This podcast is sponsored by Arctic Wolf, whose Concierge Security teams Monitor, Detect and Respond to Cyber threats 24/7 for thousands of customers around the world. Arctic Wolf. Redefining cybersecurity. Visit Arcticwolf.com/7MS to learn more.
Today we're talking about tales of pentest pwnage - specifically how much fun printers can be to get Active Directory creds. TLDL: get into a printer interface, adjust the LDAP lookup IP to be your Kali box, run nc -lvp 389 on your Kali box, and then "test" the credentials via the printer interface in order to (potentially) capture an Active Directory cred!
Today we also define an achievement that's fun to unlock called DDAD: Double Domain Admin Dance.
7MS #567: How to Build an Intentionally Vulnerable SQL Server
7MS #566: Tales of Pentest Pwnage - Part 47
7MS #565: How to Simulate Ransomware with a Monkey
7MS #564: First Impressions of OVHcloud Hosted vCenter
7MS #563: Cracking and Mapping and Execing with CrackMapExec - Part 2
7MS #562: Cracking and Mapping and Execing with CrackMapExec
7MS #561: Interview with Chris Furner of Blumira
7MS #560: 7MOOCH - Dolphin Rides Are Done Dude
7MS: #559: Tales of Pentest Pwnage - Part 46
7MS #558: How to Build a Vulnerable Pentest Lab - Part 2
7MS #557: Better Passive Network Visibility Using Teleseer
7MS #556: How to Build a Vulnerable Pentest Lab
7MS #555: Light Pentest eBook 1.1 Release
7MS #554: Simple Ways to Test Your SIEM
7MS #553: The Artificial Intelligence Throat Burn Episode
7MS #552: Tales of Pentest Pwnage - Part 45
7MS #551: Interview with Matt Warner of Blumira
7MS #550: Tales of Pentest Fail - Part 5
7MS #549: Interview with Christopher Fielder and Daniel Thanos of Arctic Wolf
7MS #548: Tales of Pentest Pwnage - Part 44
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast