This is amazing research. Robbe explained every step so well and provided PS command for everything! As a person who is a bit scared of all the new AI agents thingy, I really enjoyed reading this! @robbevddaele.bsky.social
hybridbrothers.com/posts/agenti...
Posts by
I haven't been here for a while π It's nice to be back!
I wrote a nice post if you are interested π it contains a lot of IOCs and real-world statisticsπ©΅
www.wiz.io/blog/detecti...
Enhancements in #MicrosoftEntra (diagnostic) logs: Several interesting sign-in properties (including Session ID, status for Token Protection, or GSA traffic) have been added to the sign-in logs and available in #MicrosoftSentinel. (1/3)
Some first-party apps that support ROPC flow, I see some FOCI apps in there π«£
(I tested it!)
No π₯Ί I saw it on my user, and I didn't change the password
Yet another time I impulsively post a random thought that appears to be wrong π₯²
Can someone explain what scenario can cause password failure log in non-interactive sign-in logs? π₯ @merill.net @fabian.bader.cloud
I saw $batch requests on my logs so I thought you can't see the payload, but then saw this - cloudbrothers.info/en/detect-th...
So I might be wrong π₯Ί
Want to avoid microsoft graph activity log detection? Just create all your requests as $batch
And you're done π
I just found out that Project Zero has released a Windows Registry Research Series, and I'm really looking forward to reading it!
googleprojectzero.blogspot.com/2024/04/the-wiβ¦
I love to show them the cool side of the security industry and use that to get them into things. My favorite - stuxnet. youtu.be/C8lj45IL5J4?...
Thats cool ! Is it a reference to the amazing white paper ? An ace up the sleeve π
That looks like a good one to read
What was your talk about? Looking forward watching it!
Hybrid attack paths sound like a crazy capability!! I love correlating stuff π
That's so awesome!! Thank you for the opportunity . It's so crazy to think that someone is reading my posts (and maybe even find it useful!!).
Currently working on a cool automation that sends you a message every time something is added to version v1.0 in the changelog. Would anyone be interested in the code?
I just read that security defaults become disable as soon as there is at least one CAP, is this wise? In practice it can be a very specific CAP, for which many security mechanisms are lost
Copilot is now part of Entra, and I wonder.
1. How does it handle permissions
2. Can we get access to data we are not supposed to be able to read
3. Does it also perform write/update actions for you, or only read?
This is going to be interesting π£
So true !!
Do you know if there is a large amount of entra sign-in logs example data so I can work on it? I have a cool idea π
Perfect rainy morning and the new entra.news (: it's like my dad used to read the paper, but instead of wars, I read about the great new CAE video π
I love it here. It feels more pure π
Thank you for reading it π₯Ή
Thanks !! I really appreciate it π
Haha tell me about it I'm a hugeeee fan!!