📔 Michael Grafnetter (@mgrafnetter) 's Twitter Profile
📔 Michael Grafnetter

@mgrafnetter

IT Security Researcher and Trainer, Author of the DSInternals PowerShell Module, Microsoft MVP

ID: 3934604253

linkhttps://github.com/MichaelGrafnetter/DSInternals calendar_today12-10-2015 06:20:25

349 Tweet

2,2K Followers

116 Following

James Spencer (@__jcspencer) 's Twitter Profile Photo

ever had the obscure need to lookup the UUID or named pipe corresponding to some specific Windows RPC interface? well, fear no more! here's a list of them all in one place :-) blog.jcspencer.net/rpc-interfaces/

📔 Michael Grafnetter (@mgrafnetter) 's Twitter Profile Photo

Here is a new custom administrative template (ADMX) for editing and auditing Microsoft Defender Attack Surface Reduction (ASR) policies, without being exposed to the rule GUIDs. github.com/MichaelGrafnet…

Here is a new custom administrative template (ADMX) for editing and auditing Microsoft Defender Attack Surface Reduction (ASR) policies, without being exposed to the rule GUIDs.
github.com/MichaelGrafnet…
CQURE Academy (@cqureacademy) 's Twitter Profile Photo

Here’s a recap from the CyberGen Conference with our expert 📔 Michael Grafnetter 👀 Michael was there with a workshop on AD security, a panel discussion on emerging trends & mitigation tactics, and a keynote presentation on how to ruin your security with a printer 📠 #CyberGen2025

Here’s a recap from the CyberGen Conference with our expert <a href="/MGrafnetter/">📔 Michael Grafnetter</a> 👀

Michael was there with a workshop on AD security, a panel discussion on emerging trends &amp; mitigation tactics, and a keynote presentation on how to ruin your security with a printer 📠

#CyberGen2025
📔 Michael Grafnetter (@mgrafnetter) 's Twitter Profile Photo

New blog post covering the end-to-end automation of OAuth 2.0 service/daemon application registration in Microsoft Entra ID using PowerShell Graph SDK. dsinternals.com/en/entra-id-az…

SpecterOps (@specterops) 's Twitter Profile Photo

PDQ SmartDeploy versions prior to 3.0.2046 used static, hardcoded encryption keys for cred storage. Low-privileged users could potentially access admin creds from registry or deployment files. Garrett unpacks his testing in his latest blog post. ghst.ly/4mjyuvw

SpecterOps (@specterops) 's Twitter Profile Photo

The DSInternals PowerShell module just got an upgrade! 🔥 Updates include: ✅ Golden dMSA Attack ✅ Full LAPS support ✅ Trust password & BitLocker recovery key extraction ✅ Read-only domain controller database compatibility Read more from 📔 Michael Grafnetter. ghst.ly/412rZ7F

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…

I am Jakoby (@i_am_jakoby) 's Twitter Profile Photo

If you publish your own powershell gallery modules you might have noticed your custom icon doesnt work anymore, the "IconUri" just doesnt render. They disabled it cause of me lol my bad I found an exploit that allowed me to grab every users email, user-agent, geo-location, ip

If you publish your own powershell gallery modules you might have noticed your custom icon doesnt work anymore, the "IconUri" just doesnt render. They disabled it cause of me lol my bad 

I found an exploit that allowed me to grab every users email, user-agent, geo-location, ip
📔 Michael Grafnetter (@mgrafnetter) 's Twitter Profile Photo

The DSInternals.RpcFilters PowerShell module for Windows RPC filter management is out! Includes support for the new OpNum matching capability of Windows Server 2025. Looking forward to community feedback. github.com/MichaelGrafnet…

The DSInternals.RpcFilters PowerShell module for Windows RPC filter management is out! Includes support for the new OpNum matching capability of Windows Server 2025. Looking forward to community feedback.
github.com/MichaelGrafnet…
📔 Michael Grafnetter (@mgrafnetter) 's Twitter Profile Photo

Windows EventLog Remoting Protocol hardening using RPC filters: Block legacy MS-EVEN, restrict MS-EVEN6 to RPC over TCP/IP, and block the EvtRpcClearLog call (requires Windows Server 2025). And what is YOUR favorite RPC filter? #DSInternals

Windows EventLog Remoting Protocol hardening using RPC filters: Block legacy MS-EVEN, restrict MS-EVEN6 to RPC over TCP/IP, and block the EvtRpcClearLog call (requires Windows Server 2025).
And what is YOUR favorite RPC filter? #DSInternals
📔 Michael Grafnetter (@mgrafnetter) 's Twitter Profile Photo

Fact: Remote service and scheduled task creation bypass firewalls on DCs and Win file servers because of SMB tunnelling. Solution: Create RPC filters that block MS-SCMR and MS-TSCH over named pipes. The latter has 3 UUIDs, so blocking the atsvc pipe is more elegant. #DSInternals

Fact: Remote service and scheduled task creation bypass firewalls on DCs and Win file servers because of SMB tunnelling.
Solution: Create RPC filters that block MS-SCMR and MS-TSCH over named pipes. The latter has 3 UUIDs, so blocking the atsvc pipe is more elegant. #DSInternals
SpecterOps (@specterops) 's Twitter Profile Photo

Securing Domain Controllers without breaking AD is harder than it sounds. 📔 Michael Grafnetter at Hybrid Identity Protection covers: ✅ IaC approach to Windows Firewall policy ✅ RPC filters & outbound traffic controls ✅ Hybrid environment challenges ✅ Network service discovery hipconf.com/agenda/

Securing Domain Controllers without breaking AD is harder than it sounds. <a href="/MGrafnetter/">📔 Michael Grafnetter</a> at <a href="/HIPConf/">Hybrid Identity Protection</a> covers:

✅ IaC approach to Windows Firewall policy
✅ RPC filters &amp; outbound traffic controls
✅ Hybrid environment challenges
✅ Network service discovery

hipconf.com/agenda/
SpecterOps (@specterops) 's Twitter Profile Photo

"It’s easier said than done, blocking outbound traffic. Inbound rules work, but outbound rules don’t cover everything. There are some issues, some gotchas." - 📔 Michael Grafnetter speaking on how to secure Domain Controllers without breaking Active Directory at #HIPConf25.

"It’s easier said than done, blocking outbound traffic. Inbound rules work, but outbound rules don’t cover everything. There are some issues, some gotchas."

- <a href="/MGrafnetter/">📔 Michael Grafnetter</a> speaking on how to secure Domain Controllers without breaking Active Directory at #HIPConf25.
HD Moore (@hdmoore) 's Twitter Profile Photo

SpecterOps released "DumpGuard" along with a detailed article on how they were able to bypass Windows Credential Guard in both privileged and unprivileged contexts. I learned a ton about Isolated LSA and friends: specterops.io/blog/2025/10/2…

SpecterOps released "DumpGuard" along with a detailed article on how they were able to bypass Windows Credential Guard in both privileged and unprivileged contexts. I learned a ton about Isolated LSA and friends: specterops.io/blog/2025/10/2…
HD Moore (@hdmoore) 's Twitter Profile Photo

Just like chocolate and peanut butter, runZero and BloodHound are an amazing combination. Today we are introducing runZeroHound - an open source toolkit for bringing runZero Asset Inventory data into BloodHound attack graphs: runzero.com/blog/introduci…

Just like chocolate and peanut butter, runZero and BloodHound are an amazing combination. Today we are introducing runZeroHound - an open source toolkit for bringing runZero Asset Inventory data into BloodHound attack graphs: runzero.com/blog/introduci…