<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Penetration Testing on System Overlord</title><link>https://systemoverlord.com/tags/penetration-testing.html</link><description>Recent content in Penetration Testing on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Tue, 14 Jul 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/penetration-testing/index.xml" rel="self" type="application/rss+xml"/><item><title>Raspberry Pi as a Penetration Testing Implant (Dropbox)</title><link>https://systemoverlord.com/2020/07/14/raspberry-pi-as-a-penetration-testing-implant.html</link><pubDate>Tue, 14 Jul 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/07/14/raspberry-pi-as-a-penetration-testing-implant.html</guid><description>&lt;p&gt;&lt;a href="https://www.amazon.com/Raspberry-Model-2019-Quad-Bluetooth/dp/B07TC2BK1X/ref=as_li_ss_il?cv_ct_cx=raspberry+pi&amp;amp;dchild=1&amp;amp;keywords=raspberry+pi&amp;amp;pd_rd_i=B07TC2BK1X&amp;amp;pd_rd_r=cf3c4a78-81c5-4c9a-921f-9c70bae2796e&amp;amp;pd_rd_w=XB1nE&amp;amp;pd_rd_wg=PG6Eq&amp;amp;pf_rd_p=1da5beeb-8f71-435c-b5c5-3279a6171294&amp;amp;pf_rd_r=6XKT1T3E2254DKNEXTAY&amp;amp;psc=1&amp;amp;qid=1594437202&amp;amp;sr=1-1-70f7c15d-07d8-466a-b325-4be35d7258cc&amp;amp;linkCode=li3&amp;amp;tag=systemovecom-20&amp;amp;linkId=cf0fb5b6f95cfb61bff474270a0b5ea1&amp;amp;language=en_US"&gt;&lt;img src="https://ws-na.amazon-adsystem.com/widgets/q?_encoding=UTF8&amp;amp;ASIN=B07TC2BK1X&amp;amp;Format=_SL250_&amp;amp;ID=AsinImage&amp;amp;MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;WS=1&amp;amp;tag=systemovecom-20&amp;amp;language=en_US" alt="Raspberry Pi 4"&gt;{:.left .amzimg}&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Sometimes, especially in the time of COVID-19, you can&amp;rsquo;t go onsite for a
penetration test. Or maybe you can only get in briefly on a physical test, and
want to leave behind a dropbox (literally, a box that can be &amp;ldquo;dropped&amp;rdquo; in place
and let the tester leave, no relation to the file-sharing company by the same
name) that you can remotely connect to. Of course, it could also be part of the
desired test itself if incident response testing is in-scope &amp;ndash; can they find
your malicious device?&lt;/p&gt;
&lt;p&gt;In all of these cases, one great option is a small single-board computer, the
best known of which is the &lt;a href="https://amzn.to/3fl8jSn"&gt;Raspberry Pi&lt;/a&gt;. It&amp;rsquo;s
inexpensive, compact, easy to come by, and very flexible. It may not be perfect
in every case, but it gets the job done in a lot of cases.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ll use this opportunity to discuss the setups I&amp;rsquo;ve done in the past and the
things I would change when doing it again or alternatives I considered. I hope
some will find this useful. Some familiarity with the Linux command line is
assumed.&lt;/p&gt;</description></item><item><title>So You Want to Red Team?</title><link>https://systemoverlord.com/2019/03/26/so-you-want-to-red-team.html</link><pubDate>Tue, 26 Mar 2019 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2019/03/26/so-you-want-to-red-team.html</guid><description>&lt;p&gt;So there&amp;rsquo;s a lot of confusion out there about Penetration Testing and Red
Teaming. I wanted to put together a list of resources for those familiar with
infosec or penetration testing who want to get into red teaming or at least get
a better understanding of the methodologies and techniques used by red teamers.&lt;/p&gt;
&lt;p&gt;First, it&amp;rsquo;s important to note that Red Teaming is predominantly comprised of two
things: alternative analysis and adversary simulation. Red teams do not attempt
to find &amp;ldquo;all the vulnerabilities&amp;rdquo; and do not usually try to have a wide breadth
of coverage. Instead, red teams seek to simulate an adversary with a particular
objective, predominantly to act as a &amp;ldquo;sparring partner&amp;rdquo; for blue teams. Keep in
mind, red teams are the only adversary that will debrief with the blue team so
that blue team can figure out what they missed or could have done differently.&lt;/p&gt;
&lt;p&gt;For more about the specific definition of Red Teaming, check out the
presentation &lt;a href="https://www.slideshare.net/TobyKohlenberg/red-teaming-probably-isnt-for-you-81283357"&gt;Red Teaming Probably Isn&amp;rsquo;t For You&lt;/a&gt;
by fellow red teamer Toby Kohlenberg.&lt;/p&gt;</description></item><item><title>Getting Started in Offensive Security</title><link>https://systemoverlord.com/2017/09/18/getting-started-in-offensive-security.html</link><pubDate>Mon, 18 Sep 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/09/18/getting-started-in-offensive-security.html</guid><description>&lt;p&gt;&lt;strong&gt;Please note that this post, like all of those on my blog, represents only my
views, and not those of my employer. Nothing in here implies official hiring
policy or requirements.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m not going to pretend that this article is unique or has magic bullets to get
you into the offensive security space. I also won&amp;rsquo;t pretend to speak for others
in that space or in other areas of information security. It&amp;rsquo;s a big field, and
it turns out that a lot of us have opinions about it. Mubix maintains a
&lt;a href="https://gist.github.com/mubix/5737a066c8845d25721ec4bf3139fd31"&gt;list of posts like this&lt;/a&gt;
so you can see everyone&amp;rsquo;s opinions. I highly recommend the post &lt;a href="https://medium.freecodecamp.org/so-you-want-to-work-in-security-bc6c10157d23"&gt;&amp;ldquo;So You Want
to Work in Security&amp;rdquo;&lt;/a&gt;
by Parisa Tabriz for a view that&amp;rsquo;s not specific to offensive security. (Though
there&amp;rsquo;s a lot of cross-over.)&lt;/p&gt;</description></item></channel></rss>