Standoff 365 ambassadors
Alexandra Antipina

Alexandra Antipina

Red Team Lead, captain of the legendary Cult team. I also complete challenges on the online cyberrange and occasionally submit bugs for the Standoff Bug Bounty program. Main areas of work: leading a red team and conducting security assessments. Hobbies: flatland snowboarding, enduro, longboarding, traveling around Russia, and enjoying activities that involve fine motor skills—anything from soldering to cross-stitching.

Q&A with the ambassador

When and why did you first become interested in hacking?
From an early age, I was drawn to fundamental questions and enjoyed solving problems in as many creative ways as possible. I first realized passwords could be cracked when I got access to the internet back in school. Around that time, I got into Counter-Strike 1.6 and learned about cheats for the game, which reinforced my belief that there are always unconventional ways to achieve a desired result.
 
What tools and programs do you use in your work?
I use a wide variety of tools. For security assessments, I mostly use Burp Suite, Acunetix, Nessus, and various Kali Linux utilities. For red teaming, I use either a custom-built or commercial C2 server, along with a mix of custom, sophisticated tools and simpler tools designed to mimic user behavior naturally.
 
What skills are essential for a successful career in cybersecurity?
I believe persistence, passion for your work, and strong communication skills are key to a successful career in any field, including cybersecurity.
 
How do you keep your skills up to date?
When I find myself buried under too many management tasks, I turn to a cyberrange or vulnboxes. I also make it a point to stay hands-on, not just as a leader but as a senior member of the team.
 
What qualities are most important for an ethical hacker?
  • Understanding the logic and structure of the system being tested. This requires extensive knowledge and perspective.
  • Being useful. Many beginners get a thrill from finding bugs—and that's great—but it's important to remember the business context. The real value lies in clearly explaining the impact of a vulnerability and how to fix it in a way that makes sense to the client.
  • Knowing when to stop. Hackers are often overzealous. Sometimes it's better to take a break, step back, and think things through instead of pulling an all-nighter, making a careless mistake, and getting caught by the blue team.
     

Advice for beginners in cybersecurity

  • Master the basics: build a strong understanding of networks, operating systems (especially Linux and Windows), and the principles of information security.
  • Practice over theory: use virtual labs like HackTheBox, TryHackMe, and PentesterLab, or participate in cyberranges to develop your skills. 
  • Study both offensive and defensive security: a good cybersecurity specialist knows how to attack, but also how to defend. 
  • Learn to automate: knowledge of Python or Bash will make your work significantly easier. 
  • Stay informed: follow blogs, accounts of industry experts on X (former Twitter), attend conferences and meetups. 
  • Earn certifications: certifications like OSCP, CRTP, and PNPT will help structure your knowledge and validate your skills. 
  • Don't be afraid to try: participate in CTF competitions, hunt for bugs in bug bounty programs, and practice with real-world scenarios.

What to watch about hacking and red teaming

  • YouTube channel of John Hammond: a cybersecurity expert known for CTF walkthroughs and practical hacking scenarios. 
  • The Cyber Mentor (YouTube): an educational channel by TCM Security. 
  • HackerSploit (YouTube): tutorials on ethical hacking and cybersecurity. 
  • Hak5 (YouTube): a channel and community focused on hacker gadgets and cybersecurity research. 
  • DEF CON and Black Hat conferences: annual hacker conferences with recordings available online. 
  • Community and conference materials: many free resources are available, such as webinars from SANS and Black Hills Information Security, OWASP materials, and free university courses on platforms like Coursera and edX. Communities like Red Team Village and OWASP often share workshop recordings and lectures. Many of these resources are free and can benefit both beginners (for example, by teaching the basics of secure coding) and experienced professionals (by providing analyses of complex attacks). 
  • Darknet Diaries (podcast): while not a video, this podcast provides fascinating real-world stories of hacks.

What to read about hacking and red teaming

  • Peter Kim. The Hacker Playbook 2: Practical Guide to Penetration Testing (2015). A practical guide to basic pentesting techniques, focusing on penetration testing methodology. The next book in the series dwells on red team strategies. 
  • Peter Kim. The Hacker Playbook 3: Practical Guide to Penetration Testing (2018). A follow-up focused on more advanced attacks and red team scenarios. 
  • Jon Erickson. Hacking: The Art of Exploitation (2nd ed., 2008). A classic book on the "art of exploitation," exploring unconventional approaches to complex security problems and teaching you to think as a hacker. Erickson teaches programming in C from a hacker's perspective, showing how to search for vulnerabilities and write exploits. Despite being over a decade old, this book is still highly relevant for understanding vulnerability exploitation. 
  • Dafydd Stuttard, Marcus Pinto. The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws (2nd ed., 2011). A definitive guide to web application security testing. 
  • Red Team Field Manual (2014): a handy pocket guide for red team professionals. Instead of being a traditional manual, it's more of a concise cheat sheet filled with commands and techniques for penetration testing scenarios. 
  • PortSwigger Web Security Academy: a free online academy created by the developers of Burp Suite for learning web hacking. It includes theoretical educational content, interactive labs, and video tutorials on all major types of web vulnerabilities. The academy is regularly updated to include the latest attacks and techniques, making it a dynamic follow-up to the renowned The Web Application Hacker's Handbook. An excellent resource for learning web application security on your own—covering everything from SQL injection and XSS to SSRF and deserialization.
     
Next