Tips for an Information Security Analyst/Pentester career - An overview of the series
11/20/2021 Edit: Unfortunately, Peerlyst shut down in August, 2019. It was a great info sec community, where I met a lot of valuable professionals (some of which have become good friends, too), and it helped me land my job as a penetration tester. It was a good idea but it didn't work out financially. I hope some new websites will take from there one day.
My good buddy Claus Cramon Houmann with Peerlyst asked me to list all the posts I've published so far in this series.
I've published this post on Peerlyst first and then I thought it would be a good idea to do the same for my blog, as I republished the same posts on peerlyst.
This way, my readers can, if they like to, follow this series on both platforms.
This way, my readers can, if they like to, follow this series on both platforms.
Of course, I'll keep this list updated and add links to newer posts, as I keep publishing them.
I knew I had a bunch of things to say when I started this series of posts (that's what I decided to start a series, by the way) but I didn't expect I'd be on a roll like that, though my plate is always full with my work as a web app and mobile app penetration tester and my ongoing training for OSCP, Carbon Black and other software.
I want to thank each and every one of you for the invaluable , contribution and recognition I had from the community so far, which allowed me to constantly improve the of these posts.
They wouldn't be any good without this type of support I had from you guys, which kept me on my toes and forced me to constantly keep tabs on my work.
I owe you guys a lot for this.
The quality of these posts allowed me to find two jobs while writing this series, and lastly to land my dream job as a penetration tester with Polito, Inc.
These posts were the reason why my boss wanted to bring me in, and this shows hard work pays off.
I owe you guys a lot for this.
The quality of these posts allowed me to find two jobs while writing this series, and lastly to land my dream job as a penetration tester with Polito, Inc.
These posts were the reason why my boss wanted to bring me in, and this shows hard work pays off.
In the meantime, I kept growing and landed to a large corporation, Optiv, with a much wider set of client-facing responsibilities.
So, thank you and please keep spurring me the way you've done so far.
Tips for an Information Security Analyst/Pentester career posts published so far:
- Tips for an Information Security Analyst/Pentester career -Episode 1:General and technical hints
- Tips for for an Information Security Analyst/Pentester career - Episode 2: Nmap (part 1)
- Tips for for an Information Security Analyst/Pentester career - Episode 3: Nmap (part 2)
- Tips for for an Information Security Analyst/Pentester career - Episode 4: NSE overview
- Tips for an Information Security Analyst/Pentester career - Episode 5: Wireshark basics (part 1)
- Tips for an Information Security Analyst/Pentester career - Episode 6: Wireshark (part 2a: hands-on)
- Tips for an Information Security Analyst/Pentester career - Episode 7: Wireshark (pt 2b: hands-on)
- Tips for an Information Security Analyst/Pentester career - Episode 8: WebGoat
- Tips for an Information Security Analyst/Pentester career - Episode 9: DVWA (SQL injection)
- Tips for an Information Security Analyst/Pentester career - Episode 10: Metasploitable 2
- Tips for an Information Security Analyst/Pentester career - Episode 11: Mutillidae II (introduction)
- Tips for an Information Security Analyst/Pentester career - Ep. 12: Blind SQL injection with DVWA
- Tips for an Information Security Analyst/Pentester career - Episode 13: File Upload (DVWA)
- Tips for an Information Security Analyst/Pentester career - Episode 14: OSINT (pt 1)
- Tips for an Information Security Analyst/Pentester career - Episode 15: OSINT (pt 2)
- Tips for an Information Security Analyst/Pentester career - Episode 16: IPv6 DoS attack
- Tips for an Information Security Analyst/Pentester career - Ep. 17: OSINT (pt. 3)
- Tips for an Information Security Analyst/Pentester career - Ep. 18: OSINT (pt. 4)
- Tips for an Information Security Analyst/Pentester career - Ep. 19: CTF
- Tips for an Information Security Analyst/Pentester career - Ep. 20: Lessons from a breach
- Tips for an Information Security Analyst/Pentester career - Ep. 21: Security+ Walkthrough
- Tips for an Information Security Analyst/Pentester career - Ep. 22: A naked truth
- Tips for an Information Security Analyst/Pentester career - Ep. 23: Shell from SQL injection
- Tips for an Information Security Analyst/Pentester career - Ep. 24: command injection
- Tips for an Information Security Analyst/Pentester career - Ep. 25: The importance of grit
- Tips for an Information Security Analyst/Pentester career - Ep. 26: OSINT (Pt.5)
- Tips for an Information Security Analyst/Pentester career - Ep. 27: OSINT (Pt.6)
- Tips for an Information Security Analyst/Pentester career - Ep. 28: NSE (pt.2)
- Tips for an Information Security Analyst/Pentester career - Ep. 29: XAMPP and SQL exploitation
- Tips for an Information Security Analyst/Pentester career - Ep. 30: vsFTP 2.3.4 backdoor
- Tips for an Information Security Analyst/Pentester career - Ep. 31: John The Ripper
- Tips for an Information Security Analyst/Pentester career - Ep. 32: Ransomware prevention
- Tips for an Information Security Analyst/Pentester career - Ep. 33 - Metasploit intro
- Tips for an Information Security Analyst/Pentester career -Ep. 34 - Metasploit: options and msfvenom
- Tips for an Information Security Analyst/Pentester career - Ep. 35 - Metasploit: auxiliary and check
- Tips for an Information Security Analyst/Pentester career - Ep. 36: Nikto, PHpMyAdmin and WebDav
- Tips for an Information Security Analyst/Pentester career - Ep. 37: ARP Spoofing
- Tips for an Information Security Analyst/Pentester career - Ep. 38: DNS Spoofing
- Tips for an Information Security Analyst/Pentester career - Ep. 39: NFS shares
- Tips for an Information Security Analyst/Pentester career - Ep. 40: Client-side attacks (pt. 1)
- Tips for an Information Security Analyst/Pentester career - Ep. 41: Client-side attacks (pt. 2)
- Tips for an Information Security Analyst/Pentester career - Ep. 42: Client-side attacks (pt. 3)
- Tips for an Information Security Analyst/Pentester career - Ep. 43: AV Evasion (pt. 1)
- Tips for an Information Security Analyst/Pentester career - Ep. 44: AV Evasion (pt 2)
- Tips for an Information Security Analyst/Pentester career - Ep. 45: Post-exploitation (pt. 1)
- Tips for an Information Security Analyst/Pentester career - Ep. 46: Post-exploitation (pt. 2)
- Tips for an Information Security Analyst/Pentester career - Ep. 47: Post-exploitation (pt. 3)
- Tips for an Information Security Analyst/Pentester career - Ep. 48: Web application pentesting
- Tips for an Information Security Analyst/Pentester career - Ep. 49: Web app pentesting (pt. 2)
- Tips for an Information Security Analyst/Pentester career - Ep. 50: Bash for defensive/offensive security
- Tips for an Information Security Analyst/Pentester career - Ep. 51: Meterpreter detection
- Tips for an Information Security Analyst/Pentester career - Ep. 52: Meterpreter detection (pt. 2)
- Tips for an Information Security Analyst/Pentester career - Ep. 53: Meterpreter detection (pt. 3)
- Tips for an Information Security Analyst/Pentester career - Ep. 54: (Humble) recommendations to land a job in info sec
- Tips for an Information Security Analyst/Pentester career - Ep. 55: Deception (Honeypots)
- Tips for an Information Security Analyst/Pentester career - Ep. 56: Autosploit
- Tips for an Information Security Analyst/Pentester career - Ep. 57: Forensic challenge (pt. 1)
- Tips for an Information Security Analyst/Pentester career - Ep. 58: Blue vs red: does it still make sense?
- Tips for an Information Security Analyst/Pentester career - Ep. 59: Blue team action
- Tips for an Information Security Analyst/Pentester career - Ep. 60: Pivoting attack
- Tips for an Information Security Analyst/Pentester career - Ep. 61 - Blue Hacking
- Tips for an Information Security Analyst/Pentester career - Episode 62: Forensic Challenge (pt 2)
- Tips for an Information Security Analyst/Pentester career - Ep. 63- Security Onion and IoC's
- Tips for an Information Security Analyst/Pentester career - Ep. 64- Lateral movement detection
- Tips for an Information Security Analyst/Pentester career - Ep. 65: My first real pentest (1) - considerations- & Going to BSidesLV!
- Tips for an Information Security Analyst/Pentester career - Ep. 66: My second real pentest (2) and my first security conference
- Tips for an Information Security Analyst/Pentester career - Ep. 67: OSCP path and some considerations - What I did wrong and what I'd change
- Tips for an Information Security Analyst/Pentester career - Ep. 68: From virtual lab to real world - How I became a penetration tester
- Tips for an Information Security Analyst/Pentester career - Ep. 69: My failed OSCP exam attempt- What I did wrong and what I'd change
- Tips for an Information Security Analyst/Pentester career - Ep 70- Automating large pentests (EyeWitness and Sparta)
- Tips for an Information Security Analyst/Pentester career - Ep 71- Web app pentesting practice
- Tips for an Information Security Analyst/Pentester career - Ep. 72 - Pentest automation and Metasploit
- Tips for an Information Security Analyst/Pentester career - Ep. 73 - Web App recon tools (pt.1)
- Tips for an Information Security Analyst/Pentester career - Ep. 74 - Experience-based tips 101
- Tips for an Information Security Analyst/Pentester career - Ep. 75 -Stay current (BlueKeep early exploit)
- Tips for an Information Security Analyst/Pentester career - Ep. 76- Experience-based tips 101 (no. 2)
- Tips for an Information Security Analyst/Pentester career - Ep. 77- Stay current (no.2 -CVE-2019-14287)
- Tips for an Information Security Analyst/Pentester career - Ep. 78 - Nothing is impossible
- Tips for an Information Security Analyst/Pentester career - Ep. 79- Stay Current (BlueKeep Update)
- Tips for an Information Security Analyst/Pentester career - Ep. 80-"Try Harder" Explained
- Tips for an Information Security Analyst/Pentester career - Ep. 81 - Intro to Burp Suite Pro
- Tips for an Information Security Analyst/Pentester career -Ep. 82 - Coronavirus and remote work security challenges
- Tips for an Information Security Analyst/Pentester career - Ep. 83-Endpoint Security
- Tips for an Information Security Analyst/Pentester career - Ep. 84-TryHackMe
- Tips for an Information Security Analyst/Pentester career - Ep. 85: Weaponizing Windows Binaries (LOLBAS & C.)
- Tips for an Information Security Analyst/Pentester career - Ep. 86- Experience-based tips 101 (no. 3)
- Tips for an Information Security Analyst/Pentester career - Ep. 87- Dealing with Burnout
- Tips for an Information Security Analyst/Pentester career - Ep. 88 - New Pentester? Less CTFs, More Ninja.
- Tips for an Information Security Analyst/Pentester career - Ep. 89 - Stay Current (log4j exploit)
- Tips for an Information Security Analyst/Pentester career - Ep. 90 - Spring4Shell Demo (Including reverse shell payload)
- Tips for an Information Security Analyst/Pentester career - Ep. 91 - SSH Tunneling (local port forwarding)
- Tips for an Information Security Analyst/Pentester Career - Ep. 92: 5 Unexpected Tips for A Successful Career Growth
- Tips for an Information Security Analyst/Pentester Career - Ep. 93 - Certifications vs Experience, Do You Need Certs At All?
- Tips for an Information Security Analyst/Pentester Career - Ep. 94 - Never Give Up, Try New Stuff for the Win (Ode to Manual Testing)
- Tips for an Information Security Analyst/Pentester Career - Ep. 95 - BADHB - A Little-known Secret For Success in Info Sec
- Tips for an Information Security Analyst/Pentester Career - Ep. 96 - AD foothold attacks: AS-REP-ROAST
- Tips for an Information Security Analyst/Pentester Career - Ep. 97 - To Be a Better Consultant, Learn from Your Mistakes
- Tips for an Information Security Analyst/Pentester Career - Ep. 98 - 5 Unpopular Infosec Truths
- Tips for an Information Security Analyst/Pentester Career - Ep. 99 - Lessons Learned in Evasive Spear Phishing
Comments
Post a Comment