DirectoryRanger Profile Banner
DirectoryRanger Profile
DirectoryRanger

@DirectoryRanger

Followers
34K
Following
728
Media
383
Statuses
16K

This account assembles and disseminates information related to Active Directory and Windows security.

Joined December 2017
Don't wanna be here? Send us removal request.
@DirectoryRanger
DirectoryRanger
2 years
24/7 Active Directory Incident Response Contact:.Tel. 49 (0) 6221 7569637.E-mail: incident-response@ernw.de.
1
16
83
@DirectoryRanger
DirectoryRanger
5 days
Windows Hello for Business – Past and Present Attacks, by @insinuator #TROOPERS25.
0
11
36
@DirectoryRanger
DirectoryRanger
5 days
RT @DirectoryRanger: 24/7 Active Directory Incident Response Contact:.Tel. 49 (0) 6221 7569637.E-mail: incident-response@ernw.de.
0
16
0
@DirectoryRanger
DirectoryRanger
5 days
Step-by-Step Guide: How to setup conditional access reauthentication policy for PIM.
0
5
34
@DirectoryRanger
DirectoryRanger
5 days
Registry Hive #DFIR.Documentation Data Types Data Types cont. Data Types 4
0
3
18
@DirectoryRanger
DirectoryRanger
6 days
RT @0x534c: Detect anomalous external OAuthApp activity using 🆕ActorInfoString 🔥. KQL Code:..
0
30
0
@DirectoryRanger
DirectoryRanger
6 days
Dissecting RDP Activity #DFIR.
0
13
54
@DirectoryRanger
DirectoryRanger
6 days
RT @netbiosX: Enumerate Domain Users Without Authentication
0
62
0
@DirectoryRanger
DirectoryRanger
6 days
Microsoft Entra Dangerous Defaults, on @heisec.
0
11
43
@DirectoryRanger
DirectoryRanger
6 days
RT @TEMP43487580: Also dropping the link to the new feature added to BAADTokenBroker.
0
2
0
@DirectoryRanger
DirectoryRanger
6 days
RT @ShitSecure: The slides from the talk can be found here:.
0
38
0
@DirectoryRanger
DirectoryRanger
6 days
RT @fabian_bader: My colleague Pascal did an outstanding job dismantling a info stealer that was found in the onboarding phase of a new cus….
0
35
0
@DirectoryRanger
DirectoryRanger
6 days
RT @SpecterOps: This is your reminder to join @Jonas_B_K's talk happening soon at #TROOPERS25! Hear how security boundaries become attack h….
0
6
0
@DirectoryRanger
DirectoryRanger
6 days
RT @Enno_Insinuator: Love this one ;-) #TROOPERS25 #maketheworldasaferplace .(from this talk: .
0
3
0
@DirectoryRanger
DirectoryRanger
6 days
EntraPassTheCert. post-exploitation tool that allows attackers to request Entra ID's user P2P certificate and authenticate to a remote Entra joinned machine with it, by @TEMP43487580.
0
11
30
@DirectoryRanger
DirectoryRanger
6 days
RT @ttdennis: Yesterday at #Troopers25, @twillnix and I published some of our research on Bluetooth headphones and earbuds. We found that….
0
8
0
@DirectoryRanger
DirectoryRanger
6 days
RT @AlmondOffSec: Following @ShitSecure's TROOPERS talk and release of BitlockMove, we're releasing our internal DCOMRunAs PoC made by @SAE….
0
55
0
@DirectoryRanger
DirectoryRanger
6 days
RT @DrAzureAD: Slides from my @WEareTROOPERS talk are available at
Tweet media one
0
51
0
@DirectoryRanger
DirectoryRanger
6 days
Forensic Differences Between Windows 10 and Windows 11 #DFIR.
0
48
164
@DirectoryRanger
DirectoryRanger
6 days
Precious Gemstones: The New Generation of Kerberos Attacks.
0
29
93
@DirectoryRanger
DirectoryRanger
6 days
Automating MS-RPC vulnerability research.
0
6
13