Compare cert salaries and plan your next career move
the_hutch wrote: » 3. I recently developed a video series on Penetration Testing, and because of a recommendation by our JAG office, the entire video series had to be extensively reviewed to determine if it created a serious threat to national security.
RobertKaucher wrote: » I think you are going to see this sort of thing in any Industry that has a darkside. Ignorant people who are only familiar with some vocabulary terms and not with the actual practice of defense methodologies will always have seizures at the mention of these words. I once received criticism when I was a net admin for using NMap to find hosts on a network I was solely responsible for so as to find hosts I was unaware of. There was 100% no documentation and this guy was acting like I was DDoSing every Children's Hospital cancer ward across the nation. He had no idea what the tool actually did or how it could be used for legitimate purposes. He just knew it was "a known hacker tool". I love your vids, btw. Keep up the good work.
thegoodbye wrote: » Well, in his defense, if you were using an enumerating tool against inside hosts without receiving prior approval, or at least notifying others, you could have done a lot of damage, especially if you don't have a good understanding of which hosts are on the network. I'm not exaggerating when I say that you could potentially kill someone.
RobertKaucher wrote: » LOL. Who was I getting approval from or notifying? Please read the part of my post where I say I was solely responsible for the network. The person who had set it up had passed away. There was no documentation. It was a small, retail business of about 150 hosts. No one else knew where the the switches were. No one knew were all the PCs were or how they connected to the network. Equipment was hidden in the basement, hanging from walls. But very good on you for making completely exaggerated assumptions regarding the network I was running at the time. This is exactly the problem. Not knowing all the information and yet still drawing conclusions without asking pertinent questions. For a laugh, here is one setup I found in the musty old basement of the place.
RobertKaucher wrote: » The person who had set it up had passed away.
Zartanasaurus wrote: » Was it from using Nmap?
RobertKaucher wrote: » I love your vids, btw. Keep up the good work.
the_hutch wrote: » tpatt...I agree with you to an extent. I get more offended, not by having to explain my actions, but by having to explain my intentions.And despite some of the comments here, NMAP is a safe info gathering tool if used correctly. Granted, if you blast a system with a T5 scan...you'll DOS some systems and flood your bandwidth. However, there are a lot of throttling settings that make for safe scanning.
the_hutch wrote: » Is this just a government thing, or does this happen in information security offices everywhere?
Compare salaries for top cybersecurity certifications. Free download for TechExams community.