This podcast is sponsored by Arctic Wolf, whose Concierge Security teams Monitor, Detect and Respond to Cyber threats 24/7 for thousands of customers around the world. Arctic Wolf. Redefining cybersecurity. Visit Arcticwolf.com/7MS to learn more.
Today we're talking about tales of pentest pwnage - specifically how much fun printers can be to get Active Directory creds. TLDL: get into a printer interface, adjust the LDAP lookup IP to be your Kali box, run nc -lvp 389 on your Kali box, and then "test" the credentials via the printer interface in order to (potentially) capture an Active Directory cred!
Today we also define an achievement that's fun to unlock called DDAD: Double Domain Admin Dance.
7MS #371: Tales of Internal Pentest Pwnage - Part 4
7MS #370: Happy Secure 4th!
7MS #369: Cracking Hashes with NPK
7MS #368: Tales of Pentest Fail
7MS #367: DIY Two-Hour Risk Assessment
7MS #366: Tales of Internal Pentest Pwnage - Part 3
7MS #365: Interview with Ryan Manship and Dave Dobrotka - Part 3
7MS #364: Tales of External Pentest Pwnage
7MS #363: Interview with Ryan Manship and Dave Dobrotka - Part 2
7MS #362: My Dear Friend Impostor Syndrome
7MS #361: Logging Made Easy
7MS #360: Active Directory Security 101 - Part 2
7MS #359: Windows 10 Security Baselining
7MS #358: 4 Ways to Write a Better Pentest Report
7MS #357: 7 Minutes of IT and Security Tips
7MS #356: Faster Hard Drive Forensics with CyLR and CDQR
7MS #355: Mousejacking!
7MS #354: Tales of Internal Pentest Pwnage - Part 2
7MS #353: Tales of Internal Pentest Pwnage - Part 1
7MS #352: Recap of Rad Red Team Training
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Elliot in the Morning