this post was submitted on 12 Feb 2024
755 points (97.5% liked)

linuxmemes

20703 readers
1578 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 88 points 7 months ago (7 children)

How are you supposed to fine 7 vulernabilities in an hour anyways? No way they expect the applicant to actually find vulernabilities right? So you need to memorize a bunch and see if they are present, which doesn't achieve anything other than testing your memorization abilities

[–] [email protected] 98 points 7 months ago (3 children)

How are you supposed to fine 7 vulernabilities in an hour anyways?

Threaten the interviewer with a knife until they give you at least 7 vulnerabilities. tapsheadmeme

[–] [email protected] 66 points 7 months ago (1 children)

Once again proving social engineering is king.

[–] [email protected] 16 points 7 months ago

The biggest vulnerability is the user.

That being said, click this link to make an easy thousand dollars a day.

[–] [email protected] 18 points 7 months ago

They always forget about the rubber hose exploit.

[–] [email protected] 83 points 7 months ago (1 children)

Using Kali? Easy if you have training. The capstone for our security course a decade ago was too find and exploit 5 remote machines (4 on the same network, 1 was on a second network only one of the machines had access to) in an hour with Kali. I found all 5 but could only exploit 3 of them. If I didn't have to exploit any of them 7 would be reasonably easy to find.

Kali basically has a library of known exploits and you just run the scanner on a target.

This isn't novel exploit discovery. This is "which of these 10 windows machines hasn't been updated in 3 years?"

[–] [email protected] 9 points 7 months ago (1 children)

Just saying that running automated tools and identifying those vulnerabilities is just the first step to learning hacking, but nothing more. To gain a proper understanding you must be able to find vulnerabilities manually or at least understand a certain exploit such as ETERNALBLUE which you won't really look for manually.

[–] [email protected] 8 points 7 months ago

Sure. But for an entry level interview as a pen tester... Scanning with Kali should be an easy task.

[–] [email protected] 40 points 7 months ago

It's going to be a system set up with known vulnerabilities that should be easy to locate using common tools already installed on Kali; a real world scenario should (at least in theory) not be that simple, but in a capture the flag pentest environment, that's pretty normal

[–] [email protected] 18 points 7 months ago

You can see that the first machine is at /dvwa which is the Damn Vulnerable Web Application and is made for practicing hacking. If you have a basic understanding of the vulnerabilities there finding 7 of them is easy peasy.

[–] [email protected] 7 points 7 months ago

A taser and 7 pairs of handcuffs

[–] [email protected] 4 points 7 months ago

I can find a bunch with just nmap

[–] [email protected] 3 points 7 months ago

mf wants you to work before even being hired