Haus3c Profile Banner
Ryan Profile
Ryan

@Haus3c

Followers
7K
Following
3K
Media
89
Statuses
1K

Former red teamer, current cloud security researcher

Charlotte, NC
Joined November 2015
Don't wanna be here? Send us removal request.
@Haus3c
Ryan
26 days
I merged a PR from @ScoubiMtl that now includes compatibility with BHCE. Thanks @ScoubiMtl !
Tweet card summary image
github.com
Custom Query list for the Bloodhound GUI based off my cheatsheet - hausec/Bloodhound-Custom-Queries
2
32
106
@_dirkjan
Dirk-jan
2 months
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog:
dirkjanm.io
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise...
143
906
3K
@_dirkjan
Dirk-jan
4 months
It's been almost a year since my last blog... So, here is a new one: Extending AD CS attack surface to the cloud with Intune certificates. Also includes ESC1 over Intune (in some cases). https://t.co/Dm1x9ORW7Q Oh, and a new tool for SCEP:
dirkjanm.io
Active Directory Certificate Services (AD CS) attack surface is pretty well explored in Active Directory itself, with *checks notes* already 16 “ESC” attacks being publicly described. Hybrid certif...
8
194
530
@Haus3c
Ryan
4 months
Token abuse is finally more easily detectable.
@merill
Merill Fernando
4 months
🔥 Security researchers! Microsoft Entra ID’s new linkable token identifiers are a game-changer for tracking identity threats! 🕵️‍♂️ Correlate auth events across logs (Entra, Exchange, Teams, SharePoint) to hunt attackers. Dive in: https://t.co/vlwq4jgyJ6
0
1
3
@Haus3c
Ryan
5 months
Good try mate
0
0
1
@kfosaaen
Karl
11 months
New @NetSPI blog out today on "Hijacking Azure Machine Learning Notebooks (via Storage Accounts)". This is very similar to Storage Account attacks that have been done against Function/Logic Apps and Cloud Shell -
Tweet card summary image
netspi.com
Abusing Storage Account Permissions to attack Azure Machine Learning notebooks
3
30
90
@usetraceix
Traceix
11 months
Linux sucks as a desktop.
@linuxopsys
Linuxopsys
11 months
2025 is the year of Linux desktops.🐧
112
18
866
@preludeorg
Prelude
1 year
Test-driven development—not just for software engineering. @matterpreter breaks down how applying this logic streamlines how you execute, evaluate, and iterate on your detections to better augment your defensive coverage https://t.co/MOIyRSTk2V
0
6
11
@DebugPrivilege
DebugPrivilege
1 year
Very happy to see Shiva P from @Microsoft DART blogging about this topic on how to hunt in Graph API logs. Shiva P will also present this topic at @OrangeCon_nl so make sure to check it out! He's a great guy and I'm happy for him!
3
25
85
@Haus3c
Ryan
1 year
Pretty wild time gap for logs to actually show up.
0
0
3
@Haus3c
Ryan
2 years
$105k a year to relocate to Riyadh? Are these recruiters insane?
5
0
5
@Haus3c
Ryan
2 years
While working at Microsoft, it was somewhat frowned upon to call the baby (Azure logs) ugly. But now I get to call it like it is, so I wrote about trying to make the most out of basically nothing
Tweet card summary image
trustoncloud.com
Whilst researching our ThreatModel for Azure Managed Identity, we discovered some challenges in detecting Managed Identity (MI) abuse that are worth
3
38
120
@Haus3c
Ryan
2 years
This is quite frustrating. When viewing managed identity sign in logs via portal, the time stamp differs from Log Analytics. Por que? This fucks with some detection logic I have :(. I know one is in UTC time, but specifically the minute & seconds shouldn't be different.
2
0
4
@Haus3c
Ryan
2 years
One thing I'd like to get back to doing is publicizing a lot of my research again. Publishing stuff publicly was almost taboo at MSFT, so I'd like to get back to posting blogs, updating PowerZure more frequently, and bettering the overall Azure security landscape.
2
2
22
@Haus3c
Ryan
2 years
ATRM has been handed off to my team and it's ultimately up to them what they want to do with it. It's still an OSS project so PRs are still open, but how quickly it'll be handled is out of my control.
1
0
7
@Haus3c
Ryan
2 years
After 3 years at Microsoft I've decided to move on. There are several reasons, which I won't get into here, but I enjoyed my time working on some very cool projects that I learned so much on. I'm now the Principal Lead Researcher for @trustoncloud, handling the Azure practice.
2
2
49
@kfosaaen
Karl
2 years
As a follow up on this thread, we have a new @NetSPI blog out today that explains how we were able to get the App Registration certificates for Managed Identities that were attached to Linux Function App containers. https://t.co/BXld6I84vt
@kfosaaen
Karl
2 years
A question for my Azure friends: Assume that you have abused an Azure service to compromise the private certificate associated with a Managed Identity's Service Principal and can now authenticate (off the resource) as that Managed Identity. How serious do you think this is?
2
15
38