Have you blocked Device Code flow by default yet?
If not, this very slow Graph PowerShell Beta command will tell you who is using them
Get-MgBetaAuditLogSignIn -Filter "AuthenticationProtocol eq 'deviceCode'"
Microsoft calls this a best practice, so go create the CA policy ;)
As ntlm leaking is still a thing, made a showcase for elevating via ldap relaying with some little tricks.
Relaying is done with a Win Client without admin privs and an active Windows firewall (default config), by using HTTP.SYS and SSH.
Details here: badoption.eu/blog/2024/04/2…
Watching people tweet they bypassed a certain EDR is just cringe at this point. When you ask them what did they bypass, they dont know what. So let me take you back to school...
Executing OpenSource tool is not a bypass. An EDR employs several mechanisms for detection. Getting a…
Leaking sensitive data via public accessable cloud storage is still a thing...
I collected some samples of what can be found. Crazy stuff...
badoption.eu/blog/2024/02/2…
Psst! Hey you! yeah I see you struggling with exfiltrating vhdx files you found on that public SMB share over a HTTP tunnel. What if I told you there is a better way?
You can browse remote disk images with this project and only download what u need!
github.com/skelsec/adiskr…
Steps:
- Create a group chat
- Invite the external “victim”
- Write your message
- Splash screen will be shown to the user
- Remove the user from participants
- Splash screen will also be removed
Some details here:
badoption.eu/blog/2024/01/1…
As nowadays an EDR is on almost PC, it might be time to move on to the next part in assesments.
Smartphones maybe?
You can send a QR Code as Unicode, to ensure you land on a mobile device, bypass image privacy and and go for device code phishing to get a full Azure / M365 PRT!
Did you know, that you can use search-ms to bind a WebDAV drive and filter there?
This offers some possibilities for attack chains, e.g. with Java, Python, Ruby or Visual Studio.
Here is a PoC for Visual Studio:
More 🧵👇
#initialAccess
If you ever asked yourself how complex it is to setup an O365 phishing infrastructure, the answer might be a little bit disturbing "not much". It's done in under 10 mins and free O.o
Here is a walkthrough:
It's been quiet for a while around bloodhound Python, however I'm happy to share that I am now maintaining the project at my personal GitHub. The latest version fixes many bugs/issues, also thanks to the many PRs that were submitted (thanks all!). github.com/dirkjanm/blood…
13K Followers 10K FollowingMost companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.
1K Followers 352 FollowingJust your friendly neighborhood APT :~# OSCE³ ℹ️Opinions are my own and not the views of my employer. 📌I’ll be at @BSidesTirana 2026 with @IAMCOMPROMISED
16K Followers 201 Following@TrustedSec Red Team lead | Hi-Fidelity trolling | Privacy Enthusiast | Putting the "no" in nano | Avatar: https://t.co/3XHmKR8nCk
13K Followers 10K FollowingMost companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.
13K Followers 509 FollowingI don't know how to search on Google so I do research on my own and tweet about it. Hacking as a life style
https://t.co/a05mevChzu
26K Followers 1K FollowingI play with vulnerabilities and exploits. I used to be here on Twitter but now I'm here:
@[email protected]
https://t.co/hXggdAVkSQ
2K Followers 242 FollowingBJJ Black Belt. Type Confused. calc||GTFO. Retired @OpenBSD committer, former @ProjectHoneynet researcher, @exploitdb core team vet.
64K Followers 82 FollowingThe latest research and news from Unit 42, the Palo Alto Networks (@paloaltontwks) Threat Intelligence and Security Consulting Team covering incident response.
2K Followers 340 FollowingSecurity Engineer at @calif_io. Winner of Pwn2own Vancouver 2021, Torento 2022, Vancouver 2023. MSRC top 100 2019, 2020, 2021.
1K Followers 503 FollowingCyberSec Leader/Innovation |👨🏾💻PdM @HYPRCorp |🙆Co-org @TandilSec |🧐CFP @ekoparty |✊Knowledge sharing and community building |🏀#12 |🗨️Words are mine
6K Followers 3K FollowingHunt & Response Senior Manager @HuntressLabs || "Competition is the law of the jungle, but cooperation is the law of civilisation” - Kropotkin
571 Followers 1K FollowingSecurity @OpenAI | Former Red Team @RobinhoodApp, @100xGroup, @Cruise, @Apple, and @PwC | I tweet about security, software, and entrepreneurship
8K Followers 2K FollowingProfessor of Computer Science at ETH Zurich. Views my own. Apparently in a semi-religious crypto/privacy cult. Join us! He/him.
4K Followers 689 FollowingIT Security guy, penetration testing is my thing. One of the SANS Internet Storm Center handlers at https://t.co/KLxU4pooKI. SANS SEC542 instructor and course co-author.
3K Followers 392 FollowingRed Teamer & Security researcher
Maintainer of #NetExec, #DonPAPI, dploot, certsync, and all the stuff on my github repo
bsky: https://t.co/zISpgvDSWc