Hello, I am Cold_Revenge <--- although not big on my screen name! But whats in a name right?
I am a user of whax but just "upgraded" to the BT3. I am useing it on an IBM laptop t42 with the 2100 wireless card built in. It worked right after installation.
I also carry a pcmcia that also works with out any driver updates. I can put them both in monitor mode but only the prism can inject.
I am learning the tools the best I can. Slow going, when your still new to all of it. I was looking for a community to help me develop my pen testing skills. I think there is a future in it.
So my question is.. How would you going about getting work to black box clients? is that all I should do? small clients of 50 or so work stations I could see myself footprinting, but not enterprise networks.
how does the pricing work? I am sorry,, I have so many questions and an in hunt for a forum that can or will help me out.
Experience isn't the issue, I am a network security officer at a very large instillation with clearance. I finished college in 92, been TSSBI cleared for years, was a radio man on submarines. Still carry the clearance today. I work in a testing lab at a Dod facility.
But I didn't ask about whether or not I could explain my background. I asked specific questions about getting started.. are you a qualified penetration tester? Is there anything you could teach me? or get me going in the right direction?
I dont think the problem is your clearence, or 'trust-a-bility', more you experience on pen testing a network, checking software authentication for encryption, wireless encyprtion testing, contacts and social engineering, dictionary attacks etc etc.
These are two book to get you started
Penetration Tester's Open Source Toolkit, Volume 2 (Paperback):
If you knew what a testing lab was then I would probably get answers to my questions. professional to professional. Instead, all I am getting is reasons to not go out on my own and try to make a little money for my family. And not even reasons because, well frankly I doubt the quality of this forum when it comes to ligament query's.
All I asked for was tips.
I have no reason to explain my aptitude with linux or shells. Or my ability to print networks, exploiting software, the easiest of all "wireless encryption", Or reverse engineering the patches put out by my organization/ or microsoft patches.
Ok, BOFH139, thanks for the tip.
At least there is someone here who can read a question and answer it.
A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.
In your first post you said nothing of a "Testing Lab". You said how do I get into the field of "black Box" penetration testing.
So my question is.. How would you going about getting work to black box clients?
I am more than happy to answer specific questions but that is as unspecific as it gets. This is a backtrack support forum and while it is true many of the developers and members of these forums are network admins/penetration testers that does not mean this is a "how to get a job" reference site.
So First of we will move this to general IT where it belongs. Secondly black box penetration testing is by far the most intrusive and dangerous to a network. This is the real life simulation of a attacker that may only have your phone number or IP address. Hardly any company in their right state of mind is just going to hire "anyone" to preform dangerous tests on their network.
If you really have the experience and know how you say you do then I suggest you get a resume together, adjust your attitude and research companies that are hiring for the type of job you are looking for.
Name = identity.Hello, I am Cold_Revenge <--- although not big on my screen name! But whats in a name right?
As a one man show with no contacts this is going to be difficult. You can try magazine/newspaper/yellow pages but with no experience/references it'll be very slow to impossible.So my question is.. How would you going about getting work to black box clients?If you're just starting out you shouldn't limit yourself to black box testing, or should I say "work to black box clients" which doesn't even make sense.is that all I should do?Sure. Though in a lot of environments evaluating every desktop/workstation is going to be redundant and a waste of the client's money. You'd be better off doing all servers and "an exemplar sampling of workstations" (then they can assume whatever you find on 4 or 5 machines likely applies to the majority of their machines....also makes it easier to document and report).small clients of 50 or so work stations I could see myself footprinting, but not enterprise networks.
Depends on geography, competition, etc...how does the pricing work?
Then why are we having this discussion?Experience isn't the issue,Good for you! Too bad you can't spell yet. I know you'll wanna argue this so I'll give in by saying: yes this is a public forum where you don't know anybody and owe us nothing, and we likely shouldn't expect much. Yet if this is an example of your professionalism I wouldn't hire you. If I happened to and you delivered reports etc with that kind of thing in it, you'd definitely end up on the "do not contract to" list for friends/colleagues.I am a network security officer at a very large instillation with clearance. I finished college in 92Great. This kind of leads well into the type of work you seem interested in. However, most Govt' security clearances are just a matter of paperwork (maybe a polygraph in a few situations) and I'm sure lots of people around here have interesting jobs. Thanks for sharing I guess., been TSSBI cleared for years, was a radio man on submarines. Still carry the clearance today. I work in a testing lab at a Dod facility.
YupBut I didn't ask about whether or not I could explain my background. I asked specific questions about getting started.. are you a qualified penetration tester?Seems likely, many others around here tooIs there anything you could teach me?See previous answer.or get me going in the right direction?
Assuming this refers back to your other post: "I work in a testing lab at a Dod facility. " Who gives a flying <bleeep>? Maybe you test q-tips for the DoD.If you knew what a testing lab was then I would probably get answers to my questions.You've already stated you aren't a professional in the field we're discussing. If you believe you are then I'll ask again "why are we having this discussion?"professional to professional.If you've decided to do it, then do it. Why bother asking us questions. If you haven't decided then be prepared to be told that what you're considering isn't practical. It's a valid answer whether you like it or not.Instead, all I am getting is reasons to not go out on my own and try to make a little money for my family.Queries belong to ligament?And not even reasons because, well frankly I doubt the quality of this forum when it comes to ligament query's.
The tips are: 1) Get some experience with a partner/company who is known and can actually help build your credibility in the industry, or 2) Go out on your own as an unknown and flop.All I asked for was tips.
Fine we'll assume you know nothing then.I have no reason to explain my aptitude with linux or shells.Print networks a lot?Or my ability to print networks,If your organization puts out a patch why would you need to reverse engineer it?exploiting software, the easiest of all "wireless encryption", Or reverse engineering the patches put out by my organization
I'm a compulsive post editor, you might wanna wait until my post has been online for 5-10 mins before quoting it as it will likely change.
I know I seem harsh in some of my replies. SORRY! But if you're doing something illegal or posting something that seems to be obvious BS I'm going to call you on it.