OmriR7 Profile
OmriR7

@0xMRI_

Followers
58
Following
1K
Media
16
Statuses
597

Omri Refaeli @msftsecurity , MDE Research https://t.co/JRG7TPviM0 | https://t.co/xZSLMVBhZb

Israel
Joined March 2018
Don't wanna be here? Send us removal request.
@0xMRI_
OmriR7
6 months
Ever wanted to learn (or teach) PowerShell? I built an interactive game that teaches principles hands-on in a playful few-hour session. No prior PS experience is required. Originally designed to be instructed for groups, but works great solo too🙌🏻 Readme👇 https://t.co/NPxNdPiFUX
Tweet card summary image
github.com
Fun with Powershell exercise. Using a terminal-like CTF, the players would get hands-on proficiency with Powershell - omrirefaeli/PowershellZeroToHero
0
0
0
@ACEResponder
ACE Responder
2 months
How Windows access tokens work #ThreatHunting #DFIR
0
127
723
@0xMRI_
OmriR7
3 months
ICYMI: Wrote a 2-piece blog to help you catch up from scratch on cloud authentication and authorization from a security perspective. Part 1: How AD, Entra, and Azure interact [ https://t.co/PkCFRV4b0w] Part 2: Access/Refresh Tokens, endpoint artifacts [ https://t.co/6Dt3Pxu28f]
Tweet card summary image
omrirefaeli1.medium.com
How cloud authentication really works, how attackers steal tokens to hijack sessions, and how you can spot and defend against these threats
0
0
2
@ESETresearch
ESET Research
3 months
PromptLock leverages Lua scripts generated from hard-coded prompts to enumerate the local filesystem, inspect target files, exfiltrate selected data, and perform encryption. These Lua scripts are cross-platform compatible, functioning on #Windows, #Linux, and #macOS 2/6
3
23
232
@0xMRI_
OmriR7
3 months
Was especially fun writing this one! Cloud ransomware is real and it's here!
@MsftSecIntel
Microsoft Threat Intelligence
3 months
The financially motivated threat actor Storm-0501 has continuously evolved to achieve sharpened focus on cloud-based TTPs as their primary objective shifted from deploying on-premises endpoint ransomware to using cloud-based ransomware tactics.
0
3
11
@SpecterOps
SpecterOps
3 months
Cookie theft has evolved. 🍪 Over the last year, stealing cookies on Windows devices has changed significantly for Chromium browsers like Chrome and Edge. Andrew Gomez dives into these changes, how threat actors adapt, & new detection opportunities.
Tweet card summary image
specterops.io
Explore how cookie theft has evolved in Chromium browsers with the shift from DPAPI to App-Bound encryption. This post breaks down modern cookie stealing techniques via COM, remote debugging, and...
3
76
154
@TEMP43487580
%TEMP%
3 months
I just started a new blog, and this is my first post. I took a bit of PTO, so this is a little record of some fun I had playing around with Intune during that time. It's about enrollment restriction bypass😄 https://t.co/o9CcXHN4b8
Tweet card summary image
temp43487580.github.io
Ways of device ownership spoofing and more for persistent access to Intune
15
68
245
@haider_kabibo
Haidar
3 months
I found that using RegQueryMultipleValuesW to read sensitive registry values bypasses nearly all the EDRs I tested. Alongside NtOpenKeyEx with OpenOptions 0x04, you can read Windows secrets without touching the disk and without SYSTEM. More here: https://t.co/JIRHB23l1s
7
56
219
@Cyb3rMonk
Mehmet Ergene
4 months
🚨 SOC Analysts, Incident Responders, and Detection Engineers, Be careful when using the new SessionId information in Entra ID. Learn why 👇 https://t.co/Bwg1rWsje4 #ThreatHunting #DetectionEngineering #IncidentResponse #DFIR
academy.bluraven.io
Learn why Entra ID linkable token identifier leaves gaps for incident responders and detection engineers.
0
28
120
@sapirxfed
sapir federovsky
4 months
This post is SO GOOD! I knew nothing about easy auth, It's so interesting! And the abuse ideas are so creative! It's not the first time i see how env variables on app lead to such things (See MI research by NetSpy). Go read it! https://t.co/uu4pgl574L
1
12
76
@al3x_n3ff
Alex Neff
4 months
How to find the Entra ID sync server - A new NetExec module🔎 Inspired by the great Entra ID talks at #Troopers25, I looked into how to find the Entra ID sync server. Results: The description of the MSOL account, as well as the ADSyncMSA service account reference this server🚀
10
138
497
@_dirkjan
Dirk-jan
4 months
If you want to know how to bring your own IDP in Entra, and abuse OIDC protocols for persistence, my x33fcon talk is now on YouTube 😀
@x33fcon
/ˈziːf-kɒn/
4 months
#x33fcon 2025 talks: @dirkjan - Bringing Your Own Identity Provider to Entra for Persistence and MFA Bypasses > https://t.co/tQA79Tab2e
3
54
166
@LAripping
Leo Tsaousis
4 months
My latest blog post just dropped! This time it's about Entra 🆔 "High-Profile Cloud Privesc" revisits an old PowerShell trick to pivot from cloud to endpoint - or how to elevate to Global Admin from 'OneDrive Admin'-equivalent permissions https://t.co/m5pS7VAOeW
Tweet card summary image
labs.reversec.com
Revisiting PowerShell Profile Tricks in Entra Environments
3
48
141
@0xMRI_
OmriR7
4 months
Wrote a security intro blog post on authentication and authorization in the cloud. Specifically about AD, Entra, and Azure, involving token-based authentication, and some attack scenarios. Part 2/2 is out soon! https://t.co/PkCFRV4IQ4
omrirefaeli1.medium.com
If you are coming from an on-prem background like me, familiar with how security works with Kerberos, Active Directory, and Domain…
0
0
1
@DirectoryRanger
DirectoryRanger
5 months
EntraPassTheCert. post-exploitation tool that allows attackers to request Entra ID's user P2P certificate and authenticate to a remote Entra joinned machine with it, by @TEMP43487580 https://t.co/llEOI3WQCs
Tweet card summary image
github.com
tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it - temp43487580/EntraPassTheCert
0
11
31
@_winterknife_
winterknife 🌻
5 months
Just released a WinDbg extension to read the IDT :) https://t.co/1BkmCBNTVP
5
49
207
@ShitSecure
S3cur3Th1sSh1t
5 months
After today’s talk at #TROOPERS25 I’m releasing BitlockMove, a PoC to execute code on remote systems in the context of a loggedon user session 🔥 https://t.co/zXbngHQZDD No need to steal credentials, no impersonation, no injection needed 👌
Tweet card summary image
github.com
Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking - rtecCyberSec/BitlockMove
8
174
446
@ShitSecure
S3cur3Th1sSh1t
5 months
Including nice tool release 🔥 https://t.co/4v2osVGTfA
Tweet card summary image
github.com
tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it - temp43487580/EntraPassTheCert
@ShitSecure
S3cur3Th1sSh1t
5 months
Compromising Entra joined devices with P2P certificate authentication by @TEMP43487580 👀👌
1
73
195