this post was submitted on 22 Jul 2024
11 points (100.0% liked)

cybersecurity

3238 readers
1 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 1 year ago
MODERATORS
 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

top 5 comments
sorted by: hot top controversial new old
[–] [email protected] 1 points 3 months ago (1 children)

How do I upskill myself to be able to do bug bounties? I have participated in many CTF competitions but I don't know how well that skillset will transfer to bug bounties and if yes how to transfer it

[–] [email protected] 2 points 3 months ago (1 children)

Not a bug bounty hunter myself, but it seems like one of those things that you just have to jump into and start trying to do. So many bounties seem to be pretty low-hanging fruit type of stuff. The payouts might be either LOW or non-paid, just recognition type stuff, but seeing an accepted bounty submission come back does a lot for your confidence. It's like CTFs in a way. Getting into CTFs seems intimidating at first, but then when you go actually do one and you have some level of success, it starts to feel a bit more approachable, you get more XP and you do better the next time.

You could also check this out https://www.bugbountyhunter.com/zseano/ and anything/everything from https://portswigger.net as that team is the best I know in terms of cutting-edge web app research.

[–] [email protected] 2 points 3 months ago

Thanks a lot. I'll check both the sources as well!

[–] [email protected] 1 points 3 months ago (1 children)

I am not pursuing Cybersecurity but I have a good understanding of Linux, command line, networking etc. I have made IRC bots which got hacked by IRC people and it was fun learning things.

My question is what do we actually do in Cybersecurity? Is it just nmap, Hydra, Kali?

[–] [email protected] 1 points 3 months ago

That's a loaded question 😅. One that can be answered in a few different ways... From a technical perspective, "infosec" is a relatively vast field comprised of a lot of sub-disciplines, so from a tooling and procedural perspective, it varies from job to job. Some would argue a lot of what we do is just theater, and for many orgs and many "pros", this may very well be true. At the root of it all though, you could say our job is to ensure the Confidentiality, Integrity and Availability (classic CIA triad) of data/systems, keeping in mind the balance/tradeoffs between security needs and business requirements. To do so, we employ a variety of tactics, techniques, tools, methodologies, frameworks, etc... Another way to boil down what security folks do is in the lens of "risk". Most business and IT decisions in general come down to risk-based decision making and security is no different. Security teams should understand the risk introduced by the threat landscape coupled with the respective data, attack surface, business assets, etc... to help inform the business how to reduce security risk to acceptable levels.

Hopefully this answer isn't too vague and non-answer-ey!