Advertisement · 728 × 90

Posts by 0xcsandker

Post image

Hello token friends, do you use the content of the access token as part of your application. Then be aware that Microsoft will switch to encrypted access token and this might break stuff.

Switch to id token. #EntraID

devblogs.microsoft.com/identity/access-tokens-a...

1 year ago 16 11 2 1
Post image

Do you know the Azure IP Ranges site by @derdanu.bsky.social ?

It's a great tool to filter IP ranges by service and even download them in different formats.

https://azureipranges.azurewebsites.net/

1 year ago 18 5 2 0
Post image Post image

Had not see this before. What could go wrong if you allow any user to create mailboxes with nearly arbitrary name ?!

Seen via @jangeisbauer.bsky.social, thanks for sharing!

References
- www.linkedin.com/posts/jangei...
- www.cyberis.com/article/micr...
- jeffreyt.nl/2024/taking-...

1 year ago 1 0 0 0
Post image

I'm glad to release the tool I have been working hard on the last month: #KrbRelayEx
A Kerberos relay & forwarder for MiTM attacks!
>Relays Kerberos AP-REQ tickets
>Manages multiple SMB consoles
>Works on Win& Linux with .NET 8.0
>...
GitHub: github.com/decoder-it/K...

1 year ago 63 43 3 0