A Special SEVN-XMas
2:17
Жыл бұрын
Ask A Pro: What is the Dark Web?
1:12
Ask A Pro: What is SMB Signing?
0:55
Ask A Pro: What is the CIA Triad?
1:01
From the Field: Under the Door Tool
0:17
SecureWorld 2022 Promo #short
1:22
2 жыл бұрын
Пікірлер
@svalenti94
@svalenti94 5 күн бұрын
the happy dance at the end got me 😂
@Servietsky_
@Servietsky_ 22 күн бұрын
Thanks bot
@IlCapodeiCapiTheBoss
@IlCapodeiCapiTheBoss 29 күн бұрын
this doesn't seems to work with FV2 /encrypted disk, cause the output is pretty much blank? any solution please? cause cannot unencrypted without mounting/ diskarbritation and needed a thunderbolt to work @sevnxsecurity
@sevnxsecurity
@sevnxsecurity 28 күн бұрын
Unfortunately, this tutorial does not apply to encrypted disks. You pretty much need the decryption key, and write-blocked hardware to image the drive the usual way.
@jacdavis9
@jacdavis9 Ай бұрын
Scary story!!!
@jacdavis9
@jacdavis9 Ай бұрын
Two humble guys - another interesting interview!
@TheInternationalDJCasper
@TheInternationalDJCasper Ай бұрын
Love to see it bro!
@robyounce644
@robyounce644 Ай бұрын
Nice interview Zac! When you going to bring some blue teamers in? I volunteer I have a real war story
@sevnxsecurity
@sevnxsecurity Ай бұрын
Check your DMs ;)
@jacdavis9
@jacdavis9 Ай бұрын
Fabulous interview - very entertaining gentlemen.
@brettdewall8606
@brettdewall8606 2 ай бұрын
Oh snap! Got that shout out! Great episode!
@jacdavis9
@jacdavis9 2 ай бұрын
Loved this episode - great stories and vibe with you two. Your mom sounds like a fan worthy of some free cyber coffee - just sayin....
@jacdavis9
@jacdavis9 2 ай бұрын
Really the least you could do for the steadfast support she seems to offer.
@sevnxsecurity
@sevnxsecurity 2 ай бұрын
Please check your mailbox in 3-4 business days... just sayin....
@erkind9687
@erkind9687 2 ай бұрын
This Eric should consider a career in comedy!
@jacdavis9
@jacdavis9 2 ай бұрын
Great story, hehehe.
@beeurs
@beeurs 3 ай бұрын
The blooper at the end tho 😂😂😂
@erkind9687
@erkind9687 3 ай бұрын
Awesome job Zac & Mike!
@beeurs
@beeurs 3 ай бұрын
They calling your name to do the interview!! =D abt time!!! haha
@jacdavis9
@jacdavis9 3 ай бұрын
Lost me here and there, yet another enjoyable episode!
@robyounce644
@robyounce644 3 ай бұрын
Another of my favorites!!! Great interview Zac….
@jacdavis9
@jacdavis9 3 ай бұрын
Great interview!
@beeurs
@beeurs 3 ай бұрын
You guys match! 🤣 who planned the outfit 😆
@michaelmckeown4040
@michaelmckeown4040 3 ай бұрын
Stupid is as stupid does…
@michaelmckeown4040
@michaelmckeown4040 3 ай бұрын
These are awesome!
@robyounce644
@robyounce644 3 ай бұрын
Dave Catling is one of the best!! Miss you my friend…
@jacdavis9
@jacdavis9 3 ай бұрын
Great interview!
@robyounce644
@robyounce644 4 ай бұрын
Tough story to top!!!
@robyounce644
@robyounce644 4 ай бұрын
Good Series Zac keep it going!
@erkind9687
@erkind9687 4 ай бұрын
I get to listen to these guys AND earn CPEs???! Now that’s a win-win
@michaelmckeown4040
@michaelmckeown4040 4 ай бұрын
Love it!
@awsthecheerfulkid7211
@awsthecheerfulkid7211 4 ай бұрын
My name is Aws
@wh00tie41
@wh00tie41 5 ай бұрын
I can haz?
@user-vl7fv4wp8e
@user-vl7fv4wp8e 7 ай бұрын
great sharing, thanks! i have a question, if diskutil is not available while disable disk arbitration, how can we determine which disk is our target disk(synthesized) after connect?
@TheCyberDistortionPodcast
@TheCyberDistortionPodcast 10 ай бұрын
Great job, Chris and FC!!! Very cool event and a great talk! Kudos for pulling it off live and in the flesh guys!
@anywhereroam9698
@anywhereroam9698 10 ай бұрын
Great tip
@dans2792
@dans2792 10 ай бұрын
Could I Program One Of These Suckers To Give Me A Raise When My Boss Plugs It Into His Machine? JOKING - Great Breakdown! Have A Good One Folks.
@mischievousfish
@mischievousfish 10 ай бұрын
Great now we need a rubber duck thats actually a thumb drive
@sevnxsecurity
@sevnxsecurity 10 ай бұрын
Amazon to the rescue.... www.amazon.com/EASTBULL-Novelty-Flash-Memory-Cartoon/dp/B07R4RJWGV/ref=sr_1_3?crid=EXRNNU0AKD04&keywords=rubber+duck+usb&qid=1691168503&sprefix=rubber+duck+usb%2Caps%2C81&sr=8-3
@NotAProblem
@NotAProblem 10 ай бұрын
How does this work? I get how it established a connection to the server without showing it using a .bat file once it's in, but how does it know to launch the file when inserted? I work on IT, and this could make software installs really easy at work.
@sevnxsecurity
@sevnxsecurity 10 ай бұрын
It is recognized by the OS as a human interface device (HID) and like any HID, it has a controller, that controller, in usual cases, will wait for "human" interaction (interfaces) before sending keystrokes along, but in a Rubber Ducky's case, it consults the ducky script on the device and uses that as the "human input" automatically.
@dualbasilisk
@dualbasilisk 10 ай бұрын
Could you program one of these to have your password on it so you don't have to manually type your password anymore?
@sevnxsecurity
@sevnxsecurity 10 ай бұрын
LOL you definitely ...could.... but it would be stored on the device in plaintext so if you ever lost it / left it... it's gameover.
@rshadow5683
@rshadow5683 10 ай бұрын
Cool!!!
@mrj4264
@mrj4264 Жыл бұрын
😮
@zefftrus9825
@zefftrus9825 Жыл бұрын
Can you make a videos of you using those tools in real-time so people can get a better feel for them😊
@sevnxsecurity
@sevnxsecurity Жыл бұрын
We actually have a few coming out soon, stay tuned. Thanks for the feedback!
@cvport8155
@cvport8155 Жыл бұрын
Please make more vd for advanced techniques red team and pivoting and make server Discord
@sevnxsecurity
@sevnxsecurity Жыл бұрын
Our red team is working on a few new videos. I like the Discord idea, I'll pass the suggestion along to our operators. Thanks for the feedback, Cheers!
@armandorios4032
@armandorios4032 Жыл бұрын
✋Would it clon a Schlage Smart key fob?
@sevnxsecurity
@sevnxsecurity Жыл бұрын
I don’t believe so. Do you know what frequency the key is on?
@armandorios4032
@armandorios4032 Жыл бұрын
@@sevnxsecurity I don’t know if this would tell you anything, I’m not an expert. This is what’s in the key fob fro Schlage S26A13258848005661 9651 My intention is to have a copy and use it instead of the original, because if the original breaks or damaged or if I loose it; I have to pay $250.00 ridiculous dollars for it.
@TrxpsOfficial
@TrxpsOfficial Жыл бұрын
We are a small company, in a shared office space. Do you think that we should pursue a physical security engagement or wait til we grow into our own space?
@sevnxsecurity
@sevnxsecurity Жыл бұрын
First, I'd check with the property manager to see if 1) they do any testing of their own and 2) if you have permission to conduct testing within their space. If you can and they don't, then it's likely a worthwhile exercise to know your attack surface and vulnerabilities.
@TrxpsOfficial
@TrxpsOfficial Жыл бұрын
@@sevnxsecurity Thank you, I will check with the property manager and go from there. Great information in this video!
@iancoffey2961
@iancoffey2961 Жыл бұрын
🔥🔥🔥
@markotb
@markotb Жыл бұрын
Below comments FYI. I want these pen testers to keep it real and honest. Most of the methods/tools in this, and most physical pen testing videos, are not applicable to modern scenarios, modern security has moved on from these old school entry methods. Saving ya all money and keeping it real. ALL these kind of videos I see are just rehashing old methods from others videos. It is misleading, I dont know if this is an industry thing bat every technology has or is moving on from these methods and I doubt modern pen testers are carring most of this stuff, if they are they are rarely if ever using them. Pick set - I love the creeper case, but Id suggest picking off the velcro and tuck the flap, its quieter that way. Warded picks - Nice to have bet almost never encounter warded locks in any high value locations. Film - Ive never encountered an office door handle that will open up. Shove-it tool, hall pass - Most all modern buildings will not have the old locks that are exploitable with this tool. Lockpicks - Getting in, they are mildly useful, most modern buildings are RFID access. Might be useful to get into desks and server cabinets. That lockpick kit is crap btw. Shims - Fun but again trying to exploit obsolete security methods. Gaffa tape - ok, good for many purposes. Padlock shims - ok, maybe if you are pen testing a locked bike chain. Soda cans are crap, too soft. Tubular lock pick - Ok, but require a lot of practice and are tricky. Unless you are opening vending machines. Thumb turner - again, almost obsolete, shop fronts yes, but thats looking more like thievery not pen testing Traveller hook - too old and obsolete, like shove-it and hall pass. Plug spinner - you are not picking difficult locks, and certainly not as a pen tester, if you need to spin a lock, just pick it again. The future, and current is digital. RFID cloning/hacking, OSINT and social engineering are the current methods, I think videos like this are misleading and do not reflect the reality of modern pen testing.
@mattbarnett8265
@mattbarnett8265 Жыл бұрын
Without any exaggeration, I have used every single one of those techniques you mentioned (minus the padlock shims and plug spinner in the last 6 months) on everything from banks, to corporate buildings, schools, and entertainment venues. Full disclosure: the thumb turner got used to tigger an RTE button so not the exact purpose but it's staying in my kit. We may like to imagine most companies on to these techniques by now, but I assure you, it's just a dream. The world is still very much broken.
@markotb
@markotb Жыл бұрын
@@mattbarnett8265 Thanks for the reply. I wasnt putting shade on you, I love all of these kind of videos. Let me make it clear that I dont work in the security field, I am an enthusiast and groupie, my field is Engineering Consultancy, mainly civil and structural. If I was 30 years younger Id look to physical assessment as a career, it sounds exciting and it is important. Where I live and work, Canberra, Australia, the CBD has gone through massive 'renewal' with a lot of the old buildings being knocked down and rebuilt. Who ever is doing the security assessment and recommendations is doing it right. The few buildings I have worked in over the last 3 years (hopefully Im not doxxing myself are the 2CA building, which has the Australian Protective Services as a tenant so security and monitoring is TIGHT, and the CQ building which is one of the newest 6 star office spaces in Canberra, check them out on street view and let me know if you see any obvious weaknesses, Id be very interested) are top notch. All of the Pubic Service departments are also moving into these modern buildings in the city. As a physical security enthusiast....and a reformed juvenile burglar, all the high security buildings I see, and I do a mental assessment, are not susceptible to most of the methods of attack. I would be interested in hearing about the type, not location or client, of the businesses or US Gov that you assess. More around things like, when were these buildings built, if they have upgraded their security etc. One other thing Id like to ask, you say you have used most of the methods in the last 6 months. How many physical assessment have you been involved in in those 6 months? My very limited understanding is that Security Assessing companies do maybe 2 to 4 physical penetration tests per year (from what Ive gleaned from Deviant and the Core Group), that most engagements are digital, phishing, wifi and remote access attacks rather than actually physically getting to the server room? Sorry for the looooooong reply, and have a good one.
@mattbarnett8265
@mattbarnett8265 Жыл бұрын
@@markotb All good on the reply. Reading it, I realized something. All of the techniques we cover (or tools more accurately) have two sides to them (no pun intended). There is the 1) what it was made to do and 2) what it can do. I think in some ways you're right, the tools, as designed, don't always work, but they are the right size, shape, flexibility, etc. to "work" in different ways. It's no different than hacking really. A buffer overflow is a buffer overflow, sometimes it works right out of the box, and sometimes it needs modification. Being good at this field requires a high degree of creativity and o-o-t-box thinking. Cheers!
@patrrryk
@patrrryk Жыл бұрын
great thank you
@johnhanley2431
@johnhanley2431 Жыл бұрын
You are a good speaker. However, the music really distracts from following you. For example, when I try to watch on my iPhone with earbuds, the music is too loud and I have to replay sections to hear your words. On my desktop the music is not so loud, but the music is still too distracting. Remove the background music.
@sevnxsecurity
@sevnxsecurity Жыл бұрын
Thanks for the feedback John, I’ll let our editing department know for future videos.
@mrj4264
@mrj4264 Жыл бұрын
So it's not that Cats Love Apples? :(
@zefftrus9825
@zefftrus9825 Жыл бұрын
Whare did you get that film
@sevnxsecurity
@sevnxsecurity Жыл бұрын
www.redteamtools.com/film-canister
@kennethkeller2138
@kennethkeller2138 2 жыл бұрын
Whats the name of that Farmall bag??
@sevnxsecurity
@sevnxsecurity Жыл бұрын
Doesn’t look like they make it anymore… here’s a hip bag that looks like it may work too: www.shopcaseih.com/case-ih-utilitarian-belt-bag
@minorukobayashi3684
@minorukobayashi3684 2 жыл бұрын
This method should not work on M1 Mac. This is because there is no target disk mode.
@sevnxsecurity
@sevnxsecurity Жыл бұрын
It's been replaced with Mac Sharing Mode. It's similar but accessed differently. I haven't imaged an M1/M2 yet but let me know if you'd like us to investigate and do a video on the process for sound imaging principles on Apple Silicon.
@davidstone6970
@davidstone6970 2 жыл бұрын
Why do you crack passwords?
@sevnxsecurity
@sevnxsecurity 2 жыл бұрын
Not sure we understand the question. Are you asking why SEVN-X cracks passwords during its client engagements specifically or why anyone would want to crack a password in the more general sense?