• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 03:39
CEST 09:39
KST 16:39
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL21] Ro4 Preview: On Course7Code S Season 1 - RO8 Preview7[ASL21] Ro8 Preview Pt2: Progenitors8Code S Season 1 - RO12 Group A: Rogue, Percival, Solar, Zoun13[ASL21] Ro8 Preview Pt1: Inheritors16
Community News
Maestros of The Game 2 announcement and schedule !7Weekly Cups (April 27-May 4): Clem takes triple0RSL Revival: Season 5 - Qualifiers and Main Event12Code S Season 1 (2026) - RO12 Results12026 GSL Season 1 Qualifiers25
StarCraft 2
General
Code S Season 1 - RO8 Preview Behind the Blue - Team Liquid History Book Weekly Cups (April 27-May 4): Clem takes triple Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool Code S Season 1 (2026) - RO12 Results
Tourneys
GSL Code S Season 1 (2026) WardiTV Mondays Sparkling Tuna Cup - Weekly Open Tournament Sea Duckling Open (Global, Bronze-Diamond) Maestros of The Game 2 announcement and schedule !
Strategy
Custom Maps
[D]RTS in all its shapes and glory <3 [A] Nemrods 1/4 players
External Content
Mutation # 525 Wheel of Misfortune The PondCast: SC2 News & Results Mutation # 524 Death and Taxes Mutation # 523 Firewall
Brood War
General
[ASL21] Ro4 Preview: On Course Quality of life changes in BW that you will like ? Why there arent any 256x256 pro maps? RepMastered™: replay sharing and analyzer site BGH Auto Balance -> http://bghmmr.eu/
Tourneys
[ASL21] Semifinals A [BSL22] RO16 Group Stage - 02 - 10 May [Megathread] Daily Proleagues [ASL21] Ro8 Day 3
Strategy
Simple Questions, Simple Answers Fighting Spirit mining rates Muta micro map competition What's the deal with APM & what's its true value
Other Games
General Games
Warcraft III: The Frozen Throne Stormgate/Frost Giant Megathread Path of Exile Nintendo Switch Thread Daigo vs Menard Best of 10
Dota 2
The Story of Wings Gaming
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Vanilla Mini Mafia Mafia Game Mode Feedback/Ideas TL Mafia Community Thread Five o'clock TL Mafia
Community
General
Russo-Ukrainian War Thread US Politics Mega-thread UK Politics Mega-thread The Letting Off Steam Thread European Politico-economics QA Mega-thread
Fan Clubs
The IdrA Fan Club
Media & Entertainment
Anime Discussion Thread [Manga] One Piece [Req][Books] Good Fantasy/SciFi books
Sports
2024 - 2026 Football Thread McBoner: A hockey love story Formula 1 Discussion
World Cup 2022
Tech Support
streaming software Strange computer issues (software) [G] How to Block Livestream Ads
TL Community
The Automated Ban List
Blogs
How EEG Data Can Predict Gam…
TrAiDoS
ramps on octagon
StaticNine
Funny Nicknames
LUCKY_NOOB
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1719 users

Work As A Computer Technician

Blogs > sc2effort
Post a Reply
1 2 Next All
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
Last Edited: 2013-02-25 19:37:38
February 25 2013 19:35 GMT
#1
As I sit here in a large office chair and look back on the past two years of my life, I have done many things, pulled my life together, re establish family, and found a stable job and one I enjoy. Throughout the past two years I have formed a new perspective on how the world operates and how we has individuals can bring ourselves to greatness without the help of an external force. In this Blog series I will be discussing day to day operations and my thought process as a computer technician and Pen-Tester, so lets get started.

So for the of you who do not know what a Pen Tester is I will give a simplified explanation, basically it i a person or group of people that get together with other people or companies and try to find flaws in there network security (Basically try to legally steal there data), in this blog I will not be going into how to pen test in anyway more the people I encounter and how i think.

Day 1: It was a cold morning, damp and the clouds were low, the coverage made it difficult to see and the ice on the roads didn't help me get to work considering I was already Late. I received a call from a client of mine, a business man who wanted to make sure all of his financial and "Secrete" files were secure from any outside source. At first thoughts I was considering A "Covert" operation, which basically in Pen-Testing world means that no one but the CEO knows that it is a fluke. With that in play I got to the chalk board. One of the most important steps in pen testing is scoping your target, finding everything you can about how there building is laid out to what times the IT guys get in for the day. Data collection is what makes or break the reality and effectiveness of the test, we are testing response times of the companies IT guys and how they handle a security breach so that we can in the end tell them what to fix and most importantly how to fix it.

I started scoping around 5pm I wanted to get a sense of what time there guys left the building and how many stayed after hours. I found that there was a total of 5 guys, 3 left at 5pm and the other 2 stayed until around 10pm. I needed to look into this more, I needed to know what those 2 guys did after the other two left. Almost immediately I found the first flaw, the company was using a WEP encryption on there wifi... ( For those of you who dont know, a decent hacker can crack wep codes in about 3 minutes) this is a huge nono, with that code I can then access tons of other files using basic exploits. I did not find what those other two were doing that night which put me into a predicament. I needed to physically get into the building to see what kind of infrastructure they had setup except no person with a brain is going to put there IT station out front so I needed a con per say, with help from the CEO I walked in the building the next day, I found that all of there main computers were setup on separate ports than the main systems were on, this was a breakthrough.


now that i knew they were using different ports for there data computers, I could start hacking.
I sat outside of the building and began the crack, I pin pointed areas of interest, running risk analysis against the areas that I thought could be important. Using key terms I was able to narrow the list to 5 files, (Mind you this was about 7 hour process, not all sitting infront of the building) these files had special encryption's on them, now with the criminal mind in play i started thinking of some work arounds. I found one, there website... they had vulnerabilities in there login page. (you can easily find information on this kind of thing, by using dorks and "Google-hacking") I started working on it, the back code came out to be the CEO's children's names. At that moment I sighed, I not only cracked his code but was able to get all of the files hidden in under 24 hours. I called my client, I started writing up everything I could for him, everything that I did and how I did it. Considering these reports are usually 10+ pages long i met him and his team in person and started breaking it down for them. ( Mind you the team caught the crack about 50% through but could not stop it), I laid out my ideas and fixes and they implemented them.

We always do a post test, about a month later... I will not go into the post test of this client but lets just say, they fixed a lot of things and they are secure now, at least the best they can be, there is always a way to bypass something.

Alright guys, that is the end of this blog, tell me what you think please! if you like I will do more.



Poll: Like this Blog

Like (34)
 
97%

Dislike (1)
 
3%

35 total votes

Your vote: Like this Blog

(Vote): Like
(Vote): Dislike



****
5 time GM zerg Currently top masters
Rimstalker
Profile Joined May 2011
Germany734 Posts
February 25 2013 23:32 GMT
#2
hugely dislike native speakers that can't distinguish between 'there' and 'their'.

Sorry for being grammar nazi.

And it's 'per se'. And Childrens'

But I would be interested how you got into that industry, and how you find your clients.
Here be Dragons
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 25 2013 23:35 GMT
#3
hah sorry half of this was typed via my phone... and im not big on grammer. I will be making another blog soon about the industry and how you get into it.
5 time GM zerg Currently top masters
Neighbor
Profile Joined May 2009
United States119 Posts
February 26 2013 00:25 GMT
#4
On February 26 2013 08:32 Rimstalker wrote:
Sorry for being grammar nazi.

And it's 'per se'. And Childrens'

Well, you're not doing a good job...
RoyGBiv_13
Profile Blog Joined August 2010
United States1275 Posts
February 26 2013 00:40 GMT
#5
I do some security work, and have a bunch of friends who do pen testing and other security type positions. Its fantastically fun, and I'm always keeping up with the latest news in the security scene.

Do you go to DEFCON or other conferences? I always envision I'm not the only starcraft nerd in a hotel full of nerds.
Any sufficiently advanced technology is indistinguishable from magic
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:07 GMT
#6
haha send me a pm and ill discuss some things with you
5 time GM zerg Currently top masters
Cornstyle
Profile Joined October 2010
United States147 Posts
February 26 2013 02:08 GMT
#7
Could you explain to me why you need to physically scope out the site that you're hacking? While I'm sure it makes it easier I'm curious how realistic that is. Actually needing to have "boots on the ground" so to say seems like pretty poor hacking.
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:13 GMT
#8
because in pen-testing and big wig network deals, they can have certain ports connected to a certain area. If you trip that port and get something wrong, (lets say you hit wrong area of building) you are locked out and its over. Thats why you need to scope it out, information gathering is just as imnportant as the accual hacking, you have to adjust break times, adjust a ton of things in the end report to up security. Say an employee leaves 2 minutes early, or steps out for a smoke, in those 2 minutes I can infiltrate there network gain access to there mainframe and boom its over. Thats why you need "Boots on the ground" its to plan times, thats how real hackers that do things to steal plan. Its all about thinking and doing it the same way as someone who is stealing it illegaly would.
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 02:15 GMT
#9
hope that answers your question, and friend, this is notpoor hacking... look into it in more detail and come back and tell me its poor hacking. Thats accualy offensive considering we consider it our art.
5 time GM zerg Currently top masters
Abductedonut
Profile Blog Joined December 2010
United States324 Posts
February 26 2013 02:37 GMT
#10
Hey effort,

I'm actually a computer engineering and computer science major, but I've always been fascinated with pentesting.

What kind of degree did you get? (if at all?) Are you part of a team?

Where did you learn to hack? How often do you code your own exploits? Does commercial software like metasploit and Nessus actually help, or are you mostly working through terminal and nmap? What is your take on Backtrack?

Thanks, if you do answer =P
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 04:03 GMT
#11
@Abductedonut

Those are awesome degrees!,

To answer your first question, I did not even finish highschool so no degree there.

I do work as part of a team, there are 4 of us that do what we call Mission's together haha, a lot of the time we duo team and do two jobs at once.

Im all self tought, I accualy got arrested for "hacking" when I was 18, part of why i dident finish highschool... (I am ashamed of it now that i am white hat), but I litterally bought books and read them over and over and I had my laptop and just sat at public locations and started my hacking career.

I code my own exploits often, we as a team do a lot of exploit coding. It is a must becuase you have to adapt to the system you are up against, using basic exploits dosent cut it for a lot of systems.

Metasploit I use daily, it is extremely usefull. Now I do not use the full GUI just the command line, Nessus not so much. As far as terminal goes, I use that all the time as well the Airmon-ng is always a good tool. But you have to remeber these are only tools, just like in a workshop for a carpenter, the tools are an asset your mind is the function. Nmap is put to good use as well, although terminal and metasplot more so.

Backtrack is amazing, I have it setup on a lot of my equipment, it provides a ton of built in tools... although for your average user, you will use about 10% of what is there... I only use about 45-50% a lot of the tools on backtrack are not productive and no one in the field uses them. It is convient as it comes with all the suites needed such as airmon-ng, metasplot etc...
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 06:33 GMT
#12
Also I wanted to add one more thing,

you were talking about Nmap. it is most used as a port scanner as it integrates well with metasploit, we use it for information gathering. I will go into all of this in my next blog, and in depth on what we do with each program. If you guys would like me to make a blog on what all of these programs are and how we use them just tell me.
5 time GM zerg Currently top masters
Ilikestarcraft
Profile Blog Joined November 2004
Korea (South)17741 Posts
February 26 2013 09:16 GMT
#13
I would be interested in a blog about that. I am interested in stuff like pen testing and hope one day maybe to go into the field too.
ils
"Nana is a goddess. Or at very least, Nana is my goddess." - KazeHydra
blade55555
Profile Blog Joined March 2009
United States17423 Posts
February 26 2013 09:27 GMT
#14
Haha that's awesome that you are a pen tester. I actually am in school and learning about pen testing and all that fun stuff. It's pretty cool ^^.
When I think of something else, something will go here
TheQuiff
Profile Blog Joined August 2012
Scotland91 Posts
Last Edited: 2013-02-26 09:30:01
February 26 2013 09:29 GMT
#15
Hello.

I would like to ask some question either PM me or reply. I find this greatly interesting.

I applied for something for coding and scripting as a job. Alot of people may find it boring but i love it. I like how i can write codes and then something will happen. Sadly i applied for wrong job, now i'm an accountant technichan, which is an okay job. I dont have any heavy education mainly highers/ advance highers which is equivlant to first year uni.

I've always found this interesting and also met people with big IT background who said i had a natural flare for this kind of subject, i also love get into nerdy stuff about hardware. Looking deeply into cpu's, gpu's. This hardware and scripting coding and all problem solving. I find interesting and i always go in my free time to understand it more.

I just dont have the sources or means to get a better grasp of this stuff.

I will say now that it's only for entertainment not to malicous use to this information.

If at home can you provide me any resources on further my knowledge?

Finally is there many jobs to do this, not for a salary like help out and be a volunteered white hat?

Thanks for your time.
I'm Scottish, I'm not that scary
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 26 2013 18:13 GMT
#16
@TheQuiff

Hey man, glad you find this type of work interesting!

As far as sources go, there are a ton of really good sources out there... books on metasploit are always good, I will list a few good ones at the end of this post.

As far as voulanteer jobs go, there is something you should know about Pen-Testing in general... there are not many accrual companies that are dedicated too it, it is mostly a group of people that get in contact with other people and need it done. I would browse forums etc... to see if someone would let you in... as far as my situation I started my group about 6 years ago... (we became white hat about 4 years ago). But I am sure you can find a small business that would like the service in the area, and im sure you could make a bit of money doing it on the side. Putting together a group of friends or people in the community is what I would do though because most groups are not open to outsiders.

I hope that answers your question Below is the list of books:

Books: Ninja Hacking, metasploit: the penetration testers guide, SQL injection attacks and defense.

Those are some good books I would look into.
5 time GM zerg Currently top masters
sc2effort
Profile Blog Joined June 2011
Russian Federation269 Posts
February 27 2013 05:10 GMT
#17
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,
5 time GM zerg Currently top masters
Eben
Profile Blog Joined September 2008
United States769 Posts
February 27 2013 20:57 GMT
#18
On February 27 2013 14:10 sc2effort wrote:
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,


this seems really interesting. Will follow!
Release
Profile Blog Joined October 2010
United States4397 Posts
Last Edited: 2013-02-27 21:35:44
February 27 2013 21:33 GMT
#19
On February 26 2013 08:32 Rimstalker wrote:
I prodigiously dislike native english-speakers who cannot distinguish 'there' from 'their'.

I am sorry for being a grammar nazi.

And it's 'per se'. And Childrens' Did you start 2 sentences with coordinate conjunctions? The second sentence isn't a complete sentence.

But I am interested as to the the methods whereby you got into that industry, and the methods whereby you find your clients.


Don't be a grammar nazi if you do not know rudimentary rules of grammar or apply the aforementioned rules to your own post.
☺
Athos
Profile Blog Joined February 2008
United States2484 Posts
February 28 2013 04:27 GMT
#20
On February 27 2013 14:10 sc2effort wrote:
Hey guys, so following this blog... with all of the good rating and great questions I have gotten I am going to make a new style of blog... The new blogs are going to be tutorial/blogs. They are going to cover programs, writing exploits, sql injection and so on...

These are going to be in chapter format, I am going to start with step 1... Information gathering, I will go into depth on it and how to ujse it in your advantage. SO look out for it, I should have Part 1 out by friday,



That sounds awesome. I'm researching these subjects more and more as I want to protect my website from hacking/exploitation. It's therefore in my best interest to try to break it myself. Looking forward to more awesome blogs like this.
1 2 Next All
Please log in or register to reply.
Live Events Refresh
Next event in 21m
[ Submit Event ]
Live Streams
Refresh
StarCraft: Brood War
BeSt 819
Zeus 647
Pusan 261
Killer 252
soO 63
Sharp 39
Hm[arnc] 25
910 21
Bale 20
ZergMaN 8
League of Legends
JimRising 631
Counter-Strike
olofmeister638
Other Games
summit1g13297
m0e_tv531
C9.Mang0333
monkeys_forever279
ViBE153
ceh936
RuFF_SC229
Organizations
Counter-Strike
PGL18329
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
[ Show 12 non-featured ]
StarCraft 2
• LUISG 18
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
League of Legends
• TFBlade558
Upcoming Events
GSL
21m
Afreeca Starleague
2h 21m
Soma vs Leta
Wardi Open
4h 21m
Monday Night Weeklies
8h 21m
OSC
16h 21m
CranKy Ducklings
1d 2h
Afreeca Starleague
1d 2h
Light vs Flash
Replay Cast
2 days
Replay Cast
2 days
The PondCast
3 days
[ Show More ]
Replay Cast
3 days
RSL Revival
4 days
Korean StarCraft League
4 days
RSL Revival
5 days
BSL
5 days
GSL
6 days
Cure vs TBD
TBD vs Maru
BSL
6 days
Liquipedia Results

Completed

CSL 2026 SPRING (S20)
WardiTV TLMC #16
Nations Cup 2026

Ongoing

BSL Season 22
ASL Season 21
IPSL Spring 2026
KCM Race Survival 2026 Season 2
Acropolis #4
KK 2v2 League Season 1
BSL 22 Non-Korean Championship
SCTL 2026 Spring
RSL Revival: Season 5
2026 GSL S1
Asian Champions League 2026
IEM Atlanta 2026
PGL Astana 2026
BLAST Rivals Spring 2026
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2

Upcoming

Escore Tournament S2: W7
YSL S3
Escore Tournament S2: W8
CSLAN 4
Kung Fu Cup 2026 Grand Finals
HSC XXIX
uThermal 2v2 2026 Main Event
Maestros of the Game 2
2026 GSL S2
BLAST Bounty Summer 2026: Closed Qualifier
Stake Ranked Episode 3
XSE Pro League 2026
IEM Cologne Major 2026
Stake Ranked Episode 2
CS Asia Championships 2026
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.