Getting Started as a Penetration Tester in NZ (2021 Edition)
Welcome to the latest installment of Getting Started as a Penetration Tester in NZ! An annual look at what is takes to get into this exciting industry sector. This year includes a new section on written skills, and a refresh of all resources referenced.
The cyber security domain has also grown massively as you can see from the mind map below (credit: Henry Jiang). I'm going to be focusing on roles predominately in the red (risk assessment) and blue (career development) branches of this map.
If you are interesting in domains other than penetration testing, check out the Awesome-InfosecNZ resources which cover DFIR, blue teaming and a bunch of other areas.
Maybe you want a job at Google as a security engineer? Well Grace has you sorted with her handy study guide.
To get into the industry it doesn't matter if you don't have a degree, your lack of tertiary education should not be a barrier to entry. A lot of companies are now committed to a 'no qualifications required' hiring model. At ZX we look for people that have passion and some practical experience actually hacking something, not just a bunch of theoretical knowledge.
Listed below are a number of ways to safely skill yourself up without breaking the law.
(Virtually) attend all the things
With the majority of in-person conferences now going virtual, and our inability to travel, seek out virtual conferences, pull up your chair and tune in. We have seen some really innovative approaches to running these events, and they are proving to be a good substitute.
Read/Listen to all the things
Watch all the things
There are a whole bunch of great content creators on YouTube, some of the ones recommended to me are:
Hone your skills
A good place to start learning about web application hacking is using a virtual lab. For this you will need the following:
If you want to hone your Metasploit skills (which is an important tool to get to grips with), check out metasploitable.
Once you have mastered Pentester Labs its time to shift it up a gear. Hack the box has a great selection of virtual machines that can really level you up. While these could be classified as a CTF as well (see below), they teach some great fundamental knowledge.?They also have a new Hack the box Academy
If you want to hone your network testing skills, check out Mininet, its allows you to create an instant virtual network. GNS3 is also popular network emulation software. A finally if you want to get good at Crypto, check out CryptoHack
Written Skills
A big part of being a penetration tester is being able to write well. Our clients pay for a report which documents the issues you have identified. If you can't articulate your findings, the message may fall flat or be lost.
Reports will often contain two styles of writing
The following Github page provides a list of penetration testing reports collected from various places. They provide a good overview of how to structure a report, and the amount of detail expected.
While practicing your written skills can be difficult, the following ideas may be of some use:
Wargames / Capture the Flag?
Once you have mastered the Pentester labs and Hack the Box, move onto some Capture the Flag exercises, good ones include:?
Then if you want to really challenge yourself:
Bug Bounties
One of the best ways to hone your skills legally is by participating in bug bounty programs. This is a good next step after completing the pentesterlab.com exercises. Start off with the free-tier/charity engagements, usually there are less people on these and therefore more bugs. After you build a reputation you may get invited to the closed/invite-only programs, again less people and potentially easier bugs.
The following platforms are the most popular (and well reputed):
领英推荐
The Bug Hunters Methodology also provides some great insight into findings bugs in bounty programs. Ol' mate Shubs has a great write-up on how he cut his teeth bounty hunting back in the day. His more recent musings are captured on the AssetNote blog
If you find bugs, write a blog post about it (assuming its OK with the company you found the issue in). This will help your writing skills while showing your peers (or prospective employer) that you have a passion and competence in the area.?
If the bug you find is inadvertently in a corporate website or application outside of a bounty program, please consider responsibly disclosing it to the company in question. CERT NZ have a great process which covers this
Qualifications
There are a huge number of certifications now available in the penetration testing space as you can see from the image below available at Paul Jerimy's website (red section).
The first qualification you should aim for is the Offensive Security Certified Professional (OSCP), or its CREST equivalent. The OSCP was updated in 2020, which was long overdue and makes the certification more relevant than ever.
It will probably take between three and 12 months to complete the labs depending on prior knowledge, ensure you have a good grounding in Linux before starting. If you can obtain an OSCP before you start you first job the people hiring you will be seriously impressed.
The OSCP preparation guide (updated for 2021) from @johnjhacking might also come in handy. The OSCP is hard, @evildaemond has some useful advice.
Books
Compulsory reading for any budding hacker should be The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage.
Keep an eye out for Humble Bundle deals, sometimes you can pick up a whole bunch of great books for a really reasonable price.
Anything from No Starch Press is generally excellent, here are some of my favorites:
Standing Out
The following advice is from ZX's GM Ian White who was a cyber security recruiter in a previous life.
So you've read the how to, now you want to stand out. All this hard work is about?landing your dream role. You will need to grab the hiring managers attention in two key areas:?
Let's tackle each on separately:
Professional Ability
You need to be able to showcase your current ability. The best way to do this is with tangible results that a hiring manager can see. What would this look like on your resume for someone wanting to get into the industry??
The above gives a hiring manager a snapshot of your current ability. Again, this is just an example.?Even working towards one of these tasks would be great.
Passion
A hiring manager will always favor someone who has passion towards their work. Again, this can be showcased within?a resume.?
Some additional tips
Mental Health
@sentreh provided the following advice which i think is pretty accurate
Remember to eat healthy and get a good night sleep. Nothing else matters much
Make sure you look after yourself, get outside and breath some fresh air, absorb some sunlight and don't spend every waking hour in front of your computer.
Some sage advice from @_tonijames
A wise friend once told me "there is no magic in what we do", it's just hard work and cultivation of the hacker mindset. So get out there and start hacking!
Cyber Security Specialist at Confidential
8 个月Excellent post! Understanding the nuances of penetration testing is essential for any security professional
Software Architect | Software Engineer | Cybersecurity Professional
1 年A good reference. An associated article could be a bare minimum IT professionals need to know to offer any kind of IT services (license to operate in industry). There are far too many who have specific job titles and attest to total ignorance of the security domain (yes it's broad).
IT Onsite Support Engineer
3 年Thank you for taking your time to write this article Simon. This has answered many questions that I have had for a while and those resources are awesome. Conor Williams this article is a must read.
..ooO Cyber Resilience as a Service Ooo...
3 年It may be worth having in your guide a current summary or similar to this thesis submission Debugging Computer Crime A 13-Year Analysis of the “Crimes Involving Computers” Provisions of the Crimes Act 1961. Amy Jessica Corkery (2016) https://www.otago.ac.nz/law/otago638159.pdf