This thread is for the discussion and support of those anons who have accepted the Quest to become remote pentesters. I am OP, my email is OSCPanon at protonmail. You may contact me via email with any questions related to hacking professionally, or learning to do so.
Link to the last General thread: So what are you doing to further your Quest this weekend user? Here are some good resources and things you could start working on:
Free ebook downloads for several of the books I cover: b-ok.org/
NOTE - ADD INFO FOR IRC AND FOR UPCOMING ONLINE CTF EVENTS AND HOW TO JOIN! ALSO ADD INFO FOR ANONYMITY WHEN USING IRC (DIG UP OLD ANONYMOUS GUIDES FOR THIS)
Thanks to everyone who replied to my email with the guide. My protonmail inbox is now a beacon of hope. I really appreciate your warm regards, and your positivity proves to me this is going to be a worthwhile venture.
Monetization section (updates soon):
Bug bounty site (hack large companies and websites for bounty rewards): hackerone.com
Hackerone also runs this site, which is for learning: hacker101.com/
If you are looking for the original PDF guide I posted / emailed , then please see the previous /RPG/ threads. As always any questions are welcome, and I will answer them as soon as I can throughout the day. If you want to discuss other remote work opportunities in tech, outside of hacking, that is fine too. And anyone who wants to chime in with advice on such a topic is welcome to join in.
You got this anons!
ps. Looking for IRC chat mods. Email me if you are interested. OSCPanon at protonmail dot com. Also, I added some stuff to the MISC section, couple links for online CTFs for beginners. Check em out.
Colton Young
Got the wrong link to last thread. Here you go:
John Hall
>NOTE - ADD INFO FOR IRC AND FOR UPCOMING ONLINE CTF EVENTS AND HOW TO JOIN! ALSO ADD INFO FOR ANONYMITY WHEN USING IRC (DIG UP OLD ANONYMOUS GUIDES FOR THIS)
damn I'm off today. left my own notes in there. anyway, you have a glance at what I'm working on for next weeks /RPG/ thread.
Also apologies that I am just now getting caught up on emails. It's been a busy couple weeks.
Hudson Rogers
OP, would you say learning pentesting is the best way to build up 'blue-team' skillsets? Could use some advice on this approach.
Lincoln Martin
Tough question. I actually have done blue-team for the defense industry, and it is a lot different that penetration testing, of course. What I will say, is that if you were to be OSCP qualified, you would be the most qualified blue-teamer I know. As a red-team guy now, I always wish my blue-team understood more of what I am telling them from the offensive side. A blue-team member with this level of knowledge, would not just be a SME, they would be the absolute god-mode expert. Understanding the offense to that level, while practicing incident response, forensics, etc... You would be about as valuable as a blue-team as you could be. that's my opinion, having worked both blue and red team, as well as dedicated proactive defense.
Jonathan Rodriguez
Awesome thanks, always scratched my head at the degree of separation between the two. Would working on both facets in parallel (assume not a beginner) be inefficient?
Jaxon Campbell
In my opinion, the two SHOULD go hand in hand. It is unfortunate that they don't, but I think this is an issue, where if companies required blue-teams to have the level of knowledge of red-teams, they wouldn't have a blue-team. I think you can safely work on both in parallel. I don't have resources handy right this minute, but I've got some packed away. Let me get back to you with some book titles and resources that I think would help with this.
Adam Cook
Also, I caught up on the backlogged emails. If you haven't heard from me, check your inbox, and if you have questions send em, I'm all caught up.
Lincoln James
my parents missed woodstock I've been making up for it ever since