4chan-datasets / g /92821145.txt
lesserfield's picture
Sun Apr 16 16:54:23 UTC 2023
8837177
-----
--- 92821145
Hypothetically speaking, would this work?
--- 92821161
>>92821145 (OP)
>they agree
good luck with that unless you have a strong track record
--- 92821235
>>92821145 (OP)
Any place with data worth securing would have at least 1 person on staff who could check if you did anything
And there's the liability you take assuring no vulnerabilities if they're hacked later
--- 92821334
>>92821235
This.
If you assure them their systems are safe and then they DO get hacked they will sue the shit out of you
--- 92821362
Okay, that's fine but you need to provide a full report of what you pentested, how you did it, et cetera. Do you think the lab results for your STD test are just "ur fine lol"? OP, are you 18 years or older?
--- 92821457
>>92821362
>>92821145 (OP)
it's a good idea, but don't sit on your ass. do run some scans and generate a report. you should be able to fully automate it. when calling them sell them on the "economy" plan, but mention the platinum enterprise plan for like 10 million bucks if they ask for it.
then give them the report, and if they do get pwnd tell them it wasn't covered in their package.
--- 92821634
>>92821457
That just seems like an actual legitimate business though
And that seems like a lot of work
--- 92821692
>>92821634
just ask gpt-4 to generate the scan scripts for you lol
or if you're too dumb to proompt, get someone on fiverr to do it for you.
if you already have the chops to sell, you're like 90% of the way there. it would be a shame to let that talent go to waste.
--- 92821698
>>92821145 (OP)
Are you retarded, by chance? Obviously they'd expect a full report
--- 92821762
>>92821698
no they wouldn't
--- 92822090
>>92821145 (OP)
what happens if they get hacked for real a week later?
--- 92822487
>>92821762
Yes, they do. That's how is done. Search for YouTube for something like "professional hacker", "a day in a hacker's life" or some faggotry like this and you will see than in the end they specify even the methods used and where they probed.
--- 92822549
>>92821334
Can't you just say that their systems are secure against "x" or "y" attacks
--- 92822669
>ask my sysadmin to create an obvious vulnerability
>you dont find it
>i ask what you tried
>i catch you lying
--- 92822677
>>92822669
>I sodomize you
--- 92823172
>>92821145 (OP)
Does anyone have that other post where an claimed he had a scheme he was running where he'd invoice random companies under a consulting name for like $8k-$10k and list the line item with a scope of work of him invoicing the company?
If I remember right he actually had companies pay and offered 90 day refunds and everything and was legally in the clear because he technically was following all the business laws and regulations
--- 92825015
>>92822549
You would have to show them that "X" and "Y" attacks were performed. If you sat on your ass as you suggested, and X and Y attacks were performed, you still get sued.
--- 92825040
>>92821145 (OP)
Can I offer my services doing this but with physical security? Like trying to climb their fences and smash their doors down etc?
--- 92825067
>>92822487
You're right. Having worked at places that have been pen tested you always get a report. Hell one of them flooded our site during peak hours and DDOS'd us offline by accident.
All greentext anon has to do is point Metasploit at the target and go back to sleep.
--- 92825090
>>92821145 (OP)
Yes, there are companies specialized in it. Next question.
--- 92825103
>>92825040
lmao
The virgin pentester:
>runs all tools from Kali
The Chad brain-damaged ex-football player:
>smashes the front door. Only steals desktop screens
--- 92825114
>>92825040
i will now refer to looting as "irl red teaming"
--- 92825138
>>92821145 (OP)
no it would not work, anon in image has never EVER worked in the IT industry.
during the attack phase the company has several of their own people in constant contact with the red-team attackers engineers to discuss whats happening and when, after the attack phase dozen page reports are typically produced detailing every single minute thing found from unpatched servers, network shares with liberal permissions applied to open ports in firewalls.
t. worked for company that paid multiple different vendors over the years to conduct penetration tests
--- 92825212
I was hired as a senior sysadmin for a large firm with thousands of servers and a matching inflated salary. Automated my job with some shell and ansible scripts within the first month and then did almost nothing for the next five years while raking in the money.
--- 92826601
No, because they would want documentation.
--- 92828465
>>92825103
>Only steals desktop screens
i shitted
--- 92829140
>>92825015
>>92822549
>>92821334
>>92821235
couldnt you throw all the money into an llc with veil active, and pay yourself a wagie cagie?
--- 92829493
>spend millions setting up an amazing security system in your system
>defeated in 90 seconds by pretending to be a girl and convincing the IT head you want to have sex with him
hacking is gay, social engineering will always be superior.
--- 92829554
>>92821145 (OP)
Yes, this is what security anal ysts do. But instead of say that nothing wrong they say there a problems even if there aren't any to try to sell you snake oil.
--- 92830620
>>92829493
Hacking will always be the big brain way but social engineering will always be the Chad way