Bl8ckr0uter wrote: » People get caught up in the idea of breaking into networks and forget about all of the reports and clerical work included with that job.
docrice wrote: » As of late, I've seen quite a few threads about folks who "want to get into security" and the area in question generally turns out to be penetration testing. While I'm not a pentester myself, I can see some of the allure in doing that kind of work. It's very cutting edge, you're given authorization to actually use tools that might otherwise be forbidden in a normal operations environment, and perhaps there's a certain thrill-of-the-hunt when trying to find a way in. However, I get the impression that some don't realize that in order to attack networks effectively, a strong foundation in the design and implementation of said networks and systems are paramount in order to frame the reporting in proper context. If I receive a report from an external auditor and it's just a bullet point list describing what Nessus found, let's just say I wouldn't be too happy. I'd expect something that shows the what, where, how, and why it's a concern for me in relation to my company's business (compliance, current threats elsewhere against corporate entities with similar business models, etc.). Personally, while I love learning about the offsec, I see my professional role on the defense side (which I guess you could also call the "losing side" or "the team with the harder job"). Being able to do investigative work, digging deep into packet structure and correlating events, etc., helps me learn more about the technology world we swim in and broaden my appreciation / sense of grasp of the subject matter and add value. Not that I'm good at it, mind you, but that's part of the motivation for what guides me on where I'm currently at. So my question to those who are interested in getting into pentesting / are already doing that line of work - what's the underlying appeal and source motivation in pursuing this area? Is it the uniqueness of being on the offensive side of things? The creative freedom / opportunities to improvise and devise new solutions? The idea of being a "good-guy with blackhat skillz?" Playing with tools that normal IT network / systems admins generally won't get to touch?
Turgon wrote: » Pentesting has it's allure but as a career option is overrated. A lot of semi skilled people run pentesting scripts without deep understanding of the protocols. It is simply one tool in the security genre although still an important one.
docrice wrote: » Personally, while I love learning about the offsec, I see my professional role on the defense side (which I guess you could also call the "losing side" or "the team with the harder job"). Being able to do investigative work, digging deep into packet structure and correlating events, etc., helps me learn more about the technology world we swim in and broaden my appreciation / sense of grasp of the subject matter and add value. Not that I'm good at it, mind you, but that's part of the motivation for what guides me on where I'm currently at. So my question to those who are interested in getting into pentesting / are already doing that line of work - what's the underlying appeal and source motivation in pursuing this area? Is it the uniqueness of being on the offensive side of things? The creative freedom / opportunities to improvise and devise new solutions? The idea of being a "good-guy with blackhat skillz?" Playing with tools that normal IT network / systems admins generally won't get to touch?
sexion8 wrote: » Just curious to know how far you think you can "defend" without knowing how to "offend." There has never been a conflict or game decided solely on defense.
phoeneous wrote: » How many pentest job openings do you know of? You're better off on the defensive side. In my opinion, firewalls and web application security is a safe bet.