Long-awaited parallel (threaded) queries arrive in MSTICPy! 🏃♀️🏃♀️🏃♀️
Split big queries into separately executing chunks or across multiple workspaces and clusters.
Long-awaited parallel (threaded) queries arrive in MSTICPy! 🏃♀️🏃♀️🏃♀️
Split big queries into separately executing chunks or across multiple workspaces and clusters.
🚨Small update for TokenTacticsV2
▫️Two new device platforms
▫️Linux, since it's now supported by Conditional Access
▫️OS/2, because it's not 😁
github.com/f-bader/TokenT…
Official confirmation from Microsoft that there is no supported way to rotate nor change DPAPI backup keys!
Compromised keys? ➡️ Burn the domain and rebuild a new one 💥
I know a lot of excellent people are looking for jobs right now. We have several openings at @redcanary, including my peer, Senior Director of Detection Engineering, and a Threat Hunter on a team I lead. I hope you'll consider applying or sharing. redcanary.com/job-openings/
Small update to roadtx, with thanks to @Flangvik for the idea: you can now do the interactive authentication with a "borrowed" ESTSAUTHPERSISTENT cookie from a browser, to get tokens or have an authenticated browser session.
New blog is out!
OneDrive to Enum Them All
trustedsec.com/blog/onedrive-…
Major updates:
• database storage
• logging of previous runs
• easily append digits or strings to usernames
• stale job detection
• skip tried usernames
Special thanks to @DrAzureAD and @thetechr0mancer!
@DrAzureAD brings some valid points. MemberLevel user can read CA Policies. This has not always been understood, since the GUI and MS Graph requires roles for this, but not Azure AD Graph API. Also means, that if you have gaps in CA, those can be read by normal user
@DrAzureAD brings some valid points. MemberLevel user can read CA Policies. This has not always been understood, since the GUI and MS Graph requires roles for this, but not Azure AD Graph API. Also means, that if you have gaps in CA, those can be read by normal user
🎉 @SantasaloJoosua, Principal Security Researcher @Secureworks , will be joining us next week (2nd May) to talk about "Detecting gaps in Azure and Azure AD Security". 🤖 He's a talented hacker & NodeJS dev wt a focus on Azure, Azure AD, and M365. RSVP - lnkd.in/et5YmHvM
Next version of #AADInternals will be published during the @BlackHatEvents#BHAsia on May 11th at #BHArsenal!
Some teasers:
◾ Exploitation tooling for findings covered in our Briefings talk with @SravanAkkaram 😈
◾ Totally re-written token handling 🤞
◾ Automatic FOCI client…
I've long been interested in how EDRs work under the hood and how we can apply a more evidence-based approach to evasion. I'm happy to announce that I've written a book covering these topics with @nostarch which is now available for preorder 🎉
nostarch.com/book-edr
This quarter @Secureworks had two researchers in the @msftsecresponse researcher leaderboard🔥 Congratulations to all other researchers who made it, great job everyone!
My colleague @SantasaloJoosua have had a fantastic streak this year keeping us all safe - so proud of working…
New chapter of #AzureAD Attack & Defense Playbook: Are you looking for a way to track and verify your identity security posture? @samilamppu, @PitkarantaM and I have worked on a solution which includes also comparison to recommendations and #MITRE mapping.
github.com/Cloud-Architek…
I'll deliver a workshop, "Tokens, everywhere!" at @NorthSec_io, Montreal 🇨🇦 in May! In this hands-on deep-dive, I'll cover #AzureAD#OAuth implementation, different token types, #FOCI, and various attack scenarios.
Check out details and get tickets at nsec.io
Our latest full-length episode is available! @olafhartong was kind enough to join us again after a few years and catch up - catch the episode wherever you consume podcasts, or at the YouTube link below! youtu.be/47pwrsMucSg
If you are a user of Microsoft Defender for Endpoint or are considering it you might find this series useful. A 🧵
The first edition covers the differences between #MDE and #Sysmon and telemetry acquisition
1 - Sysmon vs Microsoft Defender for Endpoint
medium.com/falconforce/sy…
⚡️MSTICpy is a powerful python library for threat intelligence and threat investigation! I created a new security artwork for a brief overview.
Learn more with @ianhellen & @PeteABryan at BlueHat for an in-depth look. 🤓@msticpy#ThreatIntel#infosec#python@MsftSecIntel
427 Followers 2K FollowingSOC & cyber infrastructure manager. I hunt the badness alongside my team. Father of 3. I like video games. Engineer at heart.
14K Followers 1K FollowingTeam @hashcat! Eternal n00b and knowledge seeker! Age is just a number and motivation is the fuel!
Whatever you do in your life, do not forget to be humble.
2K Followers 715 FollowingSecurity researcher @SemperisTech. Microsoft Security MVP, Entra nerd. Part-time hiker, full-time dad and partner. Opinions expressed are from my cat.
198 Followers 2K FollowingGenerally interested in computers (DFIR/pentesting/networking) and likes to play wargames/CTF. Deleting tweets regularly.
Likes are my way of bookmarking.
804 Followers 2K FollowingInfosec and the Green Bay Packers. Interested in all things DFIR, Detection Engineering, Purple, and CTI. Opinions are mine, certainly not those of my employer.
55K Followers 3K FollowingDirector of Intel at @redcanary. SANS Certified Instructor for FOR578: CTI. Senior Fellow at @CyberStatecraft. She/her. Mastodon: @[email protected]
1K Followers 12 FollowingDetection: Challenging Paradigms. The premiere adversary detection podcast. Powered by @SpecterOps. Link below to all supported platforms:
5K Followers 203 FollowingBlueHat is where the security research community and @Microsoft security pros come together as peers, to connect, share and learn. Run by @MSFTSecResponse
10K Followers 6K Following@Volatility Core Dev | Art of Memory Forensics co-author | Director of Adversary Tactics @HuntressLabs | #DFIR enthusiast/trainer | [email protected]
180 Followers 1K FollowingTechnical Lead @CrowdStrike | Dad, Cloud DFIR, Hacker, Cybersecurity and Cloud enthusiast that’s trying to learn all the things & share the knowledge.
675 Followers 1K FollowingSecurity Research at Microsoft, in my spare time I try to ████████████ but █████ has done ████ to it. Making beats drop and calc.exe's pop. :)
804 Followers 2K FollowingInfosec and the Green Bay Packers. Interested in all things DFIR, Detection Engineering, Purple, and CTI. Opinions are mine, certainly not those of my employer.
18K Followers 656 FollowingHacker, trainer, and guitarist | Black Hills InfoSec #RedTeam | @BreakForge Training | Produces music to hack to at @N0BANDW1DTH
216 Followers 772 FollowingDisclaimer: Does not represent professional advice, opinions, or employer. CTI-League Member. Former Fortinet. Former Symantec. Former Big4. Former Transformer.
6K Followers 2K FollowingStaff Security Researcher @datadoghq | DEF CON/Black Hat main stage speaker | he/him | OSCP OSWE | Tweets are my own | Created https://t.co/QGWMJjv9pc
58K Followers 899 FollowingPrincipal Architect @posit_pbc, GP @ComposedVC, Co-founder @voltrondata. OSS: @ApacheArrow @pandas_dev @IbisData, "Python for Data Analysis" book
17K Followers 690 FollowingLead of @AirWebFramework & Cookiecutter (5M+ downloads)
Maker at @feldroydotcom with wife @audreyfeldroy
Dad 🧸
Ex-NASA 🚀
BJJ🥋
Coauthor Two Scoops of Django🍨
59K Followers 3K FollowingStoryteller, wanderer, comic, historian, world’s oldest millennial. I used to do stuff, now I do other stuff. @[email protected]