Risk
9/30/2013
07:04 PM
Vincent Liu
Vincent Liu
Commentary
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Pen Testing: Making Passion A Priority

What sets real penetration testers apart is their motivation and willingness to lose themselves in something they love

Last week, one of the partners in my firm (Bishop Fox) said something that rang true: "If you want to be a real penetration tester, you have to live it."

In a similar vein, Paul Graham says, "To do something well, you have to love it. So to the extent you can preserve hacking as something you love, you're likely to do it well. Try to keep the sense of wonder you had about programming at age 14. If you're worried that your current job is rotting your brain, it probably is."

A real hacker doesn't see what he does as just a job or as just a hobby -- he sees it as a lifestyle. No border exists between work and play, the line between the two made indistinguishable by countless cans of late-night Red Bull.

We've talked about how some pen testers will use checklists and methodologies when performing scans or doing their testing. These can be useful, but a real pen tester sees them as a baseline against which they begin to explore, like a jazz musician improvising a new and better tune. This experimentation allows a hacker to gain more knowledge and experience than any textbook can provide. In fact, this is where the argument arises about the overlearned not having the right, open mindset needed to pen test. Too much structure can inhibit the dynamic nature of true penetration testing. Having all of the knowledge in the world matters only if you also know how to apply it. Reading may get you far, but there's no better teacher than real-world experience.

In his piece on "Great Hackers," Paul Graham says, "I know a handful of super-hackers ... Their defining quality is probably that they really love to program. Ordinary programmers write code to pay the bills. Great hackers think of it as something they do for fun, and which they're delighted to find people will pay them for." Now, Graham uses the term "hacker" to describe individuals with a passion for working on code, etc., but his observation rings true for penetration testers as well.

What sets real penetration testers apart is their motivation and willingness to lose themselves in something they love. Not just in hacking, but this applies to expertise in other fields, as well. From video games to photography, martial arts to musical instruments -- it's the ability to throw yourself into something entirely, no matter for work or play, which will take you to the next level.

When your girlfriend teases you that you've been ignoring her calls and texts for the past day, when you look out your window and realize the sun is coming up and you've hacked all night, when you suddenly remember you haven't eaten yet, or you let the pizza burn in the oven because you're finally hitting your stride in exploits -- that's when you know passion has taken over.

That it's no longer what you do, but who you are. Vincent Liu (CISSP) is a Managing Partner at Stach & Liu, a security consulting firm providing services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he oversees firm strategy, practice development, and client matters. Vincent is ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web