

spencer
49.3K posts

@techspence
🛠️ Former Sysadmin, now Pentester | Microsoft MVP | Helping IT teams make their environment harder to attack | @SecurIT360 & @CyberThreatPOV




My latest AD toolbelt: ldapdomaindump NetExec impacket adidnsdump certi Certipy BloodHound.py ldeep pre2k certsync hekatomb MANSPIDER Coercer DonPAPI go-windapsearch kerbrute enum4linux-ng.py silenthound.py targetedKerberoast.py FindUncommonShares.py

What I learned from 1,000 hours of internal pentesting in 2025. - LAPS is not as common as you’d think - The built-in domain Administrator account is often misused as a service account - Flat, non-segmented networks are the norm - Too much stock is put into EDR alone - File shares are never checked for credentials - Many IT admins don’t know they have ADCS I could go on. On the bright side, I truly believe these are some of the most solvable IT security issues. If we can’t eliminate credentials from shares how do we expect to defend against more serious issues… Curious what else I see during internal pentest? I wrote more about this on my blog. Read more: spenceralessi.com/post/common-ac…



I got mad about people defending MCP so I made this video. The first minute is just me being very mad, but then I tried to contribute something of value after that. youtube.com/watch?v=m0VyZU…



CISA urges US orgs to secure Microsoft Intune systems after Stryker breach bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Microsoft introduces Backup and Recovery for Microsoft Entra ID! Entra Backup and Recovery solution enables you to quickly recover from malicious attacks or accidental changes by reverting your core tenant objects to any previous state within the last 5 days. With automated backups and granular recovery capabilities, it ensures minimal downtime and supports your business continuity in the face of unexpected disruptions. Entra automatically generates one backup per day, retaining the last 5 days of backup history. You can recover key properties of the following core tenant objects: - Users - Groups - Applications - Conditional access policies - Service principals - Organization - Authentication methods - Authorization policy - Named locations #EntraID #Microsoft365 #Microsoft


Who knew a really long string could make an Entra ID login disappear from the logs entirely? In our #blog, @nyxgeek breaks down how overflowing #Azure's sign-in logging mechanism allowed access tokens to be issued without a single log entry. Read it now! hubs.la/Q047xTVc0




The Trump administration is not considering allowing private companies to carry out cyberattacks on behalf of the government, White House officials said this week, pushing back on speculation about the role of industry in U.S. cyber operations therecord.media/offensive-cybe…


