Recent comments in /f/IAmA
[deleted] t1_j6a2v9w wrote
[removed]
cyberjerry42 OP t1_j6a0mb2 wrote
Reply to comment by Security_Chief_Odo in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
Exactly! Mainly web based stuff, breaking our internal services (APIs) and a lot of cloud infra pentesting (AWS & GCP mainly)
cyberjerry42 OP t1_j6a0fst wrote
Reply to comment by Monster-Zero in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
I personally think I'm paid very well but I know some countries tend to be more cheap on security analyst salaries for whatever reason.
Where I currently am based, I'd say you could live decently (if living with your significant other) on ~50K. I'm currently paid 90K and I'm on the "high-end" of the typical entry-level pay.
PeriodicTrend t1_j6a01tu wrote
Do you challenge the common notion that deli meat is a healthy food option despite science proving it’s not?
cyberjerry42 OP t1_j69zzev wrote
Reply to comment by CellBoth8566 in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
I will typically try and reach out in multiple ways to the company to initially let them know of my findings. I will search for a `.well-known/security.txt` or an official security team email. If I can't find anything, I'll try and reach out directly to people via their work email. I will then wait a couple of weeks and try to reach out once more but this time broadening my "scope" even more (sending emails to more people and repeating those I've sent initially).
If after a few weeks/months, I will try and reach out via public channels to the company (twitter, facebook, instagram).
I have yet to fail to reach out to a company (gladly) so I have thankfully never had to weigh the pros and cons of exposing a vulnerability publicly for the "greater good" of the community so I can't really say what I would do if all channel of communications failed.
Security_Chief_Odo t1_j69zrxs wrote
Reply to comment by cyberjerry42 in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
Ahh okay so you mainly are focused on your own products and web based vulnerabilities.
FindingEmoe t1_j69zje6 wrote
Reply to comment by LizRD15 in I'm a Registered Dietitian (RD), and host of The Sh*t Talk Podcast. AMA! by LizRD15
This wouldn't be black coffee 🤣🤣🤣 nice try though
Monster-Zero t1_j69zj2i wrote
What are they paying you versus your area's cost of living?
CellBoth8566 t1_j69z95n wrote
How do you approach responsible disclosure when identifying vulnerabilities in a company or organization's systems?
FindingEmoe t1_j69z333 wrote
What's your views on intermittent fasting long term, specifically a one meal a day meal plan?
[deleted] t1_j69yxjq wrote
[removed]
[deleted] t1_j69ywsj wrote
[removed]
[deleted] t1_j69yvif wrote
[removed]
cyberjerry42 OP t1_j69y4hx wrote
Reply to comment by Em_Adespoton in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
Absolutely! Couldn't agree more. I was not aware that it's a common career path tho, cool to know!
Em_Adespoton t1_j69xwjo wrote
Reply to comment by cyberjerry42 in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
I’ll just add to this that starting off in support and moving to IT security is a very common career path. For red teaming, you’ll need some people with a CS background, but mostly what you need is generalists who can think laterally and pick up how to use new tools in novel ways. Support is also a viable way into blue teams, but you’re going to need a deeper understanding of systems and structures (and basic coding and analysis) to play defence.
cyberjerry42 OP t1_j69wyrp wrote
Reply to comment by Security_Chief_Odo in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
Oh and I do create exploits but typically they are very specific to the use-case and wouldn't be very useful in the wild. I do however work on some internal projects that should be made open-source at some point but they are typically more recon centric.
cyberjerry42 OP t1_j69wmn9 wrote
Reply to comment by Elbynerual in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
I didn't have any when I applied for the job. I'm currently working on both my Sec+ and OSCP for compliance purposes :)
Elbynerual t1_j69wg4i wrote
You don't have any cyber security certifications?
cyberjerry42 OP t1_j69wfgk wrote
Reply to comment by Security_Chief_Odo in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
I have to start by stating that I do not work for a security company, I work as a pentester for a tech company.
The company which I'm working at is very active on preemptively detecting CVEs (with tools like Snyk for example) in our dependencies so Metasploit doesn't really fit the kind of pentests we typically. Most of our products are either built in-house or heavily scanned before being deployed. I do however use tools that are a little more focused on certain aspects to do my reconnaissance or to catch reverse shells when it comes to it like Burpsuite, Pwncat, Feroxbuster, etc..
In terms of findings CVEs, since I only do research on our own product, I don't really "find CVEs" which will get indexed into the CVE databases. I will typically find flaws that will get patched before reaching production or that will quickly get hot-fixed.
I have to say what I enjoy the most is the cliche "I'm in" feeling. It's usually very hard to find serious vulnerabilities in well designed product but once in a while you'll find a very unique or odd way of making something do something it's not supposed to and it's an insanely satisfying feeling :) I am also a staunch believer that what I'm doing is "for the greater good".
IAmAModBot t1_j69w7wx wrote
For more AMAs on this topic, subscribe to r/IAmA_Specialized, and check out our other topic-specific AMA subreddits here.
Security_Chief_Odo t1_j69vdzp wrote
Do you have much experience creating exploits or finding CVEs, or mostly just using Metasploit and other scanning tools?
What do you enjoy most about being offensive security?
cyberjerry42 OP t1_j69uwo2 wrote
Reply to comment by motoboxer1 in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
So my "entry path" was through customer support actually! I stumbled on an job ad. I was searching specifically for support jobs as my "plan" was to get in support. By starting in support, it enabled me to get a better knowledge of how things worked inside the company so that I could lay out my next steps. As you may assume, tech companies work very differently than other traditional jobs!After about a year of being in support i managed to gain enough knowledge about our product to fully understand it. Came a point where the company's security department hosted a CTF and I knew this was my time to shine :) I ended up winning it and that's how I got my foot in the door so to speak. The security manager now knew my name a and that I had some skills so that's when I started pushing more into showing interest in that field. After a few weeks of getting to know the security team better and showing active interest into security (even from within the security department), I applied internally and got the job!!
sweatycat t1_j69uphx wrote
The OP has submitted proof confidentially.
motoboxer1 t1_j69txrb wrote
Where did you even start when looking to change career paths without additional schooling? I'm currently a truck driver in a similar situation, having only a high school diploma, and I want to make a similar change.
Difficult_Lad t1_j6a553d wrote
Reply to comment by cyberjerry42 in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
CTF?