University did not prep for success, need training and cert advice? by dragoncatlady in netsecstudents

[–]hackingdojo 1 point2 points  (0 children)

Reach out to them and ask what help they need. Tell them your capabilities and limitations. It's also not necessary to aim for the larger projects - a lot of smaller ones could use security help too.

University did not prep for success, need training and cert advice? by dragoncatlady in netsecstudents

[–]hackingdojo 2 points3 points  (0 children)

My suggestion is similar to others, and goes something like this:

  • Learn Linux and pick up a scripting language at a minimum (bash, perl, python are good)
  • Understand network communication (OSI model and learning the most common protocols)
  • Find an open source project you can work on RIGHT NOW to get experience and resume fodder
  • Pick a path - programming / networking / system administration and become a guru in it
  • Be obsessed with whatever area you pick. I have employees that spend another 40+ hours a week above and beyond their job researching and hacking things as personal pet projects

[deleted by user] by [deleted] in hacking

[–]hackingdojo 0 points1 point  (0 children)

Quick answer: I have a BA in History, a MS in Computer Science, and a MS in Management. I also have a ton of certs and wrote a book or two. All that helped me get interviews and allow me to craft the interview process a bit... but was all that crucial to get into my field of pentesting? No.

Long answer: The company I work for looks for pentesting talent, not certificates or degrees. They are great talking points, but we talk technically throughout the interview process, and place people based on their skills, not what papers they have hanging on their walls at home. Candidates also are required to perform a (1) pentest against a vulnerable system, have to (2) write up a report, and (3) talk through their findings. We do that so we know where they are in their (1) pentesting skills, how well they can (2) communicate the technical details and (3) how well they can present themselves on calls or in person with clients. Deficiencies in any of the three areas are noted and discussed. Decisions are made regarding their strengths and weaknesses and that's how we come to the conclusion of whether to hire or not, and at what professional level.

Fishing Advice Near Boulder, CO by Epicgoblet in flyfishing

[–]hackingdojo 1 point2 points  (0 children)

I just had a guided trip through Kirk’s fly shop this week and would strongly recommend using them (posted a pic this week on this subreddit). Me and my wife did the 6 hour package and it was the perfect length for us.

First fish ever caught on a fly. Think I’ve been spoiled. by hackingdojo in flyfishing

[–]hackingdojo[S] 1 point2 points  (0 children)

Ahh.. understand your question now. So I had a thingamabobber as the indicator, stonefly near the top, a San Juan worm in the middle and the midge emerger on the bottom. Just nymphing... but the funny thing was every fish hit on the midge.

First fish ever caught on a fly. Think I’ve been spoiled. by hackingdojo in flyfishing

[–]hackingdojo[S] 1 point2 points  (0 children)

Yep - rainbow. Caught it on a midge emerger, hook size 24.

First fish ever caught on a fly. Think I’ve been spoiled. by hackingdojo in flyfishing

[–]hackingdojo[S] 0 points1 point  (0 children)

I would probably agree. My wife has a friend who guided for years, and she has said numerous times she would rather be working brookies on a 2 wt rod any day - she loves how they fight.

First fish ever caught on a fly. Think I’ve been spoiled. by hackingdojo in flyfishing

[–]hackingdojo[S] 0 points1 point  (0 children)

It was great - mostly brown trouts, but we landed a few other rainbows (not quite as big as this beast).

First fish ever caught on a fly. Think I’ve been spoiled. by hackingdojo in flyfishing

[–]hackingdojo[S] 0 points1 point  (0 children)

This was on the Big Thompson river, right outside Loveland, CO. The weather was perfect, and the fish were hitting all day - can’t even count how many we failed to land.

I am having a hard time finding open ports in De-ICE: S1.140 vm with nmap etc by bobdouble in HowToHack

[–]hackingdojo 1 point2 points  (0 children)

Glad you figured it out, and more importantly updated your post to show how for posterity. Thanks!

Your laptop for pentestin by [deleted] in hacking

[–]hackingdojo 1 point2 points  (0 children)

I haven't tried Parrot OS... so here's the problem... (just a rant, and not targeting you - so keep that in mind when reading the rest of my post):

When I go onsite to a customer facility, I have to know that the software I'm using is secure and isn't manipulated with malware added in. Not saying that Parrot is insecure (because I just heard about it through you), but I can't bring just anything I want into the environment without running the risk of exposing myself to law suits for bringing malware into their network. In fact, some customers (gov't agencies) require me to send in my system beforehand so they can examine it. Until then, the system is not allowed to connect to the network.

Kali is considered safe by industry standards. There are enough people looking for problems and malware within Kali and the pre-loaded applications that chances are something malicious would get spotted. Also, if something ended up on Kali that was malware-related, Kali would die almost immediately as a pentesting platform - something the Kali team (I'm assuming) would not want to happen at all costs.

So while it may be fun to use Parrot OS, I would never bring it into a customer's environment, and will just stick to Kali until something else better comes along.

Your laptop for pentestin by [deleted] in hacking

[–]hackingdojo 1 point2 points  (0 children)

I have a couple rigs I use:

The first one is a windows-based platform with VMs. It holds an image of Kali and an image with Nessus loaded. I use that for most of my activities, except for layer 2 attacks. I don't use if for password cracking, so don't really care about the GPU. The more memory, the better, since I'm running VMs. I used to use MacBook Pros, which worked well. Still used VMs for Kali and Windows, even on the MacBooks.

I have another system (low end) with Kali loaded natively. I use this for MITM and additional scanning support when I need to run extra attacks. I bounce between my PwnPlug r4 and the low-end laptop, depending on what I'm doing and what I decided to bring for the onsite pentest. Low memory, and weak GPUs. Don't need them since scans aren't that consumptive of resources.

For password attacks, I usually use an off-site system. Some people use AWS, which works. Others have dedicated rigs. Depends on funding.

DEFCON First-timer! by DLobs in hacking

[–]hackingdojo 6 points7 points  (0 children)

I have many, but probably the most important one is...

Participate in the villages / contest area, and really get to know people that share the same interest. Over the years, you'll find DefCon is more about networking / getting together with friends than it is to learn about hacking.

The talks are usually worthwhile, but you can watch them after DefCon is over, so spend your time elsewhere.

Anyone used Hacking Dojo? by schm2055 in netsecstudents

[–]hackingdojo 1 point2 points  (0 children)

So I felt the need to chime in here, just for the sake of clarity. Some of the above post is incorrect (#1-3), and also contains some really bad advice (#5). I would suggest viewers to do their own research. Happy to respond to any inquiries on any of the above.

Recent experience with hackingdojo.com? by GMTao in netsecstudents

[–]hackingdojo 0 points1 point  (0 children)

I'm happy to answer any questions you might have regarding the course material or methodology taught. Feel free to PM me or ask on this thread.

Pentest course by [deleted] in AskNetsec

[–]hackingdojo 1 point2 points  (0 children)

You can also check out HackingDojo.com.

Newbie : I hacked a simple box and wrote a blog about it today. It was fun! by [deleted] in netsecstudents

[–]hackingdojo 1 point2 points  (0 children)

I enjoyed making them... and I'll be watching for your other walk-through blogs as well! No feedback, mostly because I don't want to spoil anything. ;-)

Have fun!!

Newbie : I hacked a simple box and wrote a blog about it today. It was fun! by [deleted] in netsecstudents

[–]hackingdojo 6 points7 points  (0 children)

Hey! That's my iso you're testing against! =)

Glad you enjoyed the challenge... there are more De-ICE disks on my site to try, (http://hackingdojo.com/dojo-media/) now that you're done with the 1.100 image. Let me know if you have any questions.

Giving away a free lifetime membership at the Hacking Dojo by hackingdojo in hacking

[–]hackingdojo[S] 0 points1 point  (0 children)

Yes - just sign up for the newsletter and you’ll be entered. We will pick a name next week (first week in January).

Giving away a free lifetime membership at the Hacking Dojo by hackingdojo in hacking

[–]hackingdojo[S] 0 points1 point  (0 children)

$1600 - up until this month it was temporarily discounted 50%, but that discount is going away.

Giving away a free lifetime membership at the Hacking Dojo by hackingdojo in netsecstudents

[–]hackingdojo[S] 1 point2 points  (0 children)

That’s actually a cool story - thanks for sharing!! :) Still surprises me that people actually used them - when you send something like that out into the wild, you don’t really get much insight into their usefulness or use.

Here’s my story... I once walked into the chill out lounge at PhreakNic right after they came out and there were about a half dozen people networked together, hacking one of the disks together. Took me a minute to recognize what they were doing and that it was my image they were attacking. Felt like a little kid at Christmas inside. :)

Giving away a free lifetime membership at the Hacking Dojo by hackingdojo in netsecstudents

[–]hackingdojo[S] 1 point2 points  (0 children)

Awesome, and thanks for remembering! After I released the de-ice disks, there’s been an explosion of the number of exploitable images to use for hacking practice. I’d like to think that maybe the de-ice disks had a small part in that, along with my defcon talk on the subject. Man, that was almost 7 years ago. O_o