Master Of Puppets wrote: » Vielen Dank! You have been especially helpful in these past months! I get to do some R&S stuff too since we are a smaller company but the majority of work is security. In the next couple of weeks I will be analyzing the network security of a client. After that come the suggestions and the implementation of those suggestions. While I help the others with the routing and switching, I am all alone when it comes to the security stuff so on larger projects with huge networks, it becomes a slow process. I also have to set up Snort in our company network which I have never done and I'm excited as hell. I have played around with Snort but not nearly as much as I would want and I haven't had the chance to set it up. But the hardest part is that I have to design the network security on 2 other large projects - something that is above my experience level. This is why I want to give everything I got and make sure I do a great job! I have designed a network security plan only once but it turned out pretty well. After all it is a great chance and, without a doubt, a major learning opportunity. I started in IT 1 year ago and although it was straight in security(because I spent years studying networking and practicing as much as I can before that) some of the things they give me at work are a little over my head. However, I like being thrown into the deep end as I learn quite a bit that way. My boss tells me I have great potential and entrusts me with stuff like that on purpose. Generally, I want to end up in pen testing so next will be the OSCP. Sadly, I don't know when I will be able to squeeze that in, timewise. I want to have as much time as I can to devote to it when I begin. That means that the hardcore studying continues but with a lot of books on pen testing and a lab with vulnarable VMs. I think I will even be able to take on pen testing responsibilities at work but at at a later time. I'm also tired of using Metasploit so a bigger dive into the manual process will come. I will better my C skills, read something like Violent Python(I'm already good with Python), get into web app exploits, learn sql etc.
Metasploit is ok,
Jobene wrote: » Gratuliere Not only ok If you want to do pentesting i would start with ceh before oscp