Meine Tweets & Meinungen kรถnnen Spuren von Ironie enthalten.

Dรผsseldorf, Germany
Joined November 2011
Joern retweeted
And the same reminder again. You know why. ๐Ÿ˜…
A very friendly reminder, especially for non-corporate PCs protected with BitLocker: if you are not sure if you have your Recovery Password handy, you can display it any moment with "manage-bde -protectors -get c:" Store the password in your password manager and make its backup!
5
37
1
363
Joern retweeted
AD Tiering simplifiedโ€ฆ T0 - Crown Jewels T1 - servers T2 - workstations T3 - Suzie in accounting who clicks every link possible
๐Ÿ”’ Secure Bits ๐Ÿ’ก Have you ever heard of ๐—˜๐—ฆ๐—– ๐˜ƒ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€? I guess you have. If you're running ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ฒ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ๐˜€ (๐—”๐—— ๐—–๐—ฆ) and haven't audited it for ESC misconfigurations โ€” you may be sitting on a ๐˜๐—ถ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐˜๐—ถ๐—บ๐—ฒ ๐—ฏ๐—ผ๐—บ๐—ฏ.ย ๐Ÿ’ฃ ๐ŸŽฏ ESC vulnerabilities (Enterprise PKI Escalation Paths) are incredibly ๐—ฐ๐—ผ๐—บ๐—บ๐—ผ๐—ปย and highly ๐—ฑ๐—ฎ๐—ป๐—ด๐—ฒ๐—ฟ๐—ผ๐˜‚๐˜€. Yetโ€ฆ most environments I assess treat AD CS like a black box โ€” โ€œItโ€™s working, so letโ€™s not touch it.โ€ But attackers love AD CS โ€” it often lets them ๐—ฒ๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ฒ ๐˜๐—ผ ๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—”๐—ฑ๐—บ๐—ถ๐—ป using just a basic user account. No exploits. Just misconfigurations. ๐—Ÿ๐—ฒ๐˜โ€™๐˜€ ๐—ฏ๐—ฟ๐—ฒ๐—ฎ๐—ธ ๐—ฑ๐—ผ๐˜„๐—ป ๐—˜๐—ฆ๐—–๐Ÿญย ๐Ÿ‘‡ ESC1 = Certificate Template Misconfig It lets a regular user request a certificate that can later be used to authenticate as someone else โ€” including privileged users. ๐—ง๐—ผ ๐—ฏ๐—ฒ ๐˜ƒ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—น๐—ฒ, ๐—ฎ๐—น๐—น ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ๐˜€๐—ฒ ๐—ฎ๐—ฟ๐—ฒ ๐˜๐—ฟ๐˜‚๐—ฒ: โœ… Non-privileged users can enroll in a certificate template โœ… Manager approval is not required โœ… No authorized signature is required โœ… The template supports client authentication (PKINIT, Smart Card, etc.) โœ… The requester can define the Subject Alternative Name (SAN) ๐—˜๐—ป๐—ฑ ๐—ฟ๐—ฒ๐˜€๐˜‚๐—น๐˜? A low-privileged user can impersonate anyone โ€” including a Domain Admin โ€” using the certificate. ๐Ÿ› ๏ธ ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฐ๐—ต๐—ฒ๐—ฐ๐—ธ ๐˜†๐—ผ๐˜‚๐—ฟ ๐—ฒ๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜: There are free tools for this: ๐Ÿ”น ADProbe โ€” My AD vulnerability scanner ๐Ÿ”น Locksmith by Jake Hildreth โ€” covers almost all ESC vulnerabilities ๐Ÿ”น ... ๐ŸŽฏ There are ๐Ÿญ๐Ÿฒ ๐—˜๐—ฆ๐—–๐˜€ ๐—ถ๐—ป ๐˜๐—ผ๐˜๐—ฎ๐—น. Iโ€™ll be covering them in upcoming Secure Bits posts. ๐Ÿ‘‰ Did you already know what ESC1 was about? #ADCS #SecureBits #CyberSecurity #ActiveDirectory #RedTeam #BlueTeam #PKI #WindowsSecurity #HorizonSecured @BlueTeamDave
1
29
119
Joern retweeted
AdminSDHolder is kinda my jam. I wrote the e-book on it. If you work with Activity Directory, I highly recommend you give this a skim, or at least check the spoilers in the blog.
AdminSDHolder: the AD security feature everyone thinks they understand but probably don't. ๐Ÿ˜ฌ @JimSycurity went to the source code to debunk decades of misconceptions โ€” including ones in Microsoft's own docs. Read more โคต๏ธ ghst.ly/3Lpmjzv
2
34
193
Joern retweeted
How to find insecure permissions in 3 easy steps. 1. Download ADeleg & ADeleginator 2. Run Invoke-ADeleginator 3. Review the report Identifying what could be a full domain compromise attack path is that simple. Link to ADeleg/ADeleginator & other AD security resources here ๐Ÿ‘‡ go.spenceralessi.com/budget
17
145
70 cybersecurity project ideas from beginner to advanced level
11
286
7
1,922
LEARN FOR FREE
33
835
6
6,037
๐Ÿ”’ Secure Bits ๐Ÿ’ก What is the ๐——๐—ป๐˜€๐—จ๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ๐—ฃ๐—ฟ๐—ผ๐˜…๐˜† group in Active Directory? Itโ€™s designed for very specific use cases โ€” like when you have multiple DHCP servers that need to update the same DNS records. ๐Ÿ’ก ๐—›๐—ผ๐˜„ ๐—ถ๐˜ ๐˜„๐—ผ๐—ฟ๐—ธ๐˜€: When a DHCP server registers a DNS record on behalf of a client, it becomes the owner of that record. But if another DHCP server tries to modify it, it's blocked โ€” because it doesn't own the record. To "fix" this, Microsoft introduced the DnsUpdateProxy group, which allows records to be created ๐˜„๐—ถ๐˜๐—ต ๐˜„๐—ฒ๐—ฎ๐—ธ๐—ฒ๐—ป๐—ฒ๐—ฑ ๐—”๐—–๐—Ÿ๐˜€: 1๏ธโƒฃ The first authenticated client to modify the record becomes the new owner. 2๏ธโƒฃ If the updater is a member of DnsUpdateProxy, ownership and the loose ACLs persist. โš ๏ธ ๐—ช๐—ต๐˜† ๐˜๐—ต๐—ถ๐˜€ ๐—ถ๐˜€ ๐—ฟ๐—ถ๐˜€๐—ธ๐˜†: With weakened ACL on the record, any authenticated client can potentially abuse it. And if DHCP is running on Domain Controllers, critical DNS records could be exposed. ๐—” ๐˜€๐—ฎ๐—ณ๐—ฒ๐—ฟ ๐—ฎ๐—น๐˜๐—ฒ๐—ฟ๐—ป๐—ฎ๐˜๐—ถ๐˜ƒ๐—ฒ: ๐Ÿ”น Use Dynamic DNS Update Credentials โ€” create a standard domain user ๐Ÿ”น Configure all DHCP servers to use this account ๐Ÿ”น (Note: gMSAs are not supported) ๐Ÿ”น Avoid putting DHCP roles on Domain Controllers ๐Ÿ”น Avoid using the DnsUpdateProxy group altogether ๐Ÿ’ฌ Are you using DnsUpdateProxy group in your environment? #SecureBits #ActiveDirectory #Windows #CyberSecurity #DNS #DHCP #BlueTeam #HorizonSecured
9
68
useful wireshark filters
4
144
4
1,046
Joern retweeted
If you know me...you can probably guess what some (all?) of these topics might be... I'm going to be sharing how IT admins can make their environments harder to attack. In honor of Cybersecurity Awareness Month. Come hang out with us! Thursday 10/23 10am Mountain. Here's a link ๐Ÿ”—go.spenceralessi.com/pdq
1
4
12
This command lets you see EVERY Wifi network you've ever connected to.ย  + all the passwords (in plain text)! ๐Ÿ˜ณ
๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐—ž๐—ฒ๐—ฟ๐—ฏ๐—ฒ๐—ฟ๐—ผ๐˜€ ๐—”๐˜‚๐˜๐—ต ๐—™๐—ฎ๐—ถ๐—น๐˜‚๐—ฟ๐—ฒ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐˜…๐—ฒ๐—ฑ ๐—˜๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜๐˜€ (๐—ช๐—ฆ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฑ + ๐—ช๐—ฆ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฎ ๐——๐—–๐˜€) Ran into this issue twice already โ€” and itโ€™s sneaky. So hereโ€™s what you should know ๐Ÿ‘‡ If youโ€™re running a mixed domain with ๐—ช๐—ถ๐—ป๐—ฑ๐—ผ๐˜„๐˜€ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฎ ๐—ฎ๐—ป๐—ฑ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฑ ๐——๐—–๐˜€, watch out for Kerberos authentication errors after password changes. ๐Ÿ’ฅย ๐—œ๐˜€๐˜€๐˜‚๐—ฒ: If a userโ€™s password is changed on a WS 2025 DC, and they later try to authenticate against a WS 2022 DC โ€” you may get: ๐Ÿ›‘ ๐—ž๐—ฅ๐—•๐Ÿฑ_๐—ž๐——๐—–_๐—˜๐—ฅ๐—ฅ_๐—˜๐—ง๐—ฌ๐—ฃ๐—˜_๐—ก๐—ข๐—ฆ๐—จ๐—ฃ๐—ฃ in Wireshark ๐Ÿ›‘ Event ID 4771 with failure codeย ๐Ÿฌ๐˜…๐—˜ย in logs I experienced this in hardened environments with only AES enabled. It looks like WS 2025 may generate key material that WS 2022 cannot read or validate properly, ๐—ฐ๐—ฎ๐˜‚๐˜€๐—ถ๐—ป๐—ด ๐—ฎ๐˜‚๐˜๐—ต ๐˜๐—ผ ๐—ณ๐—ฎ๐—ถ๐—นย โ€” even though everything looks configured correctly. โœ… Once passwords are changed back on WS 2022 DCs โ†’ things work again across both. ๐Ÿ”ย ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฑ๐—ฒ๐˜๐—ฒ๐—ฐ๐˜ ๐—ถ๐˜: โ€ข Look for repeated ETYPE_NOSUPP errors in Wireshark โ€ข Review Event ID 4771 with 0xE code โ€ข Focus on accounts that recently changed passwords on WS 2025 DCs ๐Ÿฉน ๐—ง๐—ฒ๐—บ๐—ฝ๐—ผ๐—ฟ๐—ฎ๐—ฟ๐˜† ๐˜„๐—ผ๐—ฟ๐—ธ๐—ฎ๐—ฟ๐—ผ๐˜‚๐—ป๐—ฑ: โ€ข Rotate affected passwords on WS 2022 or older DCs โ€ข Or avoid mixed environments with WS 2025 DCs โ€” for now Iโ€™ve seen this issue now multiple times, and spotted it discussed in a few community threads as well โ€” ๐˜€๐—ผ ๐—ถ๐˜โ€™๐˜€ ๐—ป๐—ผ๐˜ ๐—ถ๐˜€๐—ผ๐—น๐—ฎ๐˜๐—ฒ๐—ฑ. โ“๐—”๐—ป๐˜†๐—ผ๐—ป๐—ฒ ๐—ฒ๐—น๐˜€๐—ฒ seeing similar problems? If youโ€™re running WS 2016 or WS 2019 DCs in a mixed setup โ€” are you affected too? #ActiveDirectory #Kerberos #WindowsServer #SecureBits #HorizonSecured #CyberSecurity #ADHardening
4
18
79
Joern retweeted
Remote Desktop credential delegation (SSO) not working after enabling Credential Guard โ€“ 4sysops 4sysops.com/archives/remote-โ€ฆ
5
11
Remove Default Microsoft Store Packages: Windows Debloat Done Right Now available in the Intune Settings Catalog!! The Remove Default Microsoft Store Packages policy gives admins a native and reliable way to remove built in Microsoft Store apps without the need to use fragile PowerShell scripts! It cleans up unwanted apps automatically during provisioning and on existing enrolled devices, giving you full control over what stays on Windows. Want to know when this policy actually activates and what happens behind the scenes? That is what the blog uncovers. patchmypc.com/blog/remove-deโ€ฆ #Intune #MSIntune #WindowsAutopilot #MicrosoftStore #Windows11
Joern retweeted
Active Directory hardening - sysadmin pain scale LAPS - like stepping on a Lego MFA for RDP to servers - like too much salt on your fries Disabling legacy auth - dreams haunted by windows logs Removing accounts from DA - resume generating events Tiered Security - therapy + goat farming, congrats youโ€™ve made it
16
25
285
Joern retweeted
ATTENTION: Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft! Attackers have found a new method to trick end users into logging in to a malicious login page, intercepting tokens, and infiltrating the tenant. What makes this particularly sneaky is that they are using Microsoft URLs. The link they receive is forms.office.com/ followed by a value. Clicking that takes them to a strange URL with a PDF, which they then have to log in with their M365 account. And that's where the real danger lies. The URL ends in windows.net and is therefore considered valid. If you log in and the URL isn't login.microsoftonline.com, you can assume it's a bad one. Block the endpoint *.blob.core.windows.net entirely, and only allow access to the specific storage account you trust, like: <storage-account-name>.blob.core.windows.net Now that you're aware of this, please also set up company branding in your Microsoft 365 tenant! It helps users trust the sign-in page. When they see your logo and colors, they know it's safe. If they see a random portal, they'll think twice before entering their credentials! Read more: learn.microsoft.com/en-us/enโ€ฆ #Microsoft365 #EntraID #CloudSecurity #IdentityProtection
Joern retweeted
lets you update and activate old Windows versions after official support ends
3
75
2
518