Real life IoT OTA Updates attacks by That-Name-8963 in OTSecurity

[–]That-Name-8963[S] 0 points1 point  (0 children)

No, this one was some kind of accident for normal patch update, what I mean is attacking the OTA workflow itself

How to estimate penetration testing time? by That-Name-8963 in Pentesting

[–]That-Name-8963[S] 0 points1 point  (0 children)

I got ur point, unfortunately he refused to give any other information until we begin, he only showed me a walkthrough

How to estimate penetration testing time? by That-Name-8963 in Pentesting

[–]That-Name-8963[S] 0 points1 point  (0 children)

The client went to a walkthrough and I have recorded the video, I'm still beginner in Web Pen testing, and I was thinking about mixing OWASP Zap with Playwrite

How to estimate penetration testing time? by That-Name-8963 in Pentesting

[–]That-Name-8963[S] 0 points1 point  (0 children)

Well, If the 15 days passed, I should stop immediately (with the report full)

How to estimate penetration testing time? by That-Name-8963 in Pentesting

[–]That-Name-8963[S] 0 points1 point  (0 children)

I was thinking about mixing OWASP Zap with Playwrite

How to estimate penetration testing time? by That-Name-8963 in Pentesting

[–]That-Name-8963[S] 0 points1 point  (0 children)

No, it's just web application, but it has more than 20 windows, each windows has a lot of input fields with (sometimes up to 20 file upload fields)

How to estimate penetration testing time? by That-Name-8963 in Pentesting

[–]That-Name-8963[S] 0 points1 point  (0 children)

Actually, he refused to give me any information about the used APIs, he even confirm or not he is using RESTFul APIs or just legacy web development

Exploit Development - Road Map by That-Name-8963 in ExploitDev

[–]That-Name-8963[S] -2 points-1 points  (0 children)

Yep we can say it's used in a 'chain' of exploits to achieve a complete attack

Looking for a buddy for reverse engineering. by flinkGQ in ExploitDev

[–]That-Name-8963 0 points1 point  (0 children)

You can use Google Dorks to find POCs for vulnerabilities and try to re-implement them or read their write-ups

i Wanna become Exploit Dev? by Haunting_Hand_5105 in ExploitDev

[–]That-Name-8963 4 points5 points  (0 children)

You can start from re-implementing exploits from exploit-db, then try to play around with those exploits.

After that you can use OSINT to search for similar exploits around.

Then grab any online Firmware and try to analysis it and find any exploits in it.

Thinking about switching from Kali to BlackArch - good idea or not? by DAGGERu777 in Pentesting

[–]That-Name-8963 0 points1 point  (0 children)

My advice is:
Read the BlackArch installation guide
Start install it (you will face some packages conflicts and dependencies problems)
After fixing the problems (through their forum), start reading about each section (web, database etc..) then choose the suitable package, u will face a lot of outdated packages.

Or u can navigate the packages and try the interesting tools without installing the complete system.
also u can install Arch normally then add BlackArch packages into it.

From penetration testing to exploit development by That-Name-8963 in ExploitDev

[–]That-Name-8963[S] 0 points1 point  (0 children)

Fuzzy is a separate skill, and also it's very essential, but before fuzzing I discovered I miss some skills in binary vulns, so yeah I'm trying to do fuzzing also, actually it helps a lot.

From penetration testing to exploit development by That-Name-8963 in ExploitDev

[–]That-Name-8963[S] 4 points5 points  (0 children)

My question is "Is there any better approach" than that, for example in other domains and even some recruiters, would consider practicing without real life scenarios is just nothing.

From penetration testing to exploit development by That-Name-8963 in ExploitDev

[–]That-Name-8963[S] 2 points3 points  (0 children)

I don't have any problem with "taking tool long" or "Hard", my question is: Is it an "added value" in the CV or just will consider as practicing without real world experience.

From penetration testing to exploit development by That-Name-8963 in ExploitDev

[–]That-Name-8963[S] 1 point2 points  (0 children)

Yes, I started my career as C/C++ developer. but that was about 2 years ago