@da_667@infosec.exchange
Now, I'm not doing this to be a bully, but I'm going to just note that this fella stated he was knowledgable about Snort, Suricata, Regular expressions, Vulnerability Management, Wireshark, and tcpdump.
I wanna remind you, that I gave him a quick tutorial blog post on how to generate pcaps from a proof of concept exploit. and that his resume says he is competent in this skillset.
https://community.emergingthreats.net/t/come-sail-the-cves-part-2-turning-data-into-rules/2751
My boy took four hours to tell me that his pcap was empty and had nothing int it. So I ask 'em. what is the command you're using?
he copies it to me. The -i option is reserved for the interface you want to sniff packets on. I have not a single clue why, but his -i switch was an IP address.
@darfplatypus@infosec.exchange
@da_667@infosec.exchange why is someone with 3 years of experience an intern?