SEVNX
SEVNX
  • Видео 52
  • Просмотров 51 780
Grassr00tz 2024: Cooking with Hashcat ft. Vitaliy Kovalchuk
Recorded at Grassr00tz 2024 in Appleton, Wisconsin, SEVN-X's Vitaliy "Kelly" Kovalchuk presents on improving password cracking strategies using advanced techniques and revisiting some classics. Up your password cracking game with these advanced "recipes".
Produced www.sevnx.com
CyberCoffee
drinkcybercoffee.com
Use promo code WAR10 to save 10%
Просмотров: 138

Видео

Episode 15: "The story of Invoke-Shellcode" ft. Matt Graeber
Просмотров 142Месяц назад
In this special episode of War Stories, Zac sits down with one of his heroes, Matt Graeber! Matt is the Director of Threat Research at Red Canary. Matt is known for his expertise in threat research and offensive security. He has made significant contributions to the offensive security field through his work on a variety of topics including PowerShell security, Windows endpoint security, detecti...
Episode 14: "This is when the zombies come" ft. Nick Delewski
Просмотров 96Месяц назад
This week Zac chats with Nick Delewski. Nick is a Principle Security Consultant at MedSec (www.medsec.com/) specializing in medical device testing. Zac and Nick talk about the current state of medical device testing and cybersecurity regulation, Nick's favorite tools including a microwave oven (see below), and get a story from Nick about the most physical danger he has ever been in on a penetra...
Episode 13: "Laughing Hysterically to Fearing for Our Lives" ft. Matt Shirley
Просмотров 171Месяц назад
This week Zac sits down with Matt Shirley. Matt is the VP of Technical Services at Fortalice Solutions. Fortalice Solutions is a boutique cyber security services firm based in Charlotte NC, founded by Theresa Payton, former CIO to the White House. Zac and Matt discuss the importance of turning technical pentest findings into actionable strategy, RFID badge cloning and the hilarious situations t...
Episode 12: "What if we released a bunch of bats?" ft. John Baek
Просмотров 164Месяц назад
This week Zac sits down with John Baek. John is the OG mentor to many of the folks already on this podcast as well as the leadership at SEVN-X. Zac and John discuss a few fun stories about our upbringing and then we launch straight into the "waterworks". Produced www.sevnx.com CyberCoffee drinkcybercoffee.com Use promo code WAR10 to save 10%
Episode 11: "At that point, I was just trying to get kicked out" ft. Zac Davis
Просмотров 1432 месяца назад
In a dramatic change of pace, this week, host Zac takes the hot seat and tells all about his journey into infosec, his favorite techniques, and a story you won't want to miss. Produced www.sevnx.com CyberCoffee drinkcybercoffee.com Use promo code WAR10 to save 10%
Episode 10: "I swear it was RIGHT HERE" ft. Eric Buck
Просмотров 922 месяца назад
This week Zac sits down with Eric Buck. Eric is the Director of Offensive Security at SEVN-X. Zac and Eric discuss physical security and his favorite tried and true technique. Produced www.sevnx.com CyberCoffee drinkcybercoffee.com Use promo code WAR10 to save 10%
Episode 9: "Bypassing Palo Alto Firewalls with Ping" ft. Michael Sviben
Просмотров 1333 месяца назад
This week Zac sits down with Michael Sviben. Michael is the co-founder and COO of Domain Guard ( guardyourdomain.com ). Domain Guard is a full service domain management platform offering services including Domain Monitoring, Brand Monitoring, Attack Surface Monitoring, Phishing Site Takedowns, Phishing Simulation, and Dark Web Monitoring. Zac and Michael discuss the importance of tool developme...
Episode 8: "Stealing Credit Card Data Across the Globe" ft. Andrew Allen
Просмотров 1233 месяца назад
Andrew Allen This week Zac sits down with Andrew Allen. Andrew is a former pentester, red teamer, and security manager who has worked with some of the largest companies in the world. Zac and Andrew discuss the power of PowerShell, unique attack scenarios for PCI compliance, international pentesting, and finish it up with a story of physical pentesting. Produced www.sevnx.com CyberCoffee drinkcy...
Episode 7: "No Task Left Unscheduled" ft. Jude Keenan
Просмотров 1313 месяца назад
Jude Keenan This week Zac chats with Jude Keenan. Jude is a Director of Red Teaming for Aon. Zac and Jude discuss Bloodhound for Active Directory enumeration (github.com/BloodHoundAD/BloodHound), use of nested Microsoft Scheduled Tasks for EDR evasion during an internal penetration test, and finally cover some unique challenges that can arise on physical pentests! Produced www.sevnx.com CyberCo...
Episode 6: "It was so stupid it just might work" ft. Dave Catling
Просмотров 1313 месяца назад
Dave Catling This week Zac sits down with Dave Catling. Dave is the founder and principle consultant of Phoenix Ops (www.phoenixops.io/), a boutique cybersecurity firm based in the Philadelphia area. Zac and Dave discuss the similarities and overlaps in their career paths, Evilnginx 3.0 (github.com/kgretzky/evilginx2) for conducting social engineering campaigns, and finally Dave tells a story a...
Episode 5: "Hack all the things" ft. Vitaliy Kovalchuk
Просмотров 1934 месяца назад
Zac Davis chats with fellow SEVN-Xer, Vitaliy Kovalchuk this week on War Stories. Produced www.sevnx.com CyberCoffee drinkcybercoffee.com Use promo code WAR10 to save 10%
Episode 4: "Breaking into ATMs" ft. Matthew Freilich
Просмотров 1474 месяца назад
Zac Davis chats with best friend and hardware hacking guru, Matthew Freilich this week on War Stories. Produced www.sevnx.com CyberCoffee drinkcybercoffee.com Use promo code WAR10 to save 10%
Episode 3: "I Just Started Lyin" ft. Sarah Hume
Просмотров 1004 месяца назад
Zac Davis chats with seasoned penetration tester and "Purple Queen" Sarah Hume this week on War Stories. Produced www.sevnx.com CyberCoffee drinkcybercoffee.com Use promo code WAR10 to save 10%
Episode 2: "Get in the Ceiling!" ft. Stephen Bondurich
Просмотров 1404 месяца назад
Episode 2: "Get in the Ceiling!" ft. Stephen Bondurich
Episode 1: "Then we got arrested" ft. Matt Barnett
Просмотров 6324 месяца назад
Episode 1: "Then we got arrested" ft. Matt Barnett
Trailer: War Stories, Tales from Real Penetration Testers
Просмотров 985 месяцев назад
Trailer: War Stories, Tales from Real Penetration Testers
Barcode LIVE with FC (aka Freakyclown)
Просмотров 14710 месяцев назад
Barcode LIVE with FC (aka Freakyclown)
War Stories and Other Lies from Penetration Testers
Просмотров 115Год назад
War Stories and Other Lies from Penetration Testers
SecureWorld 2023 Recap with SEVN-X and Friends
Просмотров 114Год назад
SecureWorld 2023 Recap with SEVN-X and Friends
ChatGPT for Evil? The Surprising Truth with NBC10
Просмотров 76Год назад
ChatGPT for Evil? The Surprising Truth with NBC10
3MT: 5 Tools Attackers Hate in Corporate Environments
Просмотров 124Год назад
3MT: 5 Tools Attackers Hate in Corporate Environments
A Special SEVN-XMas
Просмотров 62Год назад
A Special SEVN-XMas
3MT: The Cost of Physical Security Testing
Просмотров 201Год назад
3MT: The Cost of Physical Security Testing
Ask A Pro: What is the Dark Web?
Просмотров 58Год назад
Ask A Pro: What is the Dark Web?
Ask A Pro: What is SMB Signing?
Просмотров 1,8 тыс.Год назад
Ask A Pro: What is SMB Signing?
Ask A Pro: What is the CIA Triad?
Просмотров 137Год назад
Ask A Pro: What is the CIA Triad?
From the Field: Under the Door Tool
Просмотров 1102 года назад
From the Field: Under the Door Tool
SecureWorld 2022 Promo #short
Просмотров 2132 года назад
SecureWorld 2022 Promo #short
What's In My Physical Testing Field Kit 2022
Просмотров 2,8 тыс.2 года назад
What's In My Physical Testing Field Kit 2022

Комментарии

  • @svalenti94
    @svalenti94 8 дней назад

    the happy dance at the end got me 😂

  • @Servietsky_
    @Servietsky_ 25 дней назад

    Thanks bot

  • @IlCapodeiCapiTheBoss
    @IlCapodeiCapiTheBoss Месяц назад

    this doesn't seems to work with FV2 /encrypted disk, cause the output is pretty much blank? any solution please? cause cannot unencrypted without mounting/ diskarbritation and needed a thunderbolt to work @sevnxsecurity

    • @sevnxsecurity
      @sevnxsecurity Месяц назад

      Unfortunately, this tutorial does not apply to encrypted disks. You pretty much need the decryption key, and write-blocked hardware to image the drive the usual way.

  • @jacdavis9
    @jacdavis9 Месяц назад

    Scary story!!!

  • @jacdavis9
    @jacdavis9 Месяц назад

    Two humble guys - another interesting interview!

  • @TheInternationalDJCasper
    @TheInternationalDJCasper Месяц назад

    Love to see it bro!

  • @robyounce644
    @robyounce644 Месяц назад

    Nice interview Zac! When you going to bring some blue teamers in? I volunteer I have a real war story

  • @jacdavis9
    @jacdavis9 Месяц назад

    Fabulous interview - very entertaining gentlemen.

  • @brettdewall8606
    @brettdewall8606 2 месяца назад

    Oh snap! Got that shout out! Great episode!

  • @jacdavis9
    @jacdavis9 2 месяца назад

    Loved this episode - great stories and vibe with you two. Your mom sounds like a fan worthy of some free cyber coffee - just sayin....

    • @jacdavis9
      @jacdavis9 2 месяца назад

      Really the least you could do for the steadfast support she seems to offer.

    • @sevnxsecurity
      @sevnxsecurity 2 месяца назад

      Please check your mailbox in 3-4 business days... just sayin....

  • @erkind9687
    @erkind9687 2 месяца назад

    This Eric should consider a career in comedy!

  • @jacdavis9
    @jacdavis9 2 месяца назад

    Great story, hehehe.

  • @beeurs
    @beeurs 3 месяца назад

    The blooper at the end tho 😂😂😂

  • @erkind9687
    @erkind9687 3 месяца назад

    Awesome job Zac & Mike!

    • @beeurs
      @beeurs 3 месяца назад

      They calling your name to do the interview!! =D abt time!!! haha

  • @jacdavis9
    @jacdavis9 3 месяца назад

    Lost me here and there, yet another enjoyable episode!

  • @robyounce644
    @robyounce644 3 месяца назад

    Another of my favorites!!! Great interview Zac….

  • @jacdavis9
    @jacdavis9 3 месяца назад

    Great interview!

  • @beeurs
    @beeurs 3 месяца назад

    You guys match! 🤣 who planned the outfit 😆

  • @michaelmckeown4040
    @michaelmckeown4040 3 месяца назад

    Stupid is as stupid does…

  • @michaelmckeown4040
    @michaelmckeown4040 3 месяца назад

    These are awesome!

  • @robyounce644
    @robyounce644 3 месяца назад

    Dave Catling is one of the best!! Miss you my friend…

  • @jacdavis9
    @jacdavis9 3 месяца назад

    Great interview!

  • @robyounce644
    @robyounce644 4 месяца назад

    Tough story to top!!!

  • @robyounce644
    @robyounce644 4 месяца назад

    Good Series Zac keep it going!

  • @erkind9687
    @erkind9687 4 месяца назад

    I get to listen to these guys AND earn CPEs???! Now that’s a win-win

  • @michaelmckeown4040
    @michaelmckeown4040 5 месяцев назад

    Love it!

  • @awsthecheerfulkid7211
    @awsthecheerfulkid7211 5 месяцев назад

    My name is Aws

  • @wh00tie41
    @wh00tie41 5 месяцев назад

    I can haz?

  • @user-vl7fv4wp8e
    @user-vl7fv4wp8e 7 месяцев назад

    great sharing, thanks! i have a question, if diskutil is not available while disable disk arbitration, how can we determine which disk is our target disk(synthesized) after connect?

  • @TheCyberDistortionPodcast
    @TheCyberDistortionPodcast 10 месяцев назад

    Great job, Chris and FC!!! Very cool event and a great talk! Kudos for pulling it off live and in the flesh guys!

  • @anywhereroam9698
    @anywhereroam9698 10 месяцев назад

    Great tip

  • @dans2792
    @dans2792 11 месяцев назад

    Could I Program One Of These Suckers To Give Me A Raise When My Boss Plugs It Into His Machine? JOKING - Great Breakdown! Have A Good One Folks.

  • @mischievousfish
    @mischievousfish 11 месяцев назад

    Great now we need a rubber duck thats actually a thumb drive

    • @sevnxsecurity
      @sevnxsecurity 11 месяцев назад

      Amazon to the rescue.... www.amazon.com/EASTBULL-Novelty-Flash-Memory-Cartoon/dp/B07R4RJWGV/ref=sr_1_3?crid=EXRNNU0AKD04&keywords=rubber+duck+usb&qid=1691168503&sprefix=rubber+duck+usb%2Caps%2C81&sr=8-3

  • @NotAProblem
    @NotAProblem 11 месяцев назад

    How does this work? I get how it established a connection to the server without showing it using a .bat file once it's in, but how does it know to launch the file when inserted? I work on IT, and this could make software installs really easy at work.

    • @sevnxsecurity
      @sevnxsecurity 11 месяцев назад

      It is recognized by the OS as a human interface device (HID) and like any HID, it has a controller, that controller, in usual cases, will wait for "human" interaction (interfaces) before sending keystrokes along, but in a Rubber Ducky's case, it consults the ducky script on the device and uses that as the "human input" automatically.

  • @dualbasilisk
    @dualbasilisk 11 месяцев назад

    Could you program one of these to have your password on it so you don't have to manually type your password anymore?

    • @sevnxsecurity
      @sevnxsecurity 11 месяцев назад

      LOL you definitely ...could.... but it would be stored on the device in plaintext so if you ever lost it / left it... it's gameover.

  • @rshadow5683
    @rshadow5683 11 месяцев назад

    Cool!!!

  • @mrj4264
    @mrj4264 Год назад

    😮

  • @zefftrus9825
    @zefftrus9825 Год назад

    Can you make a videos of you using those tools in real-time so people can get a better feel for them😊

    • @sevnxsecurity
      @sevnxsecurity Год назад

      We actually have a few coming out soon, stay tuned. Thanks for the feedback!

  • @cvport8155
    @cvport8155 Год назад

    Please make more vd for advanced techniques red team and pivoting and make server Discord

    • @sevnxsecurity
      @sevnxsecurity Год назад

      Our red team is working on a few new videos. I like the Discord idea, I'll pass the suggestion along to our operators. Thanks for the feedback, Cheers!

  • @armandorios4032
    @armandorios4032 Год назад

    ✋Would it clon a Schlage Smart key fob?

    • @sevnxsecurity
      @sevnxsecurity Год назад

      I don’t believe so. Do you know what frequency the key is on?

    • @armandorios4032
      @armandorios4032 Год назад

      @@sevnxsecurity I don’t know if this would tell you anything, I’m not an expert. This is what’s in the key fob fro Schlage S26A13258848005661 9651 My intention is to have a copy and use it instead of the original, because if the original breaks or damaged or if I loose it; I have to pay $250.00 ridiculous dollars for it.

  • @TrxpsOfficial
    @TrxpsOfficial Год назад

    We are a small company, in a shared office space. Do you think that we should pursue a physical security engagement or wait til we grow into our own space?

    • @sevnxsecurity
      @sevnxsecurity Год назад

      First, I'd check with the property manager to see if 1) they do any testing of their own and 2) if you have permission to conduct testing within their space. If you can and they don't, then it's likely a worthwhile exercise to know your attack surface and vulnerabilities.

    • @TrxpsOfficial
      @TrxpsOfficial Год назад

      @@sevnxsecurity Thank you, I will check with the property manager and go from there. Great information in this video!

  • @iancoffey2961
    @iancoffey2961 Год назад

    🔥🔥🔥

  • @markotb
    @markotb Год назад

    Below comments FYI. I want these pen testers to keep it real and honest. Most of the methods/tools in this, and most physical pen testing videos, are not applicable to modern scenarios, modern security has moved on from these old school entry methods. Saving ya all money and keeping it real. ALL these kind of videos I see are just rehashing old methods from others videos. It is misleading, I dont know if this is an industry thing bat every technology has or is moving on from these methods and I doubt modern pen testers are carring most of this stuff, if they are they are rarely if ever using them. Pick set - I love the creeper case, but Id suggest picking off the velcro and tuck the flap, its quieter that way. Warded picks - Nice to have bet almost never encounter warded locks in any high value locations. Film - Ive never encountered an office door handle that will open up. Shove-it tool, hall pass - Most all modern buildings will not have the old locks that are exploitable with this tool. Lockpicks - Getting in, they are mildly useful, most modern buildings are RFID access. Might be useful to get into desks and server cabinets. That lockpick kit is crap btw. Shims - Fun but again trying to exploit obsolete security methods. Gaffa tape - ok, good for many purposes. Padlock shims - ok, maybe if you are pen testing a locked bike chain. Soda cans are crap, too soft. Tubular lock pick - Ok, but require a lot of practice and are tricky. Unless you are opening vending machines. Thumb turner - again, almost obsolete, shop fronts yes, but thats looking more like thievery not pen testing Traveller hook - too old and obsolete, like shove-it and hall pass. Plug spinner - you are not picking difficult locks, and certainly not as a pen tester, if you need to spin a lock, just pick it again. The future, and current is digital. RFID cloning/hacking, OSINT and social engineering are the current methods, I think videos like this are misleading and do not reflect the reality of modern pen testing.

    • @mattbarnett8265
      @mattbarnett8265 Год назад

      Without any exaggeration, I have used every single one of those techniques you mentioned (minus the padlock shims and plug spinner in the last 6 months) on everything from banks, to corporate buildings, schools, and entertainment venues. Full disclosure: the thumb turner got used to tigger an RTE button so not the exact purpose but it's staying in my kit. We may like to imagine most companies on to these techniques by now, but I assure you, it's just a dream. The world is still very much broken.

    • @markotb
      @markotb Год назад

      @@mattbarnett8265 Thanks for the reply. I wasnt putting shade on you, I love all of these kind of videos. Let me make it clear that I dont work in the security field, I am an enthusiast and groupie, my field is Engineering Consultancy, mainly civil and structural. If I was 30 years younger Id look to physical assessment as a career, it sounds exciting and it is important. Where I live and work, Canberra, Australia, the CBD has gone through massive 'renewal' with a lot of the old buildings being knocked down and rebuilt. Who ever is doing the security assessment and recommendations is doing it right. The few buildings I have worked in over the last 3 years (hopefully Im not doxxing myself are the 2CA building, which has the Australian Protective Services as a tenant so security and monitoring is TIGHT, and the CQ building which is one of the newest 6 star office spaces in Canberra, check them out on street view and let me know if you see any obvious weaknesses, Id be very interested) are top notch. All of the Pubic Service departments are also moving into these modern buildings in the city. As a physical security enthusiast....and a reformed juvenile burglar, all the high security buildings I see, and I do a mental assessment, are not susceptible to most of the methods of attack. I would be interested in hearing about the type, not location or client, of the businesses or US Gov that you assess. More around things like, when were these buildings built, if they have upgraded their security etc. One other thing Id like to ask, you say you have used most of the methods in the last 6 months. How many physical assessment have you been involved in in those 6 months? My very limited understanding is that Security Assessing companies do maybe 2 to 4 physical penetration tests per year (from what Ive gleaned from Deviant and the Core Group), that most engagements are digital, phishing, wifi and remote access attacks rather than actually physically getting to the server room? Sorry for the looooooong reply, and have a good one.

    • @mattbarnett8265
      @mattbarnett8265 Год назад

      @@markotb All good on the reply. Reading it, I realized something. All of the techniques we cover (or tools more accurately) have two sides to them (no pun intended). There is the 1) what it was made to do and 2) what it can do. I think in some ways you're right, the tools, as designed, don't always work, but they are the right size, shape, flexibility, etc. to "work" in different ways. It's no different than hacking really. A buffer overflow is a buffer overflow, sometimes it works right out of the box, and sometimes it needs modification. Being good at this field requires a high degree of creativity and o-o-t-box thinking. Cheers!

  • @patrrryk
    @patrrryk Год назад

    great thank you

  • @johnhanley2431
    @johnhanley2431 Год назад

    You are a good speaker. However, the music really distracts from following you. For example, when I try to watch on my iPhone with earbuds, the music is too loud and I have to replay sections to hear your words. On my desktop the music is not so loud, but the music is still too distracting. Remove the background music.

    • @sevnxsecurity
      @sevnxsecurity Год назад

      Thanks for the feedback John, I’ll let our editing department know for future videos.

  • @mrj4264
    @mrj4264 Год назад

    So it's not that Cats Love Apples? :(

  • @zefftrus9825
    @zefftrus9825 Год назад

    Whare did you get that film

  • @kennethkeller2138
    @kennethkeller2138 2 года назад

    Whats the name of that Farmall bag??

    • @sevnxsecurity
      @sevnxsecurity 2 года назад

      Doesn’t look like they make it anymore… here’s a hip bag that looks like it may work too: www.shopcaseih.com/case-ih-utilitarian-belt-bag

  • @minorukobayashi3684
    @minorukobayashi3684 2 года назад

    This method should not work on M1 Mac. This is because there is no target disk mode.

    • @sevnxsecurity
      @sevnxsecurity Год назад

      It's been replaced with Mac Sharing Mode. It's similar but accessed differently. I haven't imaged an M1/M2 yet but let me know if you'd like us to investigate and do a video on the process for sound imaging principles on Apple Silicon.

  • @davidstone6970
    @davidstone6970 2 года назад

    Why do you crack passwords?

    • @sevnxsecurity
      @sevnxsecurity 2 года назад

      Not sure we understand the question. Are you asking why SEVN-X cracks passwords during its client engagements specifically or why anyone would want to crack a password in the more general sense?