Blog
Search all our posts or browse some of our most recent entries below:
7MS #565: How to Simulate Ransomware with a Monkey
Hey friends, today we talk through how to simulate ransomware (in a test environment!) using Infection Monkey. It's a cool way to show your team and execs just how quick and deadly an infection can be to your business. You can feed the monkey a list of usernames and passwords/hashes to use for lateral movement, test network segmentation, set a UNC path of files to [...]
7MS #564: First Impressions of OVHcloud Hosted vCenter
Today we offer you some first impressions of OVHcloud and how we're seriously considering moving our Light Pentest LITE training class to it! TLDR:It runs on vCenter, my first and only virtualization love!Unlimited VM "powered on" time and unlimited bandwidthIntergration with PowerShell so you can run a single script to "heal" your environment to a gold imageEasy integration with pfSense to be able to manage [...]
7MS #563: Cracking and Mapping and Execing with CrackMapExec – Part 2
Hey friends, today we're covering part 2 of our series all about cracking and mapping and execing with CrackMapExec. Specifically we cover: # Enumerate where your user has local admin rights: cme smb x.x.x.x/24 -u user -p password # Set wdigest flag: cme smb x.x.x.x -u user -p password -M wdigest -o ACTION=enable # Dump AD creds: cme smb IP.OF.DOMAIN.CONTROLLER -u user -p password --ntds [...]
7MS #562: Cracking and Mapping and Execing with CrackMapExec
SafePass.me is the only enterprise solution to protect organizations against credential stuffing and password spraying attacks. Visit safepass.me for more details, and tell them 7 Minute Security sent you to get a 10% discount! Hey friends, today we covered many things cracking and mapping and execing with CrackMapExec. Specifically: # General enumeration to see if your account works, and where: cme smb x.x.x.x -u username [...]
7MS #561: Interview with Chris Furner of Blumira
Today’s episode is brought to us by Blumira, which provides easy to use, automated detection and response that can be setup in…well…about 7 minutes! Detect and resolve security threats faster and prevent breaches. Try it free today at blumira.com/7ms!Today I sat down with Chris Furner of Blumira to talk about all things cyber insurance. Many of 7MinSec's clients are renewing their policies this time of [...]
7MS #560: 7MOOCH – Dolphin Rides Are Done Dude
Hey friends, I took a mental health break this week and pre-podcasted this episode of a new series called 7MOOCH: 7 Minutes of Only Chuckles. In today's story, we unpack a situation in Hawaii that made me exclaim the following quite loudly: "Dolphin rides are done, dude!"
7MS: #559: Tales of Pentest Pwnage – Part 46
Ooooo giggidy! Today's episode is about a pentest pwnage path that is super fun and interesting, and I've now seen 3-4 times in the wild. Here are some notes from the audio/video that will help bring this to life for you (oh and read this article for a great tech explanation of what's happening under the hood):Change the Responder.conf file like so:; Custom challenge. ; [...]
7MS #558: How to Build a Vulnerable Pentest Lab – Part 2
Today we continue part 2 of a series we started a few weeks ago all about building a vulnerable pentesting lab. Check out the video above, and here are the main snippets of code and tips to get you going:Use Youzer to import a bunch of bogus users into your Active Directory:sudo python ./youzer.py --generate --generate_length 20 --ou "ou=Contractors,dc=brifly,dc=us" --domain brifly.us --users 1000 --output lusers.csvMake [...]
7MS #557: Better Passive Network Visibility Using Teleseer
Today we're talking about Teleseer, which is an awesome service to give you better network visibility - whether you're on the blue, red or purple team! It all starts with a simple packet capture, and ends with gorgeous visuals and insight into what the heck is on your network and - from a pentester's perspective - delicious vulnerabilities that may lie within!
7MS #556: How to Build a Vulnerable Pentest Lab
Today's episode is brought to us by our friends at Blumira! Today we kick off a series all about building your own vulnerable pentest lab from scratch, specifically: Spinning up a domain controller with a few lines of PowerShell Installing Active Directory Domain Services Setting up an intentionally cruddy password policy Baking in the MS14-025 vulnerability Here are the code snippets that help you get [...]
7MS #555: Light Pentest eBook 1.1 Release
Today we're releasing version 1.1 of our Light Pentest eBook. Changes discussed in today's episode (and shown live in the accompanying YouTube video) include:Some typos and bug fixesA new section on finding systems with unconstrained delegation and exploiting themA new section on finding easily pwnable passwords via password sprayingA new section relaying credentials with MITM6 (be careful using some of its options - read this)New [...]