security professional, researcher, penetration test lead @teamhoplite | co-founder, CTO @shieldcyberiomichaelweimer.com Indianapolis, INJoined December 2019
🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷♂️
Read Here - akamai.com/blog/security-…
The key to securing Active Directory is being proactive about hardening policy, remediating underlying weaknesses and applying the principle of least privilege to the environment before a cyberattack. By reducing the paths from standard non-privileged users to privileged users,…
Stay ahead of Active Directory targeting. We teamed with @ASDGovAu and others to provide recommended strategies to prevent and detect malicious actors attempting to access the keys to your network. Read our joint guidance: nsa.gov/Press-Room/Pre…
Understanding EVERY Token in Entra ID 🔎
Not all tokens are equal. There are many different types with different uses and benefits.
In this blog, I break down each token and what they are used for and which tokens are the most "valuable" for an attacker to obtain.
Full blog…
Microsoft has long downplayed its role in the 2020 "SolarWinds" attack -- one of the largest cyberattacks in US history -- but a new ProPublica investigation reveals that the tech giant ignored warnings that could have stemmed the damage... 🧵
Ops teams and cyber/infosec teams take note. Patching and vulnerability management are important, but there is SO much more right under our noises. Start investing time in learning how your systems work and how to identify misconfigurations. This is where the action happens!
Ops teams and cyber/infosec teams take note. Patching and vulnerability management are important, but there is SO much more right under our noises. Start investing time in learning how your systems work and how to identify misconfigurations. This is where the action happens!
Demonstrating CVE-2022-37958 RCE Vuln. Reachable via any Windows application protocol that authenticates. Yes, that means RDP, SMB and many more. Please patch this one, it's serious!
securityintelligence.com/posts/critical…
Reposting this because some of you might find it useful. It's common proxy/url categorization sites for most vendors. A lot of which let you submit a re cat with no account and the validation is often fully automated.
pastebin.com/2yu4Rsj1
If you're interested by an alternative way to dump domain users' NT hashes and TGT without touching LSASS, take a look at the new Masky tool :)
Everything is explained in this article: z4ksec.github.io/posts/masky-re…
Thanks @harmj0y, @tifkin_ and @ly4k_ for their amazing work on ADCS!
Teddy Guzek founded Hoplite, a company that specializes in finding technical cybersecurity gaps for its clients then providing ways to mitigate risk, when he returned to Indianapolis from Chicago, where he got his first job out of college. #IBJ20s
New blog post! 📃
It will give a primer on how you can implement security boundaries in your infrastructure to prevent compromise of critical assets based on tiered administration posts.specterops.io/establish-secu…
Products are not the solution to every information security problem. But a great product might be the best solution to a particular problem. Whether you make FOSS or commercial products, I want to share with you a great tool for developing better product features: 🧵
Introducing KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
All credits go to @tiraniddo@cube0x0@harmj0y, most of the code was taken from their tools.
github.com/Dec0ne/KrbRela…
😶🌫️While working on @nikhil_mitt outstanding Azure Red Team course I've developed a handy powershell toolkit combining various Azure Red Team tactics.
Sharing it now, maybe someone will find it useful✨
github.com/mgeeky/AzureRT
I have seen this on several of our Client’s networks. The severity of this was greatly overshadowed by #log4j but should not be overlooked. Patch your DC’s (!!!) and adjust your default MachineAccountQuota
I have seen this on several of our Client’s networks. The severity of this was greatly overshadowed by #log4j but should not be overlooked. Patch your DC’s (!!!) and adjust your default MachineAccountQuota
New blog: Relaying Kerberos over DNS using krbrelayx and mitm6.
New method of gaining RCE on AD hosts in the same VLAN without credentials or needing NTLM, by abusing Kerberos, DNS and Active Directory Certificate Services.
Blog: dirkjanm.io/relaying-kerbe…
314 Followers 7K FollowingMY MAIN GOAL: Make my clients' life easier and more enjoyable while offering the perfect solutions to their needs together with great communication.
2 Followers 11 FollowingShield Cyber is a proactive cybersecurity company, who have created the Shield Platform, which a continuous threat and exposure management platform.
37K Followers 10K FollowingInfosec dork, boxer, poker player, dog owner/operator, spiller of things. Cars, vidya games, and cooking are my jam. #ChiefsKingdom and Royals fanatic. #SecKC
14 Followers 162 FollowingStudied crypto I'm in https://t.co/X5Y37jUUJw last year, earned over $2M, achieved financial freedom, This has enabled me to kick-start my global travel plan!
13K Followers 10K FollowingMost companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.
14K Followers 10K FollowingThe largest global Cyber Security Research & Innovation Platform.
On a mission to foster Innovation, share high-quality Insight and promote Leadership.
88K Followers 75 FollowingHi! I'm Dave Plummer. You might remember me from such Windows components as Task Manager, Windows Pinball, Calc, ZIPFolders, Product Activation, etc. Cheers!
11K Followers 317 FollowingAgentless Linux security. No endpoint agents and no drama. Linux malware, forensics, intrusion detection, and hacking. Founder @SandflySecurity.
3K Followers 718 FollowingMicrosoft Certified Master (MCM): Active Directory.
Previously AD field engineer at Microsoft.
Notes from the field & the lab (@duff22b)
76K Followers 609 FollowingI'm done with Musk and his Nazis, so I've moved to BlueSky (@allenholub.bsky.social) and LinkedIn (https://t.co/EBnkZ8qUC8). LinkedIn is more lively.
32K Followers 727 FollowingTechnically adept, practical, a good communicator, ethical, and committed to team development and personal growth.
@IndustrialLogic & @ModernAgile.
140K Followers 1K FollowingDistinguished Engineer at Microsoft on .NET, Creator of NuGet, SignalR, https://t.co/PiydKAsC8g Core, Aspire and Barbadian 🇧🇧, Tennis Player, Father, other half @symonefowler
396 Followers 588 FollowingCyber Advisors is a Minnesota based Cyber Security focused Managed Service Provider with 24x7x365 Support, Remote Operations Center, Offensive Security, and SOC
101K Followers 46 FollowingEnterprise technology news and views, on the web since 1998. Part of the @SitPub family. Send news tips via https://t.co/UTSGHfn6hq
1.9M Followers 27K FollowingYes, I can see some risk that your threat to jail Internet company executives for not censorsing aggressively enough could backfire.