OmriR7
@0xMRI_
Followers
58
Following
1K
Media
16
Statuses
597
Omri Refaeli @msftsecurity , MDE Research https://t.co/JRG7TPviM0 | https://t.co/xZSLMVBhZb
Israel
Joined March 2018
Ever wanted to learn (or teach) PowerShell? I built an interactive game that teaches principles hands-on in a playful few-hour session. No prior PS experience is required. Originally designed to be instructed for groups, but works great solo too🙌🏻 Readme👇 https://t.co/NPxNdPiFUX
github.com
Fun with Powershell exercise. Using a terminal-like CTF, the players would get hands-on proficiency with Powershell - omrirefaeli/PowershellZeroToHero
0
0
0
ICYMI: Wrote a 2-piece blog to help you catch up from scratch on cloud authentication and authorization from a security perspective. Part 1: How AD, Entra, and Azure interact [ https://t.co/PkCFRV4b0w] Part 2: Access/Refresh Tokens, endpoint artifacts [ https://t.co/6Dt3Pxu28f]
omrirefaeli1.medium.com
How cloud authentication really works, how attackers steal tokens to hijack sessions, and how you can spot and defend against these threats
0
0
2
Was especially fun writing this one! Cloud ransomware is real and it's here!
The financially motivated threat actor Storm-0501 has continuously evolved to achieve sharpened focus on cloud-based TTPs as their primary objective shifted from deploying on-premises endpoint ransomware to using cloud-based ransomware tactics.
0
3
11
Cookie theft has evolved. 🍪 Over the last year, stealing cookies on Windows devices has changed significantly for Chromium browsers like Chrome and Edge. Andrew Gomez dives into these changes, how threat actors adapt, & new detection opportunities.
specterops.io
Explore how cookie theft has evolved in Chromium browsers with the shift from DPAPI to App-Bound encryption. This post breaks down modern cookie stealing techniques via COM, remote debugging, and...
3
76
154
I just started a new blog, and this is my first post. I took a bit of PTO, so this is a little record of some fun I had playing around with Intune during that time. It's about enrollment restriction bypass😄 https://t.co/o9CcXHN4b8
temp43487580.github.io
Ways of device ownership spoofing and more for persistent access to Intune
15
68
245
I found that using RegQueryMultipleValuesW to read sensitive registry values bypasses nearly all the EDRs I tested. Alongside NtOpenKeyEx with OpenOptions 0x04, you can read Windows secrets without touching the disk and without SYSTEM. More here: https://t.co/JIRHB23l1s
7
56
219
🚨 SOC Analysts, Incident Responders, and Detection Engineers, Be careful when using the new SessionId information in Entra ID. Learn why 👇 https://t.co/Bwg1rWsje4
#ThreatHunting #DetectionEngineering #IncidentResponse #DFIR
academy.bluraven.io
Learn why Entra ID linkable token identifier leaves gaps for incident responders and detection engineers.
0
28
120
Entra Connect Attacker Tradecraft, by @hotnops Part 1 https://t.co/1TvCeC6zUW Part 2 https://t.co/9oU6rwbixx Part 3
specterops.io
How Entra Connect and Intune can be abused via userCertificate hijacking to bypass conditional access and compromise hybrid domains
0
28
65
This post is SO GOOD! I knew nothing about easy auth, It's so interesting! And the abuse ideas are so creative! It's not the first time i see how env variables on app lead to such things (See MI research by NetSpy). Go read it! https://t.co/uu4pgl574L
1
12
76
How to find the Entra ID sync server - A new NetExec module🔎 Inspired by the great Entra ID talks at #Troopers25, I looked into how to find the Entra ID sync server. Results: The description of the MSOL account, as well as the ADSyncMSA service account reference this server🚀
10
138
497
If you want to know how to bring your own IDP in Entra, and abuse OIDC protocols for persistence, my x33fcon talk is now on YouTube 😀
#x33fcon 2025 talks: @dirkjan - Bringing Your Own Identity Provider to Entra for Persistence and MFA Bypasses > https://t.co/tQA79Tab2e
3
54
166
My latest blog post just dropped! This time it's about Entra 🆔 "High-Profile Cloud Privesc" revisits an old PowerShell trick to pivot from cloud to endpoint - or how to elevate to Global Admin from 'OneDrive Admin'-equivalent permissions https://t.co/m5pS7VAOeW
labs.reversec.com
Revisiting PowerShell Profile Tricks in Entra Environments
3
48
141
Wrote a security intro blog post on authentication and authorization in the cloud. Specifically about AD, Entra, and Azure, involving token-based authentication, and some attack scenarios. Part 2/2 is out soon! https://t.co/PkCFRV4IQ4
omrirefaeli1.medium.com
If you are coming from an on-prem background like me, familiar with how security works with Kerberos, Active Directory, and Domain…
0
0
1
EntraPassTheCert. post-exploitation tool that allows attackers to request Entra ID's user P2P certificate and authenticate to a remote Entra joinned machine with it, by @TEMP43487580
https://t.co/llEOI3WQCs
github.com
tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it - temp43487580/EntraPassTheCert
0
11
31
After today’s talk at #TROOPERS25 I’m releasing BitlockMove, a PoC to execute code on remote systems in the context of a loggedon user session 🔥 https://t.co/zXbngHQZDD No need to steal credentials, no impersonation, no injection needed 👌
github.com
Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking - rtecCyberSec/BitlockMove
8
174
446
Troopers just started, and so many things are out already!! https://t.co/gA1ac3ymbD
semperis.com
Think nOAuth abuse is old news? We wish. Our recent testing shows that nearly 10% of apps in the Microsoft Entra Gallery remain vulnerable.
0
7
26
Including nice tool release 🔥 https://t.co/4v2osVGTfA
github.com
tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it - temp43487580/EntraPassTheCert
1
73
195
Here is the second part of the Windows IPC series. As planned, I've started with RPC. The third and fourth parts will come soon. https://t.co/8LqgWzNhTF
sud0ru.ghost.io
Let’s continue our journey into the world of IPC. As I mentioned in part one, we’re starting with RPC (Remote Procedure Call). I also said in my strategy that I’d begin with a high-level network...
2
51
132