4 answers
Updated
679 views
penetration testing cyber security?
hello, I have a cople of different questions about penetration testing. I am looking into it as a career and would love some more insight.
(1)Do you work offensively or defensively?
(2)What are your hours like?
(3)How many people do you usually work with?
(4) What does the average workday look like?
4 answers
Updated
Nick’s Answer
Hi Ian!
1) Pen-Testers are typically on the "Red team", which is to say they're typically acting as the Attacker, as opposed to the "Blue team" that acts as the Defenders. Sometimes though, the 2 teams will combine forces for something referred to as a "Purple team" exercise, where Attackers and Defenders work together to identify the best strategies to detect attacks and block/prevent them.
2) This depends on the company you work for. Pen-Testers can either work directly for a company, helping to test their own infrastructure and systems, or they can work for a company that provides Pen-testing services to customers. If you work for a company directly as a Pen-tester, hours are similar to typical software engineers, which is to say whatever you want them to be (so long as you get your work done and attend required meetings, starting at 8am vs. 11am isn't very different).
3) Most Pen-test teams are small, and work together in groups of 2-3 individuals while performing a specific test. The whole team may only be 5-10 people.
4) The process of performing a Pen-test looks something like: 1 - planning, 2-research, 3-reconnaissance, 4-attacking. Depending on which stage of the process you're in, your day can look pretty different! During 2-4, you're usually working closely with 1 or 2 other people to find ways to attack your target. During 1, you're meeting with the people involved (who is sponsoring the test) and planning what your objectives will be (are you looking to steal data or take something offline?).
1) Pen-Testers are typically on the "Red team", which is to say they're typically acting as the Attacker, as opposed to the "Blue team" that acts as the Defenders. Sometimes though, the 2 teams will combine forces for something referred to as a "Purple team" exercise, where Attackers and Defenders work together to identify the best strategies to detect attacks and block/prevent them.
2) This depends on the company you work for. Pen-Testers can either work directly for a company, helping to test their own infrastructure and systems, or they can work for a company that provides Pen-testing services to customers. If you work for a company directly as a Pen-tester, hours are similar to typical software engineers, which is to say whatever you want them to be (so long as you get your work done and attend required meetings, starting at 8am vs. 11am isn't very different).
3) Most Pen-test teams are small, and work together in groups of 2-3 individuals while performing a specific test. The whole team may only be 5-10 people.
4) The process of performing a Pen-test looks something like: 1 - planning, 2-research, 3-reconnaissance, 4-attacking. Depending on which stage of the process you're in, your day can look pretty different! During 2-4, you're usually working closely with 1 or 2 other people to find ways to attack your target. During 1, you're meeting with the people involved (who is sponsoring the test) and planning what your objectives will be (are you looking to steal data or take something offline?).
Updated
D’s Answer
Hello Ian!
Adding to Nick's answer to question 4), your day may also include 5 - Writing Reports. This is where you put together the all the information you've been provided and gathered during testing into a report that is provided to the engineers/system administrators, etc. Whoever the audience is, the report must be clear and concise and can include your findings from the test and how you were able to exploit any vulnerabilities, etc. A good rule of thumb here is to document what you do and how you do it as you go along during testing to help make your report writing easier.
Feel free to review this white paper here that discusses foundational steps for a penetration test. https://www.sans.org/white-papers/67/
Adding to Nick's answer to question 4), your day may also include 5 - Writing Reports. This is where you put together the all the information you've been provided and gathered during testing into a report that is provided to the engineers/system administrators, etc. Whoever the audience is, the report must be clear and concise and can include your findings from the test and how you were able to exploit any vulnerabilities, etc. A good rule of thumb here is to document what you do and how you do it as you go along during testing to help make your report writing easier.
D recommends the following next steps:
Updated
Martin’s Answer
Hi Ian,, working as a PenTester,, good one.
Although AI will take its place in this type of work.
But in general:
1)Do you work offensively or defensively?
Depends on the contract with the company that hires the Pentesters.
(2)What are your hours like?
Ethical Hackers usually work office hours.
(3)How many people do you usually work with?
At most Pen-test companies its most of the time a team of 5. (where one writes reports :-)
(1) What does the average workday look like?
Although AI will take its place in this type of work.
But in general:
1)Do you work offensively or defensively?
Depends on the contract with the company that hires the Pentesters.
(2)What are your hours like?
Ethical Hackers usually work office hours.
(3)How many people do you usually work with?
At most Pen-test companies its most of the time a team of 5. (where one writes reports :-)
(1) What does the average workday look like?
Updated
Jimil’s Answer
Penetration testing, also known as ethical hacking, involves simulating cyber attacks on computer systems, networks, or web applications to test their defenses and identify vulnerabilities. There are two types of penetration testers: offensive and defensive.
(1) Offensive penetration testers, also known as "red team" testers, focus on attempting to breach the systems and defenses of an organization. They use their skills and knowledge to try to find and exploit vulnerabilities in order to gain unauthorized access.
(2) Defensive penetration testers, also known as "blue team" testers, work to defend against potential attacks and help organizations improve their security posture. They may also be responsible for conducting vulnerability assessments and penetration tests to identify and remediate vulnerabilities.
(2) Hours for penetration testers can vary depending on the specific job and the needs of the organization. Some positions may require on-call availability or the ability to work irregular or long hours.
(3) The number of people a penetration tester works with can also vary. Some testers may work independently, while others may be part of a larger team.
(4) The average workday for a penetration tester may involve a combination of researching and learning about new attack techniques and tools, planning and conducting penetration tests, analyzing test results, and reporting findings to clients. Testers may also be responsible for staying up to date with new technologies and developments in the field.
(1) Offensive penetration testers, also known as "red team" testers, focus on attempting to breach the systems and defenses of an organization. They use their skills and knowledge to try to find and exploit vulnerabilities in order to gain unauthorized access.
(2) Defensive penetration testers, also known as "blue team" testers, work to defend against potential attacks and help organizations improve their security posture. They may also be responsible for conducting vulnerability assessments and penetration tests to identify and remediate vulnerabilities.
(2) Hours for penetration testers can vary depending on the specific job and the needs of the organization. Some positions may require on-call availability or the ability to work irregular or long hours.
(3) The number of people a penetration tester works with can also vary. Some testers may work independently, while others may be part of a larger team.
(4) The average workday for a penetration tester may involve a combination of researching and learning about new attack techniques and tools, planning and conducting penetration tests, analyzing test results, and reporting findings to clients. Testers may also be responsible for staying up to date with new technologies and developments in the field.
Delete Comment
Flag Comment