Yossi Sassi (@yossi_sassi) 's Twitter Profile
Yossi Sassi

@yossi_sassi

H@כk3r | 1nTh35h3ll; The Hacktive Directory guy; Pow3r5h3ll dude; Look | Think | Do; Co-founder #OrphanedLand, #OrientalRockOrchestra, #10Root

ID: 18720787

linkhttps://yossisassi.com calendar_today07-01-2009 13:27:13

17,17K Tweet

9,9K Followers

5,5K Following

NCV (@nickvourd) 's Twitter Profile Photo

Excited to share Supernova v3.5 (Star Dust)! What’s new: - Replaced random bytes with NOP bytes for IPv4, IPv6, MAC, and UUID obfuscations - Updated Golang dependencies - Optimized obfuscation code - Fixed the C template for obfuscation #maldev #redteam github.com/nickvourd/Supe…

Yossi Sassi (@yossi_sassi) 's Twitter Profile Photo

Sharing the stage in few weeks at #Warsaw with some of the best PROs in MS Security such as Paula Januszkiewicz - can't wait to share in-depth knowledge with everyone at MS Tech Summit ! NOTE: Special code MSTS25SP20 with 20% discount until May 30th: mstechsummit.pl/en/

Sharing the stage in few weeks at #Warsaw with some of the best PROs in MS Security such as <a href="/PaulaCqure/">Paula Januszkiewicz</a> - can't wait to share in-depth knowledge with everyone at <a href="/MSTechSummit/">MS Tech Summit</a> ! 
NOTE: Special code MSTS25SP20 with 20% discount until May 30th: mstechsummit.pl/en/
🕳 (@sekurlsa_pw) 's Twitter Profile Photo

Great post with 3 mitigations: 1️⃣ Add-BadSuccessorOUDenyACEs.ps1 github.com/JimSycurity/dM… This script will set 3 deny ACEs on OUs to prevent DMSA abuse. 2️⃣ Disable Implicit Owner Rights support.microsoft.com/en-us/topic/kb… 3️⃣ Don’t have a KDS Root Key learn.microsoft.com/en-us/powershe… Check for KDS

Yossi Sassi (@yossi_sassi) 's Twitter Profile Photo

Had such great experience exchanging insights on AI Security and Code Trust at Craft Conference ! köszönöm to the event team for the hospitality and great community effort you've been driving!

Yossi Sassi (@yossi_sassi) 's Twitter Profile Photo

So - got tired of assessing AD and customer adds me to DA, hopefully removes it at some point. so I created ADGroupMemberTimeBased (aka 'Mini-PAM')-PS module (5 cmdlets) for managing temporary group members using AD TTL optional feature. Inc. pre-reqs test github.com/YossiSassi/ADG…

Yossi Sassi (@yossi_sassi) 's Twitter Profile Photo

Just uploaded this simple PowerShell script to detect common hypervisor in the Domain - github.com/YossiSassi/Get… Thanks for the inspiration!

Yossi Sassi (@yossi_sassi) 's Twitter Profile Photo

I would also recommend looking at: Set-PSReadLineOption -HistorySaveStyle SaveNothing It means someone deliberately didn't want commands to be logged, without deleting txt file itself (it doesn't log the current session until closed). this of course doesn't effect psTranscripts

Yossi Sassi (@yossi_sassi) 's Twitter Profile Photo

It goes way deeper than that, e.g. how do you map 'privileged accounts'? using AdminCount=1? Group membership (recursive, hopefully)? PAC enumeration (actual cumulative token)? Control paths / attack paths through permissions ? 1 level? 2 - 3? Just take the red pill.. 😉

spencer (@techspence) 's Twitter Profile Photo

Hard truths about Active Directory... - It's going to be around for much much longer - Tiering isn't optional - The longer you avoid "cleaning up" the bigger your attack surface grows - Domain Controllers are not “just another server” - Running tasks and services as Domain Admin

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

People on here act like someone decides not to patch. Like there’s a guy who knows the service is vulnerable, knows it runs in prod, and just shrugs. That’s maybe 1% of the cases. The rest is messier: - No idea the service exists (no inventory) - No idea it’s vulnerable (no vuln

Yossi Sassi (@yossi_sassi) 's Twitter Profile Photo

Tired of misunderstanding privileged groups in your domain, w/mapping of direct & nested members? Get-AdminSDHolder enumerates AdminSDHolder-protected groups and members, shows recursive membership, direct vs. nested, source group, CSV/PNG and more. github.com/YossiSassi/Get…

Tired of misunderstanding privileged groups in your domain, w/mapping of direct &amp; nested members?
Get-AdminSDHolder enumerates AdminSDHolder-protected groups and members, shows recursive membership, direct vs. nested, source group, CSV/PNG and more.
github.com/YossiSassi/Get…
Yossi Sassi (@yossi_sassi) 's Twitter Profile Photo

Cloud 'GOD MODE' / master key flaw 🔑 that grants illegitimate access to *all* Entra/Az/365 tenants!! Well done Dirk-jan 👏 Remember that cloud has all the OnPrem cyber security headache + very poor MTTx - time to detect, respond, prevent etc is VERY short to non-existent.

Yossi Sassi (@yossi_sassi) 's Twitter Profile Photo

Happy to take part at The Hack Summit this year, this time at the online edition - Oct' 13th 9am CET - be sure to catch my latest updates & free tools to discover persistence in a wide-set of forensics tools for AD. inc. promo code: thehacksummit.com/en/ #HacktiveDirectory #DFIR

Happy to take part at <a href="/TheHackSummit/">The Hack Summit</a> this year, this time at the online edition - Oct' 13th 9am CET - be sure to catch my latest updates &amp; free tools to discover persistence in a wide-set of forensics tools for AD. inc. promo code: thehacksummit.com/en/
#HacktiveDirectory #DFIR