Tech Brandon

2.8K posts

Tech Brandon banner
Tech Brandon

Tech Brandon

@TechBrandon

Father. Engineer. Learner. Lurker. AD, Entra/Azure & enterprise security specialist. Senior Security Consultant @trustedsec. Fellow Human Being.

Sumali Ağustos 2011
409 Sinusundan1.2K Mga Tagasunod
Tech Brandon nag-retweet
TrustedSec
TrustedSec@TrustedSec·
One of our own is taking the stage at @OneRSAC! Next Thursday, don't miss Identity Security Architect @PyroTek3's talk, "Entra the Dragon—Entra ID Attack & Defense". Be sure to reserve your seat if you're attending! hubs.la/Q047BdRS0
TrustedSec tweet media
English
1
7
9
1.7K
Tech Brandon
Tech Brandon@TechBrandon·
@merill I'm sure it was an honor just to be nominated.
English
1
0
1
164
Merill Fernando
Merill Fernando@merill·
Big news 🚨 I’ve been nominated as a “Top 5 Pioneering Leader Shaping the Future in 2026.” The nomination only costs $3500. Actually… $2450 now because of a special leadership discount. If this keeps going I might become a pioneer for $499 by Friday.
Merill Fernando tweet media
English
16
2
97
5.6K
Justin Elze
Justin Elze@HackingLZ·
@HackingDave The thing holding you back is it can’t make you an Ironman suit.
English
3
0
9
1.4K
Dave Kennedy
Dave Kennedy@HackingDave·
I still don’t understand the whole AI personal assistant thing. I’ve really tried - I don’t want to give AI access to emails, calendar.. I tried perplexity with a Mac mini - it was awful. Zero use that I can see. What am I missing? Claude is amazing - my mind to code is incredible. This whole AI personal assistant that runs your workflows… I run multiple companies and already have pulse checks on it all.. just don’t see the need or any major gain.
English
89
16
292
43.6K
Tech Brandon
Tech Brandon@TechBrandon·
@curi0usJack If only they standardized on the enable = good/disable = bad methodology instead of all those double negatives.
English
5
0
31
2.1K
Tech Brandon
Tech Brandon@TechBrandon·
@HackingLZ I'm in the twitter bubble and I was still one of those people this week. I probably attribute the bubble to being so apprehensive and shameful about my lack of AI knowledge. Turns out I'm a little better off than I thought I was.
English
0
0
1
89
Justin Elze
Justin Elze@HackingLZ·
The Twitter bubble thing is real I keep running into people who haven’t tried any of the cli tools codex/claude
English
19
3
94
8.8K
Tech Brandon nag-retweet
Merill Fernando
Merill Fernando@merill·
👋 If you manage Microsoft Entra, this episode is worth your time. 🎙️🎧 @NathanMcNulty and @DanielatOCN joined me for a deep dive into all the February Entra announcements. Here's a 🧵 of what we covered. Bookmark it. Full episode: entra.chat 1/12
Merill Fernando tweet media
English
2
20
96
6.1K
Tech Brandon
Tech Brandon@TechBrandon·
@_MG_ Much respect for this comment. I mean already had respect but more now.
English
1
0
1
145
MG
MG@_MG_·
I’m seeing complaints that I’m not explaining what the device does & not making it easier for myself to sell more. I assure you, LE evidence pics are NOT the product placement I aim for. If you can safely use these, you probably already know what they do. If you have to be convinced in this thread, then you are far more likely to draw negative attention. You may disagree, but I have years of track record to back up my choices.
English
3
0
111
14.2K
MG
MG@_MG_·
Not sure why you’d carry this with you while on the run??! I just caught up on this story. The guy had tens of millions of crypto stolen from the US Marshals Service. He had a penchant for flexing. Someone rage baited him into showing off his wallet values. An op (presumably) passed a recording to @zachxbt who used it to connect the dots to his real name and the fact that his dad had a company contracting for the US Marshals Service, managing seized crypto. Soon after, he went on the run and the FBI got a nice Caribbean out of it. If I had to guess, the dad wasn’t involved and his kid just destroyed the family business/reputation. It’s hard to be that involved in the industry (as the dad) and think you have any chance of getting away. But who knows…
MG tweet media
FBI Director Kash Patel@FBIDirectorKash

Last night, John Daghita – a U.S. government contractor who allegedly stole more than $46 million in cryptocurrency from the U.S Marshals Service – was arrested on the island of Saint Martin by the French Gendarmerie’s premier elite tactical unit in a joint operation with the @FBI.   Thanks to the International Cooperation Team Serious Crime Unit of the French Gendarmerie National in Saint Martin, and the Groupe d’intervention de la Gendarmerie nationale of Guadeloupe for the outstanding coordination.   FBI will continue working 24/7 with our international partners to track down, apprehend, and bring to justice those who attempt to defraud American taxpayers—no matter where they try to hide.

English
37
50
1.1K
271.1K
Tech Brandon
Tech Brandon@TechBrandon·
@techspence Active Directory should stick around long enough for retirement right?
English
1
0
3
41
spencer
spencer@techspence·
Would you rather… Have to secure Wordpress or OpenClaw? (for the rest of your life if you had one singular job and this was it)
English
29
2
37
5.6K
Tech Brandon
Tech Brandon@TechBrandon·
I once had an admin tell me that they changed their password 12 times just so they could go back to their original password... Don't underestimate the creativity of users.
Sean Metcalf@PyroTek3

In Active Directory, there is a method that’s been around for many years which changes the password last set date but not the actual password. This is what I call a “fake password change” since the account appears to have a recent password when scanning for old passwords based on password last set, but the underlying password hasn’t actually changed. I spoke about this in my 2015 @BSidesCharm talk which was my first conference talk. More details including step-by-step screenshots are here: adsecurity.org/?p=4969 Why does this happen? There are times where service account (or admin accounts) need to have password changes, but someone doesn’t want to do the work to change them. The ability to fake a password change requires modify rights on the pwdLastSet attribute which provides the ability to check/uncheck the setting “User must change password at next logon”. This setting is enabled when you want the user to change their own password when they logon. How does this work? This is simple to do when you have rights on the target account (in this example the password last changed in August 2025). We open up Active Directory Users and Computers (ADUC), double-click on the target account to open up the account properties and then click on the Account tab. From here we check the box for “User must change password at next logon” and click Apply. The PasswordLastSet date is now blank. Which makes it seem like the account has never had a password set. We continue with our process where we uncheck the box for “User must change password at next logon” we checked and then click Apply. After performing this action, the password change date has now been set to the current date and time even though the password itself hasn’t been changed since August 2025. We have successfully faked a password change! Why does this happen? This happens because the “User must change password at next logon” option is used to force a user to change their password at next logon. With it checked, Active Directory is waiting for the user to attempt to logon which is when the user is directed to change their password. During this time the PasswordLastSet value is blank since it is waiting for a new password. Once the user changes their password, the checkbox is effectively removed and the current date and time are set for the user’s passwordlastset property (technically this is the “pwdlastset” attribute, but the AD PowerShell cmdlets use that property). An attacker could use this technique for an account with an old password they discover and have control of the account (with the ability to flip this bit). This would show that the password changed without it actually changing. Detect fake Active Directory password changes at scale I wrote a PowerShell script that will scan either the Active Directory Admins or All Users in the domain to see if there’s a fake password change that has been performed on them. github.com/PyroTek3/Activ…

English
13
56
647
33.8K
Tech Brandon
Tech Brandon@TechBrandon·
@Phatmandrake Yes! Very similar topic to the fake password change. When an administrator (or automated system running as a service account) changes your password, it has no knowledge of password history. That's only checked when authenticated.
English
1
0
0
494
Cat Wearing a Hat
Cat Wearing a Hat@Phatmandrake·
@TechBrandon Amateurs, at University I used to submit helpdesk tickets asking for my password to be reset because it would let me reuse my password.
English
1
0
12
552
Tech Brandon
Tech Brandon@TechBrandon·
@dasgrog @0gtweet Exactly. Users are like water and will usually find the path of least resistance. Resistance is usually something unfounded and deeply personal. But if there's a will, there's a way.
English
0
0
1
33
Tech Brandon
Tech Brandon@TechBrandon·
@0gtweet Yup. I'm not sure if I remember correctly but it might have been 1 day and they changed it 12 days in a row. 🙄
English
1
0
15
911