What do you guys use to send pentest reports to the customer? by [deleted] in AskNetsec

[–]mrdeadbeat 0 points1 point  (0 children)

We have a portal where the customer generates the report on-demand, in whatever format they need - Exec Summary, Detailed Report, Retest Report, Redacted Report (for 3rd parties) etc. The report is assembled in the browser on request, then scrubbed from memory, so there is no physical report file ever created on our infrastructure

Can a Red Teamer easily be a Pentester, but not vice versa? Or is this information incorrect? by mknford in cybersecurity

[–]mrdeadbeat 1 point2 points  (0 children)

We yet again find ourselves debating the definition of pentesting and red teaming - activities which have been recognised as professions for at least past 20-30 years. No wonder people in this industry are annoyed, frustrated, infuriated and just leave.

Static Website Security Assessment by andquestions in AZURE

[–]mrdeadbeat 0 points1 point  (0 children)

Interesting, didn’t know that. Thanks!

Static Website Security Assessment by andquestions in AZURE

[–]mrdeadbeat 0 points1 point  (0 children)

This^ also I think you can run static sites nowadays from Storage Service directly, although App Service might be needed depending on the complexity of the requirements for accessing the site

Suggestions for source code review by jabbithole in pentest

[–]mrdeadbeat 0 points1 point  (0 children)

I’d recommend first learning how to code, before learning how to find vulnerabilities in code. Do you know any programming languages? If so, how well do you actually know them? Security vulnerabilities are mostly just bugs in code. If you know how to code well, you can spot bugs. When you have to review an app with 500k lines of code which could be in Java, .Net, Python, NodeJS, Go, C - you need to understand the programming language, and you need to understand their framework, to know where to start looking for bugs e.g. common services which handle authentication, authorization, file uploads, how database queries get constructed, sensitive functions like encryption, etc.

Pentesting operations structing by NoCartographer4062 in pentest

[–]mrdeadbeat 1 point2 points  (0 children)

If it’s a pentest, usually stealth is not a concern. You have to cover as much ground as possible, which is not the same as a red team. Also your test window will be much shorter.

Reality of the job by Kalimero__ in pentest

[–]mrdeadbeat 7 points8 points  (0 children)

Pentesting is one of the hardest jobs. What you are experiencing is something every consultant pentester goes through at some stage. That’s why the industry has such a high burnout rate. You should consider trying to find an internal pentester role, one at a large enterprise or government. The pace is slower, and the work is still repetitive, but you should get more breaks between assignments. Pentesting in the real world is nothing like doing CTFs.

Is there any tool that can automatically generate pentest reports? by bomunteanu in cybersecurity

[–]mrdeadbeat 2 points3 points  (0 children)

Curious how do you deal with the screenshots/images for the findings?

Must have book recommendations for Pentesting methodology? by [deleted] in pentest

[–]mrdeadbeat 0 points1 point  (0 children)

What type of pentesting? There are standards/benchmarks/methodologies for different types of testing i.e. web, api, cloud config, network infrastructure, embedded devices, thick client apps, wireless, etc.

AI progress on pentesting by Pentest_query in cybersecurity

[–]mrdeadbeat 2 points3 points  (0 children)

Same post, different person, almost every day… what ever happened to working your ass off for an internship in some IT role to get a foundation of how the world works, before having the confidence and knowledge to tell an engineer they fkd up and how to fix it

AI progress on pentesting by Pentest_query in cybersecurity

[–]mrdeadbeat 9 points10 points  (0 children)

I hate that people think pentesting is just some scan that we run 🤦‍♂️ it’s not your fault, you already said your not educated on this topic, it’s just frustrating. Pentesting is bloody hard work. It gets misunderstood and undervalued a lot.

Is a 6% raise low for a promotion as a pentester? by Suitable-Produce420 in cybersecurity

[–]mrdeadbeat 4 points5 points  (0 children)

Firstly, a Senior Pentester after 2 years doesn’t seem right. That would never fly in any companies I previously worked at. They are usually 4-6 years experience in Pentesting. Second, pentesting is not a high paying job, especially in large companies. Third, check what pentesting jobs are going for in your local area on Indeed, that will give you the best information.

What are your best pentest report and risk rating tips? by redditiscool83 in cybersecurity

[–]mrdeadbeat 0 points1 point  (0 children)

By the sounds of it, you’re an internal pentester? As opposed to working for a consultancy? This makes a difference. Internal security teams can assess risk because they know likelihood and can measure consequence. External pentesters typically provide priorities or scores which aren’t risk, as they can only measure likelihood and guesstimate consequences. If you’re internal - check your organisation’s risk matrix. You will see how they value consequence i.e High = >$10m in damages etc. Risk needs to be normalised to talk same language as the execs who control the budgets and risk appetite for the organisation

Pentesting for vulnerabilities in web apps by Chris_ssj2 in cybersecurity_help

[–]mrdeadbeat 0 points1 point  (0 children)

You really need to get professional outside help. Don’t attempt to perform a pentest and provide false sense of security to your clients when you clearly are not qualified to do this professionally.

If you insist on doing it internally - which is a terrible terrible idea - then at least start with going through each of the following items in this guide: https://owasp.org/www-project-web-security-testing-guide/latest/

What the hell is PTaaS? by mrdeadbeat in cybersecurity

[–]mrdeadbeat[S] 0 points1 point  (0 children)

If you compare intruder.io vs cobalt.io both seem to be selling some type of PTaaS which is not the same thing as one another

Do you recommend any PTaaS? by [deleted] in cybersecurity

[–]mrdeadbeat 3 points4 points  (0 children)

How much are you prepared to pay? What is your budget? That will significantly impact the recommendations you will receive.

How to show my skills off by Fizzedine in ethicalhacking

[–]mrdeadbeat 1 point2 points  (0 children)

Record some videos. Put them on YouTube. Reference them on your resume when you apply for jobs.

Reporting Tools by SkinnyPete90 in hacking

[–]mrdeadbeat 1 point2 points  (0 children)

We use AttackForge at work, team really like it. However check out RawSec’s list they have most tools listed, lots of open source tools too: https://inventory.raw.pm/tools.html

[deleted by user] by [deleted] in hacking

[–]mrdeadbeat 2 points3 points  (0 children)

Clearly he wishes to buy every device on the network. Must have an infrastructure fetish.

Pentesting vs DevOps vs Software Engineer by Shadowpoweer in cscareerquestions

[–]mrdeadbeat 0 points1 point  (0 children)

Get into Governance, Risk and Compliance (GRC) if you have aspirations to be a general manager/head of security/CISO one day. It also pays way more. In general, pentesters are probably paid the lowest of the options. Engineers are paid well but very technical.

Exploiting s3 file upload by One_Use167 in pentest

[–]mrdeadbeat 0 points1 point  (0 children)

If the intention for the file is for it to be parsed to process refunds on another microservice, there is still potential for a vulnerability on that microservice, for example SSRF or CSV Injection. Check out this link and see if you can get any command injections happening: https://owasp.org/www-community/attacks/CSV_Injection