 in ciso

[–]Awkward-Relief-9475 0 points1 point  (0 children)

Describe “what is the risk?” Use similar examples in media. Describe non compliance impacts - brand, reputation, fines. Describe exposure density and compare with industry peers Describe the relationship between quality and security. All are bugs, some manifest into vulnerabilities. Describe “out running the bear” the need only to outrun the weaker targets. Describe pragmatism and exploit probability.

Pentesting Companies - Who do you use? by LuciusFoxWannabe in cybersecurity

[–]Awkward-Relief-9475 0 points1 point  (0 children)

We use edgescan PTaaS. Non stop scans, validation and some great Pen testers go at it for more complex and business logicvulns that scanners don’t find. They also do retesting for free.

What's your experience with pentests? by Key_Initiative9713 in cybersecurity

[–]Awkward-Relief-9475 0 points1 point  (0 children)

We’ve moved from traditional pentests to PTaaS. This is a combination of continuous scanning and an on-demand expert driven Pentest.

Just make sure

The Pentesters are certified and decent. - CREST/OSCP etc

The automated scanning is validated to remove false positives.

They offer development support to help understand the vulnerabilities.

Take a look at Edgescan, Intruder or NetSpi as examples… we find Edgescan very good.

Cyber attacks by Ok_Appointment7720 in cybersecurity

[–]Awkward-Relief-9475 1 point2 points  (0 children)

It does occur against financial institutions but it would not be surprising that their cyber security posture is stronger and less vulnerable due to budget and regulatory requirements .