• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 15:58
CET 21:58
KST 05:58
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
HomeStory Cup 28 - Info & Preview12Rongyi Cup S3 - Preview & Info3herO wins SC2 All-Star Invitational14SC2 All-Star Invitational: Tournament Preview5RSL Revival - 2025 Season Finals Preview8
Community News
Weekly Cups (Jan 26-Feb 1): herO, Clem, ByuN, Classic win2RSL Season 4 announced for March-April7Weekly Cups (Jan 19-25): Bunny, Trigger, MaxPax win3Weekly Cups (Jan 12-18): herO, MaxPax, Solar win0BSL Season 2025 - Full Overview and Conclusion8
StarCraft 2
General
StarCraft 2 Not at the Esports World Cup 2026 Weekly Cups (Jan 26-Feb 1): herO, Clem, ByuN, Classic win HomeStory Cup 28 - Info & Preview Weekly Cups (Jan 19-25): Bunny, Trigger, MaxPax win Oliveira Would Have Returned If EWC Continued
Tourneys
RSL Season 4 announced for March-April PIG STY FESTIVAL 7.0! (19 Feb - 1 Mar) HomeStory Cup 28 StarCraft Evolution League (SC Evo Biweekly) $21,000 Rongyi Cup Season 3 announced (Jan 22-Feb 7)
Strategy
Custom Maps
[A] Starcraft Sound Mod
External Content
Mutation # 511 Temple of Rebirth The PondCast: SC2 News & Results Mutation # 510 Safety Violation Mutation # 509 Doomsday Report
Brood War
General
[ASL21] Potential Map Candidates Can someone share very abbreviated BW cliffnotes? BW General Discussion Liquipedia.net NEEDS editors for Brood War BGH Auto Balance -> http://bghmmr.eu/
Tourneys
[Megathread] Daily Proleagues Azhi's Colosseum - Season 2 Small VOD Thread 2.0 [BSL21] Non-Korean Championship - Starts Jan 10
Strategy
Zealot bombing is no longer popular? Simple Questions, Simple Answers Current Meta Soma's 9 hatch build from ASL Game 2
Other Games
General Games
Nintendo Switch Thread Battle Aces/David Kim RTS Megathread Path of Exile Mobile Legends: Bang Bang Beyond All Reason
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Join illminati in Luanda Angola+27 60 696 7068
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Mafia Game Mode Feedback/Ideas Vanilla Mini Mafia
Community
General
US Politics Mega-thread Things Aren’t Peaceful in Palestine European Politico-economics QA Mega-thread The Games Industry And ATVI Canadian Politics Mega-thread
Fan Clubs
The herO Fan Club! The IdrA Fan Club
Media & Entertainment
Anime Discussion Thread [Manga] One Piece
Sports
2024 - 2026 Football Thread
World Cup 2022
Tech Support
Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List
Blogs
Play, Watch, Drink: Esports …
TrAiDoS
My 2025 Magic: The Gathering…
DARKING
Life Update and thoughts.
FuDDx
How do archons sleep?
8882
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1605 users

Work As A Computer Technician

Blogs > sc2effort
Post a Reply
1 2 Next All
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
Last Edited: 2013-02-25 19:37:38
February 25 2013 19:35 GMT
#1
As I sit here in a large office chair and look back on the past two years of my life, I have done many things, pulled my life together, re establish family, and found a stable job and one I enjoy. Throughout the past two years I have formed a new perspective on how the world operates and how we has individuals can bring ourselves to greatness without the help of an external force. In this Blog series I will be discussing day to day operations and my thought process as a computer technician and Pen-Tester, so lets get started.

So for the of you who do not know what a Pen Tester is I will give a simplified explanation, basically it i a person or group of people that get together with other people or companies and try to find flaws in there network security (Basically try to legally steal there data), in this blog I will not be going into how to pen test in anyway more the people I encounter and how i think.

Day 1: It was a cold morning, damp and the clouds were low, the coverage made it difficult to see and the ice on the roads didn't help me get to work considering I was already Late. I received a call from a client of mine, a business man who wanted to make sure all of his financial and "Secrete" files were secure from any outside source. At first thoughts I was considering A "Covert" operation, which basically in Pen-Testing world means that no one but the CEO knows that it is a fluke. With that in play I got to the chalk board. One of the most important steps in pen testing is scoping your target, finding everything you can about how there building is laid out to what times the IT guys get in for the day. Data collection is what makes or break the reality and effectiveness of the test, we are testing response times of the companies IT guys and how they handle a security breach so that we can in the end tell them what to fix and most importantly how to fix it.

I started scoping around 5pm I wanted to get a sense of what time there guys left the building and how many stayed after hours. I found that there was a total of 5 guys, 3 left at 5pm and the other 2 stayed until around 10pm. I needed to look into this more, I needed to know what those 2 guys did after the other two left. Almost immediately I found the first flaw, the company was using a WEP encryption on there wifi... ( For those of you who dont know, a decent hacker can crack wep codes in about 3 minutes) this is a huge nono, with that code I can then access tons of other files using basic exploits. I did not find what those other two were doing that night which put me into a predicament. I needed to physically get into the building to see what kind of infrastructure they had setup except no person with a brain is going to put there IT station out front so I needed a con per say, with help from the CEO I walked in the building the next day, I found that all of there main computers were setup on separate ports than the main systems were on, this was a breakthrough.


now that i knew they were using different ports for there data computers, I could start hacking.
I sat outside of the building and began the crack, I pin pointed areas of interest, running risk analysis against the areas that I thought could be important. Using key terms I was able to narrow the list to 5 files, (Mind you this was about 7 hour process, not all sitting infront of the building) these files had special encryption's on them, now with the criminal mind in play i started thinking of some work arounds. I found one, there website... they had vulnerabilities in there login page. (you can easily find information on this kind of thing, by using dorks and "Google-hacking") I started working on it, the back code came out to be the CEO's children's names. At that moment I sighed, I not only cracked his code but was able to get all of the files hidden in under 24 hours. I called my client, I started writing up everything I could for him, everything that I did and how I did it. Considering these reports are usually 10+ pages long i met him and his team in person and started breaking it down for them. ( Mind you the team caught the crack about 50% through but could not stop it), I laid out my ideas and fixes and they implemented them.

We always do a post test, about a month later... I will not go into the post test of this client but lets just say, they fixed a lot of things and they are secure now, at least the best they can be, there is always a way to bypass something.

Alright guys, that is the end of this blog, tell me what you think please! if you like I will do more.



Poll: Like this Blog

Like (34)
 
97%

Dislike (1)
 
3%

35 total votes

Your vote: Like this Blog

(Vote): Like
(Vote): Dislike



****
5 time GM zerg Currently top masters
Rimstalker
Profile Joined May 2011
Germany734 Posts
February 25 2013 23:32 GMT
#2
hugely dislike native speakers that can't distinguish between 'there' and 'their'.

Sorry for being grammar nazi.

And it's 'per se'. And Childrens'

But I would be interested how you got into that industry, and how you find your clients.
Here be Dragons
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 25 2013 23:35 GMT
#3
hah sorry half of this was typed via my phone... and im not big on grammer. I will be making another blog soon about the industry and how you get into it.
5 time GM zerg Currently top masters
Neighbor
Profile Joined May 2009
United States119 Posts
February 26 2013 00:25 GMT
#4
On February 26 2013 08:32 Rimstalker wrote:
Sorry for being grammar nazi.

And it's 'per se'. And Childrens'

Well, you're not doing a good job...
RoyGBiv_13
Profile Blog Joined August 2010
United States1275 Posts
February 26 2013 00:40 GMT
#5
I do some security work, and have a bunch of friends who do pen testing and other security type positions. Its fantastically fun, and I'm always keeping up with the latest news in the security scene.

Do you go to DEFCON or other conferences? I always envision I'm not the only starcraft nerd in a hotel full of nerds.
Any sufficiently advanced technology is indistinguishable from magic
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:07 GMT
#6
haha send me a pm and ill discuss some things with you
5 time GM zerg Currently top masters
Cornstyle
Profile Joined October 2010
United States147 Posts
February 26 2013 02:08 GMT
#7
Could you explain to me why you need to physically scope out the site that you're hacking? While I'm sure it makes it easier I'm curious how realistic that is. Actually needing to have "boots on the ground" so to say seems like pretty poor hacking.
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:13 GMT
#8
because in pen-testing and big wig network deals, they can have certain ports connected to a certain area. If you trip that port and get something wrong, (lets say you hit wrong area of building) you are locked out and its over. Thats why you need to scope it out, information gathering is just as imnportant as the accual hacking, you have to adjust break times, adjust a ton of things in the end report to up security. Say an employee leaves 2 minutes early, or steps out for a smoke, in those 2 minutes I can infiltrate there network gain access to there mainframe and boom its over. Thats why you need "Boots on the ground" its to plan times, thats how real hackers that do things to steal plan. Its all about thinking and doing it the same way as someone who is stealing it illegaly would.
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:15 GMT
#9
hope that answers your question, and friend, this is notpoor hacking... look into it in more detail and come back and tell me its poor hacking. Thats accualy offensive considering we consider it our art.
5 time GM zerg Currently top masters
Abductedonut
Profile Blog Joined December 2010
United States324 Posts
February 26 2013 02:37 GMT
#10
Hey effort,

I'm actually a computer engineering and computer science major, but I've always been fascinated with pentesting.

What kind of degree did you get? (if at all?) Are you part of a team?

Where did you learn to hack? How often do you code your own exploits? Does commercial software like metasploit and Nessus actually help, or are you mostly working through terminal and nmap? What is your take on Backtrack?

Thanks, if you do answer =P
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 04:03 GMT
#11
@Abductedonut

Those are awesome degrees!,

To answer your first question, I did not even finish highschool so no degree there.

I do work as part of a team, there are 4 of us that do what we call Mission's together haha, a lot of the time we duo team and do two jobs at once.

Im all self tought, I accualy got arrested for "hacking" when I was 18, part of why i dident finish highschool... (I am ashamed of it now that i am white hat), but I litterally bought books and read them over and over and I had my laptop and just sat at public locations and started my hacking career.

I code my own exploits often, we as a team do a lot of exploit coding. It is a must becuase you have to adapt to the system you are up against, using basic exploits dosent cut it for a lot of systems.

Metasploit I use daily, it is extremely usefull. Now I do not use the full GUI just the command line, Nessus not so much. As far as terminal goes, I use that all the time as well the Airmon-ng is always a good tool. But you have to remeber these are only tools, just like in a workshop for a carpenter, the tools are an asset your mind is the function. Nmap is put to good use as well, although terminal and metasplot more so.

Backtrack is amazing, I have it setup on a lot of my equipment, it provides a ton of built in tools... although for your average user, you will use about 10% of what is there... I only use about 45-50% a lot of the tools on backtrack are not productive and no one in the field uses them. It is convient as it comes with all the suites needed such as airmon-ng, metasplot etc...
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 06:33 GMT
#12
Also I wanted to add one more thing,

you were talking about Nmap. it is most used as a port scanner as it integrates well with metasploit, we use it for information gathering. I will go into all of this in my next blog, and in depth on what we do with each program. If you guys would like me to make a blog on what all of these programs are and how we use them just tell me.
5 time GM zerg Currently top masters
Ilikestarcraft
Profile Blog Joined November 2004
Korea (South)17733 Posts
February 26 2013 09:16 GMT
#13
I would be interested in a blog about that. I am interested in stuff like pen testing and hope one day maybe to go into the field too.
"Nana is a goddess. Or at very least, Nana is my goddess." - KazeHydra
blade55555
Profile Blog Joined March 2009
United States17423 Posts
February 26 2013 09:27 GMT
#14
Haha that's awesome that you are a pen tester. I actually am in school and learning about pen testing and all that fun stuff. It's pretty cool ^^.
When I think of something else, something will go here
TheQuiff
Profile Blog Joined August 2012
Scotland91 Posts
Last Edited: 2013-02-26 09:30:01
February 26 2013 09:29 GMT
#15
Hello.

I would like to ask some question either PM me or reply. I find this greatly interesting.

I applied for something for coding and scripting as a job. Alot of people may find it boring but i love it. I like how i can write codes and then something will happen. Sadly i applied for wrong job, now i'm an accountant technichan, which is an okay job. I dont have any heavy education mainly highers/ advance highers which is equivlant to first year uni.

I've always found this interesting and also met people with big IT background who said i had a natural flare for this kind of subject, i also love get into nerdy stuff about hardware. Looking deeply into cpu's, gpu's. This hardware and scripting coding and all problem solving. I find interesting and i always go in my free time to understand it more.

I just dont have the sources or means to get a better grasp of this stuff.

I will say now that it's only for entertainment not to malicous use to this information.

If at home can you provide me any resources on further my knowledge?

Finally is there many jobs to do this, not for a salary like help out and be a volunteered white hat?

Thanks for your time.
I'm Scottish, I'm not that scary
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 18:13 GMT
#16
@TheQuiff

Hey man, glad you find this type of work interesting!

As far as sources go, there are a ton of really good sources out there... books on metasploit are always good, I will list a few good ones at the end of this post.

As far as voulanteer jobs go, there is something you should know about Pen-Testing in general... there are not many accrual companies that are dedicated too it, it is mostly a group of people that get in contact with other people and need it done. I would browse forums etc... to see if someone would let you in... as far as my situation I started my group about 6 years ago... (we became white hat about 4 years ago). But I am sure you can find a small business that would like the service in the area, and im sure you could make a bit of money doing it on the side. Putting together a group of friends or people in the community is what I would do though because most groups are not open to outsiders.

I hope that answers your question Below is the list of books:

Books: Ninja Hacking, metasploit: the penetration testers guide, SQL injection attacks and defense.

Those are some good books I would look into.
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 27 2013 05:10 GMT
#17
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,
5 time GM zerg Currently top masters
Eben
Profile Blog Joined September 2008
United States769 Posts
February 27 2013 20:57 GMT
#18
On February 27 2013 14:10 sc2effort wrote:
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,


this seems really interesting. Will follow!
Release
Profile Blog Joined October 2010
United States4397 Posts
Last Edited: 2013-02-27 21:35:44
February 27 2013 21:33 GMT
#19
On February 26 2013 08:32 Rimstalker wrote:
I prodigiously dislike native english-speakers who cannot distinguish 'there' from 'their'.

I am sorry for being a grammar nazi.

And it's 'per se'. And Childrens' Did you start 2 sentences with coordinate conjunctions? The second sentence isn't a complete sentence.

But I am interested as to the the methods whereby you got into that industry, and the methods whereby you find your clients.


Don't be a grammar nazi if you do not know rudimentary rules of grammar or apply the aforementioned rules to your own post.
☺
Athos
Profile Blog Joined February 2008
United States2484 Posts
February 28 2013 04:27 GMT
#20
On February 27 2013 14:10 sc2effort wrote:
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,



That sounds awesome. I'm researching these subjects more and more as I want to protect my website from hacking/exploitation. It's therefore in my best interest to try to break it myself. Looking forward to more awesome blogs like this.
1 2 Next All
Please log in or register to reply.
Live Events Refresh
Next event in 3h 2m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
mouzHeroMarine 436
OGKoka 366
elazer 186
UpATreeSC 96
JuggernautJason94
Temp0 33
FoxeR 31
goblin 30
Nathanias 26
StarCraft: Brood War
Britney 17953
Dewaltoss 102
Shuttle 85
sSak 36
Hyuk 33
NaDa 12
Dota 2
Dendi1036
LuMiX1
League of Legends
C9.Mang0100
Counter-Strike
fl0m1876
adren_tv98
ptr_tv97
minikerr15
Foxcn1
Super Smash Bros
Mew2King72
Heroes of the Storm
Liquid`Hasu554
Khaldor157
Other Games
gofns10818
Grubby4622
FrodaN1863
Beastyqt928
B2W.Neo465
Harstem149
ToD123
ArmadaUGS116
Trikslyr63
ZombieGrub26
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 24 non-featured ]
StarCraft 2
• StrangeGG 97
• Reevou 6
• Hupsaiya 4
• Migwel
• LaughNgamezSOOP
• IndyKCrew
• intothetv
• Kozan
• sooper7s
• AfreecaTV YouTube
StarCraft: Brood War
• blackmanpl 29
• HerbMon 29
• 80smullet 11
• FirePhoenix8
• RayReign 8
• Michael_bg 1
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• WagamamaTV697
• masondota2467
League of Legends
• imaqtpie2706
• TFBlade1553
• Shiphtur510
Upcoming Events
Replay Cast
3h 2m
The PondCast
13h 2m
WardiTV Invitational
15h 2m
Replay Cast
1d 3h
RongYI Cup
2 days
herO vs Maru
uThermal 2v2 Circuit
3 days
Replay Cast
4 days
Wardi Open
4 days
Monday Night Weeklies
4 days
Sparkling Tuna Cup
5 days
Liquipedia Results

Completed

Proleague 2026-02-03
HSC XXVIII
Underdog Cup #3

Ongoing

CSL 2025 WINTER (S19)
KCM Race Survival 2026 Season 1
Acropolis #4 - TS4
Rongyi Cup S3
Nations Cup 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual
eXTREMESLAND 2025
SL Budapest Major 2025
ESL Impact League Season 8

Upcoming

Escore Tournament S1: W7
Escore Tournament S1: W8
Acropolis #4
IPSL Spring 2026
HSC XXIX
uThermal 2v2 2026 Main Event
Bellum Gens Elite Stara Zagora 2026
RSL Revival: Season 4
LiuLi Cup: 2025 Grand Finals
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
BLAST Open Spring 2026
ESL Pro League Season 23
ESL Pro League Season 23
PGL Cluj-Napoca 2026
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.