• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!

Kali Linux

Collapse
X
  •  
  • Filter
  • Time
  • Show
Clear All
new posts

    Kali Linux

    I've started very slowly move towards cyber penetration testing and have been given a few prods/pokes by permies to at least consider it a career choice or at least look into it.

    My question is has anyone found Kali Linux a good starting platform to learn from? Or should I start looking at other options?

    #2
    Originally posted by BlackCountryContractor View Post
    I've started very slowly move towards cyber penetration testing and have been given a few prods/pokes by permies to at least consider it a career choice or at least look into it.

    My question is has anyone found Kali Linux a good starting platform to learn from? Or should I start looking at other options?
    It's very good.
    There's a lot of stuff in there that you will need to learn if you're a complete novice. It depends on your background in computing and how good you want to be.
    One thing I will mention, there's nothing like a good, solid understanding of the principles and methods that the foes use. This is the sort of stuff that the tools can't teach.
    As with any good set of tools, get yourself set up with your own lab and remember the golden rule; never try the tools out on the public Internet.
    Don't believe it, until you see it!

    Comment


      #3
      This is something I'm in the process of moving towards, having done plenty of networking and network security in my career. I can only see the demand for this type of thing getting bigger and bigger.

      I've used Kali for a few years for various basic tasks, like vulnerabilty scans, etc but I'm in the process of learning more about it.

      I recently enrolled and passed the 'Cisco CCNA CyberOps' exam as this was a free scholarship Cisco offered where they teach you the basics of the cyber security analyst type role. It had some decent labs included with it, demoing how easy it is to XSS and ARP cache poisoning attacks, for example, all using Kali. It also contains a shed load of theory about incident handling, etc

      A lot of 'cyber security' type training I have found is heavily driven towards process and how to manage incidents etc and less about the actual pen testing side of things.

      Have you looked at the CEH courses, if pen testing is what you're looking at getting in to?

      Comment


        #4
        Originally posted by Mag View Post
        Have you looked at the CEH courses, if pen testing is what you're looking at getting in to?
        Save your money here. They're not very well thought of in that industry. Buy one of the books if you must and have a skim through it, but once you get to the point where you want to certify have a look at CREST or OSCP. Get started by downloading flaky VMs from Vulnhub and trying to break them - and don't feel bad at following a walkthrough as soon as you get stuck. There's sometimes some good money in pentesting and it's a good set of tools to have in conjunction with something else, but for the most part it's very junior work and the money reflects that.

        Comment


          #5
          Most penetration testing is commercially driven rather than security. I know it sounds odd but that's the way it is.

          Every time I've been involved with it (very often) it's more of a tick box exercise. Commercial pen test companies really just do:-

          - vulnerability scan (using Nessus or similar tools)
          - configuration validation (is it configured the same as per the design)

          Neither of these require proper hacking skillz and can be done in a short amount of time (1 or 2 days for a new application). They charge a few k for some mid-range engineers, in smart suits, to write a report.

          Whilst there might be some real value that can be added by a skilled hacker, it's far too expensive.
          They could end up paying a contractor £100k and he doesn't hack the system and that tells the client sweet FA. Or they pay a pen-test company £5k, get the boxes ticked and carry on.

          IMO It is a good skill but not much use for getting work unless you want bits and pieces.
          See You Next Tuesday

          Comment


            #6
            Originally posted by Lance View Post
            Most penetration testing is commercially driven rather than security. I know it sounds odd but that's the way it is.

            Every time I've been involved with it (very often) it's more of a tick box exercise. Commercial pen test companies really just do:-

            - vulnerability scan (using Nessus or similar tools)
            - configuration validation (is it configured the same as per the design)

            Neither of these require proper hacking skillz and can be done in a short amount of time (1 or 2 days for a new application). They charge a few k for some mid-range engineers, in smart suits, to write a report.

            Whilst there might be some real value that can be added by a skilled hacker, it's far too expensive.
            They could end up paying a contractor £100k and he doesn't hack the system and that tells the client sweet FA. Or they pay a pen-test company £5k, get the boxes ticked and carry on.

            IMO It is a good skill but not much use for getting work unless you want bits and pieces.

            That has been my experience in corporate IT too back as a permie Several conversations went along the lines of :

            Mr Pink : "Is this public?"
            Mr Blue : "Yes"
            Mr Pink : "So we need to pen test it?"
            Mr Blue : "Yes"

            Mr Pink - Throws money at one of our approved suppliers who pass back a report showing all vulnerabilities.

            Mr Blue : "Sooooo... Are we going to fix these?"
            Mr Pink : "No time/budget.. We are logging the risk and will carry on as previously planned"

            Comment

            Working...
            X