• HubertManne
    link
    fedilink
    313 days ago

    or like a detailed report. I bet you could make a standard report and just change a few things and maybe pull the scam sometimes. The hardest part I think would be getting someone to accept from a cold call. Would need to be pretty stupid to do that to begin with.

    • @[email protected]
      link
      fedilink
      31
      edit-2
      3 days ago

      The reports list your hardware on them generally. They need access into your network.

      The truth is that instead of faking it, you just do an actual pentest. It is generally a mix of FOSS tools like kali, metasploit, nmap, etc and pay tools like nessus. These can all be automated.

      Charge the money, mail them a pre setup laptop, then hit the “go” button and still sit on your ass for a week.

      • HubertManne
        link
        fedilink
        173 days ago

        I was thinking this. Get a nice format with letter head or whatever for dumping from the tools but now its almost like an honest living. ewwww.

      • @[email protected]
        link
        fedilink
        93 days ago

        They need access into your network.

        “Sir we found an issue in your security practises. You let some rando into your network. That’s a terrible idea. My invoice is in the mail.”

        • @cactusupyourbutt
          link
          52 days ago

          I was asked to review a project of another company, and needed access to their documentation for that. they gave me access to their whole wiki instead of just a part of it. definitely included that in the report

    • Cruxifux
      link
      fedilink
      63 days ago

      Yeah well you don’t want to try to scam smart people anyways.