This is an in-progress quick start install guide for NPK on Ubuntu 18.
From a new Ubuntu 18 box, install the essentials:
apt install unzip -y
apt install python3-pip -y
apt install jq -y
apt install npm -y
pip3 install awscli --upgrade —-user
steampowered.com | |
steamcommunity.com | |
steamgames.com | |
steamusercontent.com | |
steamcontent.com | |
steamstatic.com | |
akamaihd.net |
This is an in-progress quick start install guide for NPK on Ubuntu 18.
From a new Ubuntu 18 box, install the essentials:
apt install unzip -y
apt install python3-pip -y
apt install jq -y
apt install npm -y
pip3 install awscli --upgrade —-user
As heard on 7MS #357
Basically, you can do Windows Key + R then type cmd and Enter for quick access to command line.
But lets do some more fun stuff. Wanna open a command window from the desktop and launch a command in one swoop? Try this:
Note: this set of GPOs accompany's a YouTube video all about building your own pentest lab
Personally, when I setup an internal/test/pentest Active Directory environment I like to leave some settings the way most client environments are setup - both for ease of management and easier attacks, so that includes spinning up the following GPOs:
Enable RDP on desktops Create a new GPO and link it whatever OU your workstations are in, and set Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Connections and set Allow users to connect remotely using Remote Desktop Services to Enable
Then, create a security group in AD, called RDP-peeps for example, that you want to allow to RDP into all workstations.
This document is intended to help you create a GPO you can push to your Windows endpoints and start gathering much more rich, verbose logging data. As I recently discussed on the podcast, Windows is a bit lacking in how much information gets logged in its out-of-the-box config.
Note: much of these settings were discovered when using the great LOG-MD tool, which you can download for free.
Below is the cell phone agreement I have with my kids. It was largely inspired by this contract which had some excellent ideas.
I will silence and put away or turn off my phone:
Below is a list of Webinars hosted by 7 Minute Security:
More coming soon!
Thursday, August 20, 2020 @ 10:00 a.m. CST
In episode #341 of the 7 Minute Security podcast I talked about how to identify - and remediate - the unquoted service path vulnerabilities you might see pop up on a vulnerability scan. Here's the breakdown of resources that will help you understand and fix this pesky vuln:
Here's a great article describing unquoted service paths and why they're a risk to your enterprise.
If you want to create a fake service with unquoted service paths so you can then test fixing it, check out this gist which has you run something like the following:
New-Service -Name 'TotesFakeService' -BinaryPathName 'C:\program files\system32\something.exe' -DisplayName 'Totes Fake Dude' -StartupType Manual
This gist complements a series of podcast episodes I do called How to Succeed in Business Without Really Crying. In part 6 of this series I list a bunch of tools and services I use to help me conduct security assessments and also balance the taxes/books. Here is that full list in all its gist-y glory:
There are lots of registrars out there, and as far as I can tell, they offer about the same amount of features and same pricing for each domain. Since I have such a large footprint already in Google services with my account, moving domains under their roof was pretty easy and made sense. I've also had to use their technical support a few times and found the response times - and level of service - to be stellar.
You know it and probably love or hate it. Lots of people tell me "Just use Google Docs! Just us
In episode 338 of the 7 Minute Security podcast, I talked about a recent engagement where I helped a customer do a bit of a SIEM solution bake-off. This gist is the companion to that episode, and is broken down into the following two sections:
Questionnaire - a series of questions you can ask SIEM vendors to gather as many data points about their products and services as possible
SIEM tests - a few tests you can conduct on your internal/external network to see if your SIEM solution indeed coughs up alerts on some things it should indeed whine about