Penetration Tester

I think the idea of penetration testing is exciting. Eventually, I wouldnt mind working my way into something along those lines.
What should be my next certification? I just finished MCP (290) and security+ today. (I kind of posed this question in the middle of another thread, but I wanted to get it out there to this forum).
Thanks in advance!
What should be my next certification? I just finished MCP (290) and security+ today. (I kind of posed this question in the middle of another thread, but I wanted to get it out there to this forum).
Thanks in advance!
Comments
I'd focus on developing a solid understand of *nix and/or Windows, networking, a programming language or two (Python would be a good place to start), and pentesting tools. You're not going to be able to adequately hack or secure something you don't fully understand, which is why it's imperative that you master the fundamentals first.
As far as pentesting certs go, I'd go CEH > OSCP > GPEN. It would probably be advantageous to add something broader like the SSCP in there as well.
I really want to be able to get myself a resume that will get me interviews for jobs within the penetration testing realm. I am the biggest people person ever. I'm overly confident
That makes sense. I can't wait to start the computer science degree. I am sure that will help tons for the programming. I really should mess with our unix servers more. I don't really have to do much on them that would get used outside the military life. We have ... other .. purposes for them.
I always hear that C|EH is extremely outdated. Is that so? At least it is becoming more well known.
I think it's a good introductory cert to get. However, it's not going to make you an ethical hacker/pentester or land you a job on it's own.
You should also start playing around with Backtrack and getting acquainted with those tools.
I suggest you master the technologies you're working with, and get certified on it. Then you can move to Pen testing or to a security related position.
Say if you are windows admin, get MCSE: Security, and then you can do security related tasks. It will be easier to move from that to Pen testing.
As far as getting a job, getting a degree and having some security coursework will help you a lot. Experience is the most important thing though. I've interviewed for a couple of security positions and it always came down to experience (which kept me from getting the jobs). Final thing is to try to get an idea of what security area you'd like to focus on. Network (get Cisco or Juniper certs), Operating Systems (Linux and Windows Certs), looking over code (knowing a language helps), Physical Security (military experience helps), Risk Assessment, Disaster Recovery (those two usually go hand and hand).
Your military background, clearance, and IT job have you setup perfectly. Get a degree and certs, then you will be beating employers off with a stick. You are heading in the right direction and I believe you will be very successful. Good luck! (now let the security people on here give you the wisdom you seek!)
PHP
Kotlin
Intro to Discrete Math
Programming Languages
Work stuff
Is it still worth getting MCSE? My most recent plan is to stop working in August 2010 and be a full time computer science student at the University of Washington. Will MCSE still hold merit by then? If so, would it hold more merit than say working on C|EH and SSCP, and maybe a SANS cert (i can get a voucher for it)?
My interests definitely lie very strongly in networking and operating systems.
I appreciate the kind words. Sometimes just a few words can lead to a lot of motivation.
I recommend you become part time Computer Science student and never stop working, if you can.
you're plan is better, yes a CEH and SSCP will help you much more to land Pen testing job, 4years experience are enough to understand the technologies you worked on.
So good luck.
Personally I recommend:
CEH, OSCP, GPEN, CISSP.
CISSP will get you the money
1. The navy wont pay for C|EH, but will give me a voucher all the way to MCSE.
2. I feel somewhat comfortable with the objectives of 291.
3. If I choose vista as the OS (i have 0 experience with vista), Ill get two certs at once.
profile: linkedin.com/in/astorrs
Another course, which is significantly less expensive, is the Offensive Security class by Offensive-Security.com - Professional Security Training and Services. These are the guys that actually put together the backtrack CD. My co worker is doing both the GPEN and the offensive-security stuff and its outstanding also.
All of that being said, the only way to get any good at pen testing is to actually do it. The material is all good but without the application its nothing. Get used to the process of network scanning (sweeping, port scanning, vuln scanning), exploiting, then documenting. Set yourself up a pen testing lab. I am currently running Win2k SP2, Win2k SP4, WinXP SP2, and Server 2k3 Enterprise in VMWare. I also have damn vulnerable linux with some vulnerable services running as well. Having a wide array of target machines to hit will improve your skills greatly.
Learn NMAP, Nessus, and Metasploit. These three tools will at least get you down the right track to scanning, identifying vulns, then breaking the boxes.
CCNA Security | GSEC |GCFW | GCIH | GCIA
[email protected]
http://twitter.com/paul_bosworth
Blog: http://www.infosiege.net/
UNIXGuy: Money? What's that? Just kidding. I'm up for my first promotion since my obtaining my CISSP in December. So, we will see how valuable it is to my company. If nothing else, I need the promotion so I can look jobs that are above the next job code to really make the money.
In regards to a pen testing career, do yourself a favor and check out the DIY Ethical Hacking career over at The Ethical Hacker, The Ethical Hacker Network - DIY Career in Ethical Hacking. You can also check out the Pen Testing Summit (The Ethical Hacker Network - Interview: SANS Pen Test Summit Part 1 - Ed Skoudis) with some of the most notable pen testers in the industry like Ed Skoudis (Counter Hack), HD Moore (metasploit), and Johnny (I Hack Stuff) Long.
“We build our computer (systems) the way we build our cities: over time, without a plan, on top of ruins” - Ellen Ullman
I wish that the Navy would pay for the GPEN. It pays for GSEC though