
Sign up to save your podcasts
Or


Yeahhhhhh! Today's another fun tale of pentest pwnage, including:
The importance of starting your pentest with an AD account that actually has access to...ya know...stuff
The importance of starting your pentest plugged into a network that actually has...you know...systems connected to it!
This BHIS article is awesome for finding treasures in SMB shares
PowerUpSQL audits are a powerful way to get pwnage on a pentest - check out this presentation for some practical how-to advice
IPMI/BMCs often have weak creds and/or auth bypasses so don't forget to check for them. Rapid7 has a slick blog on the topic.
Don't forget to check for vulnerable VMWare versions because some of them have major vulnerabilities
By Brian Johnson4.7
6868 ratings
Yeahhhhhh! Today's another fun tale of pentest pwnage, including:
The importance of starting your pentest with an AD account that actually has access to...ya know...stuff
The importance of starting your pentest plugged into a network that actually has...you know...systems connected to it!
This BHIS article is awesome for finding treasures in SMB shares
PowerUpSQL audits are a powerful way to get pwnage on a pentest - check out this presentation for some practical how-to advice
IPMI/BMCs often have weak creds and/or auth bypasses so don't forget to check for them. Rapid7 has a slick blog on the topic.
Don't forget to check for vulnerable VMWare versions because some of them have major vulnerabilities

188 Listeners

2,005 Listeners

373 Listeners

372 Listeners

653 Listeners

1,023 Listeners

319 Listeners

418 Listeners

8,070 Listeners

178 Listeners

315 Listeners

187 Listeners

73 Listeners

140 Listeners

44 Listeners