Keybase proof
I hereby claim:
- I am braimee on github.
- I am braimee (https://keybase.io/braimee) on keybase.
- I have a public key ASCeG7oR4oiDB9VO2kYrb6O-VhTh27LUSHFJ56EMM_jucwo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
Below is a blurb on each podcast episode, as well as a link to the corresponding show notes (if available). I apologize but this gist is often a little outdated, so to view the show notes for the latest episodes be sure to also check out 7ms.us.
Today features the long-awaited interview with Peter Kim of The Hacker Playbook series!
Patching solution bake-off | PDQ Deploy/Inventory | Ninite | ManageEngine | ivanti |
---|---|---|---|---|
Agent or agentless | Agentless (w/option coming in Q4 for an agent install) | Agent | Both | Both |
LAN/cloud centralized administration | LAN only | Cloud only | Both | LAN only |
Can push Microsoft updates? | Cumulative monthly updates | No | Yes | Yes |
Can work w/non-MS machines (Macs/Linux)? | Can identify device type but not actively inventory/patch non-MS | No | Yes - Mac/Linux agent and ability to push patches (!) | Yes - via Ivanti patch for Linux/Unix/Mac environments |
Training/certification | Hefty Youtube training library | Unknown | Training videos library easily available from inside the Web interface. Also it looks like they do a Webinar each Patch Tuesday about the latest MS patches. | Yes check out this |
Pricing model | Per admin console (PDQ is ok with one |
You said you wouldn't do it
You said you wouldn't click that link
But you totally did
It’s clear you didn’t stop and think
How the promise of a free burrito would be all that it took
To open up our networks to virtual crooks
Tired of recruiters pinging you about jobs that you don't care about or are under/overqualified for, but you'd like to utilize their time/skills/talent to find gigs you DO want? Customize this template and send it to them!
Hello,
Thanks for your email. The position you sent me is not a fit, however, here are some of the things I’d be looking for if I were to consider another position:
This document is under construction, but is intended to get you up and running quickly with cracking hashes in the cloud using the Paperspace service.
Resources used for this article:
Check your version with:
$Psversiontable.psversion
If you are below Major: 5, Minor:1
head to Microsoft's download site to get the latest.
This document pools several awesome tools and blog entries together (see "Resources" at the end of this doc) in an attempt to automate the process of getting an initial foothold on a network in a situation where you have no valid credentials.
Ok, so one weird thing I'm trying to figure out is if I install ntlmrelay as the first tool we'll use, these steps seem to work ok:
git clone https://github.com/CoreSecurity/impacket.git /opt/impacket
cd /opt/impacket
pip install .
I had a heck of a time getting a Cuckoo sandbox running, and below I hope to help you get one up and running relatively quickly by detailing out the steps and gotchas I stumbled across along the way. I mention this in the references at the end of this gist, but what you see here is heavily influenced by this article from Nviso
It's a new (and hopefully fun) interview format I want to engage in with members of the information security community on the 7 Minute Security podcast.
I'm Brian from 7 Minute Security, LLC and I've been having a blast doing some longer-form interviews with security folks, but I thought it would be fun to do a shorter-form outline where I ask 7 questions (ok, maybe a few more than 7...but I like lucky numbers). Some questions will be serious. Others will not.
Check these out: