at UOT ❖ Application Security Engineer, Security Researcher and Sometimes a Bug Hunter ❖ Served at: Isecur1ty, EarthLink, Cure53, and Hackerone ❖ 10 CVE’s: WordPress, Joomla, Drupal, …etc
based on my subjective experience. Maybe I am right or wrong, I can’t tell. Things may vary for everyone based on where, when, who and many other circumstances. What works for X won’t work for Y and maybe won’t work for you.
hacking culture, a script kiddie, skiddie, or skid is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites. It is generally assumed that most script kiddies are juveniles who lack the ability to write sophisticated programs or exploits on their own and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities – Wikipedia
starts as a Skid(Technically). Fact #2: Skid != Amateur || Noob (Just lazy people who don’t want to learn) Fact #3: It is not about the age or the title you can find a skid with a fancy title and sometimes with a PhD!
People who think they don’t have to learn anymore! ❖ People who think every feedback is a Criticism. ❖ People who judge other people’s skills when they lack to.
❖ Books are boring sometimes. You can read topics instead. ❖ Courses have to be presented by someone who has day-to-day experience. ❖ Write-ups are the most important. Be careful! “So many books, so little time.” –Frank Z.
About Security ❖ Programming is a key requirement in the field. ❖ Choose a language based on your focus area. ❖ Do some programming tasks. ❖ You can’t fix what you can’t understand. ❖ You can’t hack what you don’t understand.
About Security ❖ Network is a key requirement in the field(Mostly). ❖ You can’t understand how things work without understanding how the network works. ❖ No deep knowledge, unless network sec role. ❖ It is very easy! More than other fields.
About Security ❖ OS is also a key requirement(Specially Linux) ❖ You need to know how to use, secure, and analyze these systems. ❖ You need to know how process, threads, and protection are implemented in these systems. Specially if you want to work on the binary-level.
❖ What is it? ❖ Platforms: HackerOne, BugCrowd, HackenProof, …etc. ❖ Self-Hosted Programs: Facebook, Google, …etc. ❖ Bug bounty has more than one face.
❖ The good parts: • They give unlimited opportunities to everyone around the world! • A lot of money if you do it well. • You can build a name with it. • You can join the community very easily. • It is a huge +1 for your resume.
❖ The bad parts: • It may(the bug hunting) waste your time. • Delay in response, fix, and rewarding processes. • Sometimes they give a false indicative about someone’s skills. • Fact: Skids can find bugs too! • Rewards are low(it debends)
special! ❖ Some people think they do the God work by themselves. ❖ You aren’t one of a kind. ❖ Don’t underestimate other people’s work. “You're never too important to be nice to people.” - Jon Batiste
❖ It is better for your future opportunities. ❖ Sometimes people hate you for what you are. (They are jealous) “If nobody hates you, you are doing something wrong.” – Dr. House
❖ Credit people for their work. ❖ Don’t talk about what you don’t know. ❖ Don’t involve in no-wins situations. ❖ Don’t use your skills to hacking, attacking, or threating people. ❖ Don’t use fake name and images. That’s lame.
❖ It is very easy to get involved in the community. ❖ It is very easy to find job when you are skilled enough. 3.5M unfilled positions by 2021 - cyber security ventures ❖ You are going to have friends from all around the world. ❖ If you are ambition enough you can get a job at Google or Facebook.