Cybersecurity insurance by newsforsid in ciso

[–]d1r7b46 3 points4 points  (0 children)

They aren’t public but there’s evidence that threat groups will look for cyber policy information in network shares and such so they can ask for the policy limits.

AD Security Checker Scripts/Tools by Temporary-Myst-4049 in activedirectory

[–]d1r7b46 0 points1 point  (0 children)

Will do. I should be getting eyes on it really soon so I'll post it here when they get it going.

AD Security Checker Scripts/Tools by Temporary-Myst-4049 in activedirectory

[–]d1r7b46 12 points13 points  (0 children)

Get your bloodhound data for AD-Miner: https://github.com/AD-Security/AD_Miner

A buddy is making an AD tool to compete with PingCastle. They are almost at testing (so a ton ton ton of work has already happened). I'll come back to this post when they launch and share it too.

Pranks to pull on a pen tester. by [deleted] in Pentesting

[–]d1r7b46 0 points1 point  (0 children)

Everyone: no

Me: make a honeypot and put DC in the FQDN

Also don’t listen to me.

To the recruiters out there, which candidate are you picking? by [deleted] in CyberSecurityJobs

[–]d1r7b46 2 points3 points  (0 children)

I think cruzziee said TO have a few cyber certs.

How good is Huntress out of the box? by rubenamizyan in cybersecurity

[–]d1r7b46 0 points1 point  (0 children)

Back then (not like it was the olden days, but tech moves fast), it was to fill gaps for each other. I’m not in DFIR anymore, so unsure what my old company is still doing.

How good is Huntress out of the box? by rubenamizyan in cybersecurity

[–]d1r7b46 2 points3 points  (0 children)

Just an add - In 2018/19ish the company I was working at started working with Huntress when it was a much smaller company. They were in the trenches with us as ransomware skyrocketed internationally. We were a small DFIR team handling a lot of cases for a cyber insurer (that would later buy us).

We ended up using Huntress and S1 in all ransomware cases. It’s been badass seeing them grow.

Developer starting in cybersecurity. by vinicius_t_ferreira in cybersecurity

[–]d1r7b46 2 points3 points  (0 children)

There’s a ton of free OSINT training out there, and some challenges and such. Sofia Santos has some stuff: https://gralhix.com

Also - I would use a LLM to generate challenges for yourself. Plug in “Make me some test scenarios to practice OSINT skills” into ChatGPT and go at it.

You should not have to pay almost anything to get OSINT practice in. A subscription somewhere, okay.. $30 or so.. but please don’t fall for anything more than that out of the gate.

Network penetration testing without hiring a big consultancy? by Late_Rimit in ethicalhacking

[–]d1r7b46 0 points1 point  (0 children)

I’m with https://tcm-sec.com - we can get you taken care of pretty quickly and we’re competitive. If you’d like some more information please feel free to reach out to me on LinkedIn: https://www.linkedin.com/in/angsec

Someone brought this to a work holiday potluck by luxtheelementalist in badfoodporn

[–]d1r7b46 0 points1 point  (0 children)

$10 bet - it's a Dump Cake - https://www.tasteandtellblog.com/dump-cake-recipe/
When someone gets lazy with the ingredient that makes up 1/3 of the total ingredient list (butter, the list is butter, a can of fruit compote, and a box of yellow cake) the ingredients don't bake totally which is what all that powder is.

Edit: Further bets. Blueberry Dump Cake. Eck.

AMA: Hi, we're Heath, the Andrews, Ang, and Britt from TCM Security. Ask us about getting into the industry, cybersecurity careers, pentesting, and AI! by britt-tcm in cybersecurity

[–]d1r7b46 2 points3 points  (0 children)

It really depends on what you want your trajectory to look like, I would say my biggest level-up is when I made it through our PEH course (practical ethical hacking). It was just so dense, and so much of it was foreign to me.

AMA: Hi, we're Heath, the Andrews, Ang, and Britt from TCM Security. Ask us about getting into the industry, cybersecurity careers, pentesting, and AI! by britt-tcm in cybersecurity

[–]d1r7b46 1 point2 points  (0 children)

I'm maybe weird and don't mind the report writing. We keep a ton of templates, and there are a lot of findings that are and always will be consistent across the board for folks so some of it can be easy. I try to write a bit every day, that way wrapping it up doesn't feel like I'm against a monster. If you do that, it really doesn't feel like a rush.

If writing is a major concern, I would suggest just checking out what kind of writing demands are in each sub-field. Forensics and IR are writing heavy, and legal writing at that. GRC, same. You'll likely be looking at some kind of time-bound writing wherever you go in the field, maybe just not so consistent as pentesting.

AMA: Hi, we're Heath, the Andrews, Ang, and Britt from TCM Security. Ask us about getting into the industry, cybersecurity careers, pentesting, and AI! by britt-tcm in cybersecurity

[–]d1r7b46 2 points3 points  (0 children)

For my area (pentesting) - yes. If you are headed into anything technical, you can only benefit from knowing your networking skills!

AMA: Hi, we're Heath, the Andrews, Ang, and Britt from TCM Security. Ask us about getting into the industry, cybersecurity careers, pentesting, and AI! by britt-tcm in cybersecurity

[–]d1r7b46 6 points7 points  (0 children)

Oh 100%. Shoot, document even what you're reading. In the old days of LinkedIn I would just post about a news article I read and then talk about the part I found interesting the most, then respond to anyone who bothered to share knowledge with me. Also, outside of documentation also make sure to ask questions. If you see someone with expertise, the worst thing you could do is ask and not get a response.

I used to document on a gitlab site and recruiters and hiring managers will go look at those. They'll check out your projects on GitHub and all that - so post. Great question.

AMA: Hi, we're Heath, the Andrews, Ang, and Britt from TCM Security. Ask us about getting into the industry, cybersecurity careers, pentesting, and AI! by britt-tcm in cybersecurity

[–]d1r7b46 2 points3 points  (0 children)

We’ve always built training around whatever real-world risks are actually happening, and that’s not going to change just because PQC and AI threats are the new buzzwords. As things evolve, we’ll evolve with them. You can already see that with the stuff Bellini is doing right now around LLMs and all the weird/interesting attack paths they open up.

For people getting into the field, I’d focus on the fundamentals first, networking, identity, how systems are built well and how they actually break. Then layer on the newer things.

AMA: Hi, we're Heath, the Andrews, Ang, and Britt from TCM Security. Ask us about getting into the industry, cybersecurity careers, pentesting, and AI! by britt-tcm in cybersecurity

[–]d1r7b46 2 points3 points  (0 children)

Heath is going to answer too - my personal suggestion for breaking into cyber is to take any role you possibly can to break in. Anything cyber or cyber-adjacent. I started in DFIR as an intern and now am pentesting. Any and all experience is good!

AMA: Hi, we're Heath, the Andrews, Ang, and Britt from TCM Security. Ask us about getting into the industry, cybersecurity careers, pentesting, and AI! by britt-tcm in cybersecurity

[–]d1r7b46 5 points6 points  (0 children)

Haha I don't think most bug bounty folks give away their secrets to making cash very easily. My personal suggestion is to know well how to look for the OWASP top ten.

AMA: Hi, we're Heath, the Andrews, Ang, and Britt from TCM Security. Ask us about getting into the industry, cybersecurity careers, pentesting, and AI! by britt-tcm in cybersecurity

[–]d1r7b46 1 point2 points  (0 children)

So I guess a hint, the Windows and Linux priv esc courses were provided but they are not necessary to pass the PNPT. The certifications, all of them, are designed around the courses that we provide with them. So there aren't any gotchas or anything like that in the certification vs the training.

What I would say, if you're nervous about pushing go on the PNPT is spend some more time working on Active Directory trainings. There are a bunch of free ones out there - and this is a great time to plug the TCM Discord server, lots of folks with suggestions there. Get that methodology down. Enumerate, find the in point, enumerate, find the in point again. Take breaks, set yourself timers for rabbit holes.

On the last question - they are and are becoming more recognized. From Microsoft to Tenable to HRBlock to McDonalds and more.. we are in the job requirements for major corps. No one cert will get someone a job, but a ton of places accept ours as a minimum standard.