Blog
Search all our posts or browse some of our most recent entries below:
7MS #572: Protecting Your Domain Controllers with LDAP Firewall
Today we look at LDAP Firewall - a cool (and free!) way to defend your domain controllers against SharpHound enumeration, LAPS password enumeration, and the noPac attack.
7MS #571: Simple Ways to Test Your SIEM – Part 2
Hey friends! This week I spoke at the Secure360 conference in Minnesota on Simple Ways to Test Your SIEM. This is something I covered a while back on the podcast, but punched up the content a bit and built a refreshed a two-part GitHub gist that covers:Questions you can ask a prospective SIEM/SOC solution to figure out which one is the right fit for youAll [...]
7MS #570: How to Build a Vulnerable Pentest Lab – Part 4
SafePass.me is the only enterprise solution to protect organizations against credential stuffing and password spraying attacks. Visit safepass.me for more details, and tell them 7 Minute Security sent you to get a 10% discount!In today's episode we staged an NTLM relay attack using a vulnerable SQL server.First we used CrackMapExec (see our two part series on Cracking and Mapping and Execing with CrackMapExec - part [...]
7MS #569: Interview with Jim Simpson of Blumira
Today we're excited to share a featured interview with our new friend Jim Simpson, CEO of Blumira. Jim was in security before it was hip/cool/lucrative, working with a number of startups as well as some big names like Duo. Blumira and 7 Minute Security have a shared love for helping SMBs be more secure, so it was great to chat with Jim about the IT/security [...]
7MS #568: Lets Play With the 2023 Local Administrator Password Solution!
Hey friends, today we're playing with the new (April 2023) version of Local Administrator Password Solution (LAPS). Now it's baked right into PowerShell and the AD Users and Tools console. It's awesome, it's a necessary blue team control for any size company, and you should basically stop reading this and install LAPS now.
7MS #567: How to Build an Intentionally Vulnerable SQL Server
Hey friends, today we're talking about building an intentionally vulnerable SQL server, and here are the key URLs/commands talked about in the episode:Download SQL Server hereInstall SQL via config .ini fileOr, install SQL via pure command lineDeploy SQL with a service account while also starting TCP/IP and named pipes automagically:setup.exe /Q /IACCEPTSQLSERVERLICENSETERMS /ACTION="install" /FEATURES=SQL /INSTANCENAME=MSSQLSERVER /TCPENABLED=1 /NPENABLED=1 /SQLSVCACCOUNT="YOURDOMAIN\YOUR-SERVICE-ACCOUNT" /SQLSVCPASSWORD="YOUR PASSWORD" /SQLSYSADMINACCOUNTS="YOURDOMAIN\administrator" "YOURDOMAIN\domain users"Run PowerUpSQL to [...]
7MS #566: Tales of Pentest Pwnage – Part 47
Ok, I know we say this every time, but it is true this time yet again: this is our favorite tale of pentest pwnage. It involves a path to DA we've never tried before, and introduced us to a new trick that one of our favorite old tools can do:rubeus.exe monitor /interval:5 /nowrap /runfor:60 /registry:SOFTWARE\MONITOR
7MS #565: How to Simulate Ransomware with a Monkey
Hey friends, today we talk through how to simulate ransomware (in a test environment!) using Infection Monkey. It's a cool way to show your team and execs just how quick and deadly an infection can be to your business. You can feed the monkey a list of usernames and passwords/hashes to use for lateral movement, test network segmentation, set a UNC path of files to [...]
7MS #564: First Impressions of OVHcloud Hosted vCenter
Today we offer you some first impressions of OVHcloud and how we're seriously considering moving our Light Pentest LITE training class to it! TLDR:It runs on vCenter, my first and only virtualization love!Unlimited VM "powered on" time and unlimited bandwidthIntergration with PowerShell so you can run a single script to "heal" your environment to a gold imageEasy integration with pfSense to be able to manage [...]
7MS #563: Cracking and Mapping and Execing with CrackMapExec – Part 2
Hey friends, today we're covering part 2 of our series all about cracking and mapping and execing with CrackMapExec. Specifically we cover: # Enumerate where your user has local admin rights: cme smb x.x.x.x/24 -u user -p password # Set wdigest flag: cme smb x.x.x.x -u user -p password -M wdigest -o ACTION=enable # Dump AD creds: cme smb IP.OF.DOMAIN.CONTROLLER -u user -p password --ntds [...]
7MS #562: Cracking and Mapping and Execing with CrackMapExec
SafePass.me is the only enterprise solution to protect organizations against credential stuffing and password spraying attacks. Visit safepass.me for more details, and tell them 7 Minute Security sent you to get a 10% discount! Hey friends, today we covered many things cracking and mapping and execing with CrackMapExec. Specifically: # General enumeration to see if your account works, and where: cme smb x.x.x.x -u username [...]
