SEVNX
SEVNX
  • 58
  • 54 747
Episode 21: "Hacking Apple" ft. Mike Piekarski
This week Zac sits down with Mike Piekarski. Mike is a bug bounty specialist, penetration tester, and solutions architect. He is also the founder of Breach Craft (breachcraft.io), a boutique cybersecurity firm based in Pennsylvania. Zac and Mike discuss Mike's most successful bug bounty targeting one of the biggest companies in the world via a insecure Cisco configuration. They also touch on the power of the Project Discovery toolkit (projectdiscovery.io), and Mike tells the story of trying to use a Santa suit on a social engineering engagement.
Produced www.sevnx.com
CyberCoffee
drinkcybercoffee.com
Use promo code WAR10 to save 10%
zhlédnutí: 52

Video

Episode 20: "The Art of Deception" ft. Faisal Tameesh
zhlédnutí 133Před 21 dnem
This week Zac sits down with Faisal Tameesh. Faisal is a senior red team operator at NVIDIA and a "hacker of all trades" with experience in software development, pentesting, red teaming, social engineering, exploit development, and reverse engineering. Zac and Faisal discuss the technical details of the CrowdStrike incident, take a deep dive on the art of human deception and how the cybersecuri...
Episode 19: "IDOR, APIs, and Passwords OH My!" ft. Jullian Gerhart
zhlédnutí 247Před měsícem
This week Zac sits down with Jullian Gerhart. Jullian is a Managing Consultant at NCC Group, which specializes in application security and application security pentesting. Jullian is also a contributor to the Application Defense Alliance (appdefensealliance.dev/) working to create a standardized framework for securing applications in the Google Play and Apple App Stores. Zac and Jullian discuss...
Episode 18: "Cars and Cyber" ft. Brett DeWall
zhlédnutí 120Před měsícem
This week Zac sits down with his longtime friend Brett DeWall. Brett is a Staff Specialist at White Oak Security (CyberAdvisors). He is a pentester, red teamer, bug bounty hunter, and security researcher. Zac and Brett do a deep dive on the RFID hacking research Brett has conducted, as well as go over his RFID skimming solution (SkimJob). They also tell the story of starting their careers toget...
Episode 17: "Hey Hoang, umm Cylance is on the Phone..." ft. Hoang Bui
zhlédnutí 164Před měsícem
This week Zac sits down with Hoang Bui. Hoang specializes in reverse engineering, while dabbling in penetration testing and red teaming. Zac and Hoang discuss the levels of abstraction and different approaches for writing and breaking programs. Hoang tells a unique story of bypassing EDR, blogging about it, and getting himself into hot water in the process! Are you hiring a researcher or revers...
Episode 16: "Yea, we just stole half a million dollars" ft. Shelby Spencer
zhlédnutí 184Před měsícem
This week Zac sits down with Shelby Spencer. Shelby is a developer turned red teamer who has worked on some of the most elite teams in the offensive security world. Zac and Shelby discuss the breakdown between pentesting and red teaming, tools development (Shelby created the Jenkins Attack Framework), and different security perspective across industries. We also get two technical deep dives fro...
Grassr00tz 2024: Cooking with Hashcat ft. Vitaliy Kovalchuk
zhlédnutí 195Před 2 měsíci
Recorded at Grassr00tz 2024 in Appleton, Wisconsin, SEVN-X's Vitaliy "Kelly" Kovalchuk presents on improving password cracking strategies using advanced techniques and revisiting some classics. Up your password cracking game with these advanced "recipes". Produced www.sevnx.com CyberCoffee drinkcybercoffee.com Use promo code WAR10 to save 10%
Episode 15: "The story of Invoke-Shellcode" ft. Matt Graeber
zhlédnutí 204Před 3 měsíci
In this special episode of War Stories, Zac sits down with one of his heroes, Matt Graeber! Matt is the Director of Threat Research at Red Canary. Matt is known for his expertise in threat research and offensive security. He has made significant contributions to the offensive security field through his work on a variety of topics including PowerShell security, Windows endpoint security, detecti...
Episode 14: "This is when the zombies come" ft. Nick Delewski
zhlédnutí 108Před 3 měsíci
This week Zac chats with Nick Delewski. Nick is a Principle Security Consultant at MedSec (www.medsec.com/) specializing in medical device testing. Zac and Nick talk about the current state of medical device testing and cybersecurity regulation, Nick's favorite tools including a microwave oven (see below), and get a story from Nick about the most physical danger he has ever been in on a penetra...
Episode 13: "Laughing Hysterically to Fearing for Our Lives" ft. Matt Shirley
zhlédnutí 183Před 3 měsíci
This week Zac sits down with Matt Shirley. Matt is the VP of Technical Services at Fortalice Solutions. Fortalice Solutions is a boutique cyber security services firm based in Charlotte NC, founded by Theresa Payton, former CIO to the White House. Zac and Matt discuss the importance of turning technical pentest findings into actionable strategy, RFID badge cloning and the hilarious situations t...
Episode 12: "What if we released a bunch of bats?" ft. John Baek
zhlédnutí 171Před 3 měsíci
This week Zac sits down with John Baek. John is the OG mentor to many of the folks already on this podcast as well as the leadership at SEVN-X. Zac and John discuss a few fun stories about our upbringing and then we launch straight into the "waterworks". Produced www.sevnx.com CyberCoffee drinkcybercoffee.com Use promo code WAR10 to save 10%
Episode 11: "At that point, I was just trying to get kicked out" ft. Zac Davis
zhlédnutí 183Před 4 měsíci
In a dramatic change of pace, this week, host Zac takes the hot seat and tells all about his journey into infosec, his favorite techniques, and a story you won't want to miss. Produced www.sevnx.com CyberCoffee drinkcybercoffee.com Use promo code WAR10 to save 10%
Episode 10: "I swear it was RIGHT HERE" ft. Eric Buck
zhlédnutí 98Před 5 měsíci
This week Zac sits down with Eric Buck. Eric is the Director of Offensive Security at SEVN-X. Zac and Eric discuss physical security and his favorite tried and true technique. Produced www.sevnx.com CyberCoffee drinkcybercoffee.com Use promo code WAR10 to save 10%
Episode 9: "Bypassing Palo Alto Firewalls with Ping" ft. Michael Sviben
zhlédnutí 146Před 5 měsíci
This week Zac sits down with Michael Sviben. Michael is the co-founder and COO of Domain Guard ( guardyourdomain.com ). Domain Guard is a full service domain management platform offering services including Domain Monitoring, Brand Monitoring, Attack Surface Monitoring, Phishing Site Takedowns, Phishing Simulation, and Dark Web Monitoring. Zac and Michael discuss the importance of tool developme...
Episode 8: "Stealing Credit Card Data Across the Globe" ft. Andrew Allen
zhlédnutí 130Před 5 měsíci
Episode 8: "Stealing Credit Card Data Across the Globe" ft. Andrew Allen
Episode 7: "No Task Left Unscheduled" ft. Jude Keenan
zhlédnutí 141Před 5 měsíci
Episode 7: "No Task Left Unscheduled" ft. Jude Keenan
Episode 6: "It was so stupid it just might work" ft. Dave Catling
zhlédnutí 144Před 5 měsíci
Episode 6: "It was so stupid it just might work" ft. Dave Catling
Episode 5: "Hack all the things" ft. Vitaliy Kovalchuk
zhlédnutí 206Před 6 měsíci
Episode 5: "Hack all the things" ft. Vitaliy Kovalchuk
Episode 4: "Breaking into ATMs" ft. Matthew Freilich
zhlédnutí 161Před 6 měsíci
Episode 4: "Breaking into ATMs" ft. Matthew Freilich
Episode 3: "I Just Started Lyin" ft. Sarah Hume
zhlédnutí 110Před 6 měsíci
Episode 3: "I Just Started Lyin" ft. Sarah Hume
Episode 2: "Get in the Ceiling!" ft. Stephen Bondurich
zhlédnutí 153Před 6 měsíci
Episode 2: "Get in the Ceiling!" ft. Stephen Bondurich
Episode 1: "Then we got arrested" ft. Matt Barnett
zhlédnutí 663Před 7 měsíci
Episode 1: "Then we got arrested" ft. Matt Barnett
Trailer: War Stories, Tales from Real Penetration Testers
zhlédnutí 114Před 7 měsíci
Trailer: War Stories, Tales from Real Penetration Testers
Barcode LIVE with FC (aka Freakyclown)
zhlédnutí 161Před rokem
Barcode LIVE with FC (aka Freakyclown)
War Stories and Other Lies from Penetration Testers
zhlédnutí 126Před rokem
War Stories and Other Lies from Penetration Testers
SecureWorld 2023 Recap with SEVN-X and Friends
zhlédnutí 116Před rokem
SecureWorld 2023 Recap with SEVN-X and Friends
ChatGPT for Evil? The Surprising Truth with NBC10
zhlédnutí 78Před rokem
ChatGPT for Evil? The Surprising Truth with NBC10
3MT: 5 Tools Attackers Hate in Corporate Environments
zhlédnutí 129Před rokem
3MT: 5 Tools Attackers Hate in Corporate Environments
A Special SEVN-XMas
zhlédnutí 63Před rokem
A Special SEVN-XMas
3MT: The Cost of Physical Security Testing
zhlédnutí 219Před rokem
3MT: The Cost of Physical Security Testing

Komentáře

  • @tennesseetuned
    @tennesseetuned Před 15 dny

    Need an update.

  • @jacdavis9
    @jacdavis9 Před 21 dnem

    Excellent conversation - indeed, the art of deception..."how deep does your truth chain need to be with another human, before you can deceive them?" - this was fascinating.

  • @ParallaxVisuals
    @ParallaxVisuals Před 22 dny

    hello! this might be a long shot but here it is. I have s Seagate backup plus 4tb external hard drive APFS encrypted. I've set a password on it years ago, the password got saved in my local keychain so i never had to type it. When I say I've set a password i mean a looong one (was watching a lot of Snowden documentaries at the time) fast forward 4 years, i had to format my macbook due to an issue. I didn't know at the time that there is a local keychain, i thought it's all on iCloud. long story short, lost the password to the external hdd.I have A LOT of family photos/videos in there as it was my main backup drive.... What are the cances I can recover the password?

    • @sevnxsecurity
      @sevnxsecurity Před 20 dny

      Without a backup of the keychain... minimal unfortunately. Do you have any time machine backups of the OS prior to formatting?

  • @LouCosmeRC-ov2ol
    @LouCosmeRC-ov2ol Před měsícem

    Why is there music in the background. Any way to turn it off? I have my own radio.

    • @sevnxsecurity
      @sevnxsecurity Před měsícem

      LOL we've had this comment a lot on this video. Chalk it up to a young editor that learned proper mixing...after...we published this video. Thanks for the feedback though!

  • @erkind9687
    @erkind9687 Před měsícem

    Recording

  • @jacdavis9
    @jacdavis9 Před měsícem

    Great interview.

  • @svalenti94
    @svalenti94 Před 2 měsíci

    the happy dance at the end got me 😂

  • @Servietsky_
    @Servietsky_ Před 3 měsíci

    Thanks bot

  • @IlCapodeiCapiTheBoss
    @IlCapodeiCapiTheBoss Před 3 měsíci

    this doesn't seems to work with FV2 /encrypted disk, cause the output is pretty much blank? any solution please? cause cannot unencrypted without mounting/ diskarbritation and needed a thunderbolt to work @sevnxsecurity

    • @sevnxsecurity
      @sevnxsecurity Před 3 měsíci

      Unfortunately, this tutorial does not apply to encrypted disks. You pretty much need the decryption key, and write-blocked hardware to image the drive the usual way.

  • @jacdavis9
    @jacdavis9 Před 3 měsíci

    Scary story!!!

  • @jacdavis9
    @jacdavis9 Před 3 měsíci

    Two humble guys - another interesting interview!

  • @TheInternationalDJCasper
    @TheInternationalDJCasper Před 3 měsíci

    Love to see it bro!

  • @robyounce644
    @robyounce644 Před 3 měsíci

    Nice interview Zac! When you going to bring some blue teamers in? I volunteer I have a real war story

  • @jacdavis9
    @jacdavis9 Před 4 měsíci

    Fabulous interview - very entertaining gentlemen.

  • @brettdewall8606
    @brettdewall8606 Před 4 měsíci

    Oh snap! Got that shout out! Great episode!

  • @jacdavis9
    @jacdavis9 Před 4 měsíci

    Loved this episode - great stories and vibe with you two. Your mom sounds like a fan worthy of some free cyber coffee - just sayin....

    • @jacdavis9
      @jacdavis9 Před 4 měsíci

      Really the least you could do for the steadfast support she seems to offer.

    • @sevnxsecurity
      @sevnxsecurity Před 4 měsíci

      Please check your mailbox in 3-4 business days... just sayin....

  • @erkind9687
    @erkind9687 Před 5 měsíci

    This Eric should consider a career in comedy!

  • @jacdavis9
    @jacdavis9 Před 5 měsíci

    Great story, hehehe.

  • @beeurs
    @beeurs Před 5 měsíci

    The blooper at the end tho 😂😂😂

  • @erkind9687
    @erkind9687 Před 5 měsíci

    Awesome job Zac & Mike!

    • @beeurs
      @beeurs Před 5 měsíci

      They calling your name to do the interview!! =D abt time!!! haha

  • @jacdavis9
    @jacdavis9 Před 5 měsíci

    Lost me here and there, yet another enjoyable episode!

  • @robyounce644
    @robyounce644 Před 5 měsíci

    Another of my favorites!!! Great interview Zac….

  • @jacdavis9
    @jacdavis9 Před 5 měsíci

    Great interview!

  • @beeurs
    @beeurs Před 5 měsíci

    You guys match! 🤣 who planned the outfit 😆

  • @michaelmckeown4040
    @michaelmckeown4040 Před 5 měsíci

    Stupid is as stupid does…

  • @michaelmckeown4040
    @michaelmckeown4040 Před 5 měsíci

    These are awesome!

  • @robyounce644
    @robyounce644 Před 6 měsíci

    Dave Catling is one of the best!! Miss you my friend…

  • @jacdavis9
    @jacdavis9 Před 6 měsíci

    Great interview!

  • @robyounce644
    @robyounce644 Před 6 měsíci

    Tough story to top!!!

  • @robyounce644
    @robyounce644 Před 6 měsíci

    Good Series Zac keep it going!

  • @erkind9687
    @erkind9687 Před 7 měsíci

    I get to listen to these guys AND earn CPEs???! Now that’s a win-win

  • @michaelmckeown4040
    @michaelmckeown4040 Před 7 měsíci

    Love it!

  • @awsthecheerfulkid7211
    @awsthecheerfulkid7211 Před 7 měsíci

    My name is Aws

  • @wh00tie41
    @wh00tie41 Před 7 měsíci

    I can haz?

  • @user-vl7fv4wp8e
    @user-vl7fv4wp8e Před 10 měsíci

    great sharing, thanks! i have a question, if diskutil is not available while disable disk arbitration, how can we determine which disk is our target disk(synthesized) after connect?

  • @TheCyberDistortionPodcast

    Great job, Chris and FC!!! Very cool event and a great talk! Kudos for pulling it off live and in the flesh guys!

  • @anywhereroam9698
    @anywhereroam9698 Před rokem

    Great tip

  • @dans2792
    @dans2792 Před rokem

    Could I Program One Of These Suckers To Give Me A Raise When My Boss Plugs It Into His Machine? JOKING - Great Breakdown! Have A Good One Folks.

  • @mischievousfish
    @mischievousfish Před rokem

    Great now we need a rubber duck thats actually a thumb drive

    • @sevnxsecurity
      @sevnxsecurity Před rokem

      Amazon to the rescue.... www.amazon.com/EASTBULL-Novelty-Flash-Memory-Cartoon/dp/B07R4RJWGV/ref=sr_1_3?crid=EXRNNU0AKD04&keywords=rubber+duck+usb&qid=1691168503&sprefix=rubber+duck+usb%2Caps%2C81&sr=8-3

  • @NotAProblem
    @NotAProblem Před rokem

    How does this work? I get how it established a connection to the server without showing it using a .bat file once it's in, but how does it know to launch the file when inserted? I work on IT, and this could make software installs really easy at work.

    • @sevnxsecurity
      @sevnxsecurity Před rokem

      It is recognized by the OS as a human interface device (HID) and like any HID, it has a controller, that controller, in usual cases, will wait for "human" interaction (interfaces) before sending keystrokes along, but in a Rubber Ducky's case, it consults the ducky script on the device and uses that as the "human input" automatically.

  • @dualbasilisk
    @dualbasilisk Před rokem

    Could you program one of these to have your password on it so you don't have to manually type your password anymore?

    • @sevnxsecurity
      @sevnxsecurity Před rokem

      LOL you definitely ...could.... but it would be stored on the device in plaintext so if you ever lost it / left it... it's gameover.

  • @rshadow5683
    @rshadow5683 Před rokem

    Cool!!!

  • @mrj4264
    @mrj4264 Před rokem

    😮

  • @zefftrus9825
    @zefftrus9825 Před rokem

    Can you make a videos of you using those tools in real-time so people can get a better feel for them😊

    • @sevnxsecurity
      @sevnxsecurity Před rokem

      We actually have a few coming out soon, stay tuned. Thanks for the feedback!

  • @cvport8155
    @cvport8155 Před rokem

    Please make more vd for advanced techniques red team and pivoting and make server Discord

    • @sevnxsecurity
      @sevnxsecurity Před rokem

      Our red team is working on a few new videos. I like the Discord idea, I'll pass the suggestion along to our operators. Thanks for the feedback, Cheers!

  • @armandorios4032
    @armandorios4032 Před rokem

    ✋Would it clon a Schlage Smart key fob?

    • @sevnxsecurity
      @sevnxsecurity Před rokem

      I don’t believe so. Do you know what frequency the key is on?

    • @armandorios4032
      @armandorios4032 Před rokem

      @@sevnxsecurity I don’t know if this would tell you anything, I’m not an expert. This is what’s in the key fob fro Schlage S26A13258848005661 9651 My intention is to have a copy and use it instead of the original, because if the original breaks or damaged or if I loose it; I have to pay $250.00 ridiculous dollars for it.

  • @TrxpsOfficial
    @TrxpsOfficial Před rokem

    We are a small company, in a shared office space. Do you think that we should pursue a physical security engagement or wait til we grow into our own space?

    • @sevnxsecurity
      @sevnxsecurity Před rokem

      First, I'd check with the property manager to see if 1) they do any testing of their own and 2) if you have permission to conduct testing within their space. If you can and they don't, then it's likely a worthwhile exercise to know your attack surface and vulnerabilities.

    • @TrxpsOfficial
      @TrxpsOfficial Před rokem

      @@sevnxsecurity Thank you, I will check with the property manager and go from there. Great information in this video!

  • @iancoffey2961
    @iancoffey2961 Před rokem

    🔥🔥🔥

  • @markotb
    @markotb Před rokem

    Below comments FYI. I want these pen testers to keep it real and honest. Most of the methods/tools in this, and most physical pen testing videos, are not applicable to modern scenarios, modern security has moved on from these old school entry methods. Saving ya all money and keeping it real. ALL these kind of videos I see are just rehashing old methods from others videos. It is misleading, I dont know if this is an industry thing bat every technology has or is moving on from these methods and I doubt modern pen testers are carring most of this stuff, if they are they are rarely if ever using them. Pick set - I love the creeper case, but Id suggest picking off the velcro and tuck the flap, its quieter that way. Warded picks - Nice to have bet almost never encounter warded locks in any high value locations. Film - Ive never encountered an office door handle that will open up. Shove-it tool, hall pass - Most all modern buildings will not have the old locks that are exploitable with this tool. Lockpicks - Getting in, they are mildly useful, most modern buildings are RFID access. Might be useful to get into desks and server cabinets. That lockpick kit is crap btw. Shims - Fun but again trying to exploit obsolete security methods. Gaffa tape - ok, good for many purposes. Padlock shims - ok, maybe if you are pen testing a locked bike chain. Soda cans are crap, too soft. Tubular lock pick - Ok, but require a lot of practice and are tricky. Unless you are opening vending machines. Thumb turner - again, almost obsolete, shop fronts yes, but thats looking more like thievery not pen testing Traveller hook - too old and obsolete, like shove-it and hall pass. Plug spinner - you are not picking difficult locks, and certainly not as a pen tester, if you need to spin a lock, just pick it again. The future, and current is digital. RFID cloning/hacking, OSINT and social engineering are the current methods, I think videos like this are misleading and do not reflect the reality of modern pen testing.

    • @mattbarnett8265
      @mattbarnett8265 Před rokem

      Without any exaggeration, I have used every single one of those techniques you mentioned (minus the padlock shims and plug spinner in the last 6 months) on everything from banks, to corporate buildings, schools, and entertainment venues. Full disclosure: the thumb turner got used to tigger an RTE button so not the exact purpose but it's staying in my kit. We may like to imagine most companies on to these techniques by now, but I assure you, it's just a dream. The world is still very much broken.

    • @markotb
      @markotb Před rokem

      @@mattbarnett8265 Thanks for the reply. I wasnt putting shade on you, I love all of these kind of videos. Let me make it clear that I dont work in the security field, I am an enthusiast and groupie, my field is Engineering Consultancy, mainly civil and structural. If I was 30 years younger Id look to physical assessment as a career, it sounds exciting and it is important. Where I live and work, Canberra, Australia, the CBD has gone through massive 'renewal' with a lot of the old buildings being knocked down and rebuilt. Who ever is doing the security assessment and recommendations is doing it right. The few buildings I have worked in over the last 3 years (hopefully Im not doxxing myself are the 2CA building, which has the Australian Protective Services as a tenant so security and monitoring is TIGHT, and the CQ building which is one of the newest 6 star office spaces in Canberra, check them out on street view and let me know if you see any obvious weaknesses, Id be very interested) are top notch. All of the Pubic Service departments are also moving into these modern buildings in the city. As a physical security enthusiast....and a reformed juvenile burglar, all the high security buildings I see, and I do a mental assessment, are not susceptible to most of the methods of attack. I would be interested in hearing about the type, not location or client, of the businesses or US Gov that you assess. More around things like, when were these buildings built, if they have upgraded their security etc. One other thing Id like to ask, you say you have used most of the methods in the last 6 months. How many physical assessment have you been involved in in those 6 months? My very limited understanding is that Security Assessing companies do maybe 2 to 4 physical penetration tests per year (from what Ive gleaned from Deviant and the Core Group), that most engagements are digital, phishing, wifi and remote access attacks rather than actually physically getting to the server room? Sorry for the looooooong reply, and have a good one.

    • @mattbarnett8265
      @mattbarnett8265 Před rokem

      @@markotb All good on the reply. Reading it, I realized something. All of the techniques we cover (or tools more accurately) have two sides to them (no pun intended). There is the 1) what it was made to do and 2) what it can do. I think in some ways you're right, the tools, as designed, don't always work, but they are the right size, shape, flexibility, etc. to "work" in different ways. It's no different than hacking really. A buffer overflow is a buffer overflow, sometimes it works right out of the box, and sometimes it needs modification. Being good at this field requires a high degree of creativity and o-o-t-box thinking. Cheers!

  • @patrrryk
    @patrrryk Před rokem

    great thank you