Pentesting is NOT what I expected

Поділитися
Вставка
  • Опубліковано 12 вер 2024
  • Assumptions were made and lessons were learned.
    ----------------------------------------------------
    ☕ If you want to support the channel, then you can buy me a coffee here: buymeacoffee.com/pr0tag0nist
    ----------------------------------------------------
    💬 Hack Smarter Discord: / discord

КОМЕНТАРІ • 44

  • @skaus2184
    @skaus2184 21 день тому +13

    Slowly, and methodically, poking, prodding, researching, and documenting. Probably not a career path for everyone, but it's what I'm working towards.

  • @pigs4w
    @pigs4w 21 день тому +3

    we are at the same boat, as a plain pentester you cover literally every struggling that we find on the week tests, along side the exploitation totally agreed to everything you said.

    • @pr0tagnist
      @pr0tagnist  20 днів тому

      It's nice to see others have the same experience.

  • @_tun0
    @_tun0 17 днів тому +2

    Here is my personal opinion and experience: This totally depends on the company you work for and the clients you work with. Each has its approach. My current role focuses on displaying impact, so we are trying to get code execution and steal admin accounts via XSS but with longer engagement windows. My last role was focused on checking the boxes, finding vulnerabilities, and less on exploitation. Reporting among each org has been the most important aspect of the job and people do need to understand that before jumping in. You should have strong verbal and written communication skills… Great video man! 😊

    • @pr0tagnist
      @pr0tagnist  17 днів тому +1

      Thanks for your comment! I love hearing the experience of others. To clarify, my role definitely is attempting to show impact and not just ticking boxes. We get those clients, and they get wrecked when we go through. My point was more that the HTB mentality can trip you up when you first start.

    • @_tun0
      @_tun0 12 днів тому

      @@pr0tagnist To be quite honest, I feel like Offsec, HTB, THM, etc., are great for learning the latest exploits and building a methodology, but the job is so DIFFERENT. Sorry if I misunderstood my initial comment about impact. However, I guess it's still good that I said something because there are those box-checker organizations and scenarios where clients refrain from exploitation.

  • @patsplat
    @patsplat 14 днів тому

    Great to see your progress.

  • @Tinge1337
    @Tinge1337 20 днів тому +1

    Thanks for sharing your experience!

  • @nostalgicnow6001
    @nostalgicnow6001 17 днів тому +1

    First thanks for the insightful I definitely have the HTB approach I love it! However it lets me know I need to slow down.
    So, if you are looking for “Width,” as you say. Instead of “Depth” doesn't this make things a bit more easy… More work, of course. Sounds more of a bug bounty

  • @boreddude123456
    @boreddude123456 15 днів тому

    After watching the video and reading the comments, sounds like the general approach you should go in to pentesting with, atleast for entry level, is “How can I help the client improve their security”, rather than, “How can I hack the client”. Very insightful!

  • @markmicgraph1
    @markmicgraph1 20 днів тому +1

    When I was watching this video the words were not aliened with the mouth, did someone hack my computer?

  • @007order007
    @007order007 18 днів тому +1

    Most people just see the glamorized part of pentesting from movies, but in reality a good pentester is more 60/70% consulting and 30% actual hacking. I've seen lots of pentesters forget that the report and the interaction with the customer is the actual product, your technical wizardy comes second. I've had more impact helping a customer just talking to them for two hours brainstorm problems than a 60 page PDF document ever will do

  • @hexdoner
    @hexdoner 19 днів тому +2

    We have extremely similar career timelines… I too remember realizing the RCE sprint and local privesc drilled into me from HTB was so unrealistic. I used to do so many boxes but now getting “root” feels laughably convoluted.
    CTFs are fun but not very helpful past a certain point… red team labs though are however quite useful

    • @ultravioletiris6241
      @ultravioletiris6241 19 днів тому

      Red team labs?

    • @cheesybeast1721
      @cheesybeast1721 17 днів тому

      @@ultravioletiris6241 something you can basically only do when you are already a cybersecurity pro

    • @wandererx86
      @wandererx86 17 днів тому

      can you expand on "red team labs"? thanks

    • @hexdoner
      @hexdoner 17 днів тому +1

      @@wandererx86 I'm referring to larger networks of machines that simulate a real enterprise environment. Virtual user interactions, subnets, pivoting, etc. Learning to orient yourself in a large network is not easy at first.

    • @wandererx86
      @wandererx86 17 днів тому

      @@hexdoner What would you recommend to get access to these types of networks to practice on? This sounds much more detailed than something like GOAD (game of active directory).

  • @Siik94Skillz
    @Siik94Skillz 19 днів тому +1

    I have my first gig as a Pentester/Red Teamer/Trainer starting in October. Ill report back on how I experience all of this

  • @s3msec
    @s3msec 19 днів тому

    Good to see you're confidence levels growing mate. Appreciate the content! I'm sitting my OSCP exam next month but still know very little coding. Will probably try to put a block of learning in after the fact. Were you able to code proficiently in any language prior to starting web app testing?

  • @Bwp110
    @Bwp110 17 днів тому

    My pentest team does a htb session together on Friday afternoons. So we can do some of that depth testing. Best to keep up with how to do that. You so we don’t lose that depth test ability while pentesting.

  • @Bwp110
    @Bwp110 17 днів тому

    Keep in mind clients are not paying for you to hack them. They are paying for the report you give at the end of the test.

  • @Userupload
    @Userupload 20 днів тому

    Thank you for this video.

  • @pixeldust5226
    @pixeldust5226 19 днів тому

    Not in it yet, been trying to get into infosec for a while now with existing sysadmin experience for almost five years, seems impossible to break into it at times. Hard to pick and choose what to spend time on when it comes to learning, red teaming or general offensive security would be the dream for me right now.

    • @anonyghost7422
      @anonyghost7422 16 днів тому

      System admin is an amazing foundation but what separates you from other applicants? I will say this (though I don’t fully agree, I’m not HR) but not having an entry level pentesting cert (OSCP, PNPT) you are likely going to find it really hard to break into the offensive side.

  • @Hen-om6le
    @Hen-om6le 17 днів тому

    man you room is too cool 😁😁

    • @pr0tagnist
      @pr0tagnist  17 днів тому

      Thank you. I'm sitting next to a freezer hahaha 🤣

  • @ReverseShell1337
    @ReverseShell1337 20 днів тому

    Nice video man!

  • @ResumeCEO
    @ResumeCEO 16 днів тому

    Is there a difference between ethical hacking and pen testing?

    • @supreme-erg9875
      @supreme-erg9875 16 днів тому

      Pentesting is ethical hacking but not all ethical hacking is pentesting. Someone who does OSINT/digital forensics for the government is also an ethical hacker but they aren’t pentesting

  • @Abc-sl1nf
    @Abc-sl1nf 17 днів тому

    Thx

  • @patrickchan2503
    @patrickchan2503 18 днів тому

    most pentesters say their job is boring. Or you can hear it in their tone.

    • @pr0tagnist
      @pr0tagnist  17 днів тому

      I think that's a bit of an over generalisation. Also, a lot of technical people aren't your charismatic types. I have plenty of friends that are pentesters that love it.

    • @patrickchan2503
      @patrickchan2503 17 днів тому

      @@pr0tagnist hehe I see. True. Some pen testers don't like their job, maybe due to other factors e.g. the work / company. Nice to know some pen testers love their job. I note some love to travel all over the world with their company.

  • @peerullahhussainy7610
    @peerullahhussainy7610 17 днів тому +1

    Bro , u never mentioned any pen test product beginners can start learning n practicing , pls include in ur future videos. Thank you for this video time n effort n passion goes with its creation!!!

    • @pr0tagnist
      @pr0tagnist  17 днів тому

      Thanks for the suggestion, I'll put it on my list of videos to make

    • @FyerBear
      @FyerBear 16 днів тому

      That was not the point of the video lol