PaulDotCom mailing list archives

Re: Yet another request for career advice.


From: Josh More <jmore () starmind org>
Date: Wed, 12 Sep 2012 14:41:25 -0500

No time to go into depth here, so here's a scattershot:

Start with discussions, not technology.
Do attack vector mapping and scan by attack vector in order of priority.
Do not scan the next attack vector until you have created a mitigation
plan that everyone agrees with.
Once you have that, split your time 80/20 between resolving issues and
finding new ones.
The surest way to fail is to drown people in data while providing no
practical advice.

Practice your report writing skills.
Contrary to what you were (likely) taught in school, longer is not
better. If you can't explain an issue possible solutions and your
recommended mitigation in a single page, it needs to be shorter.
Read children's board books for inspiration.  (Seriously.  Do this
now.  I am not kidding.)

Be prepared to prove your findings.
Practice on VMs and test systems so your proof doesn't break production.

Try to find mitigations that shortcut other people's jobs.  That's a
great way to get buy in.

(Meeting starting, have to end here.   Good luck.)

-Josh More



On Wed, Sep 12, 2012 at 12:41 PM, A D <hackermuscle () gmail com> wrote:
Hi all.

I recently started working for a new company (beginning of the year)
as part of the networked systems team. We currently manage 300 or so
systems provisioned at a handful of datacenters around the world. 97%
of the systems or running Linux. We have no official security team.
Just good common sense and a need to steer clear of becoming
compromised. My last few jobs I have always been the security
administrator (perimeter security services) so I have some experience
and built in paranoia about what goes on behind the scenes. This
appears to me to be a perfect opportunity to really jump into a
security role by taking the lead in providing vulnerability scans and
penetration testing for the company. I have had exposure to the
typical scanning tools pre-installed with the Backtrack distro and
some others. Although, my Metaspoit skills suck at the moment.

With the hope of providing some quick results and to get my employer
interested in my abilities I am going to jump right in and start doing
whitebox testing using NMAP and Nessus.

What suggestions do you guys have to allow me to step up to the
challenge? This is what want to do in the next phase of my career.

Thanks in adv.

HM
_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com


Current thread: