All content for Legitimate Cybersecurity Podcasts is the property of LegitimateCybersecurity and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
Legitimate Cybersecurity Podcasts
41 minutes 33 seconds
4 months ago
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field.We cover:✅ The skills you actually need to get into pen testing✅ What certs like OSCP, CEH, and GPEN really mean✅ Why most companies have no idea what’s on their network✅ Real pen test experiences gone sideways✅ Why you might still get arrested after a bug bounty✅ And how to break into the field—even without a degree🎙️ WE NEED YOUR HELP! 🎙️We’re in the running for Best Technology Podcast at PodcastAwards.com — and we’d love your vote!🗳️ Go to https://www.podcastawards.com, register, and vote for Legitimate Cybersecurity in the Technology category.Your vote helps real, nerdy cybersecurity voices rise to the top!📌 Like, Subscribe & Share.🔔 Click the bell to get notified about new episodes (and Frank’s midlife crises).📎 Check the show notes for career resources, links, and our Hack the Box profile recs!#PenTesting #EthicalHacking #CybersecurityCareers #OSCP #CEH #GPEN #HackTheBox #RedTeam #CyberSecurityPodcast #InfoSec #HackerLife #BugBounty #CybersecurityTraining #CyberMythsBusted #ITSecurity #SecurityTesting #KaliLinux #CyberCareer #podcastawards Chapter Breaks00:00 - Intro: What Is Penetration Testing?01:31 - Myths vs. Reality of Hacking02:40 - What Kind of People Make Good Pen Testers?05:33 - You Don’t Need a Degree To Be a Hacker07:19 - Why AI-Generated Code Is Easy to Hack09:16 - Cybersecurity Certifications (OSCP, CEH, GPEN)12:16 - Is CEH Still Worth It?14:42 - What EC in EC-Council *Actually* Stands For16:20 - Pen Test Expectations vs. Reality19:35 - Types of Pen Tests: Internal, External, Web App, Social Engineering22:12 - Cost, Scope & Asset Prioritization24:00 - What If You Don’t Know Your Own Assets?26:58 - Pen Test Reports: Why No One Reads Them28:55 - Remediation Is Scarier Than the Hack30:49 - Hacker Teams: Foothold → Escalation → Ransom32:31 - The Most Hilarious Old Systems We’ve Found34:28 - You Must *Love* Computers To Hack Well37:03 - Want to Be a Hacker? Here’s Your Roadmap39:51 - Military & DOD Paths To Cyber Careers40:44 - Vote for Us, Subscribe, and Frank’s Midlife Crisis