Tobi (@tobi4530482) 's Twitter Profile
Tobi

@tobi4530482

OSCP | CRTO | Pen Tester | AWS Cloud Security Dude

ID: 1613821766710722560

linkhttps://t-s3c.de/blog/ calendar_today13-01-2023 08:54:49

31 Tweet

31 Takipçi

169 Takip Edilen

Mor Rubin (@rubin_mor) 's Twitter Profile Photo

From Pass The Prt to Pass The Certificate for Azure AD machines In this post, I will explain what NegoEx and PKU2U are, what P2P certificate is and how to use those to gain access to Azure AD machines medium.com/@mor2464/azure…

fortunato lodari (@flodari) 's Twitter Profile Photo

AD Privesc Kerberos TGS and SeTcbPrivilege If you have SeTcbPrivilege, you can ask TGS on behalf of ALL logged users on your machine WITHOUT Password ...and if there is a Domain Admin logged? Zero detection by EDR/AV github.com/foxlox/GIUDA.g… #redteam #SeTcbPrivilege

AD Privesc
Kerberos TGS and SeTcbPrivilege

If you have SeTcbPrivilege, you can ask TGS on behalf of ALL logged users on your machine WITHOUT Password

...and if there is a Domain Admin logged?

Zero detection by EDR/AV

github.com/foxlox/GIUDA.g…

#redteam #SeTcbPrivilege
CloudBreach (@cloud_breach) 's Twitter Profile Photo

Just launched the #CloudBreach Blog 🚀: Dive into the essentials of AWS Enumeration! Uncover the tactics for unauthenticated #AWSEnumeration, leveraging OSINT, Google & GitHub Dorks, and more. A must-read for #CloudSecurity readers. cloudbreach.io/blog/intro-to-…

rootsecdev (@rootsecdev) 's Twitter Profile Photo

Something I still reference a lot. To this day. The Attackers Guide to Azure AD Conditional Access – Daniel Chronlund Cloud Security Blog danielchronlund.com/2022/01/07/the…

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

FullBypass: bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) securityonline.info/fullbypass-byp…

Tom Wechsler - Microsoft Azure & CDM MVP (@tomvideo2brain) 's Twitter Profile Photo

Active Directory Advanced Threat Hunting - Using PowerShell to track down the source of account lockouts and bad passwords! Microsoft Microsoft Security Windows #Microsoft #ActiveDirectory #mvpbuzz #coolstuff #Hunting #ADDS #Windows #WindowsServer 👇👇👇👇 github.com/tomwechsler/Ac…

Active Directory Advanced Threat Hunting - Using PowerShell to track down the source of account lockouts and bad passwords!
<a href="/Microsoft/">Microsoft</a> <a href="/msftsecurity/">Microsoft Security</a> <a href="/Windows/">Windows</a> #Microsoft #ActiveDirectory #mvpbuzz #coolstuff #Hunting #ADDS #Windows #WindowsServer
👇👇👇👇
github.com/tomwechsler/Ac…
rootsecdev (@rootsecdev) 's Twitter Profile Photo

Another log on the fire why I really can’t recommend on premises exchange environments. posts.specterops.io/pwned-by-the-m…

pfiatde (@pfiatde) 's Twitter Profile Photo

Did you know, that a simple msi repair with a low privileged user can disable Cortex XDR if the tamper protection is turned off? 👇

Keanu Nys (@redbyte1337) 's Twitter Profile Photo

🚀I'm finally releasing GraphSpy to the public!🕵️ A powerful offensive security tool focused on making initial access and post-compromise enumeration in Microsoft Entra and M365 much more convenient during penetration tests and red team assessments! github.com/RedByte1337/Gr…

Cyber Ghost (@cyberghost13337) 's Twitter Profile Photo

A new clickfix technique, FileFix, developed by mr.d0x, is being used in the wild—poorly. Website tersmoles[.]com delivers a "Legitimate Chrome Installer" using FileFix. The attacker didn’t even change the path and filename—just copy-pasted code directly from demo website

A new clickfix technique, FileFix, developed by <a href="/mrd0x/">mr.d0x</a>, is being used in the wild—poorly.

Website tersmoles[.]com delivers a "Legitimate Chrome Installer" using FileFix.

The attacker didn’t even change the path and filename—just copy-pasted code directly from demo website