You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Instantly share code, notes, and snippets.
Brian Johnson
7MinSec
Cybersecurity consultancy based in the Twin Cities (7MinSec.com). We have a sister repo where we occasionally release private tools: github.com/7MinuteSecurity
Below is a blurb on each podcast episode, as well as a link to the corresponding show notes (if available). I apologize but this gist is often a little outdated, so to view the show notes for the latest episodes be sure to also check out 7MinSec.com/blog.
Training videos library easily available from inside the Web interface. Also it looks like they do a Webinar each Patch Tuesday about the latest MS patches.
You said you wouldn't do it
You said you wouldn't click that link
But you totally did
It’s clear you didn’t stop and think
How the promise of a free burrito would be all that it took
To open up our networks to virtual crooks
Tired of recruiters pinging you about positions you aren't interested in *BUT* you'd like to utilize their time/skills/talent to find gigs you DO want? Send this template to them!
Tired of recruiters pinging you about jobs that you don't care about or are under/overqualified for, but you'd like to utilize their time/skills/talent to find gigs you DO want? Customize this template and send it to them!
Hello,
Thanks for your email. The position you sent me is not a fit, however, here are some of the things I’d be looking for if I were to consider another position:
A contract position would be my first choice, but I would go FTE for the right opportunity
How to Build a Cuckoo Sandbox Malware Analysis System
I had a heck of a time getting a Cuckoo sandbox running, and below I hope to help you get one up and running relatively quickly by detailing out the steps and gotchas I stumbled across along the way. I mention this in the references at the end of this gist, but what you see here is heavily influenced by this article from Nviso
Build your Linux Cuckoo VM
Setup a Ubuntu 16.04 64-bit desktop VM (download here) in VMWare with the following properties:
It's a new (and hopefully fun) interview format I want to engage in with members of the information security community on the 7 Minute Security podcast.
Wait wait wait. Who are you? What's this all about?
I'm Brian from 7 Minute Security, LLC and I've been having a blast doing some longer-form interviews with security folks, but I thought it would be fun to do a shorter-form outline where I ask 7 questions (ok, maybe a few more than 7...but I like lucky numbers). Some questions will be serious. Others will not.
Ok I'll bite. What kind of questions would you ask in this 7-minute interview?
This gist focuses on (relatively) free and (relatively) easy things organizations can do to better protect their networks without buying yet another black box with blinking lights.
Got some ideas of your own that should be on this list? Please leave a comment below!
Implementing a stronger AD password policy
Microsoft has a great paper on the topic that gives some nice high level recommendations:
This document complements the Active Directory security topics talked about on the 7 Minute Security podcast miniseries related to Active Directory - specifically #329. The purpose of this doc is to compile resources we can all use to make our Active Directory environments more physically and logically secure. Here we go....
Practice good physical security
I can't tell you how many companies I've run into that have flippin' Fort Knox around their DCs at their primary office (cameras, motion detectors, angry guard dogs, snipers, etc.) but then the branch office has a DC under the receptionist's desk with no security controls. Make sure all domain controllers are physically locked down. I think a good minimum config is to have the DC locked in a room with keycard access - where only a subset of employees have physical access.