all InfoSec news
The journey to join the offensive security highs (part 1)
DEV Community dev.to
Over the years and regardless of their specialization, I have met only a couple of people that didn’t like offensive security operations. But most people, have no idea how such an engagement happens.
N.B: In this article (and the subsequent ones in the series) we are only talking about legal engagements, where you have permission to attack a system (or for fun, in your own local vulnerable VMs). Don’t forget that you can be prosecuted if acted against those common …
article attack common sense don engagement engineer fun guidelines journey legal local offensive offensive security operations own people permission security security engineer security operations series system talking vms vulnerable what is