• Cornelius_Wangenheim@lemmy.world
    link
    fedilink
    arrow-up
    176
    arrow-down
    1
    ·
    1 个月前
    1. No one’s hiring you unless you have an OSCP or similar certification.
    2. A real pen test will set off all kinds of alarms.
    3. You don’t get paid until you deliver a 100+ page report detailing what you did and your findings.
    • Echo Dot@feddit.uk
      link
      fedilink
      arrow-up
      37
      ·
      1 个月前

      You hope it’ll set off alarms. Sometimes it doesn’t, mostly because they don’t have monitoring setup.

      • Cornelius_Wangenheim@lemmy.world
        link
        fedilink
        arrow-up
        27
        ·
        1 个月前

        Pen tests aren’t cheap. Even basic ones are ~$20k. There’s only 2 types of companies that bother with them: ones that care about cybersecurity and ones that have to do it for compliance (PCI/CMMC/etc). Both will have some kind of IDS and a SIEM.

        • Echo Dot@feddit.uk
          link
          fedilink
          arrow-up
          2
          ·
          1 个月前

          That’s what happens when you do off the book stuff on company time. Got to organize yourself better.

    • ameancow@lemmy.world
      link
      fedilink
      English
      arrow-up
      25
      ·
      1 个月前

      You’re implying that people who post on 4-chan have no clue how the real world works and no idea what business is like and how people make money!

    • Captain Howdy@lemm.ee
      link
      fedilink
      arrow-up
      25
      arrow-down
      4
      ·
      1 个月前
      1. Most folks dgaf about certs, and I agree with them. Certs are BS. I only have certs because employers paid for them and in tech (especially security) there’s a LOT of free time if you know what you’re doing. Certs only prove you can pass a test.

      2. Bold of you to assume most companies have intrusion detection systems and that their monitoring isn’t muted half the time.

      3. Findings come from an automated report generated by a scanner that does literally all the work.

      OP post is really not that far off. It’s an easy gig.

      Source: I’ve worked on both sides.

      • expr@programming.dev
        link
        fedilink
        arrow-up
        15
        arrow-down
        2
        ·
        1 个月前

        Uh, certs are a huge deal in cyber security. Absolutely useless in most fields, but cybersecurity is not one of them.

        • TriflingToad
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 个月前

          oh yeah I probably should close those unused ports I’ve had open since 2020…

  • sugar_in_your_tea
    link
    fedilink
    arrow-up
    142
    ·
    1 个月前

    I’m pretty lazy, but I’d at least run a port scan so I have something to submit in a report. That takes a few minutes to run and can be scheduled to run daily so there’s something in their logs.

    That said, our audits always turn up something new (usually benign), so I’d be very suspicious of an “all clear” result.

    • Elvith Ma'for@feddit.org
      link
      fedilink
      arrow-up
      32
      ·
      1 个月前

      Also, even without a prior pentest the admins should have a rough idea where problems areas are (or maybe even know them for a fact but cannot completely patch/disable them to not lock out legacy systems or so). A completely empty report would definitely raise suspicions

    • TachyonTele@lemm.ee
      link
      fedilink
      arrow-up
      22
      ·
      1 个月前

      Just copy some report from online and change a few characters. Easy to do on the toilet.

  • Agent641@lemmy.world
    link
    fedilink
    arrow-up
    86
    ·
    1 个月前

    As a professional pen tester myself, you have to test at least some of the pens to make sure the ink isn’t all dried up or run out. It’s not hard.

      • agamemnonymous
        link
        fedilink
        arrow-up
        35
        ·
        1 个月前

        “How do I know you won’t use my techniques to become bad hackerman to hack your competitors? Sorry, I’m a professional”

    • HubertManne@moist.catsweat.com
      link
      fedilink
      arrow-up
      32
      ·
      1 个月前

      or like a detailed report. I bet you could make a standard report and just change a few things and maybe pull the scam sometimes. The hardest part I think would be getting someone to accept from a cold call. Would need to be pretty stupid to do that to begin with.

      • mosiacmango@lemm.ee
        link
        fedilink
        arrow-up
        32
        ·
        edit-2
        1 个月前

        The reports list your hardware on them generally. They need access into your network.

        The truth is that instead of faking it, you just do an actual pentest. It is generally a mix of FOSS tools like kali, metasploit, nmap, etc and pay tools like nessus. These can all be automated.

        Charge the money, mail them a pre setup laptop, then hit the “go” button and still sit on your ass for a week.

        • HubertManne@moist.catsweat.com
          link
          fedilink
          arrow-up
          18
          ·
          1 个月前

          I was thinking this. Get a nice format with letter head or whatever for dumping from the tools but now its almost like an honest living. ewwww.

        • Kusimulkku@lemm.ee
          link
          fedilink
          arrow-up
          11
          ·
          1 个月前

          They need access into your network.

          “Sir we found an issue in your security practises. You let some rando into your network. That’s a terrible idea. My invoice is in the mail.”

          • cactusupyourbutt@lemmy.world
            link
            fedilink
            arrow-up
            6
            ·
            1 个月前

            I was asked to review a project of another company, and needed access to their documentation for that. they gave me access to their whole wiki instead of just a part of it. definitely included that in the report

          • stetech@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            1 个月前

            You jest, but I’ve read somewhere it’s actually reasonable to provide some amount of info or access to pen testers… since they’re just gonna find out anyway, but if you pay them for a week, you might as well not waste the first 3 days to have them figure the basic setup which doesn’t have an effect on the security analysis/outcome.

  • Jo Miran@lemmy.ml
    link
    fedilink
    arrow-up
    54
    arrow-down
    2
    ·
    1 个月前

    LOL. I wish it was that easy. Also, if you say you did a pen test bjt didn’t, then the client gets hit through an exploit you said you checked or should have checked for, you and your company are done.

    • MimicJar@lemmy.world
      link
      fedilink
      arrow-up
      28
      arrow-down
      1
      ·
      1 个月前

      Not me, just my company Try-N-Hack LLC.

      Luckily I’ll be back on my feet as ThisGuyHacks LLC in no time!

      • Jo Miran@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        1 个月前

        Not how that works. They will go after the company and individuals. You can bet that fraud charges will be filed with the police and don’t think that wire fraud with the feds is out of the question.

        • Echo Dot@feddit.uk
          link
          fedilink
          arrow-up
          2
          ·
          1 个月前

          It depends on what happened. If the company simply said they’d done the test but never gave any of the tasks to their employees then the employees would be in the clear. You can’t be sued for something you never even knew about.

          But if the company had taken the contract on in good faith given the task to an employee and then they’d just lied to their managers and said they’d done it then yeah the employee could be gone after.

          • Jo Miran@lemmy.ml
            link
            fedilink
            arrow-up
            2
            ·
            1 个月前

            Lawsuits will name the company and specific individuals they believe are complicit. The company by default because they are the ones with insurance.

  • shneancy@lemmy.world
    link
    fedilink
    arrow-up
    34
    arrow-down
    1
    ·
    edit-2
    1 个月前

    >get sued a week later when a real hacker breaks into their system and the IT department notices a security flaw that would easily be addressed by first few staps in pen testing

    • GHiLA
      link
      fedilink
      arrow-up
      8
      ·
      1 个月前

      It’s in crypto and I’m in Portugal.

    • Jiggle_Physics
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 个月前

      Points out where working with me give no security guarantees, that they accept when agreeing to allow me to hack them, either in person, writing, or electronic communications, along with allowing the terms to change at any time, for any reason, without notice.

  • Glitterbomb@lemmy.world
    link
    fedilink
    arrow-up
    32
    ·
    1 个月前

    This is why you should hire me, the pen tester tester. For $2000 I’ll make your network slightly less secure to see if the pen test catches it.

  • rumba@lemmy.zip
    link
    fedilink
    English
    arrow-up
    19
    ·
    1 个月前

    With the exception of Girl Scout cookies, I don’t buy anything from anyone that shows up unannounced.

    If I didn’t know I needed it until now, I need to do research before I buy into it.

    If I did know I needed it and you showed up randomly, I have no reason to expect that you provide any reasonable value with your services.

    Door to door sales are as dead as cold calls and email.

  • nebulaone@lemmy.world
    link
    fedilink
    arrow-up
    11
    ·
    1 个月前

    At least do some auto scans with WebCheck, Shodan, nmap + vulnerability scans and some basic OSINT on their boss so you can report something and at least spook them a little bit.

  • ch00f@lemmy.world
    link
    fedilink
    arrow-up
    7
    ·
    1 个月前

    I’ve always wanted to start a ghost busting business.

    Just explain that after I’m done, all the strange sounds they hear have a perfectly logical explanation.