woetroe
@woetroe2
Donโt go out of scope | crto
ID: 1248677116109094913
10-04-2020 18:20:14
446 Tweet
34 Followers
1,1K Following
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-globโฆ
๐ด ๐ก๐ฒ๐ ๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต: ๐๐๐ป๐๐ถ๐ป๐ด ๐๐ฑ๐ฎ๐ฝ๐๐ถ๐ ๐๐ฎ โ ๐ง๐ฟ๐ฎ๐ฐ๐ถ๐ป๐ด ๐ผ๐๐ฒ๐ฟ ๐ญ๐ฌ๐ฌ ๐๐ถ๐๐ฒ ๐๐ฎ ๐ฆ๐ฒ๐ฟ๐๐ฒ๐ฟ๐ ๐ถ๐ป ๐๐ต๐ฒ ๐ช๐ถ๐น๐ฑ Our team investigated AdaptixC2, an open-source command and control framework thatโs being used in real attacks. Using HuntSQLโข,
Credential Guard was supposed to end credential dumping. It didn't. Valdemar Carรธe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more โคต๏ธ ghst.ly/4qtl2rm
[RELEASE] As promised, Iโm releasing the first blog post in a series. It covers the gaps still present in current stack-based telemetry and how Moonwalking can be extended to evade detection logic and reach โon-execโ memory encryption. Enjoy ;) klezvirus.github.io/posts/Moonwalkโฆ