
Sign up to save your podcasts
Or


This episode of the 7 Minute Security Podcast is brought to you by Authentic8, creators of Silo. Silo allows its users to conduct online investigations to collect information off the web securely and anonymously. For more information, check out Authentic8.
This episode features cool things I'm learning about external pentesting. But first, some updates:
My talk at Secure360 went really well. Only slightly #awkward thing is I felt an overwhelming need to change my title slide to talk about the fact that I don't drink.
The 7MS User Group went well. We'll resume in the late summer or early fall and do a session on lockpicking!
Wednesday night my band had the honor of singing at a Minnesota LEMA service and wow, what an honor. To see the sea of officers and their supportive families and loved ones was incredibly powerful.
On the external pentest front, here are some items we cover in today's show:
MailSniper's Invoke-DomainHarvestOWA helps you discover the FQDN of your mail server target. Invoke-UsernameHarvestOWA helps you figure out what username scheme your target is using. Invoke-PasswordSprayOWA helps you do a low and slow password spray to hopefully find some creds!
Once inside the network, CrackMapExec is your friend. You can figure out where your compromised creds are valid across the network with this syntax:
You can also find what shares you have access to with:
crackmapexec smb 192.168.0.0/24 -u USER -p 'PASSWORD' -d YOURDOMAIN --sharesSift through those shares! They often have VERY delicious bits of information in them :-)
By Brian Johnson4.7
6868 ratings
This episode of the 7 Minute Security Podcast is brought to you by Authentic8, creators of Silo. Silo allows its users to conduct online investigations to collect information off the web securely and anonymously. For more information, check out Authentic8.
This episode features cool things I'm learning about external pentesting. But first, some updates:
My talk at Secure360 went really well. Only slightly #awkward thing is I felt an overwhelming need to change my title slide to talk about the fact that I don't drink.
The 7MS User Group went well. We'll resume in the late summer or early fall and do a session on lockpicking!
Wednesday night my band had the honor of singing at a Minnesota LEMA service and wow, what an honor. To see the sea of officers and their supportive families and loved ones was incredibly powerful.
On the external pentest front, here are some items we cover in today's show:
MailSniper's Invoke-DomainHarvestOWA helps you discover the FQDN of your mail server target. Invoke-UsernameHarvestOWA helps you figure out what username scheme your target is using. Invoke-PasswordSprayOWA helps you do a low and slow password spray to hopefully find some creds!
Once inside the network, CrackMapExec is your friend. You can figure out where your compromised creds are valid across the network with this syntax:
You can also find what shares you have access to with:
crackmapexec smb 192.168.0.0/24 -u USER -p 'PASSWORD' -d YOURDOMAIN --sharesSift through those shares! They often have VERY delicious bits of information in them :-)

186 Listeners

2,011 Listeners

371 Listeners

372 Listeners

652 Listeners

1,027 Listeners

318 Listeners

418 Listeners

8,078 Listeners

175 Listeners

315 Listeners

195 Listeners

73 Listeners

139 Listeners

45 Listeners