Michel Derville (@mderville) 's Twitter Profile
Michel Derville

@mderville

ID: 271832489

calendar_today25-03-2011 08:19:40

3,3K Tweet

306 Followers

1,1K Following

spencer (@techspence) 's Twitter Profile Photo

But we will keep on seeing this issue during internal pentests until we've been able to educate every sysadmin in the world, which is an obviously unachievable goal. We must also keep encouraging IT admins that there is a better more secure way: - Create and use tiered admin

🇺🇦 @BxlAirMonitor@mastodon.sdf.org (@bxlairmonitor) 's Twitter Profile Photo

5 idées reçues sur les cyclistes: le vrai du faux 2/ Le cycliste n’a rien à faire sur les trottoirs 2025-04-06 08:50:29 rtbf.be/article/5-idee…

5 idées reçues sur les cyclistes: le vrai du faux 2/ Le cycliste n’a rien à faire sur les trottoirs 2025-04-06 08:50:29

rtbf.be/article/5-idee…
CaratPils Pro League (@caratpils) 's Twitter Profile Photo

Plus que les duels entre eux où ils risquent de se neutraliser globalement, je crois que les 3 clubs du haut risquent de perdre le titre sur une connerie face aux 3 nuls. Ce sera malheur à celui qui ne fait pas 18/18 face aux trois nullards de ces PO1 🤔 #andgnk

spencer (@techspence) 's Twitter Profile Photo

How do you meaningfully improve the security of your AD environment? Run these free tools quarterly: - PingCastle - ScriptSentry - Locksmith - ADeleginator If you just ran these tools and fixed everything identified by them, your AD environment will not only be more secure,

Unit 42 (@unit42_intel) 's Twitter Profile Photo

We've observed a growing volume of domains used for deceptive search pages. This type of activity is typically associated with #BrowserHijacking. These pages more closely mimic Chrome's "New Tab" page than we've seen from prior activity. Details at bit.ly/3YYVIx5

We've observed a growing volume of domains used for deceptive search pages. This type of activity is typically associated with #BrowserHijacking. These pages more closely mimic Chrome's "New Tab" page than we've seen from prior activity. Details at bit.ly/3YYVIx5
OptaJohan (@optajohan) 's Twitter Profile Photo

90 - Royale Union Saint-Gilloise are champions of the Jupiler Pro League for the first time since 1934-35, with 90 years the biggest gap between two top-flight titles across the top 10 European leagues. Patience.

90 - Royale Union Saint-Gilloise are champions of the Jupiler Pro League for the first time since 1934-35, with 90 years the biggest gap between two top-flight titles across the top 10 European leagues. Patience.
Ma Pro League (@maproleague) 's Twitter Profile Photo

🏆 l La musique de la Ligue des Champions de retour à Anderlecht ? Les Mauves et l'Union Saint-Gilloise seraient proches d'un accord pour que l'USG joue ses matchs au Lotto Park (Pieter-Jan Calcoen)

🏆 l La musique de la Ligue des Champions de retour à Anderlecht ? 

Les Mauves et l'Union Saint-Gilloise seraient proches d'un accord pour que l'USG joue ses matchs au Lotto Park (<a href="/PJCalcoen/">Pieter-Jan Calcoen</a>)
spencer (@techspence) 's Twitter Profile Photo

App control is not negotiable… I did an internal pentest recently and man, I had such a rough time, because they had implemented app control well. You could argue they are an enigma or you can strap in and put the time in to get it working for you. It’s possible, trust me it

Florent Toniutti (@florenttoniutti) 's Twitter Profile Photo

Souvenir de cette découverte en d2 croate alors que je regardais un défenseur central (qu’il avait terminé). Ah si seulement quelqu’un s’était intéressé à notre travail deux ans plus tôt. Vidéo de présentation de l’été dernier : youtu.be/B6CoL-aYL1o #florucz

spencer (@techspence) 's Twitter Profile Photo

How to find insecure delegations in active directory 1. Download and run ADeleg 2. Click View -> Index view by -> Trustees 3. Look for: Everyone, Authenticated Users, Domain Users Check the permissions on the right side to see if there's any privileged resources listed, such as

How to find insecure delegations in active directory

1. Download and run ADeleg
2. Click View -&gt; Index view by -&gt; Trustees
3. Look for: Everyone, Authenticated Users, Domain Users

Check the permissions on the right side to see if there's any privileged resources listed, such as
Zack Korman (@zackkorman) 's Twitter Profile Photo

Microsoft isn’t disclosing this so: M365 Copilot allowed users to access files without producing an audit log. All you had to do was ask Copilot to not link to the file. You don’t even have to ask; it sometimes just happens. If your org uses Copilot your audit log is likely wrong