domingo, 1 de maio de 2016

Wanna be pentester

Hi guys!

So, if you are reading this, I'm dead! Lol kidding.

Seriously now, if you are reading this, you are trying to become a pentester and not a stupid teenager who just wants to run a tool and tell his friends that he is a hacker.

Also, if you are concerned/complaining about the icon size on your desktop, your sound card is not working in Kali Linux, or you are too lazy to read it, go back to your everyday life. You don't have the pentester/hacker soul.


If you are still reading at this point, I already suppose that you have at least the basic knowledge of:

- Linux operation and management

- Windows operation and management

- Some programming language skills (Perl, python, ruby, javascript) also, for web pentest event HTML is required, even if it isn't a programming language

- Basic Network knowledge (TCP/IP, ICMP) /Network services (Proxy, VPN, Samba, AD)

- Protocols like HTTP, FTP, DNS, SSH

- SQL (DDL, DML, and so on), MySQL, SQL Server, Postgres, Oracle.


If you don't have these skills, don't try to get into the security world at this moment, or you will get frustrated. You will need a lot of reading before you can start it.


Don't think just installing Kali Linux on your machine magically makes you a pentester. It takes time, and to be honest, a lot of time!


If you want to learn Linux, don't start with Kali for the following reasons: http://docs.kali.org/introduction/should-i-use-kali-linux. Basically, these lines: "The fact of the matter is, however, that Kali is a Linux distribution specifically geared towards professional penetration testers and security specialists, and given its unique nature, it is NOT a recommended distribution if you're unfamiliar with Linux or are looking for a general-purpose Linux desktop distribution for development, web design, gaming, etc."


The most important thing is: Know how things work.

I will not discuss the guys who use SET to grab Facebook credentials. I know a lot of "hackers" who can dump entire databases, but they don't even know how a SELECT or CREATE TABLE statement works or guys who can take down a server, but they don't even know what an ICMP type 8 is. I felt sick writing this last sentence…


So, don't be big-headed. Just executing tools does not make you a hacker/pentester. Correctly start your studies.

Don't be a simple stupid script kiddie. These guys are jokes in the security world. Do you wanna be like these guys? I don't think so.


And another tip: Don't think that everything is for free, you'll need to save some money to buy books, training or certifications.


There is a lot of training available on the internet. I'm saving some time for you:


Some books and links to start (I put them in the order that I think is the best way to learn, feel free to choose the best way for you):


https://en.wikipedia.org/wiki/Modern_Operating_Systems

http://iips.icci.edu.iq/images/exam/Computer-Networks---A-Tanenbaum---5th-edition.pdf

http://www.amazon.com/HTTP-Definitive-Guide-Guides/dp/1565925092

https://www.edx.org/course/introduction-linux-linuxfoundationx-lfs101x-0

https://linuxacademy.com/linux

http://linux-training.be/

http://www.htmlandcssbook.com/

https://en.wikiversity.org/wiki/Programming_Logic

https://www.python.org/about/gettingstarted/

https://www.perl.org/books/beginning-perl/

http://www.sqlcourse.com/

https://go.dev/


Now you have at least 6 months of studying ahead, and you can find more related training. Remember, Google is your friend.


I ALREADY HAVE THE SKILLS (Really? Double check it)


So, if you already have the required skills, there are some excellent references that you can use to get into IT security. Still, first, you should select one area and move to another one after you have mastered it (my recommendation). However, sometimes you have to mix them to get better results. Some security areas (it's not an exhaustive list):


Web Pentesting

Network Pentesting

Mobile Pentesting

SCADA Pentesting

Reverse Engineering

Malware Analysis

Forensics

Security Research

Hardware Security

Exploitation

Hardware Hacking

IoT Pentesting

RedTeaming -> Offensive

BlueTeam -> Defensive


Of course, you can simultaneously share your focus and study more than 1 topic.


If you are thinking of using Kali to start your studies, you should visit the link http://docs.kali.org.

In this link, there is a lot of Kali documentation that can help you before you go to the #kali-Linux channel on Freenode and ask an obvious question. Also, you can use forums.kali.org. Additionally, as Kali is Debian-based, it is good to check the Debian Linux documentation if you are not familiar with this distro.



Some helpful links to start your pentest journey:



Books:

http://www.hackingexposed.com/ - Very nice book series that covers a lot of different topics.



This is another very nice book series that covers many topics, like Mobile, Android, Cars, and others, not only Web Applications, search for it.

http://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470

http://www.amazon.com/s/ref=nb_sb_noss_1?url=search-alias%3Dstripbooks&field-keywords=hacker%27s+handbook&rh=n%3A283155%2Ck%3Ahacker%27s+handbook



http://www.amazon.com/SQL-Injection-Attacks-Defense-Second/dp/1597499633/


Red Teaming: 

https://www.amazon.de/Red-Team-Succeed-Thinking-Enemy/dp/0465048943

https://www.amazon.de/-/en/Joe-Vest/dp/B083XVG633/ref=pd_lpo_4?pd_rd_i=B083XVG633&psc=1



Also, you can google "Pentest Kali Linux" on google. There are a lot of related books, just choose one and try.



Links:

One more link in the same style as this post:

https://www.corelan.be/index.php/2015/10/13/how-to-become-a-pentester/


http://www.vulnhub.com - > A lots of vulnerable machines to play.

http://www.securitytube.com -> A lots of security videos and tutorials.

https://www.cybrary.it -> More security videos

https://pentesterlab.com -> Various pentest exercises

http://hackthebox.eu -> Various pentest exercises

https://en.wikipedia.org/wiki/Hacking:_The_Art_of_Exploitation -> Low Level exploitation

http://www.owasp.org

https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project

https://github.com/enaqx/awesome-pentest

http://worldwideprogramers.blogspot.com.br/2016/07/22-hacking-sites-ctfs-and-wargames-to.html?m=1



Certifications/Training:

https://www.offsec.com

https://kali.training/ --> FREE TRANING! 

https://portswigger.net/web-security --> FREE TRANING! 

http://www.elearn.com -> Moved to https://ine.com/learning/paths -> CyberSecurity

https://www.sans.org

https://www.eccouncil.org/Certification/certified-ethical-hacker

https://courses.zeropointsecurity.co.uk/courses/red-team-ops


Here, there is a list of most of the expressive certifications in CyberSecurity according to each area:

https://pauljerimy.com/security-certification-roadmap/



Building a pentest lab:

https://pen-testing.sans.org/blog/2014/02/27/building-a-pen-test-infrastructure-hacking-at-home-on-the-cheap


https://community.rapid7.com/docs/DOC-2196


https://www.cybrary.it/0p3n/tutorial-for-setting-up-a-virtual-penetration-testing-lab-at-your-home/


Also, you can find an excellent pentest LAB for FREE on

www.hackthebox.eu


I recommend you to take VIP access. It's about U$10/month, and it's totally worth it!



How To Ask Questions The Smart Way:

http://www.catb.org/esr/faqs/smart-questions.html


Thanks to <Illusional> for the help! \o/

Nenhum comentário:

Postar um comentário