<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Pentesting on System Overlord</title><link>https://systemoverlord.com/tags/pentesting.html</link><description>Recent content in Pentesting on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Tue, 29 Dec 2015 05:32:33 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/pentesting/index.xml" rel="self" type="application/rss+xml"/><item><title>Offensive Security Certified Professional</title><link>https://systemoverlord.com/2015/12/29/offensive-security-certified-professional/</link><pubDate>Tue, 29 Dec 2015 05:32:33 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2015/12/29/offensive-security-certified-professional/</guid><description>&lt;p&gt;It&amp;rsquo;s been a little bit since I last updated, and it&amp;rsquo;s been a busy time. I did want to take a quick moment to update and note that I accomplished something I&amp;rsquo;m pretty proud of. As of Christmas Eve, I&amp;rsquo;m now an Offensive Security Certified Professional.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://systemoverlord.com/img/blog/oscp.png" alt="OSCP Logo"&gt;&lt;/p&gt;
&lt;p&gt;Even though I&amp;rsquo;ve been working in security for more than two years, the lab and exam were still a challenge. Given that I mostly deal with web security at work, it was a great change to have a lab environment of more than 50 machines to attack. Perhaps most significantly, it gave me an opportunity to fight back a little bit of the impostor syndrome I&amp;rsquo;m perpetually afflicted with.&lt;/p&gt;</description></item><item><title>Weekly Reading List for 5/23/14</title><link>https://systemoverlord.com/2014/05/23/weekly-reading-list-for-52314/</link><pubDate>Fri, 23 May 2014 07:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/05/23/weekly-reading-list-for-52314/</guid><description>&lt;p&gt;###Radare2 Book
Maijin on GitHub is in the process of putting together an &lt;a href="https://radare.gitbooks.io/radare2book/"&gt;online book for Radare2&lt;/a&gt;. I&amp;rsquo;ve been looking for a good resource for using Radare2, and this is a great start.&lt;/p&gt;
&lt;p&gt;###Reverse Engineering for Beginners
Dennis Yurichev has a &lt;a href="http://yurichev.com/RE-book.html"&gt;free eBook on Reverse Engineering&lt;/a&gt;. I haven&amp;rsquo;t gotten through it yet, but it looks interesting, and you can&amp;rsquo;t beat the price.&lt;/p&gt;
&lt;p&gt;###Hacker Playbook
Finally, I finished up &lt;a href="http://www.amazon.com/gp/product/1494932636/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=1494932636&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;The Hacker Playbook: Practical Guide To Penetration Testing&lt;/a&gt; this week. You can find &lt;a href="https://systemoverlord.com/2014/05/21/book-review-the-hacker-playbook/"&gt;my full review here&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Book Review: Red Team Field Manual</title><link>https://systemoverlord.com/2014/05/02/book-review-red-team-field-manual/</link><pubDate>Fri, 02 May 2014 15:24:27 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/05/02/book-review-red-team-field-manual/</guid><description>&lt;p&gt;I recently picked up a copy of the &lt;a href="http://www.amazon.com/gp/product/1494295504/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=1494295504&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20&amp;amp;linkId=VUHBPTAFLWN7MNBT"&gt;Red Team Field Manual&lt;/a&gt; on Amazon after hearing good things from a few people in the industry. It&amp;rsquo;s information dense, basically a concatenation of cheat sheets for everything you&amp;rsquo;d want to do during a pentest. I&amp;rsquo;m mostly a Linux/Unix guy, and given my role on an internal red team for a mostly Linux company, I don&amp;rsquo;t do a lot of Windows. However, I recently had an engagement where we were targeting Windows, and I wish I&amp;rsquo;d had the RTFM handy then: there are a number of great pointers for Windows that I could&amp;rsquo;ve leveraged to make my engagement go more smoothly. Additionally, the book provides coverage for other platforms, like Cisco IOS, and for various scripting situations in Powershell, Python, or even &lt;a href="http://www.secdev.org/projects/scapy/"&gt;Scapy&lt;/a&gt;.&lt;/p&gt;</description></item></channel></rss>