Identity protection

Sydney
Joined February 2009
Vlado Vajdic retweeted
This article explores a novel attack technique that combines Ghost SPNs and Kerberos reflection to elevate privileges on SMB servers, highlighting a critical gap in traditional detection methods. It details how attackers can exploit stale or misconfigured Service Principal Names (SPNs) in Active Directory—termed "Ghost SPNs"—to manipulate Kerberos authentication and reflect service tickets back to the SMB server, gaining elevated access. The technique bypasses common defenses like LDAP filtering and SPN hygiene, making it stealthy and potent. Semperis emphasizes the need for proactive detection strategies and shares insights into identifying vulnerable configurations and mitigating the threat. semperis.com/blog/exploiting…
1
43
96
Vlado Vajdic retweeted
AdminSDHolder is kinda my jam. I wrote the e-book on it. If you work with Activity Directory, I highly recommend you give this a skim, or at least check the spoilers in the blog.
AdminSDHolder: the AD security feature everyone thinks they understand but probably don't. 😬 @JimSycurity went to the source code to debunk decades of misconceptions — including ones in Microsoft's own docs. Read more ⤵️ ghst.ly/3Lpmjzv
2
34
193
Vlado Vajdic retweeted
🚨Detect Actor Token Abuse (#CVE-2025-55241) After verifying the details with @_dirkjan, I created a query to detect Actor Token abuse, regardless of the activity involved. The idea is simple: If these activities are S2S, they should originate from Microsoft service IPs. 🧐 Link to query: github.com/Cyb3r-Monk/Threat…
4
65
287
Vlado Vajdic retweeted
AD recovery is no simple fix; it’s a high-stakes strategy. The right prep, automation, and testing separate organizations that recover fast from those that crumble. Learn how leaders prepare before disaster strikes with @Semperis + Cohesity: cohesity.co/41Lm6fq #CyberResilience #ActiveDirectory #DataProtection
2
1
1
Getting ready for my "Domain Controller Firewall: Fact or Fiction" session at #HIPConf25, focusing on the Infrastructure as Code (IaC) approach to Windows Firewall policy management, RPC filters, outbound traffic, hybrid environment challenges, and network service discovery.
1
2
10
Vlado Vajdic retweeted
Pass the free Active Directory Administrator practical applied skill test learn.microsoft.com/en-us/cr… and go into the draw to win 50% off your next Microsoft certification exam. Details at: learn.microsoft.com/en-us/cr…
1
31
173
Vlado Vajdic retweeted
🚨 Fortinet RCE: There's a new critical vulnerability in #FortiSIEM. CVE‑2025‑25256 allows for unauthenticated #RCE attacks, allowing an attacker to gain complete control over the affected system. This includes accessing sensitive data, modifying or deleting system resources, and potentially installing malware or creating backdoors. Horizon3.ai customers are now able to run a Rapid Response test — if you haven't, confirm you're not exploitable at horizon3.ai/attack-research/…. #NodeZero #pentesting #infosec
Vlado Vajdic retweeted
ICYMI: Was just perusing the latest CrowdStrike 2025 Threat Hunting report (crowdstrike.com/en-us/resour…) and check this wild timeline for Scattered Spider - from account takeover to Entra ID bulk user export in <5 minutes 👀
5
76
1
223
Vlado Vajdic retweeted
Wanna play around with #KQL and #Graph Microsoft just released sample datasets to play around and look at this gorgeous visualization for the #Bloodhound schema they offer! Thanks @cosh23 🥰 learn.microsoft.com/en-us/ku…
34
131
Vlado Vajdic retweeted
🧵 Red teams are shifting to stealthier AD enumeration via Active Directory Web Services (ADWS) over port 9389. Tools like SOAPHound, SoaPy & ShadowHound wrap LDAP queries in SOAP, bypassing traditional detections. ipurple.team/2025/08/12/acti… A KQL to detect this type of AD enumeration: detections.ai/share/rule/vSh… #Cybersecurity #ADEnumeration #ADWS
Vlado Vajdic retweeted
6 places I check when I'm reviewing a company's external footprint and tech stack to get a basic understanding of the architecture: 1. aadinternals.com/osint 2. dnsdumpster.com 3. virustotal.com 4. crt.sh 5. LinkedIn 6. Careers Go check these things to see what others look at. It usually takes me less than 1 hour.
Vlado Vajdic retweeted
This article is really interesting to me: red.anthropic.com/2025/cyber… What if the most pressing security problem to solve with LLMs is how to defend against attackers using them to perform relatively repeatable attacks (e.g. install ransomware on low-to-mid defended environments)?
Launching now — a new blog for research from @AnthropicAI’s Frontier Red Team and others. > red.anthropic.com We’ll be covering our internal research on cyber, bio, autonomy, national security and more.
Vlado Vajdic retweeted
Today, together with Jonathan Elkabas, we're releasing EntraGoat - A Deliberately Vulnerable Entra ID Environment. Your own hands-on Entra lab for identity attack simulation. Built for red teams, blue teams and identity nerds. Check it out here👉github.com/semperis/entragoa…
9
237
702
Vlado Vajdic retweeted
Ransomware threats are going offline — literally. Our new 2025 Global Ransomware Report shows cybercriminals are now threatening physical harm to victims who don't pay up. This isn’t just cyber risk — it's personal risk. 🔗 theregister.com/2025/07/31/r…
1
1
Vlado Vajdic retweeted
Microsoft Active Directory Forest Recovery Guide, by @shorinsean semperis.com/wp-content/uplo…
4
11
Vlado Vajdic retweeted
Ransomware Attacks Escalate to Physical Threats Against Executives ift.tt/sBTXYK2 Semperis found that executives were physically threatened in 40% of ransomware incidents, in a bid to pressure victims to pay demands
Vlado Vajdic retweeted
Heading to #BlackHatUSA? Don’t miss EntraGoat—a vulnerable Microsoft Entra ID environment built for testing real-world misconfigs and attack paths. Presented by @SemperisTech researchers Tomer Nahum & Jonathan Elkabas #BHUSA
4
4
Vlado Vajdic retweeted
ONE OF THESE DAYS....
1
3