7 Minute Security cover art

7 Minute Security

7 Minute Security

By: Brian Johnson
Listen for free

About this listen

7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.Brian Johnson Politics & Government
Episodes
  • 7MS #702: Should You Hire AI to Run Your Next Pentest?
    Nov 21 2025

    Hello friends, in today's episode I give an audio summary of a talk I gave this week at the MN GOVIT Symposium called "Should You Hire AI to Run Your Next Pentest?" It's not a pro-AI celebration, nor is it an anti-AI bashing. Rather, the talk focuses on my experiences using both free and paid AI services to guide me through an Active Directory penetration test.

    Show More Show Less
    21 mins
  • 7MS #701: What I'm Working on This Week – Part 5
    Nov 14 2025

    Hello friends! This week I'm talking about what I'm working on this week, including:

    • Preparing a talk called Should You Hire AI to Run Your Next Pentest for the Minnesota GOVIT Symposium.
    • Playing with Lithnet AD password protection (I will show this live on next week's Tuesday TOOLSday).
    • The Light Pentest logo contest has a winner!
    Show More Show Less
    18 mins
  • 7MS #700: Pretender
    Nov 7 2025

    Today is episode 700 of the 7MinSec podcast! Oh my gosh. My mom didn't think we could do it, but we did. Instead of a big blowout with huge news, giveaways and special guests, today is a pretty standard issue episode with a (nearly) 7-minute run time!

    The topic of today's episode is Pretender (which you can download here and read a lot more about here). The tool authors explain the motivation behind the tool: "We designed pretender with the single purpose to obtain machine-in-the-middle positions combining the techniques of mitm6 and only the name resolution spoofing portion of Responder."

    On a recent pentest, I used Pretender's "dry run" mode to find a hostname (that didn't exist) that a ton of machines were querying for, and poisoned requests just for that host. This type of targeted poisoning snagged me some helpful hashes that I was able to crack/relay, all while minimizing the risk of broader network disruption!

    Show More Show Less
    8 mins
No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.