🎭 To be, rather than to seem!
⚠️ between seriousness, expect sarcasm and humor
That's not true! You can still use the AT after TAP expiration
learn.microsoft.com/en-us/entra/...
That's not true! You can still use the AT after TAP expiration
learn.microsoft.com/en-us/entra/...
I was too excited when I posted this 😂.
Let me know if you know a way to prevent the use of AADGraph.
#azure #redteam #blueteam
To prevent that, you can use CAP filters.
Let me know if you know of any other way to enumerate CAP with low privs account.
To prevent that, you can use CAP filters.
Let me know if you know of any other way to enumerate CAP with low privs account.
To prevent that, you can use CAP filters.
Let me know if you know of any other way to enumerate CAP with low privs account.
A list a known FOCI clients:
github.com/secureworks/...
A list a known FOCI clients:
github.com/secureworks/...
github.com/baswijdenes/...
#azure #M365
github.com/baswijdenes/...
#azure #M365
Attacker's IP and device are logged in #EntraID sign-in logs.
The Authentication protocol is Device Code.
Those details are helpful for detection as well as prevention.
Utilize Authentication Flow and Location based CAP to prevent such attacks.
#azuresecurity
Attacker's IP and device are logged in #EntraID sign-in logs.
The Authentication protocol is Device Code.
Those details are helpful for detection as well as prevention.
Utilize Authentication Flow and Location based CAP to prevent such attacks.
#azuresecurity
#fullofcrap #enterprise
#fullofcrap #enterprise
Another month(s) of azure red team learning. I hope its worth it. www.alteredsecurity.com/azureadvanced
Another month(s) of azure red team learning. I hope its worth it. www.alteredsecurity.com/azureadvanced
I'm starting to believe that the reason he's coming is to play Xbox and not visit us or his cousins.
I'm starting to believe that the reason he's coming is to play Xbox and not visit us or his cousins.
Exploitation of the IFEO causes hijacking of legitimate applications, leading to unauthorized access or malware execution.
pwntales.com/image-file-e...
#redteam #Windows
Exploitation of the IFEO causes hijacking of legitimate applications, leading to unauthorized access or malware execution.
pwntales.com/image-file-e...
#redteam #Windows
Check here as I break down all three types of attacks in an easy to understand way.
pwntales.com/kerberos-del...
#redteam #activedirectory #kerberos
Check here as I break down all three types of attacks in an easy to understand way.
pwntales.com/kerberos-del...
#redteam #activedirectory #kerberos
🚨 Cybersecurity isn’t for everyone.
🚨 Long hours and big pressure.
🚨 You must always keep learning.
🚨 Mistakes can be costly.
🚨It’s not just hacking, it’s meetings and reports too.
✅️ Cybersecurity needs heroes.
✅️ Stop hackers and protect the data.
✅️ Jobs are growing fast, secure your future.
✅️ Great pay, even for beginners.
✅️ Learn cool tech skills every day.
✅️ Make the digital world safer.
🚨 Cybersecurity isn’t for everyone.
🚨 Long hours and big pressure.
🚨 You must always keep learning.
🚨 Mistakes can be costly.
🚨It’s not just hacking, it’s meetings and reports too.
✅️ Cybersecurity needs heroes.
✅️ Stop hackers and protect the data.
✅️ Jobs are growing fast, secure your future.
✅️ Great pay, even for beginners.
✅️ Learn cool tech skills every day.
✅️ Make the digital world safer.
✅️ Cybersecurity needs heroes.
✅️ Stop hackers and protect the data.
✅️ Jobs are growing fast, secure your future.
✅️ Great pay, even for beginners.
✅️ Learn cool tech skills every day.
✅️ Make the digital world safer.