Submitted by cyberjerry42 t3_10nnsg4 in IAmA
cyberjerry42 OP t1_j69wfgk wrote
Reply to comment by Security_Chief_Odo in I am an ex-welder turned Offensive Security analyst (ethical hacker) AmA! by cyberjerry42
I have to start by stating that I do not work for a security company, I work as a pentester for a tech company.
The company which I'm working at is very active on preemptively detecting CVEs (with tools like Snyk for example) in our dependencies so Metasploit doesn't really fit the kind of pentests we typically. Most of our products are either built in-house or heavily scanned before being deployed. I do however use tools that are a little more focused on certain aspects to do my reconnaissance or to catch reverse shells when it comes to it like Burpsuite, Pwncat, Feroxbuster, etc..
In terms of findings CVEs, since I only do research on our own product, I don't really "find CVEs" which will get indexed into the CVE databases. I will typically find flaws that will get patched before reaching production or that will quickly get hot-fixed.
I have to say what I enjoy the most is the cliche "I'm in" feeling. It's usually very hard to find serious vulnerabilities in well designed product but once in a while you'll find a very unique or odd way of making something do something it's not supposed to and it's an insanely satisfying feeling :) I am also a staunch believer that what I'm doing is "for the greater good".
Security_Chief_Odo t1_j69zrxs wrote
Ahh okay so you mainly are focused on your own products and web based vulnerabilities.
cyberjerry42 OP t1_j6a0mb2 wrote
Exactly! Mainly web based stuff, breaking our internal services (APIs) and a lot of cloud infra pentesting (AWS & GCP mainly)
Viewing a single comment thread. View all comments