Lukas Klein | @rantasec.bsky.social

481 posts

Lukas Klein | @rantasec.bsky.social

Lukas Klein | @rantasec.bsky.social

@RantaSec

Katılım Temmuz 2021
170 Takip Edilen60 Takipçiler
Lukas Klein | @rantasec.bsky.social retweetledi
TrustedSec
TrustedSec@TrustedSec·
Who knew a really long string could make an Entra ID login disappear from the logs entirely? In our #blog, @nyxgeek breaks down how overflowing #Azure's sign-in logging mechanism allowed access tokens to be issued without a single log entry. Read it now! hubs.la/Q047xTVc0
English
3
73
275
71.7K
Lukas Klein | @rantasec.bsky.social retweetledi
HD Moore
HD Moore@hdmoore·
SpecterOps released "DumpGuard" along with a detailed article on how they were able to bypass Windows Credential Guard in both privileged and unprivileged contexts. I learned a ton about Isolated LSA and friends: specterops.io/blog/2025/10/2…
HD Moore tweet media
English
2
60
219
12.8K
Lukas Klein | @rantasec.bsky.social retweetledi
📔 Michael Grafnetter
📔 Michael Grafnetter@MGrafnetter·
Fact: Remote service and scheduled task creation bypass firewalls on DCs and Win file servers because of SMB tunnelling. Solution: Create RPC filters that block MS-SCMR and MS-TSCH over named pipes. The latter has 3 UUIDs, so blocking the atsvc pipe is more elegant. #DSInternals
📔 Michael Grafnetter tweet media📔 Michael Grafnetter tweet media
English
1
35
194
14.1K
Lukas Klein | @rantasec.bsky.social retweetledi
codewhisperer84
codewhisperer84@codewhisperer84·
Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with Kerberos and NTLM. github.com/trustedsec/Tit…
English
14
184
554
91.9K
Lukas Klein | @rantasec.bsky.social retweetledi
📔 Michael Grafnetter
📔 Michael Grafnetter@MGrafnetter·
The DSInternals.RpcFilters PowerShell module for Windows RPC filter management is out! Includes support for the new OpNum matching capability of Windows Server 2025. Looking forward to community feedback. github.com/MichaelGrafnet…
📔 Michael Grafnetter tweet media📔 Michael Grafnetter tweet media📔 Michael Grafnetter tweet media
English
2
3
18
1.3K
Lukas Klein | @rantasec.bsky.social retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
English
140
902
3.2K
470.4K
Lukas Klein | @rantasec.bsky.social retweetledi
Grzegorz Tworek
Grzegorz Tworek@0gtweet·
Can't kill sysmon.exe anymore? Cut it off from its own log by stopping ETW logger! LocalSystem required, of course.
Grzegorz Tworek tweet media
English
2
17
99
7.5K
Lukas Klein | @rantasec.bsky.social retweetledi
SpecterOps
SpecterOps@SpecterOps·
Check out @elad_shamir's recent blog post to learn more about NTLM relay attacks. ⬇️ ghst.ly/4lv3E31
English
0
6
6
1.7K
Lukas Klein | @rantasec.bsky.social retweetledi
SpecterOps
SpecterOps@SpecterOps·
Check out this new blog post from @_wald0 discussing the fundamental components & mechanics that enable the emergence of critical Attack Paths in Microsoft's increasingly popular Intune product. ⬇️ ghst.ly/3Cd5cwH
English
2
48
119
10.5K
Lukas Klein | @rantasec.bsky.social retweetledi
Fabian Bader
Fabian Bader@fabian_bader·
Now available in my tenant ADSynchronization.ReadWrite.All
Fabian Bader tweet media
English
1
3
9
1.2K
Lukas Klein | @rantasec.bsky.social retweetledi
thaddeus e. grugq
thaddeus e. grugq@thegrugq·
The Chinese threat intelligence report is here: mp.weixin.qq.com/s/3bmehaRuvaL5… It’s always nice to see reports from other parts of the world because they can give a different perspective. That said, the translation I read was super confusing so I’m sure I missed some details
Lukasz Olejnik@lukOlejnik

The Chinese Computer Emergency Response Center announced that a U.S. intelligence agency hacked an advanced materials unit and an energy-focused company, stealing important trade secrets and intellectual property via trojans. globaltimes.cn/page/202412/13…

English
12
96
352
70.5K
Lukas Klein | @rantasec.bsky.social retweetledi
%TEMP%
%TEMP%@TEMP43487580·
I finished my talk at BHEU! The attack methods and techniques shared in the talk are not a great deal, but I hope this serves as an opportunity to draw attention to the importance of security measures for Intune. Here is the tool released for the talk. github.com/secureworks/py…
English
5
54
138
26.2K
Lukas Klein | @rantasec.bsky.social retweetledi
Muhammad Umair
Muhammad Umair@m_umairx·
FLARE is releasing a tool today that I've been working on over this year that helps break down binaries into smaller functional clusters and uses Gemini to describe their relationships, behavior and the overall malware functionality. It's called XRefer and it is out for you to read about and try out. Check out the write up here, and look below for some examples: cloud.google.com/blog/topics/th…
English
5
117
425
48.1K
Lukas Klein | @rantasec.bsky.social retweetledi
Tal Be'ery
Tal Be'ery@TalBeerySec·
Unauthenticated Remote Code Execution (RCE) on Domain Controllers (DC). It does not get worse than that. Probably will be included in #ransomware campaigns. Any technical analysis of CVE-2024-49112 published? CC: @gentilkiwi @harmj0y @_wald0
Tal Be'ery tweet media
English
16
178
645
146.8K
Lukas Klein | @rantasec.bsky.social retweetledi
Joe Stocker
Joe Stocker@ITguySoCal·
How many audits or IR engagements do you think pull the UAL without checking if any accounts have Audit Bypass enabled?
Joe Stocker@ITguySoCal

@malmoeb even if Audit Logging is enabled tenant wide, it can still be disabled on individual accounts. To find out if it has been disabled run this in EXO: Get-MailboxAuditBypassAssociation -ResultSize unlimited | Format-Table Name,AuditBypassEnabled Source: learn.microsoft.com/en-us/powershe…

English
2
8
31
5.1K
Lukas Klein | @rantasec.bsky.social retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph 😃
English
6
119
346
36.1K
Lukas Klein | @rantasec.bsky.social retweetledi
Dr. Nestori Syynimaa
Dr. Nestori Syynimaa@DrAzureAD·
New #AADInternals version is finally out now: ▪ Moved endpoint related stuff to new module: AADInternals-Endpoints ▪ Added blue team stuff: Get app consent info, find backdoors, convert SID<>Entra ID Object ID, find abusable dynamic groups ▪ Added red team stuff: Get ESTSAUTH cookies, export Intune certificate, invoke PS scripts as system or other users See full change log at: #version-info" target="_blank" rel="nofollow noopener">aadinternals.com/aadinternals/#…
Dr. Nestori Syynimaa tweet media
English
7
119
412
27.1K
Lukas Klein | @rantasec.bsky.social retweetledi
thaddeus e. grugq
thaddeus e. grugq@thegrugq·
The systems used to intercept those calls were designed, built and installed specifically for the FBI to intercept calls. These systems were working exactly as intended, except being operated by “the bad guys.” A scenario always raised as a reason for strong encryption.
John Scott-Railton@jsrailton

Don't forget: the government spent decades warning us against against encryption. Short-sighted gaslighting that made America less safe.

English
5
142
385
31.2K