Dirk-jan

2.5K posts

Dirk-jan banner
Dirk-jan

Dirk-jan

@_dirkjan

Hacker at @OutsiderSec. Researches AD and Azure (AD) security. Likes to play around with Python and write tools that make work easier.

Katılım Aralık 2017
206 Takip Edilen29.7K Takipçiler
Sabitlenmiş Tweet
Dirk-jan
Dirk-jan@_dirkjan·
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
English
140
902
3.2K
470.4K
Dirk-jan retweetledi
TrustedSec
TrustedSec@TrustedSec·
Who knew a really long string could make an Entra ID login disappear from the logs entirely? In our #blog, @nyxgeek breaks down how overflowing #Azure's sign-in logging mechanism allowed access tokens to be issued without a single log entry. Read it now! hubs.la/Q047xTVc0
English
3
79
287
74.7K
Dirk-jan
Dirk-jan@_dirkjan·
@EvanKlein338226 I'm not currently aware of another method that gives the same info!
English
0
0
0
124
Evan Klein
Evan Klein@EvanKlein338226·
@_dirkjan The classic "finding out your technique got patched during a live demo" moment 😭 At least it means someone at MS was paying attention to your research. What's your backup enumeration method now?
English
1
0
0
147
Dirk-jan
Dirk-jan@_dirkjan·
It appears that Microsoft removed the discovery of all domains in a tenant through ACS, a technique that I shared at my BH/DC talks last summer (though probably not many people spotted the reference). I found it out during a live demo of course 🙃
Dirk-jan tweet media
English
4
40
229
16K
Andrea P
Andrea P@decoder_it·
Gave some extra work to MSRC 😅
Andrea P tweet media
English
3
0
36
4K
Dirk-jan
Dirk-jan@_dirkjan·
@NathanMcNulty I know the offensive side is tempting, but this is crossing into dark side territory 😅 should I be concerned? 😄
English
5
0
14
2.7K
Nathan McNulty
Nathan McNulty@NathanMcNulty·
Doing some napkin math, I estimate just under 3 hours (fully optimized) to wipe 200K devices via Intune API If an attacker were unaware of API limits being per app, that bumps to ~5.5 hours under ideal conditions What happens if all admin devices are wiped first? 🤔 😳 🥺 😭
Nathan McNulty tweet media
English
11
25
176
19.1K
Dirk-jan
Dirk-jan@_dirkjan·
The next public edition of my "Offensive Entra ID" course will take place from June 8th to 11th in The Hague! Tickets are now available via events.outsidersecurity.nl/entra-26-07/. Last time the tickets sold out in a few weeks, so don't wait too long if you want to secure a spot.
English
0
24
77
9.1K
Andrea P
Andrea P@decoder_it·
With yesterday’s CVE I realized that I reached 20 CVEs. Nothing huge, but an honest number considering this isn’t even my job.🤷‍♂️
English
2
0
55
4.4K
Dirk-jan
Dirk-jan@_dirkjan·
@olafhartong The trees look different than what I remember.
English
1
0
5
1.1K
Olaf Hartong
Olaf Hartong@olafhartong·
Morzine, France 2026
Olaf Hartong tweet mediaOlaf Hartong tweet mediaOlaf Hartong tweet media
Français
1
0
16
1.9K
Dirk-jan
Dirk-jan@_dirkjan·
Forgot to post it, but the recording of my Black Hat talk was released last week. If you're interested in all the hybrid AD attack surface you never knew about, give it a watch: youtu.be/rzfAutv6sB8?si…
YouTube video
YouTube
English
2
109
378
28.1K
Dirk-jan retweetledi
Andrea P
Andrea P@decoder_it·
Just dropped a short post on why some classic NTLM relay tricks seems to be dead on Server 2025. decoder.cloud/2026/02/25/wha…
English
2
65
201
13.4K
Dirk-jan
Dirk-jan@_dirkjan·
There are still some spots left for my class at @1ns0mn1h4ck next month. A good opportunity to visit a great conference in a beautiful place and even learn something about Entra ID at the same time!
Dirk-jan tweet media
English
2
4
15
3.5K
Dirk-jan retweetledi
sapir federovsky
sapir federovsky@sapirxfed·
@shahardorf & I found a phishing campaign abusing oauth applications in Entra in more than 50 organizations! And i promise you that in this blog we explain how you can do it too! And provide all the IOCs 🤭 It's one of these blogs i would enjoy reading! #tldr-0" target="_blank" rel="nofollow noopener">wiz.io/blog/detecting…
English
8
48
179
20.7K
Dirk-jan
Dirk-jan@_dirkjan·
Since I was bored in a plane I decided to revisit some of the Windows Hello tradecraft and finally implemented browser based FIDO2 auth using WHFB keys in roadtx. Thanks @fabian_bader and @NathanMcNulty for the inspiration!
English
4
37
203
19.8K
Nathan McNulty
Nathan McNulty@NathanMcNulty·
@_dirkjan @_subTee @fabian_bader @taviso Ahh, cool, I tried a minimal implementation to avoid adding dependencies :p For the MS Graph flow, don't you need an app registration for that? I couldn't get it work with delegated permissions :( The advantage of the one I got working is it uses delegated auth in My Signins :)
English
1
0
0
87
Dirk-jan
Dirk-jan@_dirkjan·
@NathanMcNulty @_subTee @fabian_bader @taviso Import cbor2 fixed most of it, plus I followed the documented MS Graph passkey registration flow for a change 😅 using the browser flow for registration would be a nice alternative.
English
1
0
3
106
Nathan McNulty
Nathan McNulty@NathanMcNulty·
@_dirkjan @_subTee @fabian_bader @taviso Haha, nice! I didn't realize you had done the full registration too I was just playing with it to learn, my Python is terrible, so decided it was a good first time to play with Antigravity Can't wait to see how you did it, CBOR dependency questions, command design, etc. :)
English
1
0
1
114