Blog
Search all our posts or browse some of our most recent entries below:
7MS #670: Adventures in Self-Hosting Security Services
Hi friends, today I'm kicking off a series talking about the good/bad/ugly of hosting security services. Today I talk specifically about transfer.zip. By self-hosting your own instance of transfer.zip, you can send and receive HUGE files that are end-to-end encrypted using WebRTC. Sweet! I also supplemented today's episode with a short live video over at 7MinSec.club.
7MS #669: What I’m Working on This Week – Part 3
Hi friends, in this edition of what I'm working on this week: 3 pulse-pounding pentests that had...problems Something I'm calling the unshadow/reshadow credentials attack Heads-up on a new video experiment I'm going to try next week
7MS #668: Tales of Pentest Pwnage – Part 69
Hola friends! Today's tale of pentest pwnage talks about abusing Exchange and the Azure ADSync account! Links to the discussed things: adconnectdump - for all your ADSync account dumping needs! Adam Chester PowerShell script to dump MSOL service account dacledit.py (part of Impacket) to give myself full write privileges on the MSOL sync account: dacledit.py -action 'write' -rights 'FullControl' -principal lowpriv -target MSOL-SYNC-ACCOUNT -dc-ip [...]
7MS #667: Pentesting GOAD SCCM – Part 2!
Hey friends, our good buddy Joe "The Machine" Skeen and I are back this week with part 2 (check out part 1!) tackling GOAD SCCM again! Spoiler alert: this time we get DA! YAY! Definitely check out these handy SCCM resources to help you - whether it be in the lab or IRL (in real life): GOAD SCCM walkthrough MisconfigurationManager - tremendous resource for [...]
7MS #666: Tales of Pentest Pwnage – Part 68
Today we have a smattering of miscellaneous pentest tips to help you pwn all the stuff! Selective Snaffling with Snaffler The importance of having plenty of dropbox disk space - for redundant remote connectivity and PXE abuse! TGTs can be fun for SMB riffling, targeted Snaffling, netexec-ing and Evil-WinRMing!
7MS #665: What I’m Working on This Week – Part 2
Hello there friends, I'm doing another "what I'm working on this week" episode which includes: BPATTY v1.6 release - big/cool/new content to share here PWPUSH - this looks to be an awesome way (both paid and free) to securely share files and passwords Also, 7 Minute Security was featured on WebsitePlanet.com this week to discuss: Our business origin story Services we offer Emerging trends in [...]
7MS #664: What I’m Working on This Week
In today's episode I talk about what I'm working on this week, including: Playing with Sliver C2 and pairing it with ShellcodePack Talking about Netexecer, my upcoming tool that helps automate some of the early/boring stuff in an internal pentest A gotcha to watch out for if utilizing netexec's MSSQL upload/download functionality
7MS #663: Pentesting GOAD SCCM
Today we live-hack an SCCM server via GOAD SCCM using some attack guidance from Misconfiguration Manager! Attacks include: Unauthenticated PXE attack PXE (with password) attack Relaying the machine account of the MECM box over to the SQL server to get local admin
7MS #662: Pentesting Potatoes – Part 2
Hi friends, today we're talking about pentesting potatoes (not really, but this episode is sort of a homage to episode 333 where I went to Boise to do a controls assessment and ended up doing an impromptu physical pentest and social engineer exercise). I talk about what a blast I'm having hunting APTs in XINTRA LABS, and two cool tools I'm building with the help [...]
7MS #661: Baby’s First Hetzner and Ludus – Part 2
Today we continue our journey from last week where we spun up a Hetzner cloud server and Ludus.cloud SCCM pentesting range! Topics include: Building a Proxmox Backup Server (this YouTube video was super helpful) Bridging a second WAN IP to the Hetzner/Ludus server Wrestling with the Hetzner (10-rule limit!) software firewall When attacking SCCM - you can get a version of pxethief that runs in [...]
7MS #660: Baby’s First Hetzner and Ludus
I had an absolute ball this week spinning up my first Hetzner server, though it was not without some drama (firewall config frustrations and failing hard drives). Once I got past that, though, I got my first taste of the amazing world of Ludus.cloud, where I spun up a vulnerable Microsoft SCCM lab and have started to pwn it. Can't say enough good things about [...]