• 7MS #675: Pentesting GOAD – Part 2
    May 16 2025

    Hey friends! Today Joe “The Machine” Skeen and I tackled GOAD (Game of Active Directory) again – this time covering:

    • SQL link abuse between two domains
    • Forging inter-realm TGTs to conquer the coveted sevenkingdoms.local!

    Join us next month when we aim to overtake essos.local, which will make us rulers over all realms!

    Show More Show Less
    32 mins
  • 7MS #674: Tales of Pentest Pwnage – Part 71
    May 9 2025

    Today’s tale of pentest pwnage is another great one! We talk about:

    • The SPNless RBCD attack (covered in more detail in this episode)
    • Importance of looking at all “branches” of outbound permissions that your user has in BloodHound
    • This devilishly effective MSOL-account-stealing PowerShell script (obfuscate it first!)
    • A personal update on my frustration with ringing in my ears
    Show More Show Less
    49 mins
  • 7MS #673: ProxmoxRox
    May 3 2025

    Today we’re excited to release ProxmoxRox – a repo of info and scripts to help you quickly spin up Ubuntu and Windows VMs. Also, some important news items:

    • 7MinSec.club in-person meeting is happening Wednesday, May 14! More details here.
    • We did our second Tuesday TOOLSday this week and showed you some local privesc techniques when you have local admin on an endpoint
    Show More Show Less
    31 mins
  • 7MS #672: Tales of Pentest Pwnage – Part 70
    Apr 25 2025

    Today’s a fun tale of pentest pwnage where we leveraged a WinRM service ticket in combination with the shadow credentials attack, then connected to an important system using evil-winrm and make our getaway with some privileged Kerberos TGTs! I also share an (intentionally) vague story about a personal struggle I could use your thoughts/prayers/vibes with.

    Show More Show Less
    55 mins
  • 7MS #671: Pentesting GOAD
    Apr 18 2025

    Hello! This week Joe “The Machine” Skeen and I kicked off a series all about pentesting GOAD (Game of Active Directory). In part one we covered:

    • Checking for null session enumeration on domain controllers
    • Enumerating systems with and without SMB signing
    • Scraping AD user account descriptions
    • Capturing hashes using Responder
    • Cracking hashes with Hashcat
    Show More Show Less
    25 mins
  • 7MS #670: Adventures in Self-Hosting Security Services
    Apr 11 2025

    Hi friends, today I’m kicking off a series talking about the good/bad/ugly of hosting security services. Today I talk specifically about transfer.zip. By self-hosting your own instance of transfer.zip, you can send and receive HUGE files that are end-to-end encrypted using WebRTC. Sweet! I also supplemented today’s episode with a short live video over at 7MinSec.club.

    Show More Show Less
    37 mins
  • 7MS #669: What I’m Working on This Week – Part 3
    Apr 4 2025

    Hi friends, in this edition of what I’m working on this week:

    • 3 pulse-pounding pentests that had…problems
    • Something I’m calling the unshadow/reshadow credentials attack
    • Heads-up on a new video experiment I’m going to try next week
    Show More Show Less
    43 mins
  • 7MS #668: Tales of Pentest Pwnage – Part 69
    Mar 28 2025

    Hola friends! Today’s tale of pentest pwnage talks about abusing Exchange and the Azure ADSync account! Links to the discussed things:

    • adconnectdump – for all your ADSync account dumping needs!
    • Adam Chester PowerShell script to dump MSOL service account
    • dacledit.py (part of Impacket) to give myself full write privileges on the MSOL sync account: dacledit.py -action ‘write’ -rights ‘FullControl’ -principal lowpriv -target MSOL-SYNC-ACCOUNT -dc-ip 1.2.3.4 domain.com/EXCHANGEBOX$ -k -no-pass
    • Looking to tighten up your Exchange permissions – check out this crazy detailed post
    Show More Show Less
    30 mins