Submitted by Offsec_Community t3_yl59ln in IAmA

I have been working in Cyber Security for 8 years. I spent 7 years in the Army working as a Cyber Operations Specialist. I have worked on real life and training missions defending different types of networks. I also have a B.S. degree in Networking and Cyber Security. I recognize the importance of cyber security and defending enterprise networks and critical infrastructure from constant cyber-attacks. I now create defensive content to help train other cyber security operators.

Ask me anything about:

• Cyber Security

• Defensive cyber training

PROOF: https://imgur.com/a/ZveTl5O

​

EDIT: I am signing off now, but I will answer as much as possible, so feel free to add more questions. Thanks for all the support. Keep on keepin on!

200

Comments

You must log in or register to comment.

dissonance79 t1_iuwkwh9 wrote

Where’s the best place to start as someone who has an IT background, but wants to move into SecOps?

What classes (online) or literature do you suggest?

7

Offsec_Community OP t1_iuwp402 wrote

A background in IT is a great start already and a easy transfer that a lot of people do. My biggest advice is to start getting hands on experience. There are a lot of books out there but just reading can only get you so far. Offsec has our SOC200 training out with the exam that will be coming out as well. We also have challenge labs with a play button that launches an entire attack against a network and the student has to find it in the host logs. Tryhackme is also a good resource for hands on stuff as well. CTFs are a fun way to get some experience and hands on skills like PicoCTF. Getting some security certifications will help make that switch too.

12

dissonance79 t1_iuwpcnj wrote

I’ve been working through TryHackMe and several Udemy courses. I have a thing where I don’t want to be dead weight on a team.

Thank you for your insight and I will absolutely look up your program Gabe!!!

3

Offsec_Community OP t1_iuwsge2 wrote

Do not worry about being dead weight. I will always choose an analyst who is trying to get better and has a good work ethic over someone who knows a lot and does not try to get better.

6

kee80 t1_iuwn4nl wrote

What, in your opinion, is the single best thing a person can do to protect themselves online? Thank you!

6

Offsec_Community OP t1_iuwqeox wrote

That is a tough question. I would say improve your knowledge about the threats out there. People are the biggest security risk. You can have all the security features you want but a person can make those useless. Be aware of how hackers are operating these days. Like text message are big now saying it is your bank and you need to click a link. Just be aware of those type of things.

3

itspeterj t1_iux3310 wrote

Not OP, but Multifactor Authentication is a huge way to protect yourself. Put it on everything you can. If attackers gain your usernames and passwords from data breaches, MFA can prevent them from getting into your accounts. Also, don't use the same passwords on multiple sites because if somebody hacks LinkedIn (for example) and gets your password, you can bet they'll try to see what else they can access with those credentials.

3

Offsec_Community OP t1_iux4zcz wrote

Great advice. That all comes back people being well informed and nonweldable. Some people do not even think about what you just said. Great advice thank you!

2

___Tom___ t1_iv0285a wrote

Not OP, but IMHO the single best thing you can do is to not re-use passwords. Use a different password for every website you have an account on, because password leaks are common and your username is often your e-mail these days, and hackers will take a leaked password database and try those e-mail/password combinations on other sites, especially social media, gmail, and others that offer SSO ("log in with Facebook/GMail/Github/etc")

2

JamesBaxter_Horse t1_iuwty3a wrote

What is your opinion on artificial intelligence in cyber security? Especially in regards to behavior-based detection systems, for example in fending off zero-day attacks.

5

Offsec_Community OP t1_iuww0f7 wrote

I have heard a lot of people talking about how that is the future and even someone said that security analysts will be a thing of the past. I disagree with that. I do not think AI will take the place of a person. Well at least for a long time. There are a lot of tools that classify network traffic and logs and create a base of what is going on and hackers till get passed that stuff. It will help for sure but every time security tools get better then hackers get better. It just never ends.

3

LaserHD t1_iuwyes2 wrote

What are some warning signs that an undetected attacker would be attempting to escalate privileges on a machine?

Thanks for the ama!

5

Offsec_Community OP t1_iux00n4 wrote

That is a tough question haha because that can be a lot of different things depending on what technique they are using. For a general answer I would say looking for "weirdness" on the network. I always say most of a SOC analysts job is verifying "good" things. Lots of things will look weird on the network and you dig in and find its something normal. So I would be looking for things a normal user would not be doing. Things like running command that are not necessarily bad but could be used in a bad way that a normal user would not be doing. Trying to access things on the system a normal user does not need to access. Those type of things.

8

MadDany94 t1_iux2cr5 wrote

What is your opinion on scam callers? And how do you think the government should battle them?

5

Offsec_Community OP t1_iux3cn9 wrote

I think about this a lot since I get scam calls a lot. What some people do not know is that answering these can cause more calls to happen. Some scam calls are just being sent to random numbers to just see if it is even a real number. Then they see it is real and keep calling. So it is best to never answer.

There does need to be some sort of regulation when it comes to this. It is hard to regulate though because often these scam calls come from outside the U.S. and that makes it tough to enforce any real consequences. I do not have a solution (If I did I would probably be rich) but maybe regulating the cell phone companies so they actually put real blocks in place. The are probably in the best place to do something about it all these calls so if they have a real incentive put in place by regulations then they might spend real time trying to solve the problem (This could be a thing already but I am not sure to be honest).

8

PeanutSalsa t1_iuwyrry wrote

What are the most common ways hackers get into networks? Are there a lot of different methods for them to get into networks? What are some of the less common ways?

4

Offsec_Community OP t1_iux19os wrote

There are a ton of ways for hackers to get into a network. The biggest security risk is people. You can have all the right security measures in place and someone will mess all that up. Email or phishing attacks are huge. An attacker sends an email with malware attached and then a user clicks on it to get all their free iTunes music and boom the attacker has a foot hold in the network. Social engineering is a big way for attackers to compromise a network

Web attacks are huge too. Mismanaged websites and application are always a way to get in a network. https://owasp.org/www-project-top-ten/ has a list of the top 10 web application security risk that they keep updated and is a great source for that.

A less common way is probably like the movies show a hacker just reinforcing their way into a network.

8

tierneyb t1_iuwxr4z wrote

Do/did you do any work in misinformation campaigns? It seems countries like Russia do this very well. Curious how often Americans are purposely duped for efforts related to warfare.

3

Offsec_Community OP t1_iuwz09l wrote

I did not work in any of that but I did volunteer to do that but it just never happened. I thought it would have been a lot of fun though. There is a lot of misinformation that is happening when it comes to warfare and the U.S. is a huge target. The use of misinformation is not a new thing either. It has been happening for a long time. It is just easier now with the internet. If you can make the enemy confused then you have a big advantage.

5

AdventurousAd8086 t1_iuxowgo wrote

Can you create an AI that argues with itself to reframe the narratives… for instance, to focus on weak points of the argument, rather than the strong points… for instance “Bernie Sanders is a socialist” vs “free health care” rather than vs “overturning citizens United”… you know, like a controller of hundreds of chatbots that argue with each other precisely to weaken the argument that actually matters most… I found that overturning citizens United was a huge argument 10 years ago, and doing so would greatly help other policies to take hold, but instead we have scattered arguments that all kind of fall under the umbrella that is no longer spoken about… I hope that was a clear enough question…

1

maxipontifex t1_iux2czh wrote

Why does Offensive Security need a Defense Developer?

3

Offsec_Community OP t1_iux4nar wrote

Great question. We are creating more defensive training. We have a SOC200 course that is out and the OSDA (Offensive Security Defense Analyst) exam coming out soon. The best security analyst is a well rounded one that can have a defense and offensive mindset. You can not have defense training if there is no one to play the offensive part so creating defense training just makes sense.

We also have defense challenge labs too. The student has access to a ELK SIEM with a working network that starts up. The student presses a play button and full network attack from initial compromise to the end of the attack happens and the student has to find what happened in the logs. Having a hacker at your fingertips basically so analyst can train on "hunting" is great training.

Ok commercial over!

2

xomdlynn t1_iuwtq3q wrote

what's the scariest cyber attack you've dealt with?

2

Offsec_Community OP t1_iuwur8g wrote

I can not get into details because of the classification. I will say the scariest attack is one that happened at a very very important facility and it was not hard for the attacker to get into that network. It was a network that should have been harder to attack but the it was sooo easy for them.

3

Flare_Starchild t1_iuwxxm0 wrote

I always wonder how many of these Stargate-style world altering scenarios have been averted by specialists like you but no one will ever know about because of the classifications of them.

Thank you for your service to the world.

2

Offsec_Community OP t1_iuwyhnh wrote

You would be surprised how boring having a clearance can actually be. It is not as exciting as the movies make it out to be. I dealt with a couple cool things here and there.

Not sure if I helped the world but I will keep at it! Thank you!

2

Flare_Starchild t1_iux8vpq wrote

Hey, as long as you're watching for trouble, you're a Guardian nonetheless.

1

SplitDiamond t1_iuwwzq1 wrote

What's a recommendation for online resources for someone who wants to get into Cyber Security? Things like Tryhackme, Cybrary, etc?

I was in the Army as well and have spent a few years working physical security. Looking back I regret the time I told my recruiter I wasn't interested in IT work haha

2

Offsec_Community OP t1_iuwy5xy wrote

I obviously recommend offsec for training. We have a lot of hands on stuff and a lot of good defensive training going on right now. Tryhackme is a good resource as well. I have used that.

For some good fundamental training https://overthewire.org/wargames/bandit/ and under the wire are great. They help build command line skills which is very important. They are free as well.

We probably all have something we regret like that for our time in the Army haha but its never to late to get in the game. I was 25 working at a motorcycle mechanic when I joined the Army and started in cyber security.

5

itspeterj t1_iux3fhg wrote

Hi Gage, I'm a big fan of the Offensive Security training materials you put out there, but they can be very difficult to figure out in terms of what to do for labs and the proving grounds. I know the OffSec motto is "try harder" and I'm a big believer in that, but has there been any discussion about making some of the lab boxes a bit more straight forward?

2

Offsec_Community OP t1_iux64ex wrote

I do not work on the team that does the Proving grounds work so I am not sure if they are having that discussion. The offsec discord is a great place to bring those issues up and get some answers. I will can also pass that message along to them and if you have some more specific input on that let me know and I will pass that along.

I will say that for proving grounds I think the idea is to not have much to go on. Just like in the real world for a hacker. They do not get any inside tips or help most of the time. They might just start with a web site or an IP address just like in proving grounds and from there they work on finding out as much as they can about what services are running, vulnerabilities, etc.

If the issue is not that and something else then we are always open to making the student experience better any way we can.

2

avvstin t1_iuxh0dw wrote

I will soon be graduating with an AAS in Networking Technology and an AAS in Cybersecurity. I plan to get a CCNA cert and a Security+ cert as well. I have a bit over a year of experience as an operations coordinator at a large shipping company.

​

Most jobs, even ones claiming to be entry level, seem to require multiple years of IT experience. Is this actually required for most entry level jobs or as long as I demonstrate I have the skills should my current skill set be good enough to get an entry level job to start gaining experience? I'd really prefer to get a job in Cyber Security after my AAS instead of going for my B.S. right now, is this realistic?

​

Thank you btw!

2

Offsec_Community OP t1_iuxm169 wrote

That is a problem in the industry. A lot of entry level jobs then say "requires 5 years experience." The market is very demanding right now. There are a lot of jobs out there but a lot of people too trying to get those jobs.

If you have basic skills then you should be good for a entry level position. I think a good attitude and showing you are trying to learn more goes a long way. You might not get the exact job you want right away but do not be afraid to take something not ideal to build that experience.

The more certs you have does help, but you need to be able to show that knowledge as well. Like I said in another post that I was a motorcycle mechanic before and I made the switch. Do not be afraid to go for it.

3

___Tom___ t1_iv02da7 wrote

Come over to Europe. We are desperate for people with cybersecurity knowledge. My company is hiring and so is every other company in the field that I know.

1

Cactusonahill t1_iuwkgbi wrote

Just a couple of questions

  1. How did you get into the field?
  2. What's the work like in the cyber security field (what is the core elements of the job)?
1

Offsec_Community OP t1_iuwptz4 wrote

  1. I started in cyber security in the Army. I was on a cyber protection team and we deployed to different areas where a cyber attack had occurred. I was actually a motorcycle mechanic and wanted to make a switch.
  2. The work is fun and challenging. There is always something to learn and it never ends. For a SOC analyst for example they spend a lot of time looking at a SIEM and looking at alerts hoping to find "the bad things". We would spend a lot of time working on tools to make our work easier and make it easier to find cyber attacks. Also we did a lot of practicing and exercises because if you do not have an cyber attack its hard to get better at finding one.
3

IAmAModBot t1_iuwpsup wrote

For more AMAs on this topic, subscribe to r/IAmA_Tech, and check out our other topic-specific AMA subreddits here.

1

PeanutSalsa t1_iux6sys wrote

If a hacker sends a malicious link and someone clicks on it, can the hacker access the person's network upon them clicking on it? Are only copying and pasting full web address links or clicking links which you fully trust the best way to avoid clicking on malicious links? Any other suggestions?

1

Offsec_Community OP t1_iux8alt wrote

There are different ways this can happen. The link may bring the user to a malicious site hosted by the attacker and then malware is automatically downloaded. Networks may have security measures put in place to help stop this but they also may not.

When things like that are initiated from inside the network it can bypass security measures because users still need to visit web sites and download things. You can not just stop normal use.

Once the malware is downloaded it might make a connection back to the attacker so they can access the network. It could be a worm that does not need human interaction and spreads itself through the network. Lots of things like that can happen.

There is no fool proof way to avoid links. You can be cautious though. Look at the full picture. Did the link come from a unknown email? Or a email from the organization but it is worded weird ex: "Hey friend co worker of mine! Good days to you and yours. Please click link for the fun I talked about".

Virus total is a good website to use. You can paste the url on the site and they will give you a score on how malicious it is and if it is known to be malicious. That is always helpful for a quick check.

2

mibjt t1_iux8ajp wrote

Do you have a single daily driver operating system that you use everyday or a variety?

1

Offsec_Community OP t1_iux8mjx wrote

I use Windows 11 at the moment. I always have virtual machines running though with a Linux system going. I use both windows and Linux to get work done. I know a lot of people use MAC as their OS on their laptop and then run VMs with Windows an Linux going.

2

PeanutSalsa t1_iux9h2m wrote

Does Reddit, or social media platforms in general, have safeguards in place to stop users from posting malicious links on their platforms?

1

Offsec_Community OP t1_iuxa06u wrote

>Does Reddit, or social media platforms in general, have safeguards in place to stop users from posting malicious links on their platforms

I am not sure to be honest. Not any that I have heard of thought. I feel like it would be tough to handle because of the volume that links are getting posted to the platforms. I could be wrong though.

3

___Tom___ t1_iv02qrn wrote

No OP, but some sub-reddits do have a bot doing link-checking, yes.

1

kieppie t1_iuxd3go wrote

Why the correlation between luciousness of a UNIX heard and other facial hair & mad 1337 h4x0r sKiLlZ?

1

geoloshit t1_iuxf8qe wrote

What did you score on your Sec+ exam?

1

Offsec_Community OP t1_iuxl7jm wrote

haha I honestly do not remember. It was a passing score though

2

geoloshit t1_iuyk2bd wrote

Lol. I had to take it for work and I don't even work in IT or network security. Shit was hard. Don't remember any of it.

1

ottoe57 t1_iuxnnzj wrote

Thank you for doing this AMA.

What are your thoughts on SIEM technologies? There doesn't seem to be a single security professional that loves their SIEM. They are noisy. They are overly complicated. They are expensive. They require more care and feeding than a newborn. Are they only a necessary evil? Or do they really provide value?

1

Offsec_Community OP t1_iuxpin2 wrote

Great question. Some SIEMs are the worst and some are great. I like Splunk a lot because it is easy to use. I think it is something that is needed in an enterprise network. They are as good as you set them up to be. A lot of places just sent logs to their SIEM and thats it. They do not tune their logs or anything. You have to spend time making it work correctly. You have to spend the time making worth while alerts and dashboards. When we would deploy to a network the first thing we would do would be is fine tune our SIEM. Making sure the correct logs are going in and not just all the logs.

long answer short is they are as good as you let them work. Spend the time to tune them and make them work well for your organization.

1

MustySphere t1_iuxqpex wrote

What’s my best bet to get into cyber security with no prior qualifications? I’ve always loved technology, built computers, repaired phones and have always wanted to get into cyber security for lack of better word, the security. Any tips? Many thanks.

1

Offsec_Community OP t1_iuy5476 wrote

Getting some certifications will help get your foot in the door. You can always go after some IT/helpdesk positions. They are not security but are good to get experience and pivot over to security.

Also there are a lot of smaller cyber security companies, also hospitals, lawyer firms, things like that have security positions that may be easier to get a job in security for them.

The certifications will help get their attention and then do some training on your own to build some knowledge.

2

TheCapnRedbeard t1_iuxy1gr wrote

I’m planning to take a non degree certificate course for cyber security. Is it worth it will I be able to find good jobs or will they expect a Bachelors in field?

1

Offsec_Community OP t1_iuy5e3n wrote

Lots of positions I have seen list for qualifications like "5 years experience with degree or 8 years experience with no degree". It makes it harder because you need more experience but you can get into the field with out a degree.

Obviously it helps to have a degree but I have worked with some super smart people who never got a degree and can run circles around me on the keyboard.

3

TheCapnRedbeard t1_iuz25hn wrote

Thank you for the reply! I’m really excited to start this course and although it may be harder, it makes me feel more confident hearing this

1

___Tom___ t1_iv02neg wrote

Second that. Some of the world-class people I'm lucky to know in the field have no formal qualifications. However, many of them are (like myself) dinosaurs from a time when there was no "IT Security" study. You'd study something with IT and then pivot into security. These days, qualifications are getting more important, but everywhere I've worked within the past 10 years people were still open for lateral entrants.

1

hagcel t1_iuy0drv wrote

Hey man, keep up the good work. I'm in the same role for the DiB.

My question, why does this role make us all grow long beards?

1

Offsec_Community OP t1_iuy5lqg wrote

haha shaving in the Army for 7 years made me want a long beard but a keyboard must have some sort of electromagnetic hair pull that makes the beard grow down.

2

Iamatworkgoaway t1_iuyaj2s wrote

Which 5g spying do you like the best. NSA and AT&T, or China and their version? Me personally I kind of prefer the Chinese, they care less about my midwest self than the local spys.

1

AttentionRoyal2276 t1_iuyi6pr wrote

Do you think our country (US) lacks behind the rest of the world in cyber security? I am concerned that we do.

1

Turing-87 t1_iuz5etv wrote

Why is the AF cyber security training so boring?

Also, I found this thumb drive in the parking lot. Would you like to plug it in to you computer???

1

cathlicjoo t1_iuzpvxy wrote

What are some things that a security firm would be looking for on a resume from somebody not currently in security? I run network operations at the facility I work at, but nothing specifically in security. I'm guessing the certs and all that are fine, but I'm looking for something that has meat on the bone that I can show to a prospective employer. Thanks for the AMA!

1

___Tom___ t1_iv02yu9 wrote

Not OP, but my company is looking, so: The right mindset. Skills can be acquired. But dealing with an intelligent, intentionally acting adversary is fundamentally different from dealing with technical failures, environment events or simple system behaviour. This is also where in the training scenarios I sometimes run most companies fail. They can handle a fire, a DDoS attack, a malware outbreak - but they can't handle a hacker who will pivot and react to whatever you're doing. Having a basic grasp of what it means to be under attack is essential.

1

___Tom___ t1_iv020l9 wrote

I'm also in your sphere and want to bounce a pet-peeve of mine off you. Security awareness trainings. My take: We've been doing them for 30 years or so. If they'd work, they'd have worked by now. What do you think of them?

1

_tactic__ t1_iv0mrpo wrote

What are your thoughts on web3 security?

1

erickson666 t1_iv42dlj wrote

What were you doing when the ransomware wannacry happened? What about petya?

1

sedra03iu t1_ivco9n2 wrote

Am a cybersecurity student still a freshman… what do you suggest? Any tips?

1

callsign-ham t1_ivlqv9o wrote

Is it realistically possible to be "hidden" from the government online?

1

GTRacer1972 t1_iw9uqpn wrote

What is the most secure form of encryption for a program like Truecrypt or Veracrypt, and is it true it would take millions of years to crack those encryptions assuming no one is using a quantum computer?

1