
Sign up to save your podcasts
Or


I recently had the awesome opportunity to take the awesome Real World Red Team course put on by Peter Kim, author of The Hacker Playbook series.
TLDR and TLDR (too long don't listen): go take this training. Please. Now. The end.
If you want to hear more, check out today's podcast episode where I talk about all the wonderful tidbits I learned from Peter during the training, including:
Doppelganger attacks - does your target have a frequently used site like mail.company.com? Try buying up mailcompany.com with a copy of their email portal (using Social Engineer Toolkit), and the creds might come pouring in!
Get potential usable creds from old breaches (Adobe, Ashley Madison, LinkedIn, Spotify)
Password spraying is often really effective to get you your first set of creds - check out Spray or DomainPasswordSpray
When creating phishing payloads, Veil will help you craft something to bypass AV
When you're in a network and have grabbed your first set of creds, run BloodHound or SharpHound to map the Active Directory and find your high-value targets
Check systems for MS17-010 for some potential easy wins
Look for potential accounts that you can Kerberoast
For more info visit today's show notes on 7ms.us
By Brian Johnson4.7
6868 ratings
I recently had the awesome opportunity to take the awesome Real World Red Team course put on by Peter Kim, author of The Hacker Playbook series.
TLDR and TLDR (too long don't listen): go take this training. Please. Now. The end.
If you want to hear more, check out today's podcast episode where I talk about all the wonderful tidbits I learned from Peter during the training, including:
Doppelganger attacks - does your target have a frequently used site like mail.company.com? Try buying up mailcompany.com with a copy of their email portal (using Social Engineer Toolkit), and the creds might come pouring in!
Get potential usable creds from old breaches (Adobe, Ashley Madison, LinkedIn, Spotify)
Password spraying is often really effective to get you your first set of creds - check out Spray or DomainPasswordSpray
When creating phishing payloads, Veil will help you craft something to bypass AV
When you're in a network and have grabbed your first set of creds, run BloodHound or SharpHound to map the Active Directory and find your high-value targets
Check systems for MS17-010 for some potential easy wins
Look for potential accounts that you can Kerberoast
For more info visit today's show notes on 7ms.us

186 Listeners

2,011 Listeners

371 Listeners

372 Listeners

652 Listeners

1,027 Listeners

318 Listeners

418 Listeners

8,078 Listeners

175 Listeners

315 Listeners

195 Listeners

73 Listeners

139 Listeners

45 Listeners