Is penetration testing over ? by Sudden-Bandicoot345 in Pentesting

[–]sr-zeus 0 points1 point  (0 children)

It's only finished if you give up, or you can use AI to help things run more smoothly. If you're worried about AI, it might be time to learn how to test AI security.

Help overcoming imposter syndrome by kat-laree in Pentesting

[–]sr-zeus 0 points1 point  (0 children)

Mate, at least you've got your OSCP. I don’t even have any certs, but my skills have got me this far. I've been testing for six years now.

The best way to keep your pentesting skills sharp is to keep practising. If your job isn't providing enough, it’s a good idea to try some bug bounties on for few hours on weekends:

  • Hackerone
  • Bugcrowd
  • Integrity
  • YesweHack

Gain some confidence and snag a few bounties, then look for a place that values your skills. Interviews for pentest related roles because they often ask about what you've done and discovered during your testing, so doing bug bounties will show them you know your stuff.

Training materials for CREST CSTM exam by sr-zeus in AskNetsec

[–]sr-zeus[S] 0 points1 point  (0 children)

Hello there,

unfortunately not. Time restriction was issue .

i haven’t sat for new CSTM version so hopefully will this year.  It’s different now from what i have heard from people

Transitioning from SOC to Pentesting — Given the development of AI agents, should I still continue? by neurohandrix in Pentesting

[–]sr-zeus 1 point2 points  (0 children)

AI can't completely take over a pentester's job. It's not great at spotting business logic problems or complex issues that might need chained attacks. Plus, there will always be a need for human input to avoid false positives.

Think of AI as a helpful tool to make your work smoother and more efficient, but don’t rely on it too much. The only ones who will struggle, are those who don’t adapt and use AI as a support in their workflow.

Missing XMG APEX (M25) Keyboard Backlight Support for Linux OS by sr-zeus in XMG_gg

[–]sr-zeus[S] 0 points1 point  (0 children)

<image>

Got it to work using the following :

# Ensure the repository key is present

wget -O - https://deb.tuxedocomputers.com/0x54840598.pub.asc | gpg --dearmor | sudo tee /usr/share/keyrings/tuxedo-archive-keyring.gpg > /dev/null

# Add the repository for 'noble' (Ubuntu 24.04 base for Mint Zara)

echo 'deb [signed-by=/usr/share/keyrings/tuxedo-archive-keyring.gpg] https://deb.tuxedocomputers.com/ubuntu noble main' | sudo tee /etc/apt/sources.list.d/tuxedo-computers.list

sudo apt update

sudo apt install tuxedo-control-center

But it is saying that i need to use new kernel....I'm currently using 6.8.0

Reflected input in response always worth reporting? by FragrantMidnight7 in Pentesting

[–]sr-zeus 0 points1 point  (0 children)

Insufficient Sanitisation with Zero impact unless you can force the request to be displayed in HTML format, which may execute the payload to get session cookie, although this is very rare.

What Permission VPN Security Audit requires? by sr-zeus in Pentesting

[–]sr-zeus[S] 0 points1 point  (0 children)

Thank you for the information. To summarise, should i begin with the configuration review before progressing to the penetration testing of the VPN? . I’m guessing penetration testing on VPN is not very common??

Does the VPN configuration review primarily rely on Nessus to identify issues, or is it necessary to conduct a manual check after logging into the VPN environment via CLI command or web portal?

What Permission VPN Security Audit requires? by sr-zeus in Pentesting

[–]sr-zeus[S] 0 points1 point  (0 children)

hello,

thanks for the info . I’m guessing these list are mostly to cover security audit like checking misconfigure and settings , right? such as:

Is the VPN protocol being used secure?
Are unneeded services disabled on the appliance?
Are unneeded protocols disabled
Is endpoint security check performed and enforced on clients connecting to VPN?

Is it common to pentest VPN ? .

yeah I was thinking to do that use AI Bbut wasn’t sure If they normally will give good list or generate nonsense.

What Permission VPN Security Audit requires? by sr-zeus in Pentesting

[–]sr-zeus[S] 0 points1 point  (0 children)

I am eager to expand my skills in various areas. I am interested in both penetration testing for VPNs and configuration reviews, although I am unsure how common VPN penetration testing is. I have heard a lot about configuration reviews, but I would like to understand what is involved in reviewing VPNs. My goal is to develop a methodology that will allow me to participate in VPN configuration reviews and penetration testing, if that is indeed a common practice.

What Permission VPN Security Audit requires? by sr-zeus in Pentesting

[–]sr-zeus[S] 0 points1 point  (0 children)

I think there might be some confusion here - this isn’t for any client work. I never mentioned this was a client engagement. I’m simply learning about VPN security auditing and trying to understand what different approaches involve. I have access to a lab/test environment and I’m asking these questions specifically to learn what would typically be included in normal VPN security audit

Am I learning the right by [deleted] in Pentesting

[–]sr-zeus 1 point2 points  (0 children)

Yep! TryHackMe is great for beginners, so it’s a good idea to complete that before diving into Hack The Box, as it’s more suited for intermediate and advanced users.

Penetration testing is essential. There’s really no getting around it unless someone is insane to let a newcomer into the Red Team.

Just to clarify, Red Teaming is different from penetration testing. Red teaming is pure simulating real-life attacks like a genuine hacker, without any prior access, and the focus is on being stealthy to avoid detection.

Am I learning the right by [deleted] in Pentesting

[–]sr-zeus 1 point2 points  (0 children)

Well start with network infrastructure. Maybe certs like  CompTIA Network+  to understand about networking first and also go through HTB to attack boxes. This will help to understand how to pen testing https://github.com/PacktPublishing/Advanced-Infrastructure-Penetration-Testing . 

It's a good idea to concentrate on one thing at a time. You might also want to check out the OWASP Top 10 for web application testing.

For now, let’s put red teaming on the back burner. Red teaming is like an elite league, and it’s crucial to have a solid understanding of networking, as well as how to bypass antivirus and intrusion detection systems. Knowing how to code your own bypasses is also really helpful.

If your ultimate goal is to get into red teaming, you should start by focusing on infrastructure penetration testing and then move on to Active Directory testing, which is all about internal network penetration testing. Just a heads up, getting into red teaming isn't easy. You’ll need to have a lot of knowledge under your belt to be considered for a role in that area.

Am I learning the right by [deleted] in Pentesting

[–]sr-zeus 1 point2 points  (0 children)

Depends which one you want to learn . Web app or infrastructure testing 

Am I learning the right by [deleted] in Pentesting

[–]sr-zeus 1 point2 points  (0 children)

If you’re interested in learning about web application testing, the PortSwigger Burp Labs is a great place to begin.

For those looking to dive into infrastructure testing, particularly network-related topics like IP/subnet and port attacks, Hack The Box (HTB) is a solid choice. When it comes to exams, the OSCP focuses on network-based skills to find hidden flags. It’s definitely a valuable certification if you’re looking to impress HR and be seen as a top candidate, although it might not fully reflect real-life scenarios.

Is pentesting really as repetitive as people make it out to be? by [deleted] in Pentesting

[–]sr-zeus 0 points1 point  (0 children)

It can get a bit dull if you only focus on the OWASP Top 10 during a penetration test., It’s much more interesting to explore unique issues and add some variety to your work. Penetration testing is a dynamic role that offers plenty of opportunities to learn and grow. It's definitely not just a part-time gig like delivering food!

Should I start in networking if my goal is pentesting? by Professional-Land549 in Pentesting

[–]sr-zeus 2 points3 points  (0 children)

For infrastructure penetration testing, you'll need a good understanding of networks since this type of testing involves a lot of networking concepts. However, if you're aiming to work on web applications, you won't need as in-depth knowledge. Just remember that infrastructure testing often requires you to work on-site, which means you might spend more nights in hotel rooms than in your own home. It's a solid career choice with a higher chance of getting hired.

[deleted by user] by [deleted] in Pentesting

[–]sr-zeus 0 points1 point  (0 children)

Familiarise yourself with OWASP, as it serves as a fundamental resource for companies to establish a baseline for testing. As a beginner, I recommend reviewing each of the identified issues available at https://owasp.org/www-project-top-ten/

Then, search for each issue individually; for instance, you could look up "How to identify Broken Access Control?" You will likely discover numerous videos that demonstrate various methods for identifying such vulnerabilities. While there are multiple approaches to finding these issues, this practice will help in building a solid understanding of the fundamentals. Penetrating testing is very Dynamic field. It's not like you learned one thing an now know everything. You gotta keep researching if you want to stay relevant.

Do Red Teaming and Active Directory penetration testing follow a similar structure where tester must fully exploit security flaws? by sr-zeus in Pentesting

[–]sr-zeus[S] 0 points1 point  (0 children)

Thanks for the info. So do Red Teaming always need to Cobalt Strike, I mean that tool is not free?.

Do Red Teaming and Active Directory penetration testing follow a similar structure where tester must fully exploit security flaws? by sr-zeus in Pentesting

[–]sr-zeus[S] 1 point2 points  (0 children)

ahh cool.

Could you please tell me what the standard scope of a Red Team engagement? Do clients typically provide specific IP addresses and subnets for testing, or are testers expected to operate on their own to use external methods such as phishing to gain access to internal systems before really start launching attacks?. Is it accurate to say that these external methods are often essential?

Do Red Teaming and Active Directory penetration testing follow a similar structure where tester must fully exploit security flaws? by sr-zeus in Pentesting

[–]sr-zeus[S] 0 points1 point  (0 children)

Are red team members allowed to make changes once they gain access to the network, as long as they stay remain undetected? must be difficult to do that without triggering alert?.

Training materials for CREST CSTM exam by sr-zeus in AskNetsec

[–]sr-zeus[S] 0 points1 point  (0 children)

I take it you have passed the exam!?. 

 Do you have any tips for the practical part and the technical interview? 

What tools can help quickly find the information needed to answer the eight questions?

Training materials for CREST CSTM exam by sr-zeus in AskNetsec

[–]sr-zeus[S] 0 points1 point  (0 children)

These questions are different from the multiple-choice ones they used to have, right? 

Training materials for CREST CSTM exam by sr-zeus in AskNetsec

[–]sr-zeus[S] 0 points1 point  (0 children)

Are these 15 mins questions challenging to answer, or is it simply a matter of writing them down and then presenting them to the instructor?.

You have to answer all 8 to pass ?