Cyberscum wrote: » What about pen testing interests you? For most pen testers I know, it is not a job to them. They love to do this stuff in their free time etc...
MrAgent wrote: » You will definitely need a solid understanding of Linux. Having some scripting skills is also beneficial as it can really help when trying to modify exploits for your needs. I would suggest learning python, and start working with Linux.
lsud00d wrote: » L+ and CEH will kind of help you with pen testing, but that's just more so book knowledge. OSCP is of more pertinent value towards this line of work. Linux is crucial though. Python is great for scripting (and tools like Scapy) and Metasploit is written in Ruby so both are great tools to have in your toolbox. Since you have CCNP:S you obviously understand the TCP/IP stack, ports, tunneling, VLAN's, ACL's, firewall, etc side of things. That gives you a big leg up. In addition, the Cisco way of things gives you a jump on the *nix CLI. Also, doing vuln assessments + remediation via Nessus is good because you should be familiar with the typical classes and types of vulnerabilities. I recommend getting familiar with OWASP: https://www.owasp.org/index.php/Category:Attack RTFM is a good field guide: Rtfm: Red Team Field Manual: Ben Clark: 9781494295509: Amazon.com: Books Run through Metasploit unleashed : http://www.offensive-security.com/metasploit-unleashed/Main_Page And Malware Forensics is great for analyzing code, namely in memory. It goes into varying detail of how to spot intrusions/attacks (typically post-mortem) and gives a lot of good ideas of what kinds of things to do in a pen test, depending on the extent and scope of the engagement. Malware Forensics: Investigating and Analyzing Malicious Code: Cameron H. Malin, Eoghan Casey, James M. Aquilina: 9781597492683: Amazon.com: BooksDisclaimer: I'm not a pen tester and I don't work in security, however I do this for fun on the side and participate in various events/groups outside of work geared towards cyber security.
lsud00d wrote: » RTFM is a good field guide: Rtfm: Red Team Field Manual: Ben Clark: 9781494295509: Amazon.com: Books
--chris-- wrote: » There is also a BTFM now: Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.: Don Murdoch GSE: 9781500734756: Amazon.com: Books Rev 2 of the book is supposed to be out before Christmas, fyi. Good list in this thread so far...
MrAgent wrote: » Python is a great starting language. I would also suggest taking a look at The Hacker Playbookhttp://www.amazon.com/The-Hacker-Playbook-Practical-Penetration/dp/1494932636/ref=sr_1_1?ie=UTF8&qid=1414689563&sr=8-1&keywords=the+hacker+playbook
Nersesian wrote: » I don't know if this will help or not, but I'm in something of the same boat. For the next 18 months, I'm going to be concentrating exclusively on security completing WGU's MS Information Security and Assurance program which outlines the ten CISSP domains. I expect to feel the same way about the CEH and CHFI, but its part of the curriculum and why not right? At the conclusion of the program, I'll sit for the CISSP and then start work on the OSCP. I'm going to focus on the management side of the house since it matches my background a little more closely, so YRMV.