Blog
Search all our posts or browse some of our most recent entries below:
7MS #309: Password Cracking in the Cloud – Part 2
IntroCracking passwords in the cloud is super fun (listen to last week's episode to learn how to build your own cracking box on the cheap at Paperspace)!In the last couple weeks, customers have asked me about doing a password strength assessment on their Active Directory environment. I asked around and read a bunch of blogs and found a method that I think:Extracts the hashes safelyParses [...]
7MS #308: Password Cracking in the Cloud
IntroI had an absolute ball this week trying to figure out how to crack passwords effectively, and on the cheap, and in the cloud. Today's episode goes into much more detail, and below is the Gist of my approach thus far. If you've got things to add/suggest to this document, let me know!
7MS #307: Writing Security-Focused Radio Commercials
IntroHey, so this week I am without my main machine - thus no jingle or "jungle boogie" intro music. Feels weird. Feels real weird.Anyway, ya know how I teased last week that 7MS could possibly be coming to a radio station near you? Well I think it's more of a probability than a possibility at this point!I met with a radio exec a few weeks [...]
7MS #306: A Peek into the 7MS Mail Bag – Part 2
IntroWe've dug into some pretty technical topics the last few weeks so we're gonna take it easy today. Below are some FAQs and updates I'll cover on today's show:FAQsWhat security certs should a sales person get?What lav mic should I get for podcasting?How do I know if I'm ready to take the OSCP?When are you gonna do some more YouTube videos?When will the PacktPub project [...]
7MS #305: Evaluating Endpoint Protection Solutions – Part 2
IntroToday is part two of evaluating endpoint solutions, where I primarily focus on Caldera which is an adversary simulation system that's really awesome! You can essentially setup a virtual attacker and cut it loose on some test machines, which is what I did as part of an endpoint protection evaluation project.The attacks simulated are from Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) project. So the [...]
7MS #304: Integrating Pwned Passwords with Active Directory
IntroI've been super pumped about Troy Hunt's Pwned Passwords project ever since it came out - especially when I saw a tweet about using it in Active Directory so that enterprises could essentially stop people from picking previously pwned passwords! That led me to explore the following two solutions:Pwned Passwords DLLThis blog entry has everything you need to get started with this GitHub project. If [...]
7MS #303: Evaluating Endpoint Protection Solutions
IntroI'm working on a fun project right now where I'm evaluating endpoint protection solutions for a client. They're faced with a choice of either refreshing endpoints to the latest gen of their current product, or doing a rip and replace with something else.I've spun up a standalone AD environment with ~5 Win 10 VMs and nothing on 'em except a current set of patches. The [...]
7MS #302: Bunnies and Bloodhounds
IntroI've had a fun week with a mixed bag of security related stuff happening, so I thought I'd throw it all in a big stew and cook it up for today's episode. Here are the highlights:Bash bunny presoI had a fun opportunity this week to speak to some property managers about the threats the Bash Bunny poses to an environment. Specifically I showed the one-two [...]
7MS #301: CredDefense
IntroCredDefense is a freakin' sweet tool from the fine folks at Black Hills Information Security that does some really nifty things:Password filterLets say you use the out-of-the-box password policy that comes with Active Directory, and you want to change your password to Winter2017! - AD is gonna say "Yeah dude/dudette, go for it...it fits the bill!" But from an attacker's perspective we know this is [...]
7MS #300: Windows System Forensics 101 – Part 2
IntroIn today's continuation of last week's episode I'm continuing a discussion on using free tools to triage Windows systems - be they infected or just acting suspicious. Specifically, those tools include:FTK Imager - does a dandy job of creating memory dumps and/or full disk backups of a live system. You can also make a portable version by installing FTK Imager on a machine, then copying [...]
7MS #299: Windows System Forensics 101
I had the privilege of creating a Windows System Forensics 101 course/presentation for a customer. The good/bad news is there is so much good information out there, it's hard to boil things down to just an hour.For the first part of the presentation, I focused on Mark Russinovich's technique of using Sysinternals as the primary surgical tool. This approach includes things like:Use Process Explorer to [...]
