Episodios

  • 7MS #675: Pentesting GOAD – Part 2
    May 16 2025

    Hey friends! Today Joe “The Machine” Skeen and I tackled GOAD (Game of Active Directory) again – this time covering:

    • SQL link abuse between two domains
    • Forging inter-realm TGTs to conquer the coveted sevenkingdoms.local!

    Join us next month when we aim to overtake essos.local, which will make us rulers over all realms!

    Más Menos
    32 m
  • 7MS #674: Tales of Pentest Pwnage – Part 71
    May 9 2025

    Today’s tale of pentest pwnage is another great one! We talk about:

    • The SPNless RBCD attack (covered in more detail in this episode)
    • Importance of looking at all “branches” of outbound permissions that your user has in BloodHound
    • This devilishly effective MSOL-account-stealing PowerShell script (obfuscate it first!)
    • A personal update on my frustration with ringing in my ears
    Más Menos
    49 m
  • 7MS #673: ProxmoxRox
    May 3 2025

    Today we’re excited to release ProxmoxRox – a repo of info and scripts to help you quickly spin up Ubuntu and Windows VMs. Also, some important news items:

    • 7MinSec.club in-person meeting is happening Wednesday, May 14! More details here.
    • We did our second Tuesday TOOLSday this week and showed you some local privesc techniques when you have local admin on an endpoint
    Más Menos
    31 m
  • 7MS #672: Tales of Pentest Pwnage – Part 70
    Apr 25 2025

    Today’s a fun tale of pentest pwnage where we leveraged a WinRM service ticket in combination with the shadow credentials attack, then connected to an important system using evil-winrm and make our getaway with some privileged Kerberos TGTs! I also share an (intentionally) vague story about a personal struggle I could use your thoughts/prayers/vibes with.

    Más Menos
    55 m
  • 7MS #671: Pentesting GOAD
    Apr 18 2025

    Hello! This week Joe “The Machine” Skeen and I kicked off a series all about pentesting GOAD (Game of Active Directory). In part one we covered:

    • Checking for null session enumeration on domain controllers
    • Enumerating systems with and without SMB signing
    • Scraping AD user account descriptions
    • Capturing hashes using Responder
    • Cracking hashes with Hashcat
    Más Menos
    25 m
  • 7MS #670: Adventures in Self-Hosting Security Services
    Apr 11 2025

    Hi friends, today I’m kicking off a series talking about the good/bad/ugly of hosting security services. Today I talk specifically about transfer.zip. By self-hosting your own instance of transfer.zip, you can send and receive HUGE files that are end-to-end encrypted using WebRTC. Sweet! I also supplemented today’s episode with a short live video over at 7MinSec.club.

    Más Menos
    37 m
  • 7MS #669: What I’m Working on This Week – Part 3
    Apr 4 2025

    Hi friends, in this edition of what I’m working on this week:

    • 3 pulse-pounding pentests that had…problems
    • Something I’m calling the unshadow/reshadow credentials attack
    • Heads-up on a new video experiment I’m going to try next week
    Más Menos
    43 m
  • 7MS #668: Tales of Pentest Pwnage – Part 69
    Mar 28 2025

    Hola friends! Today’s tale of pentest pwnage talks about abusing Exchange and the Azure ADSync account! Links to the discussed things:

    • adconnectdump – for all your ADSync account dumping needs!
    • Adam Chester PowerShell script to dump MSOL service account
    • dacledit.py (part of Impacket) to give myself full write privileges on the MSOL sync account: dacledit.py -action ‘write’ -rights ‘FullControl’ -principal lowpriv -target MSOL-SYNC-ACCOUNT -dc-ip 1.2.3.4 domain.com/EXCHANGEBOX$ -k -no-pass
    • Looking to tighten up your Exchange permissions – check out this crazy detailed post
    Más Menos
    30 m
adbl_web_global_use_to_activate_T1_webcro805_stickypopup