Lukas Klein | @rantasec.bsky.social

480 posts

Lukas Klein | @rantasec.bsky.social

Lukas Klein | @rantasec.bsky.social

@RantaSec

เข้าร่วม Temmuz 2021
170 กำลังติดตาม60 ผู้ติดตาม
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
HD Moore
HD Moore@hdmoore·
SpecterOps released "DumpGuard" along with a detailed article on how they were able to bypass Windows Credential Guard in both privileged and unprivileged contexts. I learned a ton about Isolated LSA and friends: specterops.io/blog/2025/10/2…
HD Moore tweet media
English
2
60
219
12.8K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
📔 Michael Grafnetter
📔 Michael Grafnetter@MGrafnetter·
Fact: Remote service and scheduled task creation bypass firewalls on DCs and Win file servers because of SMB tunnelling. Solution: Create RPC filters that block MS-SCMR and MS-TSCH over named pipes. The latter has 3 UUIDs, so blocking the atsvc pipe is more elegant. #DSInternals
📔 Michael Grafnetter tweet media📔 Michael Grafnetter tweet media
English
1
35
194
14.1K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
codewhisperer84
codewhisperer84@codewhisperer84·
Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with Kerberos and NTLM. github.com/trustedsec/Tit…
English
14
184
554
91.9K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
📔 Michael Grafnetter
📔 Michael Grafnetter@MGrafnetter·
The DSInternals.RpcFilters PowerShell module for Windows RPC filter management is out! Includes support for the new OpNum matching capability of Windows Server 2025. Looking forward to community feedback. github.com/MichaelGrafnet…
📔 Michael Grafnetter tweet media📔 Michael Grafnetter tweet media📔 Michael Grafnetter tweet media
English
2
3
18
1.3K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
Dirk-jan
Dirk-jan@_dirkjan·
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
English
140
902
3.2K
470.4K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
Grzegorz Tworek
Grzegorz Tworek@0gtweet·
Can't kill sysmon.exe anymore? Cut it off from its own log by stopping ETW logger! LocalSystem required, of course.
Grzegorz Tworek tweet media
English
2
17
99
7.5K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
SpecterOps
SpecterOps@SpecterOps·
Check out @elad_shamir's recent blog post to learn more about NTLM relay attacks. ⬇️ ghst.ly/4lv3E31
English
0
6
6
1.7K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
SpecterOps
SpecterOps@SpecterOps·
Check out this new blog post from @_wald0 discussing the fundamental components & mechanics that enable the emergence of critical Attack Paths in Microsoft's increasingly popular Intune product. ⬇️ ghst.ly/3Cd5cwH
English
2
48
119
10.5K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
Fabian Bader
Fabian Bader@fabian_bader·
Now available in my tenant ADSynchronization.ReadWrite.All
Fabian Bader tweet media
English
1
3
9
1.2K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
thaddeus e. grugq
thaddeus e. grugq@thegrugq·
The Chinese threat intelligence report is here: mp.weixin.qq.com/s/3bmehaRuvaL5… It’s always nice to see reports from other parts of the world because they can give a different perspective. That said, the translation I read was super confusing so I’m sure I missed some details
Lukasz Olejnik@lukOlejnik

The Chinese Computer Emergency Response Center announced that a U.S. intelligence agency hacked an advanced materials unit and an energy-focused company, stealing important trade secrets and intellectual property via trojans. globaltimes.cn/page/202412/13…

English
12
96
352
70.5K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
%TEMP%
%TEMP%@TEMP43487580·
I finished my talk at BHEU! The attack methods and techniques shared in the talk are not a great deal, but I hope this serves as an opportunity to draw attention to the importance of security measures for Intune. Here is the tool released for the talk. github.com/secureworks/py…
English
5
54
138
26.2K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
Muhammad Umair
Muhammad Umair@m_umairx·
FLARE is releasing a tool today that I've been working on over this year that helps break down binaries into smaller functional clusters and uses Gemini to describe their relationships, behavior and the overall malware functionality. It's called XRefer and it is out for you to read about and try out. Check out the write up here, and look below for some examples: cloud.google.com/blog/topics/th…
English
5
117
425
48.1K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
Tal Be'ery
Tal Be'ery@TalBeerySec·
Unauthenticated Remote Code Execution (RCE) on Domain Controllers (DC). It does not get worse than that. Probably will be included in #ransomware campaigns. Any technical analysis of CVE-2024-49112 published? CC: @gentilkiwi @harmj0y @_wald0
Tal Be'ery tweet media
English
16
178
645
146.8K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
Joe Stocker
Joe Stocker@ITguySoCal·
How many audits or IR engagements do you think pull the UAL without checking if any accounts have Audit Bypass enabled?
Joe Stocker@ITguySoCal

@malmoeb even if Audit Logging is enabled tenant wide, it can still be disabled on individual accounts. To find out if it has been disabled run this in EXO: Get-MailboxAuditBypassAssociation -ResultSize unlimited | Format-Table Name,AuditBypassEnabled Source: learn.microsoft.com/en-us/powershe…

English
2
8
31
5.1K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
Dirk-jan
Dirk-jan@_dirkjan·
Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph 😃
English
6
119
346
36.1K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
Dr. Nestori Syynimaa
Dr. Nestori Syynimaa@DrAzureAD·
New #AADInternals version is finally out now: ▪ Moved endpoint related stuff to new module: AADInternals-Endpoints ▪ Added blue team stuff: Get app consent info, find backdoors, convert SID<>Entra ID Object ID, find abusable dynamic groups ▪ Added red team stuff: Get ESTSAUTH cookies, export Intune certificate, invoke PS scripts as system or other users See full change log at: #version-info" target="_blank" rel="nofollow noopener">aadinternals.com/aadinternals/#…
Dr. Nestori Syynimaa tweet media
English
7
119
412
27.1K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
thaddeus e. grugq
thaddeus e. grugq@thegrugq·
The systems used to intercept those calls were designed, built and installed specifically for the FBI to intercept calls. These systems were working exactly as intended, except being operated by “the bad guys.” A scenario always raised as a reason for strong encryption.
John Scott-Railton@jsrailton

Don't forget: the government spent decades warning us against against encryption. Short-sighted gaslighting that made America less safe.

English
5
142
385
31.2K
Lukas Klein | @rantasec.bsky.social รีทวีตแล้ว
Jonny Johnson
Jonny Johnson@JonnyJohnson_·
Microsoft's Threat-Intelligence ETW provider now supports events to identify token impersonation attacks. I wrote a blog on these events and how Microsoft is surfacing them: jsecurity101.medium.com/behind-the-mas…
English
3
92
250
19.1K