zlacker

[return to "Ask HN: Any felons successfully found IT work post-release?"]
1. public+l6[view] [source] 2024-01-03 19:17:40
>>public+(OP)
Thank you all for your perspective, and suggestions.

I was on a bad psychedelic trip, accompanied with some other issues at the time and ending up making threatening statements to a very high level official, but no battery occurred whatsoever. Thank goodness, or I would probably not be writing this message

◧◩
2. x0x0+s9[view] [source] 2024-01-03 19:32:31
>>public+l6
You could also consider working as a consultant or external pen tester. When we hired our pen testers, we did not run background checks on them, not least because they have no access to customer data so it's much less of a concern.
◧◩◪
3. zamada+Qb[view] [source] 2024-01-03 19:44:04
>>x0x0+s9
If the people you're paying to find weaknesses in the security system are assuredly never going to find a way to access internal data then how did you conclude you needed a pen tester in the first place? I mean, it's probably the right conclusion but only precisely because they'd find a way to access things they shouldn't be able to.
◧◩◪◨
4. x0x0+Fj[view] [source] 2024-01-03 20:20:52
>>zamada+Qb
We spin up a clone of prod and point them at that.

Certainly if a weakness is found in the clone it's also present in prod, but that's what contracts are for. And we also review logs to make sure.

edit: a clone of prod w/ only test data in it, not prod data.

◧◩◪◨⬒
5. random+xp[view] [source] 2024-01-03 20:46:54
>>x0x0+Fj
How do you know what you are looking for in the logs?

If you have the foresight to be able to recognize a malicious action from the logs, why not have the software block those actions from the start?

◧◩◪◨⬒⬓
6. x0x0+wq[view] [source] 2024-01-03 20:50:57
>>random+xp
We log all accesses and flows. So eg if our pentesters found a vulnerability in an endpoint, we can retrieve every post against that endpoint and (1) verify the pentesters didn't exploit it against prod, and (2) verify that it hasn't been exploited by anyone else.
◧◩◪◨⬒⬓⬔
7. random+0s[view] [source] 2024-01-03 20:57:50
>>x0x0+wq
Of course, that only works if the vulnerability is reported. There is no reason for the malicious actor to report the vulnerability they have chosen to exploit.

What percentage of the vulnerabilities discovered are independently discovered by multiple pen testers?

◧◩◪◨⬒⬓⬔⧯
8. x0x0+pZ[view] [source] 2024-01-04 01:04:52
>>random+0s
> What percentage of the vulnerabilities discovered are independently discovered by multiple pen testers?

Zero because we patch them as soon as we are notified. Generally at the end of the test / before the retest, but if they found something serious they would notify immediately,

◧◩◪◨⬒⬓⬔⧯▣
9. random+u51[view] [source] 2024-01-04 02:09:39
>>x0x0+pZ
Patch production, sure, but naturally you would leave them in the pen testing environment for some time in order to collect data. No data and you’re just guessing. That’s fine for amateur hour, but not business.
[go to top]