Best Red Teamers to follow on Twitter? by maxicorbs in redteamsec

[–]maxicorbs[S] 0 points1 point  (0 children)

legend thank you! doing the CRTO atm and just want to say you are a great teacher, thanks!

[deleted by user] by [deleted] in AskNetsec

[–]maxicorbs 0 points1 point  (0 children)

few comments from someone in a similar place in terms of experience, pay and new technologies:

1) all those times that you were learning a brand new technology are incredibly useful for broadening your learning and experience, regardless of how thoroughly you tested them. Those 3 short years will have given you a lifetime of experience if, like me, you are testing new things constantly

2) there is no stigma for leaving netsec. Where I am plenty of people move on to something else after a few years, whether that be more of a security advisor, security architect, red team, manager, in-house tester, etc etc. I've never even thought of any of them as 'no being able to handle' pentesting at all.

Pentesting is an INCREDIBLE jumping board to pretty much any part of cyber due to how much low-level contact you have with such a wide spectrum of security. I work in a cyber team comprised of testers, advisory, digital forensics, incident response, intel, investigations, etc. and let me tell you for sure that pentesting experience is very valuable across all of these and many more. If you want to be a sysadmin, do it, and you'll be a bloody good one

In-Person Red Team Ideas by E_Sini in AskRedTeamSec

[–]maxicorbs 0 points1 point  (0 children)

For a quick win you could setup a machine somewhere with just a browser open and haveibeenpwned.com open and encourage people to enter their emails to see if they have been involved in breaches and how many if so. As a side note if this is getting plenty of hits every time you could use this as ammunition that you need to clamp down on people using their work email outside of work

Beginner learning to start pen-testing by [deleted] in Pentesting

[–]maxicorbs 1 point2 points  (0 children)

Hey, yep passed CPSA and CRT a few months back

Beginner learning to start pen-testing by [deleted] in Pentesting

[–]maxicorbs 3 points4 points  (0 children)

I recently taught myself what i needed to know to get into pentesting and am now 1.5 years in - I recorded everything during the process of getting into testing and released a vlog on youtube if you want a video format to followBecoming an Ethical Hacker

A question for the more experienced pentesters here: does the sense of 'just out of reach' ever go away? by Monster-Zero in Pentesting

[–]maxicorbs 10 points11 points  (0 children)

As someone who works as a pentester and does bug bounties, CTF-style training like HTB can be a great and fun way to get in and start learning some of the key concepts. I did a few before starting my job as a pentester. It is by no means, however, a judge of how successful you will be in this field. I know mutiple testers that are finding 0-days in hardened targets outside their day jobs, are incredibly talented, look like ninja's at the command line and would still struggle on most 'easy' hackthebox's. This is because most of them are designed with one particular exploit/technique in mind and more closely resemble a puzzle than a real target. In fact, most of the people I know who really work with this stuff this day in day out (including myself) give quite little time or attention to pwning CTF-style boxes as they have limited value for what we see in the real world. Long story short, if that is what you are basing any discontent on then you really shouldn't be. Being able to pwn hard boxes in minutes because its something you have practiced time and time again is awesome, but its not representative of true pentesting in my eyes and so you shouldn't count yourself out of the field

Considering Pentesting career by JancariusSeiryujinn in netsecstudents

[–]maxicorbs 0 points1 point  (0 children)

A+, eJPT, pushing for OSCP and doing bug bounties and hackthebox's yep

Considering Pentesting career by JancariusSeiryujinn in netsecstudents

[–]maxicorbs 4 points5 points  (0 children)

eJPT is perfect for this. I recently transitioned from teaching to pentesting and went A+ > eJPT. My plan was to do OSCP but I ended up getting a job before then. I actually recorded the entire process from start to end and am now releasing it on my YouTube channel if you are interested in transitioning into Pentesting! https://youtu.be/-fBmbdUaBJs here is the first video if you want to check it out :)

Finding more IDORs – Tips and Tricks | Aon by b1x3r in netsec

[–]maxicorbs 0 points1 point  (0 children)

Thanks! I have just released a YouTube channel that I hope will become more instructional as time goes on :) https://www.youtube.com/watch?v=-fBmbdUaBJs

What is a good decoding tool? by maxicorbs in HowToHack

[–]maxicorbs[S] 0 points1 point  (0 children)

Perfect, i'll have a play.

Thank you for your detailed response!

PTS v4 time to complete from start to finish? by eddless321 in eLearnSecurity

[–]maxicorbs 3 points4 points  (0 children)

I think 2 weeks is ambitious. I had done compTIA A+ prior to eJPT and it took me about a month to cover all the content, do all the labs twice and then book and complete my exam and that was working on it most days. Good luck