this post was submitted on 12 Feb 2024
754 points (97.4% liked)

linuxmemes

22165 readers
253 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] [email protected] 88 points 11 months ago (7 children)

    How are you supposed to fine 7 vulernabilities in an hour anyways? No way they expect the applicant to actually find vulernabilities right? So you need to memorize a bunch and see if they are present, which doesn't achieve anything other than testing your memorization abilities

    [–] [email protected] 98 points 11 months ago (3 children)

    How are you supposed to fine 7 vulernabilities in an hour anyways?

    Threaten the interviewer with a knife until they give you at least 7 vulnerabilities. tapsheadmeme

    [–] teft 66 points 11 months ago (1 children)

    Once again proving social engineering is king.

    [–] RGB3x3 16 points 11 months ago

    The biggest vulnerability is the user.

    That being said, click this link to make an easy thousand dollars a day.

    [–] [email protected] 18 points 11 months ago

    They always forget about the rubber hose exploit.

    [–] fkn 83 points 11 months ago (1 children)

    Using Kali? Easy if you have training. The capstone for our security course a decade ago was too find and exploit 5 remote machines (4 on the same network, 1 was on a second network only one of the machines had access to) in an hour with Kali. I found all 5 but could only exploit 3 of them. If I didn't have to exploit any of them 7 would be reasonably easy to find.

    Kali basically has a library of known exploits and you just run the scanner on a target.

    This isn't novel exploit discovery. This is "which of these 10 windows machines hasn't been updated in 3 years?"

    [–] [email protected] 9 points 11 months ago (1 children)

    Just saying that running automated tools and identifying those vulnerabilities is just the first step to learning hacking, but nothing more. To gain a proper understanding you must be able to find vulnerabilities manually or at least understand a certain exploit such as ETERNALBLUE which you won't really look for manually.

    [–] fkn 8 points 11 months ago

    Sure. But for an entry level interview as a pen tester... Scanning with Kali should be an easy task.

    [–] [email protected] 40 points 11 months ago

    It's going to be a system set up with known vulnerabilities that should be easy to locate using common tools already installed on Kali; a real world scenario should (at least in theory) not be that simple, but in a capture the flag pentest environment, that's pretty normal

    [–] [email protected] 18 points 11 months ago

    You can see that the first machine is at /dvwa which is the Damn Vulnerable Web Application and is made for practicing hacking. If you have a basic understanding of the vulnerabilities there finding 7 of them is easy peasy.

    [–] Agent641 7 points 11 months ago

    A taser and 7 pairs of handcuffs

    [–] [email protected] 4 points 11 months ago

    I can find a bunch with just nmap

    [–] [email protected] 3 points 11 months ago

    mf wants you to work before even being hired