Jump to content

WarLord

Active Members
  • Content Count

    590
  • Joined

  • Last visited

  • Days Won

    9

WarLord last won the day on January 13 2019

WarLord had the most liked content!

Community Reputation

142 Excellent

1 Follower

About WarLord

  • Rank
    Registered user
  • Birthday 10/19/1980

Profile Information

  • Gender
    Male

Converted

  • Location
    172.16.128.254
  • Interests
    Totul referitor la I.T.
  • Occupation
    Specialist sisteme I.T., contractor.

Recent Profile Visitors

3208 profile views
  1. I am pretty chill bro. Nu lua totul ca atac personal, ca n-am nimic de impartit cu tine. Si da, am inteles la ce te refereai, dar totusi, cu asa cereri unul interesat crede ca esti mofturos, si nici nu se chinuie sa aplice. Daca esti dezamagit cu o firma, mergi la alta, ca doar ii ca la piata, nu?!
  2. Si tu cauti unicorni mah? Sunt multi angajatori ca si tine si nu va dati seama cat de rau stricati industria IT cu asteptari din astea.
  3. "Nu cititi curs, invatati scenarii. Nu invatati comenzi ci luati un scenariu si rezolvati-l de la cap la coada. Nu va axati pe cursuri/certificari care sunt vendor propietary, cum este Cisco. ...Invatati cum functioneaza lucrurile si mai ales de ce." CORECT! Invatati scenarii. 100-1000 de acord cu asta. Practica si iar practica gandita. Asa ca si militarii. Aia nu invata din carte teoretic cum sa traga cu arma, sau teoretic cum se infiltreaza/ataca o tara, ci practic, pe campul de lupta si prin exercitii!
  4. Merita de inceput ca sa-ti dezvolti un vocabular sa poti prezenta o idee un manager sau coleg din domeniu, etc. Dar cu certificatele de inceput nu faci prea multa treaba. Daca gasesti un Security+ care sa te invete practic ce inseamna fiecare lucru/idee/notiune atunci DA, pentru ca in momentul ala inveti practic cum si ce. Poti sa faci tu research-ul tau, acasa cu VMware workstation si masini virtuale, pe care oricum ca ITist trebuie sa il ai, dar dureaza luni de zile pana aflii raspunsurile la intrebarile tale critice si practice. Eventual daca prezinti bine situatia la un interviu, poti sa spui ca ai facut tu research-ul acasa in laborator, in reteaua ta de acasa, explici, comentezi, aduci contra argumente la inverviu sa arati ca stii ce pula ta vorbesti, si daca gasesti un manager din ala care sa aprecieze setea ta pentru cunostinte ai spart gheata si iei un job. Nu stiu cum is managerii romani, dar cum observa multi, managerii romani is destul de distrusi si pretentiosi. Din carti inveti multa teorie, si putina practica, de aia se pune accentul pe 'experienta' lui peste. Apoi nu uita ca Security+ expira in 3 ani. Eu am deja Security+ (2017), si invat acuma pentru CySA+, beta examen pe care il am pe data de Decembrie 20. Daca il iau imi reinnoiesc Network+, Security+ si am si CySA+. Ureaza-mi bafta Nimeni nu-ti poate lua cunostinta pe care o ai, dar daca nu o pui in practica in cateva luni de zile, incepi sa scartaii. Faptul ca ai facut niste certificate trebuie sa arate ca ai macar sete de cunostinta de felul ala, ca ti-ar placea sa faci asa ceva, ca ai ceva idei. Cunostintele de baza ar trebui sa arate un manager ca vi cu ceva cunostinte la bord, si ca acuma el ca lider/sef/manager poate sa te cladeasca. Dar multi cretini din industria de security nu le trebuie numai unicorni si cai verzi pe pereti. E jale in industria de security, cu 2 milioane de locuri de munca vacante, si managerii de cacat se plang ca nu gasesc oameni. Se afla oameni, dar nu unicorni din aia care vor ei. Lucrurile se vor schimba in 2020 pentru ca se va incepe la un nou trend in care managerii, din cauza industriei, vor fi nevoiti sa angajeze entry-level si sa ii cladeasca, sau vor trebuie sa plateasca salarii exagerate celor care sunt deja cu experienta dar fac mofturi la salarii. Asa ca pune mana si invata ca iti va prinde bine, ori in tara ori inafara tarii. Iti doresc succes si revino cu denumeriri si probleme pe care le intalnesti in timpul studiilor. Sper ca gasesc oameni de treaba, care sa te ajute sa inveti, si sa nu ai de-a face cu aroganta unora care o ajuns mare haxori si o uitat de unde o inceput care iti arunca vorbele de parca vorbesc cu un caine. Numai bine.
  5. Hai mah nu te ambala in halul ala ca noi doi nu avem nimic unul cu celalalt. Treaba lui ala ce vrea sa faca, dar mai intelept ar fi sa nu inceapa la drum pana nu isi face experienta in IT de cativa ani buni.
  6. @vatman32 - tu crezi ca toti analistii dezvolta 0 days? Si numai daca poti sa dezvolati un 0 day esti haxor? exagerezi putin Dar un cybersec analist trebuie sa inteleaga mentalitatea de haxor oricum, la fel si un sys admin/engineer. Nu e nevoie sa dam exemple de unicorni din aia care la 50 de ani si-o schimbat cariera din lopatar in web developer
  7. Chiar sunt curios cum merg lucrurile in Romania pe domeniul Info Sec. Adica IT-ul aud ca o duce destul de bine, incepand cu salarii de vreo 500 de euro la novice, dar astia care fac upgrade-ul din sysadmin/helpdesk/etc in InfoSec, cum sunt salariile? Se moare fara diploma de facultate? Ii impresioneaza certificatele pe angajatori? Ce se cere mai mult: blue teamers, red teamers, o amestecata din aia de purple teamers?
  8. Ce-o vrut sa zica ii ca daca vrea sa ii impresioneze pe aia de la angajari, sa duca ceva de-acasa, ceva proiect la ce-o lucrat, ceva practic, decat niste hartii si teorie din certificate.
  9. Exact parerea mea gigiRoman. Omul de-abia si-a terminat CCNA-ul si vrea sa sa se faca cybersec analist, si @vatman il ia cu chestii de development: panel web, stocare in baze de date, APIs, sisteme cache, uz abuziv de procesoare in development, cunostinte de baze de stocare de date. Eu zic omului sa se faca sys admin/inginer daca ii place IT-ul si sa lase labareala din Info Sec. Si mai ales, sa invate 1-2 domenii la care ii bun ca de ex retele si inca ceva si apoi sa treaca in Info Sec daca ii place inca labareala. Sa lase visele alea de mare haxor ca se pierde pe drum si o da in disperare si nebunie ca multi din Info Sec care is cu nervii la pamant. Sunt destule joburi in IT si dupa 8-10 ore mergi acasa si ai viata de familie si prieteni. Nu-ii trebuie adictie la calculatoare.
  10. CBT-Getting-Started-with-Palo-Alto-Firewalls-v8.x https://mega.nz/#F!M2ARlKbT!P5-pS0E-QZroCEe4kz1Wqw!wzYFnSIA
  11. https://www.jollyfrogs.com/osee-awestralia-2018-preparations/ OSEE - AWEstralia 2018 preparations Living in Australia, the total cost of attending the AWE training in Vegas, including flights and hotel would exceed AUD 10,000$. So instead I decided to ask the Offensive Security trainers if they wanted to come and deliver the AWE training in my home town of Brisbane, Australia. I was able to rally together a few large companies interested in participating in the training. We now have over 25 interested people - enough for Offensive Security to come to Brisbane and host the training right here in Australia! Since the training is called Advanced Windows Exploitation (AWE), we call the training AWEstralia 2018 - it will be a lot of fun! This post is to help myself and other participants prepare for the AWE exam. Many thanks to Alpine for helping put together this guide. This guide was written based on existing AWE (OSEE) reviews and the official AWE syllabus topics. We're in the preparation stages now - lots of learning and finding good resources to prepare for the onslaught of AWE. Offensive Security has not yet confirmed a date for 2018 but we expect them to confirm very soon. The date will be around May 2018 and the course will be held in Brisbane Australia. If you'd like to join us, please contact me on TheFrog at jollyfrogs -dot -com. WinDBG usage AWE students are expected to know how to use the WinDBG debugger WinDBG general information: https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/ WinDBG configuration: https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/getting-started-with-windows-debugging WinDBG configuration in VMWare: http://silverstr.ufies.org/lotr0/windbg-vmware.html WinDBG configuration in VirtualBox: https://hshrzd.wordpress.com/2017/05/28/starting-with-windows-kernel-exploitation-part-1-setting-up-the-lab/ WinDBG Lab: https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debug-universal-drivers---step-by-step-lab--echo-kernel-mode- WinDBG Useful commands reference: https://briolidz.wordpress.com/2013/11/17/windbg-some-debugging-commands/ Module 0x01 Custom Shellcode Creation http://www.securitytube-training.com/online-courses/securitytube-linux-assembly-expert/index.html http://www.securitytube-training.com/online-courses/x8664-assembly-and-shellcoding-on-linux/index.html SLAE32 and SLAE64 discount code https://www.fuzzysecurity.com/tutorials/expDev/6.html https://blahcat.github.io/2017/08/14/a-primer-to-windows-x64-shellcoding/ The Shellcoder's Handbook http://sh3llc0d3r.com/windows-reverse-shell-shellcode-ii/ http://blog.harmonysecurity.com/2009/06/retrieving-kernel32s-base-address.html http://nagareshwar.securityxploded.com/2013/09/21/using-peb-to-get-base-address-of-kernelbase-dll/ http://www.rohitab.com/discuss/topic/38717-quick-tutorial-finding-kernel32-base-and-walking-its-export-table/ http://www.hick.org/code/skape/papers/win32-shellcode.pdf http://expdev-kiuhnm.rhcloud.com/2015/05/22/shellcode/ https://www.offensive-security.com/vulndev/fldbg-a-pykd-script-to-debug-flashplayer/ https://exploit.courses/files/bfh2017/day6/0x60_WindowsExploiting.pdf https://secure2.sophos.com/de-de/medialibrary/PDFs/other/Comprehensive-Exploit-Prevention.ashx Module 0x02 DEP/ASLR/EMET Bypass and Sandbox Escape via Flash HeapSpray https://www.offensive-security.com/vulndev/disarming-and-bypassing-emet-5-1/ https://www.offensive-security.com/vulndev/disarming-emet-v5-0/ https://www.offensive-security.com/vulndev/disarming-enhanced-mitigation-experience-toolkit-emet/ https://www.blackhat.com/presentations/bh-europe-07/Sotirov/Whitepaper/bh-eu-07-sotirov-WP.pdf https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/ https://www.fuzzysecurity.com/tutorials/expDev/8.html https://www.fuzzysecurity.com/tutorials/expDev/11.html https://www.corelan.be/index.php/2016/07/05/windows-10-x86wow64-userland-heap/ https://www.corelan.be/index.php/2013/01/18/heap-layout-visualization-with-mona-py-and-windbg/ https://www.corelan.be/index.php/2013/02/19/deps-precise-heap-spray-on-firefox-and-ie10/ http://gsec.hitb.org/sg2016/sessions/look-mom-i-dont-use-shellcode-a-browser-exploitation-case-study-for-internet-explorer-11/ https://github.com/shellphish/how2heap https://0x00sec.org/t/heap-exploitation-abusing-use-after-free/3580 http://expdev-kiuhnm.rhcloud.com/2015/06/02/ie11-part-1/ http://expdev-kiuhnm.rhcloud.com/2015/06/02/ie11-part-2/ http://expdev-kiuhnm.rhcloud.com/2015/06/01/ie10-use-free-bug/ https://sites.google.com/site/zerodayresearch/smashing_the_heap_with_vector_Li.pdf http://blog.morphisec.com/exploit-bypass-emet-cve-2015-2545 http://casual-scrutiny.blogspot.sg/2015/01/simple-emet-eaf-bypass.html Module 0x03 32-bit Kernel Driver Exploitation https://www.offensive-security.com/vulndev/ms11-080-voyage-into-ring-zero/ https://github.com/hacksysteam/HackSysExtremeVulnerableDriver https://theevilbit.blogspot.sg/2017/09/pool-spraying-fun-part-1.html https://theevilbit.blogspot.in/2017/09/windows-kernel-pool-spraying-fun-part-2.html https://theevilbit.blogspot.in/2017/09/windows-kernel-pool-spraying-fun-part-3.html https://www.fuzzysecurity.com/tutorials/expDev/14.html https://www.fuzzysecurity.com/tutorials/expDev/15.html https://www.fuzzysecurity.com/tutorials/expDev/19.html https://www.whitehatters.academy/intro-to-windows-kernel-exploitation-2-windows-drivers/ https://foxglovesecurity.com/2017/08/25/abusing-token-privileges-for-windows-local-privilege-escalation/ https://glennmcgui.re/introduction-to-windows-kernel-exploitation-pt-1/ https://glennmcgui.re/introduction-to-windows-kernel-driver-exploitation-pt-2/ http://srcincite.io/blog/2017/09/06/sharks-in-the-pool-mixed-object-exploitation-in-the-windows-kernel-pool.html https://github.com/hatRiot/token-priv https://rootkits.xyz/blog/2017/06/kernel-setting-up/ https://rootkits.xyz/blog/2017/08/kernel-stack-overflow/ https://rootkits.xyz/blog/2017/09/kernel-write-what-where/ Module 0x04 64-bit Kernel Driver Exploitation http://trackwatch.com/windows-kernel-pool-spraying/ https://blahcat.github.io/2017/08/31/arbitrary-write-primitive-in-windows-kernel-hevd/
  12. Se pare ca vin strainii pe site Azi maine vorbim cu totii engleza pe aici.
  13. @SilenTx0 - nu ai cumva si cursul PTX de la eLearnSec?
  14. Merge daca o tastez, dar nu merge daca ii dau cu grija copy&paste. Nu are spatiu. Merci
×
×
  • Create New...