エピソード

  • 7MS #681: Pentesting GOAD – Part 3
    2025/06/27

    Today Joe “The Machine” Skeen and I pwn the third and final realm in the world of GOAD (Game of Active Directory): essos.local! The way we go about it is to do a WinRM connection to our previously-pwned Kingslanding domain, coerce authentication out of MEEREEN (the DC for essos.local) and then capture/abuse the TGT with Rubeus! Enjoy.

    続きを読む 一部表示
    18 分
  • 7MS #680: Tips for a Better Purple Team Experience
    2025/06/20

    Today I share some tips on creating a better purple team experience for your customers, including:

    • Setting up communication channels and cadence
    • Giving a heads-up on highs/criticals during testing (not waiting until report time)
    • Where appropriate, record videos of attacks to give them more context
    続きを読む 一部表示
    27 分
  • 7MS #679: Tales of Pentest Pwnage – Part 73
    2025/06/13

    In today’s tale of pentest pwnage I talk about a cool ADCS ESC3 attack – which I also did live on this week’s Tuesday TOOLSday. I also talk about Exegol’s licensing plans (and how it might break your pentest deployments if you use ProxmoxRox).

    続きを読む 一部表示
    30 分
  • 7MS #678: How to Succeed in Business Without Really Crying – Part 22
    2025/06/06

    Today I share some tips on presenting a wide variety of content to a wide variety of audiences, including:

    • Knowing your audience before you touch PowerPoint
    • Understanding your presentation physical hookups and presentation surfaces
    • A different way to screen-share via Teams that makes resolution/smoothness way better!
    続きを読む 一部表示
    34 分
  • 7MS #677: That One Time I Was a Victim of a Supply Chain Attack
    2025/05/30

    Hi everybody. Today I take it easy (because my brain is friend from the short week) to tell you about the time I think my HP laptop was compromised at the factory!

    続きを読む 一部表示
    14 分
  • 7MS #676: Tales of Pentest Pwnage – Part 72
    2025/05/27

    Today’s fun tale of pentest pwnage discuss an attack path that would, in my opinion, probably be impossible to detect…until it’s too late.

    続きを読む 一部表示
    1 時間
  • 7MS #675: Pentesting GOAD – Part 2
    2025/05/16

    Hey friends! Today Joe “The Machine” Skeen and I tackled GOAD (Game of Active Directory) again – this time covering:

    • SQL link abuse between two domains
    • Forging inter-realm TGTs to conquer the coveted sevenkingdoms.local!

    Join us next month when we aim to overtake essos.local, which will make us rulers over all realms!

    続きを読む 一部表示
    32 分
  • 7MS #674: Tales of Pentest Pwnage – Part 71
    2025/05/09

    Today’s tale of pentest pwnage is another great one! We talk about:

    • The SPNless RBCD attack (covered in more detail in this episode)
    • Importance of looking at all “branches” of outbound permissions that your user has in BloodHound
    • This devilishly effective MSOL-account-stealing PowerShell script (obfuscate it first!)
    • A personal update on my frustration with ringing in my ears
    続きを読む 一部表示
    49 分