• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 02:04
CET 08:04
KST 16:04
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
Intel X Team Liquid Seoul event: Showmatches and Meet the Pros9[ASL20] Finals Preview: Arrival13TL.net Map Contest #21: Voting10[ASL20] Ro4 Preview: Descent11Team TLMC #5: Winners Announced!3
Community News
Weekly Cups (Oct 20-26): MaxPax, Clem, Creator win62025 RSL Offline Finals Dates + Ticket Sales!10BSL21 Open Qualifiers Week & CONFIRM PARTICIPATION2Crank Gathers Season 2: SC II Pro Teams10Merivale 8 Open - LAN - Stellar Fest5
StarCraft 2
General
Weekly Cups (Oct 20-26): MaxPax, Clem, Creator win Weekly Cups (Oct 13-19): Clem Goes for Four DreamHack Open 2013 revealed RotterdaM "Serral is the GOAT, and it's not close" Intel X Team Liquid Seoul event: Showmatches and Meet the Pros
Tourneys
Merivale 8 Open - LAN - Stellar Fest SC4ALL $6,000 Open LAN in Philadelphia Kirktown Chat Brawl #9 $50 8:30PM EST 2025 RSL Offline Finals Dates + Ticket Sales! Crank Gathers Season 2: SC II Pro Teams
Strategy
Custom Maps
Map Editor closed ?
External Content
Mutation # 497 Battle Haredened Mutation # 496 Endless Infection Mutation # 495 Rest In Peace Mutation # 494 Unstable Environment
Brood War
General
What's going on with b.net? BGH Auto Balance -> http://bghmmr.eu/ Ladder Map Matchup Stats Map pack for 3v3/4v4/FFA games BW General Discussion
Tourneys
[ASL20] Grand Finals BSL21 Open Qualifiers Week & CONFIRM PARTICIPATION Small VOD Thread 2.0 The Casual Games of the Week Thread
Strategy
How to stay on top of macro? PvZ map balance Current Meta Soma's 9 hatch build from ASL Game 2
Other Games
General Games
Stormgate/Frost Giant Megathread Path of Exile Nintendo Switch Thread The Perfect Game Beyond All Reason
Dota 2
Official 'what is Dota anymore' discussion LiquidDota to reintegrate into TL.net
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread SPIRED by.ASL Mafia {211640}
Community
General
Things Aren’t Peaceful in Palestine US Politics Mega-thread Russo-Ukrainian War Thread Canadian Politics Mega-thread The Big Programming Thread
Fan Clubs
White-Ra Fan Club The herO Fan Club!
Media & Entertainment
[Manga] One Piece Anime Discussion Thread Movie Discussion! Korean Music Discussion Series you have seen recently...
Sports
MLB/Baseball 2023 TeamLiquid Health and Fitness Initiative For 2023 Formula 1 Discussion 2024 - 2026 Football Thread NBA General Discussion
World Cup 2022
Tech Support
SC2 Client Relocalization [Change SC2 Language] Linksys AE2500 USB WIFI keeps disconnecting Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List Recent Gifted Posts
Blogs
Challenge: Maths isn't all…
Hildegard
more word salad -- pay no h…
Peanutsc
Career Paths and Skills for …
TrAiDoS
Reality "theory" prov…
perfectspheres
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1645 users

Work As A Computer Technician

Blogs > sc2effort
Post a Reply
1 2 Next All
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
Last Edited: 2013-02-25 19:37:38
February 25 2013 19:35 GMT
#1
As I sit here in a large office chair and look back on the past two years of my life, I have done many things, pulled my life together, re establish family, and found a stable job and one I enjoy. Throughout the past two years I have formed a new perspective on how the world operates and how we has individuals can bring ourselves to greatness without the help of an external force. In this Blog series I will be discussing day to day operations and my thought process as a computer technician and Pen-Tester, so lets get started.

So for the of you who do not know what a Pen Tester is I will give a simplified explanation, basically it i a person or group of people that get together with other people or companies and try to find flaws in there network security (Basically try to legally steal there data), in this blog I will not be going into how to pen test in anyway more the people I encounter and how i think.

Day 1: It was a cold morning, damp and the clouds were low, the coverage made it difficult to see and the ice on the roads didn't help me get to work considering I was already Late. I received a call from a client of mine, a business man who wanted to make sure all of his financial and "Secrete" files were secure from any outside source. At first thoughts I was considering A "Covert" operation, which basically in Pen-Testing world means that no one but the CEO knows that it is a fluke. With that in play I got to the chalk board. One of the most important steps in pen testing is scoping your target, finding everything you can about how there building is laid out to what times the IT guys get in for the day. Data collection is what makes or break the reality and effectiveness of the test, we are testing response times of the companies IT guys and how they handle a security breach so that we can in the end tell them what to fix and most importantly how to fix it.

I started scoping around 5pm I wanted to get a sense of what time there guys left the building and how many stayed after hours. I found that there was a total of 5 guys, 3 left at 5pm and the other 2 stayed until around 10pm. I needed to look into this more, I needed to know what those 2 guys did after the other two left. Almost immediately I found the first flaw, the company was using a WEP encryption on there wifi... ( For those of you who dont know, a decent hacker can crack wep codes in about 3 minutes) this is a huge nono, with that code I can then access tons of other files using basic exploits. I did not find what those other two were doing that night which put me into a predicament. I needed to physically get into the building to see what kind of infrastructure they had setup except no person with a brain is going to put there IT station out front so I needed a con per say, with help from the CEO I walked in the building the next day, I found that all of there main computers were setup on separate ports than the main systems were on, this was a breakthrough.


now that i knew they were using different ports for there data computers, I could start hacking.
I sat outside of the building and began the crack, I pin pointed areas of interest, running risk analysis against the areas that I thought could be important. Using key terms I was able to narrow the list to 5 files, (Mind you this was about 7 hour process, not all sitting infront of the building) these files had special encryption's on them, now with the criminal mind in play i started thinking of some work arounds. I found one, there website... they had vulnerabilities in there login page. (you can easily find information on this kind of thing, by using dorks and "Google-hacking") I started working on it, the back code came out to be the CEO's children's names. At that moment I sighed, I not only cracked his code but was able to get all of the files hidden in under 24 hours. I called my client, I started writing up everything I could for him, everything that I did and how I did it. Considering these reports are usually 10+ pages long i met him and his team in person and started breaking it down for them. ( Mind you the team caught the crack about 50% through but could not stop it), I laid out my ideas and fixes and they implemented them.

We always do a post test, about a month later... I will not go into the post test of this client but lets just say, they fixed a lot of things and they are secure now, at least the best they can be, there is always a way to bypass something.

Alright guys, that is the end of this blog, tell me what you think please! if you like I will do more.



Poll: Like this Blog

Like (34)
 
97%

Dislike (1)
 
3%

35 total votes

Your vote: Like this Blog

(Vote): Like
(Vote): Dislike



****
5 time GM zerg Currently top masters
Rimstalker
Profile Joined May 2011
Germany734 Posts
February 25 2013 23:32 GMT
#2
hugely dislike native speakers that can't distinguish between 'there' and 'their'.

Sorry for being grammar nazi.

And it's 'per se'. And Childrens'

But I would be interested how you got into that industry, and how you find your clients.
Here be Dragons
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 25 2013 23:35 GMT
#3
hah sorry half of this was typed via my phone... and im not big on grammer. I will be making another blog soon about the industry and how you get into it.
5 time GM zerg Currently top masters
Neighbor
Profile Joined May 2009
United States119 Posts
February 26 2013 00:25 GMT
#4
On February 26 2013 08:32 Rimstalker wrote:
Sorry for being grammar nazi.

And it's 'per se'. And Childrens'

Well, you're not doing a good job...
RoyGBiv_13
Profile Blog Joined August 2010
United States1275 Posts
February 26 2013 00:40 GMT
#5
I do some security work, and have a bunch of friends who do pen testing and other security type positions. Its fantastically fun, and I'm always keeping up with the latest news in the security scene.

Do you go to DEFCON or other conferences? I always envision I'm not the only starcraft nerd in a hotel full of nerds.
Any sufficiently advanced technology is indistinguishable from magic
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:07 GMT
#6
haha send me a pm and ill discuss some things with you
5 time GM zerg Currently top masters
Cornstyle
Profile Joined October 2010
United States147 Posts
February 26 2013 02:08 GMT
#7
Could you explain to me why you need to physically scope out the site that you're hacking? While I'm sure it makes it easier I'm curious how realistic that is. Actually needing to have "boots on the ground" so to say seems like pretty poor hacking.
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:13 GMT
#8
because in pen-testing and big wig network deals, they can have certain ports connected to a certain area. If you trip that port and get something wrong, (lets say you hit wrong area of building) you are locked out and its over. Thats why you need to scope it out, information gathering is just as imnportant as the accual hacking, you have to adjust break times, adjust a ton of things in the end report to up security. Say an employee leaves 2 minutes early, or steps out for a smoke, in those 2 minutes I can infiltrate there network gain access to there mainframe and boom its over. Thats why you need "Boots on the ground" its to plan times, thats how real hackers that do things to steal plan. Its all about thinking and doing it the same way as someone who is stealing it illegaly would.
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:15 GMT
#9
hope that answers your question, and friend, this is notpoor hacking... look into it in more detail and come back and tell me its poor hacking. Thats accualy offensive considering we consider it our art.
5 time GM zerg Currently top masters
Abductedonut
Profile Blog Joined December 2010
United States324 Posts
February 26 2013 02:37 GMT
#10
Hey effort,

I'm actually a computer engineering and computer science major, but I've always been fascinated with pentesting.

What kind of degree did you get? (if at all?) Are you part of a team?

Where did you learn to hack? How often do you code your own exploits? Does commercial software like metasploit and Nessus actually help, or are you mostly working through terminal and nmap? What is your take on Backtrack?

Thanks, if you do answer =P
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 04:03 GMT
#11
@Abductedonut

Those are awesome degrees!,

To answer your first question, I did not even finish highschool so no degree there.

I do work as part of a team, there are 4 of us that do what we call Mission's together haha, a lot of the time we duo team and do two jobs at once.

Im all self tought, I accualy got arrested for "hacking" when I was 18, part of why i dident finish highschool... (I am ashamed of it now that i am white hat), but I litterally bought books and read them over and over and I had my laptop and just sat at public locations and started my hacking career.

I code my own exploits often, we as a team do a lot of exploit coding. It is a must becuase you have to adapt to the system you are up against, using basic exploits dosent cut it for a lot of systems.

Metasploit I use daily, it is extremely usefull. Now I do not use the full GUI just the command line, Nessus not so much. As far as terminal goes, I use that all the time as well the Airmon-ng is always a good tool. But you have to remeber these are only tools, just like in a workshop for a carpenter, the tools are an asset your mind is the function. Nmap is put to good use as well, although terminal and metasplot more so.

Backtrack is amazing, I have it setup on a lot of my equipment, it provides a ton of built in tools... although for your average user, you will use about 10% of what is there... I only use about 45-50% a lot of the tools on backtrack are not productive and no one in the field uses them. It is convient as it comes with all the suites needed such as airmon-ng, metasplot etc...
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 06:33 GMT
#12
Also I wanted to add one more thing,

you were talking about Nmap. it is most used as a port scanner as it integrates well with metasploit, we use it for information gathering. I will go into all of this in my next blog, and in depth on what we do with each program. If you guys would like me to make a blog on what all of these programs are and how we use them just tell me.
5 time GM zerg Currently top masters
Ilikestarcraft
Profile Blog Joined November 2004
Korea (South)17731 Posts
February 26 2013 09:16 GMT
#13
I would be interested in a blog about that. I am interested in stuff like pen testing and hope one day maybe to go into the field too.
"Nana is a goddess. Or at very least, Nana is my goddess." - KazeHydra
blade55555
Profile Blog Joined March 2009
United States17423 Posts
February 26 2013 09:27 GMT
#14
Haha that's awesome that you are a pen tester. I actually am in school and learning about pen testing and all that fun stuff. It's pretty cool ^^.
When I think of something else, something will go here
TheQuiff
Profile Blog Joined August 2012
Scotland91 Posts
Last Edited: 2013-02-26 09:30:01
February 26 2013 09:29 GMT
#15
Hello.

I would like to ask some question either PM me or reply. I find this greatly interesting.

I applied for something for coding and scripting as a job. Alot of people may find it boring but i love it. I like how i can write codes and then something will happen. Sadly i applied for wrong job, now i'm an accountant technichan, which is an okay job. I dont have any heavy education mainly highers/ advance highers which is equivlant to first year uni.

I've always found this interesting and also met people with big IT background who said i had a natural flare for this kind of subject, i also love get into nerdy stuff about hardware. Looking deeply into cpu's, gpu's. This hardware and scripting coding and all problem solving. I find interesting and i always go in my free time to understand it more.

I just dont have the sources or means to get a better grasp of this stuff.

I will say now that it's only for entertainment not to malicous use to this information.

If at home can you provide me any resources on further my knowledge?

Finally is there many jobs to do this, not for a salary like help out and be a volunteered white hat?

Thanks for your time.
I'm Scottish, I'm not that scary
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 18:13 GMT
#16
@TheQuiff

Hey man, glad you find this type of work interesting!

As far as sources go, there are a ton of really good sources out there... books on metasploit are always good, I will list a few good ones at the end of this post.

As far as voulanteer jobs go, there is something you should know about Pen-Testing in general... there are not many accrual companies that are dedicated too it, it is mostly a group of people that get in contact with other people and need it done. I would browse forums etc... to see if someone would let you in... as far as my situation I started my group about 6 years ago... (we became white hat about 4 years ago). But I am sure you can find a small business that would like the service in the area, and im sure you could make a bit of money doing it on the side. Putting together a group of friends or people in the community is what I would do though because most groups are not open to outsiders.

I hope that answers your question Below is the list of books:

Books: Ninja Hacking, metasploit: the penetration testers guide, SQL injection attacks and defense.

Those are some good books I would look into.
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 27 2013 05:10 GMT
#17
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,
5 time GM zerg Currently top masters
Eben
Profile Blog Joined September 2008
United States769 Posts
February 27 2013 20:57 GMT
#18
On February 27 2013 14:10 sc2effort wrote:
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,


this seems really interesting. Will follow!
Release
Profile Blog Joined October 2010
United States4397 Posts
Last Edited: 2013-02-27 21:35:44
February 27 2013 21:33 GMT
#19
On February 26 2013 08:32 Rimstalker wrote:
I prodigiously dislike native english-speakers who cannot distinguish 'there' from 'their'.

I am sorry for being a grammar nazi.

And it's 'per se'. And Childrens' Did you start 2 sentences with coordinate conjunctions? The second sentence isn't a complete sentence.

But I am interested as to the the methods whereby you got into that industry, and the methods whereby you find your clients.


Don't be a grammar nazi if you do not know rudimentary rules of grammar or apply the aforementioned rules to your own post.
☺
Athos
Profile Blog Joined February 2008
United States2484 Posts
February 28 2013 04:27 GMT
#20
On February 27 2013 14:10 sc2effort wrote:
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,



That sounds awesome. I'm researching these subjects more and more as I want to protect my website from hacking/exploitation. It's therefore in my best interest to try to break it myself. Looking forward to more awesome blogs like this.
1 2 Next All
Please log in or register to reply.
Live Events Refresh
Next event in 6h 56m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
Nina 220
StarCraft: Brood War
ToSsGirL 141
Sacsri 54
Dota 2
XaKoH 739
League of Legends
JimRising 868
Super Smash Bros
hungrybox590
Heroes of the Storm
Khaldor153
Other Games
summit1g17222
NeuroSwarm52
Organizations
Other Games
gamesdonequick944
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 12 non-featured ]
StarCraft 2
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
League of Legends
• Jankos1152
• Stunt473
Upcoming Events
BSL Team A[vengers]
6h 56m
Cross vs Sobenz
Sziky vs IcaruS
SC4ALL
7h 56m
SC4ALL
7h 56m
BSL 21
11h 56m
Replay Cast
1d 1h
Wardi Open
1d 4h
Monday Night Weeklies
1d 9h
Replay Cast
1d 15h
Sparkling Tuna Cup
2 days
WardiTV Korean Royale
2 days
[ Show More ]
Replay Cast
3 days
WardiTV Korean Royale
3 days
The PondCast
4 days
Korean StarCraft League
5 days
CranKy Ducklings
6 days
IPSL
6 days
dxtr13 vs OldBoy
Napoleon vs Doodle
Liquipedia Results

Completed

CSL 2025 AUTUMN (S18)
CranK Gathers Season 2: SC II Pro Teams
Eternal Conflict S1

Ongoing

BSL 21 Points
BSL 21 Team A
C-Race Season 1
IPSL Winter 2025-26
KCM Race Survival 2025 Season 4
SOOP Univ League 2025
SC4ALL: Brood War
SC4ALL: StarCraft II
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025

Upcoming

YSL S2
BSL Season 21
SLON Tour Season 2
BSL 21 Non-Korean Championship
HSC XXVIII
RSL Offline Finals
WardiTV 2025
RSL Revival: Season 3
Stellar Fest
META Madness #9
BLAST Bounty Winter 2026: Closed Qualifier
eXTREMESLAND 2025
ESL Impact League Season 8
SL Budapest Major 2025
BLAST Rivals Fall 2025
IEM Chengdu 2025
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.