• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 03:07
CET 09:07
KST 17:07
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
RSL Revival - 2025 Season Finals Preview8RSL Season 3 - Playoffs Preview0RSL Season 3 - RO16 Groups C & D Preview0RSL Season 3 - RO16 Groups A & B Preview2TL.net Map Contest #21: Winners12
Community News
ComeBackTV's documentary on Byun's Career !3Weekly Cups (Dec 8-14): MaxPax, Clem, Cure win2Weekly Cups (Dec 1-7): Clem doubles, Solar gets over the hump1Weekly Cups (Nov 24-30): MaxPax, Clem, herO win2BGE Stara Zagora 2026 announced15
StarCraft 2
General
Simple life skill activities that schools ignore ComeBackTV's documentary on Byun's Career ! Weekly Cups (Dec 8-14): MaxPax, Clem, Cure win Did they add GM to 2v2? RSL Revival - 2025 Season Finals Preview
Tourneys
RSL Offline Finals Info - Dec 13 and 14! Master Swan Open (Global Bronze-Master 2) Winter Warp Gate Amateur Showdown #1: Sparkling Tuna Cup - Weekly Open Tournament $5,000+ WardiTV 2025 Championship
Strategy
Custom Maps
Map Editor closed ?
External Content
Mutation # 504 Retribution Mutation # 503 Fowl Play Mutation # 502 Negative Reinforcement Mutation # 501 Price of Progress
Brood War
General
FlaSh on: Biggest Problem With SnOw's Playstyle How Rain Became ProGamer in Just 3 Months BGH Auto Balance -> http://bghmmr.eu/ [BSL21] RO8 Bracket & Prediction Contest BW General Discussion
Tourneys
[BSL21] WB SEMIFINALS - Saturday 21:00 CET [Megathread] Daily Proleagues [BSL21] RO8 - Day 2 - Sunday 21:00 CET [ASL20] Grand Finals
Strategy
Game Theory for Starcraft Current Meta Simple Questions, Simple Answers Fighting Spirit mining rates
Other Games
General Games
Path of Exile Stormgate/Frost Giant Megathread General RTS Discussion Thread Dawn of War IV Nintendo Switch Thread
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Mafia Game Mode Feedback/Ideas Survivor II: The Amazon Sengoku Mafia TL Mafia Community Thread
Community
General
Stages of a Sales Pipeline: Simple Explanation Nee The Games Industry And ATVI Russo-Ukrainian War Thread US Politics Mega-thread Things Aren’t Peaceful in Palestine
Fan Clubs
White-Ra Fan Club
Media & Entertainment
Anime Discussion Thread [Manga] One Piece Movie Discussion!
Sports
2024 - 2026 Football Thread Formula 1 Discussion
World Cup 2022
Tech Support
Expert Legal Assistance for Corporate Law Concepts Computer Build, Upgrade & Buying Resource Thread
TL Community
TL+ Announced Where to ask questions and add stream?
Blogs
How Sleep Deprivation Affect…
TrAiDoS
I decided to write a webnov…
DjKniteX
James Bond movies ranking - pa…
Topin
Thanks for the RSL
Hildegard
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1252 users

Work As A Computer Technician

Blogs > sc2effort
Post a Reply
1 2 Next All
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
Last Edited: 2013-02-25 19:37:38
February 25 2013 19:35 GMT
#1
As I sit here in a large office chair and look back on the past two years of my life, I have done many things, pulled my life together, re establish family, and found a stable job and one I enjoy. Throughout the past two years I have formed a new perspective on how the world operates and how we has individuals can bring ourselves to greatness without the help of an external force. In this Blog series I will be discussing day to day operations and my thought process as a computer technician and Pen-Tester, so lets get started.

So for the of you who do not know what a Pen Tester is I will give a simplified explanation, basically it i a person or group of people that get together with other people or companies and try to find flaws in there network security (Basically try to legally steal there data), in this blog I will not be going into how to pen test in anyway more the people I encounter and how i think.

Day 1: It was a cold morning, damp and the clouds were low, the coverage made it difficult to see and the ice on the roads didn't help me get to work considering I was already Late. I received a call from a client of mine, a business man who wanted to make sure all of his financial and "Secrete" files were secure from any outside source. At first thoughts I was considering A "Covert" operation, which basically in Pen-Testing world means that no one but the CEO knows that it is a fluke. With that in play I got to the chalk board. One of the most important steps in pen testing is scoping your target, finding everything you can about how there building is laid out to what times the IT guys get in for the day. Data collection is what makes or break the reality and effectiveness of the test, we are testing response times of the companies IT guys and how they handle a security breach so that we can in the end tell them what to fix and most importantly how to fix it.

I started scoping around 5pm I wanted to get a sense of what time there guys left the building and how many stayed after hours. I found that there was a total of 5 guys, 3 left at 5pm and the other 2 stayed until around 10pm. I needed to look into this more, I needed to know what those 2 guys did after the other two left. Almost immediately I found the first flaw, the company was using a WEP encryption on there wifi... ( For those of you who dont know, a decent hacker can crack wep codes in about 3 minutes) this is a huge nono, with that code I can then access tons of other files using basic exploits. I did not find what those other two were doing that night which put me into a predicament. I needed to physically get into the building to see what kind of infrastructure they had setup except no person with a brain is going to put there IT station out front so I needed a con per say, with help from the CEO I walked in the building the next day, I found that all of there main computers were setup on separate ports than the main systems were on, this was a breakthrough.


now that i knew they were using different ports for there data computers, I could start hacking.
I sat outside of the building and began the crack, I pin pointed areas of interest, running risk analysis against the areas that I thought could be important. Using key terms I was able to narrow the list to 5 files, (Mind you this was about 7 hour process, not all sitting infront of the building) these files had special encryption's on them, now with the criminal mind in play i started thinking of some work arounds. I found one, there website... they had vulnerabilities in there login page. (you can easily find information on this kind of thing, by using dorks and "Google-hacking") I started working on it, the back code came out to be the CEO's children's names. At that moment I sighed, I not only cracked his code but was able to get all of the files hidden in under 24 hours. I called my client, I started writing up everything I could for him, everything that I did and how I did it. Considering these reports are usually 10+ pages long i met him and his team in person and started breaking it down for them. ( Mind you the team caught the crack about 50% through but could not stop it), I laid out my ideas and fixes and they implemented them.

We always do a post test, about a month later... I will not go into the post test of this client but lets just say, they fixed a lot of things and they are secure now, at least the best they can be, there is always a way to bypass something.

Alright guys, that is the end of this blog, tell me what you think please! if you like I will do more.



Poll: Like this Blog

Like (34)
 
97%

Dislike (1)
 
3%

35 total votes

Your vote: Like this Blog

(Vote): Like
(Vote): Dislike



****
5 time GM zerg Currently top masters
Rimstalker
Profile Joined May 2011
Germany734 Posts
February 25 2013 23:32 GMT
#2
hugely dislike native speakers that can't distinguish between 'there' and 'their'.

Sorry for being grammar nazi.

And it's 'per se'. And Childrens'

But I would be interested how you got into that industry, and how you find your clients.
Here be Dragons
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 25 2013 23:35 GMT
#3
hah sorry half of this was typed via my phone... and im not big on grammer. I will be making another blog soon about the industry and how you get into it.
5 time GM zerg Currently top masters
Neighbor
Profile Joined May 2009
United States119 Posts
February 26 2013 00:25 GMT
#4
On February 26 2013 08:32 Rimstalker wrote:
Sorry for being grammar nazi.

And it's 'per se'. And Childrens'

Well, you're not doing a good job...
RoyGBiv_13
Profile Blog Joined August 2010
United States1275 Posts
February 26 2013 00:40 GMT
#5
I do some security work, and have a bunch of friends who do pen testing and other security type positions. Its fantastically fun, and I'm always keeping up with the latest news in the security scene.

Do you go to DEFCON or other conferences? I always envision I'm not the only starcraft nerd in a hotel full of nerds.
Any sufficiently advanced technology is indistinguishable from magic
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:07 GMT
#6
haha send me a pm and ill discuss some things with you
5 time GM zerg Currently top masters
Cornstyle
Profile Joined October 2010
United States147 Posts
February 26 2013 02:08 GMT
#7
Could you explain to me why you need to physically scope out the site that you're hacking? While I'm sure it makes it easier I'm curious how realistic that is. Actually needing to have "boots on the ground" so to say seems like pretty poor hacking.
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:13 GMT
#8
because in pen-testing and big wig network deals, they can have certain ports connected to a certain area. If you trip that port and get something wrong, (lets say you hit wrong area of building) you are locked out and its over. Thats why you need to scope it out, information gathering is just as imnportant as the accual hacking, you have to adjust break times, adjust a ton of things in the end report to up security. Say an employee leaves 2 minutes early, or steps out for a smoke, in those 2 minutes I can infiltrate there network gain access to there mainframe and boom its over. Thats why you need "Boots on the ground" its to plan times, thats how real hackers that do things to steal plan. Its all about thinking and doing it the same way as someone who is stealing it illegaly would.
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:15 GMT
#9
hope that answers your question, and friend, this is notpoor hacking... look into it in more detail and come back and tell me its poor hacking. Thats accualy offensive considering we consider it our art.
5 time GM zerg Currently top masters
Abductedonut
Profile Blog Joined December 2010
United States324 Posts
February 26 2013 02:37 GMT
#10
Hey effort,

I'm actually a computer engineering and computer science major, but I've always been fascinated with pentesting.

What kind of degree did you get? (if at all?) Are you part of a team?

Where did you learn to hack? How often do you code your own exploits? Does commercial software like metasploit and Nessus actually help, or are you mostly working through terminal and nmap? What is your take on Backtrack?

Thanks, if you do answer =P
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 04:03 GMT
#11
@Abductedonut

Those are awesome degrees!,

To answer your first question, I did not even finish highschool so no degree there.

I do work as part of a team, there are 4 of us that do what we call Mission's together haha, a lot of the time we duo team and do two jobs at once.

Im all self tought, I accualy got arrested for "hacking" when I was 18, part of why i dident finish highschool... (I am ashamed of it now that i am white hat), but I litterally bought books and read them over and over and I had my laptop and just sat at public locations and started my hacking career.

I code my own exploits often, we as a team do a lot of exploit coding. It is a must becuase you have to adapt to the system you are up against, using basic exploits dosent cut it for a lot of systems.

Metasploit I use daily, it is extremely usefull. Now I do not use the full GUI just the command line, Nessus not so much. As far as terminal goes, I use that all the time as well the Airmon-ng is always a good tool. But you have to remeber these are only tools, just like in a workshop for a carpenter, the tools are an asset your mind is the function. Nmap is put to good use as well, although terminal and metasplot more so.

Backtrack is amazing, I have it setup on a lot of my equipment, it provides a ton of built in tools... although for your average user, you will use about 10% of what is there... I only use about 45-50% a lot of the tools on backtrack are not productive and no one in the field uses them. It is convient as it comes with all the suites needed such as airmon-ng, metasplot etc...
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 06:33 GMT
#12
Also I wanted to add one more thing,

you were talking about Nmap. it is most used as a port scanner as it integrates well with metasploit, we use it for information gathering. I will go into all of this in my next blog, and in depth on what we do with each program. If you guys would like me to make a blog on what all of these programs are and how we use them just tell me.
5 time GM zerg Currently top masters
Ilikestarcraft
Profile Blog Joined November 2004
Korea (South)17732 Posts
February 26 2013 09:16 GMT
#13
I would be interested in a blog about that. I am interested in stuff like pen testing and hope one day maybe to go into the field too.
"Nana is a goddess. Or at very least, Nana is my goddess." - KazeHydra
blade55555
Profile Blog Joined March 2009
United States17423 Posts
February 26 2013 09:27 GMT
#14
Haha that's awesome that you are a pen tester. I actually am in school and learning about pen testing and all that fun stuff. It's pretty cool ^^.
When I think of something else, something will go here
TheQuiff
Profile Blog Joined August 2012
Scotland91 Posts
Last Edited: 2013-02-26 09:30:01
February 26 2013 09:29 GMT
#15
Hello.

I would like to ask some question either PM me or reply. I find this greatly interesting.

I applied for something for coding and scripting as a job. Alot of people may find it boring but i love it. I like how i can write codes and then something will happen. Sadly i applied for wrong job, now i'm an accountant technichan, which is an okay job. I dont have any heavy education mainly highers/ advance highers which is equivlant to first year uni.

I've always found this interesting and also met people with big IT background who said i had a natural flare for this kind of subject, i also love get into nerdy stuff about hardware. Looking deeply into cpu's, gpu's. This hardware and scripting coding and all problem solving. I find interesting and i always go in my free time to understand it more.

I just dont have the sources or means to get a better grasp of this stuff.

I will say now that it's only for entertainment not to malicous use to this information.

If at home can you provide me any resources on further my knowledge?

Finally is there many jobs to do this, not for a salary like help out and be a volunteered white hat?

Thanks for your time.
I'm Scottish, I'm not that scary
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 18:13 GMT
#16
@TheQuiff

Hey man, glad you find this type of work interesting!

As far as sources go, there are a ton of really good sources out there... books on metasploit are always good, I will list a few good ones at the end of this post.

As far as voulanteer jobs go, there is something you should know about Pen-Testing in general... there are not many accrual companies that are dedicated too it, it is mostly a group of people that get in contact with other people and need it done. I would browse forums etc... to see if someone would let you in... as far as my situation I started my group about 6 years ago... (we became white hat about 4 years ago). But I am sure you can find a small business that would like the service in the area, and im sure you could make a bit of money doing it on the side. Putting together a group of friends or people in the community is what I would do though because most groups are not open to outsiders.

I hope that answers your question Below is the list of books:

Books: Ninja Hacking, metasploit: the penetration testers guide, SQL injection attacks and defense.

Those are some good books I would look into.
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 27 2013 05:10 GMT
#17
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,
5 time GM zerg Currently top masters
Eben
Profile Blog Joined September 2008
United States769 Posts
February 27 2013 20:57 GMT
#18
On February 27 2013 14:10 sc2effort wrote:
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,


this seems really interesting. Will follow!
Release
Profile Blog Joined October 2010
United States4397 Posts
Last Edited: 2013-02-27 21:35:44
February 27 2013 21:33 GMT
#19
On February 26 2013 08:32 Rimstalker wrote:
I prodigiously dislike native english-speakers who cannot distinguish 'there' from 'their'.

I am sorry for being a grammar nazi.

And it's 'per se'. And Childrens' Did you start 2 sentences with coordinate conjunctions? The second sentence isn't a complete sentence.

But I am interested as to the the methods whereby you got into that industry, and the methods whereby you find your clients.


Don't be a grammar nazi if you do not know rudimentary rules of grammar or apply the aforementioned rules to your own post.
☺
Athos
Profile Blog Joined February 2008
United States2484 Posts
February 28 2013 04:27 GMT
#20
On February 27 2013 14:10 sc2effort wrote:
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,



That sounds awesome. I'm researching these subjects more and more as I want to protect my website from hacking/exploitation. It's therefore in my best interest to try to break it myself. Looking forward to more awesome blogs like this.
1 2 Next All
Please log in or register to reply.
Live Events Refresh
Next event in 1h 54m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
SortOf 172
StarCraft: Brood War
Rain 4983
JulyZerg 35
Soma 27
NaDa 23
Shine 13
sorry 9
Mong 9
Sharp 1
Dota 2
NeuroSwarm95
League of Legends
JimRising 542
C9.Mang0424
Counter-Strike
shoxiejesuss106
Other Games
summit1g12886
WinterStarcraft393
Mew2King83
Trikslyr23
Organizations
Other Games
gamesdonequick786
StarCraft: Brood War
UltimateBattle 102
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 13 non-featured ]
StarCraft 2
• LUISG 6
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• iopq 2
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
League of Legends
• HappyZerGling150
Upcoming Events
The PondCast
1h 54m
WardiTV 2025
4h 54m
Cure vs Creator
Solar vs TBD
herO vs Spirit
Scarlett vs Gerald
Rogue vs Shameless
MaNa vs ShoWTimE
Nice vs TBD
WardiTV 2025
1d 2h
ByuN vs TBD
Clem vs TBD
OSC
1d 5h
CranKy Ducklings
2 days
SC Evo League
2 days
Ladder Legends
2 days
BSL 21
2 days
Sziky vs Dewalt
eOnzErG vs Cross
Sparkling Tuna Cup
3 days
Ladder Legends
3 days
[ Show More ]
BSL 21
3 days
StRyKeR vs TBD
Bonyth vs TBD
Replay Cast
4 days
Monday Night Weeklies
4 days
WardiTV Invitational
6 days
Liquipedia Results

Completed

Acropolis #4 - TS3
RSL Offline Finals
Kuram Kup

Ongoing

C-Race Season 1
IPSL Winter 2025-26
KCM Race Survival 2025 Season 4
YSL S2
BSL Season 21
Slon Tour Season 2
WardiTV 2025
META Madness #9
eXTREMESLAND 2025
SL Budapest Major 2025
ESL Impact League Season 8
BLAST Rivals Fall 2025
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22

Upcoming

CSL 2025 WINTER (S19)
BSL 21 Non-Korean Championship
Acropolis #4
IPSL Spring 2026
Bellum Gens Elite Stara Zagora 2026
HSC XXVIII
Big Gabe Cup #3
OSC Championship Season 13
ESL Pro League Season 23
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.