Clément Notin

8.7K posts

Clément Notin banner
Clément Notin

Clément Notin

@cnotin

😈 Security research (#ActiveDirectory #EntraID) & pentest 🎉 #CTF @tipi_hack 👨‍💼 Works @TenableSecurity, opinions my own 🪂 https://t.co/4HRwJQ6PUm

France 🇫🇷🗼 Katılım Şubat 2011
975 Takip Edilen5.9K Takipçiler
Sabitlenmiş Tweet
Clément Notin
Clément Notin@cnotin·
Have you ever wondered how to decrypt “encrypted stub data” 🔐 fields in Wireshark when analyzing Kerberos, RPC, LDAP... traffic? ➡️ Ask no more! medium.com/tenable-techbl… 1. get Kerberos keys 2. give keys to Wireshark in a keytab file 3. get decrypted RPC! Works with NTLM too 😉
Clément Notin tweet mediaClément Notin tweet mediaClément Notin tweet mediaClément Notin tweet media
English
5
116
452
0
Clément Notin
Clément Notin@cnotin·
💡 TIL: @SystemInformer (Process Hacker) doesn't catch short lived processes! I always thought it captured all process creations like Procmon. But it actually relies on polling which misses events between refreshes🕵️‍♂️❌ Confirmed by this feature request: github.com/winsiderss/sys…
English
0
1
6
617
Dr. Nestori Syynimaa
Dr. Nestori Syynimaa@DrAzureAD·
Got some great news last week! My research paper titled "Inside Hackers' Mind: A Qualitative Study of Offensive Security Tool Developers" was accepted to be presented at the iceis.scitevents.org conference at the end of May 🎉 This is (hopefully) the last paper of my PhD dissertation in @uniofjyvaskyla. Thanks to all the hackers who participated in the interviews; the world will now have a better understanding of the great minds behind the offensive tools used daily by thousands!
Dr. Nestori Syynimaa tweet media
English
9
22
165
9.8K
Clément Notin
Clément Notin@cnotin·
@insecureagents hi! Have you thought about submitting your podcast to Apple Podcasts? It’d make it easier to subscribe outside of Spotify
English
0
0
1
191
Gonzague 👨🏼‍💻
Gonzague 👨🏼‍💻@gonzague·
Bizarre je pensais que quand tu installais un @home_assistant "neuf" il n'y avait plus ce tableau de bord méga intimidant par défaut? (Ici juste en connectant une alarme @ajax_systems on a tellement d'infos qui remontent..)
Gonzague 👨🏼‍💻 tweet media
Français
13
0
24
9.9K
Rudy Ooms
Rudy Ooms@Mister_MDM·
Ever wondered what those S 1 12 1 entries in your Administrators group actually represent With the new AADSidToNameV2Support feature, Entra group and role SIDs are automatically translated into real names and stored on the device (cached) Here is the blog that explains how it works patchmypc.com/blog/windows-f… #Intune #MSIntune #Windows #Entra #Windows11 #Azure
Rudy Ooms tweet media
Rudy Ooms@Mister_MDM

When you see an S-1-12-1-something SID in (for example) your local Administrators group, you have no idea what it actually represents. Now that’s changing! With the new feature flag active, Windows finally recognizes Entra groups by name. No more guessing which SID, resembles which group . It's now perfect readable. #Intune #MSIntune #Windows #Windows11

English
2
36
138
12.9K
Clément Notin
Clément Notin@cnotin·
@kfosaaen hi! I sent you a DM in case you didn't see it drowned in the spams we get nowadays... I'd love to get your feedback if you the occasion🙏
English
0
0
2
244
Damien N.
Damien N.@CapnChaotik·
@SwiftOnSecurity This was a room in a hotel I stayed at years ago. At the very least there was a controllable blind you could lower between the bedroom and that shower.
Damien N. tweet media
English
6
4
258
26.6K
Jim Sykora
Jim Sykora@JimSycurity·
@cnotin Do you have AD? Then yes, Windows 2000 is still haunting it. :p
English
1
0
2
167
Clément Notin
Clément Notin@cnotin·
👻 Is Windows 2000 still haunting your Active Directory? AD trusts created in the Win2k era never get the WITHIN_FOREST flag, even after later upgrades ➡️ you could misclassify safe internal trusts as risky external ones 💥 ⚠️when "trustAttributes=0" tenable.com/blog/active-di…
English
1
5
14
1.5K
Samuel Path
Samuel Path@smlpth·
I gave a 1h interview on a podcast called Education Futures, talking about recent advancements in AI and their potential impacts on parents and educators. I think many of you will find it interesting and useful. Link to Spotify, Apple Podcast and YouTube below.
English
2
0
6
755
Nathan McNulty
Nathan McNulty@NathanMcNulty·
@cnotin @sapirxfed @merill You mean attacker tools that fill out the description? Not sure :( But we have an MDR that sees this all the time - axios, OfficeHome, etc. where most things get left as default So many of these criminals have no idea what they are doing, just following guides/forum support...
English
1
0
1
110
sapir federovsky
sapir federovsky@sapirxfed·
If you were an attacker, add a secret to an application. What would you write for the description of the secret? Would you leave it empty? Do you have real-world info on this? @merill 🤭
English
5
0
6
3.8K
Clément Notin
Clément Notin@cnotin·
@sapirxfed @merill I even have a nastier one: null byte! Not visible in the Entra admin center, but you see it in the Graph API list devices output
Clément Notin tweet media
English
2
0
5
143
sapir federovsky
sapir federovsky@sapirxfed·
@merill Lol, emoji?? True story: I once found a new register device with this displayname: 😈
English
1
0
1
238
Nathan McNulty
Nathan McNulty@NathanMcNulty·
@sapirxfed @merill lol, based on what I've seen, attackers just run tools as-is... which means if tools are adding a unique description, there's a chance for detection If they use the UI and leave it blank, it uses the portal default, which I suspect most do (or put initials in there)
English
2
0
7
345
Clément Notin
Clément Notin@cnotin·
@merill Haha indeed 😅 I agree with the test title and reco 👌
English
0
0
1
86
Merill Fernando
Merill Fernando@merill·
This is a really good question and is one of tests in the new Zero Trust Assessment that we released release yesterday. Yes, apps with expired creds are BAD. Especially if the apps have privileged permissions to various APIs. It's a ticking time bomb since an attacker that gets into your tenant can add new credentials and stay hidden for years. What's worse, at some point in the future, you might see a credential and assume it's a legitimate and active app. You might think it's unlikely, but this is exactly how Microsoft was impacted (see one of the reports we published on how they attacker pivoted from a test tenant that had a very old/unused app with privileged perms). As part of SFI, at Microsoft we are ruthless about test tenants and inactive apps. The tenants are monitored daily and anything that's not needed or not in use is purged asap. With the Zero Trust Assessment, we are now giving you the same visibility into your tenant. However, this is just step one. You need to do the work to action them. Check out aka.ms/zerotrust/demo for more.
Rogue Bogey@roguebogey

If my tenant has 22K applications with expired secrets, is that bad?

English
6
9
82
14.5K
Clément Notin
Clément Notin@cnotin·
@merill Otherwise I’m afraid admins will assume an incorrect fix which is to just delete these creds, or worse add fresh new ones 😅 rather than cleaning the app
English
1
0
0
155
Clément Notin
Clément Notin@cnotin·
@merill Ok I see what you mean. That this app could be re-used later by attackers. Ok so the issue is of a privileged app, now unused and improperly cleaned (deleted or at least its privileged removed). Exp. creds are the symptom that it’s a ghost app, ready for cleaning. Not the issue!
English
1
0
1
107