Removing the Last Exchange Server is now FINALLY possible!
A new capability in Exchange Online now allows administrators to manage Exchange attributes for directory-synchronized users with mailboxes hosted in the cloud.
With this update, the Source of Authority (SOA) for…
ACTIVE DIRECTORY: RESET THE DSRM PASSWORD
Got the DSRM password for each DC documented somewhere? It's surprising how many folks we've encountered that are in a pickle and have no clue what the DSRM password is!
In an elevated CMD for a local DC:
ntdsutil
set dsrm password…
ACTIVE DIRECTORY: RESET THE DSRM PASSWORD
Got the DSRM password for each DC documented somewhere? It's surprising how many folks we've encountered that are in a pickle and have no clue what the DSRM password is!
In an elevated CMD for a local DC:
ntdsutil
set dsrm password…
Remote Desktop Services RemoteApps RSS: The Seamless and Secure User Experience
RDS has a RSS Feed built-in (pic 1). That feed is virtually device agnostic meaning _any_ device with a RDS App can hook into them.
The RSS feed gets updated automatically at midnight every day. All…
Delegated permissions in Active Directory: silent but deadly 💩💨🤢
For example: Some random user with “FullControl” of the Domain Controllers OU
Nessus didn’t find it…
The IT team didn’t know it was there…
It wasn’t discovered on past pentests…
🧵I found it almost…
In the past, you had to:
phish a user, drop malware, escalate privileges, pivot to servers, evade EDR, dump creds, move laterally, exfiltrate quietly, clean up, leave a backdoor.
Today, you just:
phish a user, steal an OAuth token, access everything from anywhere.
Cloud…
In the past, you had to:
phish a user, drop malware, escalate privileges, pivot to servers, evade EDR, dump creds, move laterally, exfiltrate quietly, clean up, leave a backdoor.
Today, you just:
phish a user, steal an OAuth token, access everything from anywhere.
Cloud…
We've been doing a deep dive into threat modeling recently.
You should check this out if you're starting out in threat modeling.
youtube.com/playlist?list=…
Please ask all your admins to watch! Microsoft will be rolling out the policy as Microsoft Managed soon. This is not like AITM. It doesn't not matter if users have phishing resistant auth. Federation does not matter. This provides long term persistent access without MFA.
Please ask all your admins to watch! Microsoft will be rolling out the policy as Microsoft Managed soon. This is not like AITM. It doesn't not matter if users have phishing resistant auth. Federation does not matter. This provides long term persistent access without MFA.
Regarding the BlackBasta leaks: we haven't reviewed them in totality yet. It's quite a bit of messages in JSON format. It also has some Russian slang which makes it difficult to translate accurately. Thankfully there are some native Russian speakers who have made some interesting…
To people who don't know M365:
Entra ID
Exchange Online + Protection
Defender Suite of tools (there are at least 10 different ones)
Teams
SharePoint
OneDrive
Purview (8 more tool suites with different functionalities)
Admin Center
Apps Admin Center
Intune
Power Platform
It…
Windows Server Reminder: Always Set the Network Location Awareness Service to Automatic (Delayed).
That guarantees the service does not do its poll before the network stack is initialized putting the Windows Firewall into a limp lockdown mode with the Public Profile indicated.
123K Followers 11K FollowingChristian. Dedicated to living a life that can be imitated by my future kids. 📩 Books. Music. [email protected] for collabs. Serving @FoursquareNigr
75 Followers 482 FollowingIAM Engineer | Young Cybersecurity Enthusiast and student | Blue Team | Digital Forensics and Incident response | Internship Seeking
54 Followers 648 FollowingCollecting energy for spreading growth, knowledge and prosperity around with sharing knowledge and thoughts....that provoke new ideas
6 Followers 110 FollowingAircraft maintenance engineer. Emerging Cybersecurity Professional | Passionate about protecting digital worlds | learning and growing.
7 Followers 98 FollowingExperienced Project Manager | Expert in Agile Methodologies | Passionate about Efficiency and Innovation | Leading Cross-Functional Teams to Success.
192 Followers 364 FollowingTechnology Business Specialist ¦ Stanford LEADer ¦ Electronic Security Pro ¦ Statistician. I support Startup with - Technology • Strategy • Research
3 Followers 96 Followingجالس في اهدأ زاوية في تويتر ، وسواءً غردت عن السفر او البطيخ او كيفية عمل الأندومي فهذا لا يعنيك في شئ واعتراضك سيؤدي بك الى اسرع بلوك تشوفه في حياتك
2K Followers 5 Following➡️https://t.co/SF0W2qq94U Welcome to the world of Device Management! Device Management Admins❤️ Q? ➡️ https://t.co/RWowRPyZkG Managed by HTMD Community Team
7K Followers 512 FollowingSecurity #MVP | Endpoint management @we_are_inspark | #MSIntune #ConfigMgr #Windows | Proud father of TJ and LJ | Happily married with Marjolein
3K Followers 0 FollowingAn autodidact and polymath, writing his knowledge on https://t.co/o21PTFKF0f. Join the movement and subscribe to the newsletter https://t.co/SUFcy6BnZc
13K Followers 310 FollowingThreat Researcher, Blue Team, DFIR, Malware Analysis, and Reverse Engineering.
“⚔️What do we say to God of malware, Not today⚔️”
24K Followers 372 FollowingClarity to break in. Command to lead. Explore career launch tools, leadership playbooks, and vCISO services. Built for real-world cybersecurity impact.
2K Followers 374 FollowingMicrosoft MVP '09-Present. We design & build HA solutions for on-premises, data centre, & hybrid. Workload Migration Specialists. Active Directory Security.
10K Followers 1K FollowingCensys is the source for real-time Internet intelligence and actionable threat insights for governments, F500 companies, and leading threat intel providers
21K Followers 0 FollowingOur mission is to make the Internet more secure by bringing to light vulnerabilities, malicious activity and emerging threats. Join our Alliance!
8K Followers 479 FollowingWe develop a third-party #patch and application management solution for #Microsoft #ConfigMgr and #MSIntune. Learn more at https://t.co/rdAo5KIdgp
3K Followers 25 FollowingOfficial X handle of the Microsoft Configuration Manager Product Team in Engineering.
📄 https://t.co/7vy29rmwGC ❓@IntuneSuppTeam
#ConfigMgr
48K Followers 20 FollowingWelcome to CyberPatron. Your #1 Cybersecurity Network official X account. We bring you the best Cybersecurity Contents, Training and Mentorship. 💻🗝️
34K Followers 5K FollowingA Career Coach||CEO♡@thecyberpatron_||I’m a BIG DEAL ||Tech Influencer| Cybersecurity|| GRC🤍|| AI Gov|| ISO27001 LI|Emphasis on the God factor. 🔥💥DsL ʚїɞ ♔♡
268K Followers 0 FollowingThe Internet's Observatory: Tracking cybersecurity and digital governance • connectivity and democracy • tools and policy for change
17K Followers 1K FollowingLoves Jesus, loves others | Husband, father of 4, security solutions architect, love to learn and teach | Microsoft MVP | @TribeOfHackers | 🦋@nathanmcnulty.com
240K Followers 200 FollowingBreaking cybersecurity and technology news, guides, and tutorials that help you get the most from your computer. DMs are open, so send us those tips!
191K Followers 417 FollowingSANS is the most trusted and by far the largest source for information & cyber security training, certification and research in the world.
4K Followers 610 FollowingFounder @killervms | Helping orgs build secure IT Infrastructure & newbies get better in IT and Cybersecurity.
Retweets are not an endorsement.
No recent Favorites. New Favorites will appear here.