SANS Penetration Testing

Pen Test Poster: "White Board" - Bash - Website Cloner

By Matthew Toussain, Geoff Pamerleau According to Verizon's 2016 Data Breach Investigations Report 30 percent of phishing messages get opened by targeted users and 12 percent of those users click on the malicious attachment or link. That means, on average, every 4 phished users should (statistically) yield one click. Developing a highly targeted message … Continue reading Pen Test Poster: "White Board" - Bash - Website Cloner


Pen Test Poster: "White Board" - PowerShell - Find Juicy Stuff in File System

By Matthew Toussain Get-ChildItem may be the most horrific way to express the concept of listing the contents of a directory, but fortunately PowerShell has aliases: gci, dir, and ls! That's right PowerShell has solved the antediluvian ls/dir wars by aliasing both to a magical, if nonsensical, yet grammatically complete, sentence. Because PowerShell cmdlets … Continue reading Pen Test Poster: "White Board" - PowerShell - Find Juicy Stuff in File System


Using Let's Encrypt in Google Compute Engine...

...Or How I Learned to Stop Worrying and Love the Cloud By Daniel Pendolino The Issue While working on last year's SANS Holiday Hack Challenge, we came to the point where the target systems were stable and the mad rush had ebbed. At this point, I started focusing on long-term stability (read: I want Holiday … Continue reading Using Let's Encrypt in Google Compute Engine...


Pen Test Poster: "White Board" - PowerShell - One-Line Web Client

By Matthew Toussain, Grant Curell Introduction Mobility is a critical component of the attack. The ability to be adaptable, while transporting your tactics and tools into a remote environment, is a key differentiator between inexperienced and senior operators. The criticality is an aftereffect of frequency, one of the most common tasks in pentesting involves … Continue reading Pen Test Poster: "White Board" - PowerShell - One-Line Web Client


Pen Test Poster: "White Board" - PowerShell - Get Firewall Rules

By Matthew Toussain, Grant Curell Updated - 3/14/2017 Concealed within his fortress, the Lord of Mordor sees all'' And with PowerShell we can too! Microsoft has truly given system administrators and computer hackers alike a gift: The gift of vision. Take for instance, PowerShell output, format, and export functions. Most scripting languages are … Continue reading Pen Test Poster: "White Board" - PowerShell - Get Firewall Rules