Quote:
And for you, professional is an insult? :) Anyway.. Quote:
When I was a bit younger (8-10 years ago), I wanted to do this kind of job and the fashion of security arrived and it was not funny anymore. I got sick by the hype and media around it. I took a more general path and just made security my hobbie without doing any harm. [/mylife] So I can't give you an answer. But I would say that for testing a system, you first have to know it. The first step would be to have some basic and advanced linux/windows certification, general ones. Then you probably have to make yourself a name or work for a company that is known for good results. You can also concentrate on one precise subject (like pax, nx bit, web security,..) But take care, this kind of jobs are ephemeral IMO. After 5 years, new kids will arrive and will hack your box in less than you can think because there are new techniques. At the opposite, experience is very important. Understanding general security concept is a must background. Quote:
Also when massive attack tool are used, I really find this lame. There is no fun, only fame. nmap is used during the information phase of the attack. In theory, this is considered illegal (You are not supposed to access a service that is not referenced somewhere). I would highly suggest to never ever scan back a system even if it's really tempting. It's illegal and you can get into trouble easily ;) |
Ya, I'm majoring in network security and I have my mcse and ccna. Even tho I spend hours on the computer a day (my wife doesn't like that) I'm still struggling to keep up with all the new stuff. (I just found out today about port knocking -- which I think is really awsome.) I think anyone would prefer professional over anything else. :D
Some good papers on the legality of port scanning can be found here. A good one there breaks down the Scott Moultin case where the courts ruled that: "act of conducting an unauthorized port scan and throughput test of defendant's servers does not constitute a violation of either the Georgia Computer Systems Protection Act or the Computer Fraud and Abuse Act." Basically what I got was that port scanning isn't illegal. However, I'm not sure about publishing the information you recieve. Either way there are a lot of interesting documents. And kalabanta: I posted a quick list for you at the end of page 1. Altho you're on your own for finding where to get them. |
Quote:
Quote:
Now if you mean: be familiar with "script kiddie techniques" and use those to try to break into your server, that's a whole different story. An administrator can make tests of greatly varying success on the network he looks after without being able to write a simple shell code to save his life. This doesn't make him a bad administrator, but it also doesn't make him "more than familiar with hacking in all its forms". P.S.: I don't understand how, so far, nobody has yet complained about the so called improper use of the word "hacker". I suppose people are sticking to the important things, rather than tripping over nomenclature. |
Quote:
|
Quote:
In my mind a script-kiddie is someone who uses a program or any exploit for what ever purpose who doesn't understand how it works even a little bit. |
Quote:
|
In my mind a "white hat" or "security professional" is someone who couldn't hack it as a programmer. :o
|
Quote:
If your confused on exactly what directory traversal is and how it is used you can check here. Quote:
nomb |
Quote:
To run a tool that was designed to exploit a Linux application when the target machine is actually using a Win32 application is just plain dumb, which is what script kiddies are...dumb. They are either too lazy to check what the tool does or they lack the aptitude. Believe me, I'm not confused when I see "../../../../../../../../etc/passwd" in Snort payload and Snort is triggering a definitive directory traversal alert. Directory traversal can be done by hand or can be used in a script which can be leveraged by another tool. Unless you're saying I just saw "../../../../../../../../etc/passwd" 100 times and each time I saw that payload, someone was behind the scenes copy/pasting that into a browser 100 times....I think not. You might want to take a look at some Nessus plugins. I believe Nessus has some plugins that attempt directory traversal. Commercial products such as Foundscan and Qualys' VA tool also conduct directory traversal, in case you're wondering if Nessus only does this. |
Quote:
|
Quote:
|
Exactly I agree completly.
|
Script kiddies are so dumb they need security professionals to tell them who they are. Good thing only people qualified to wear hats can create scripts -- white, grey or black only, sorry red hats.
|
Should we submit that as the new wikipedia definition? :D
|
Quote:
It also runs off of a LiveCD, or can be installed on the machine if you so choose. sleepy |
All times are GMT -5. The time now is 04:16 AM. |