MGrafnetter Profile Banner
📔 Michael Grafnetter Profile
📔 Michael Grafnetter

@MGrafnetter

Followers
3K
Following
251
Media
67
Statuses
357

Principal Security Researcher @SpecterOps, Microsoft MVP Identity & Access

Prague, Czech Republic
Joined October 2015
Don't wanna be here? Send us removal request.
@MGrafnetter
📔 Michael Grafnetter
5 months
Together with @pavelfor, we have created the ultimate guide and tooling for configuring host-based firewalls on #ActiveDirectory domain controllers in enterprise environments. Blocks most remote command execution and authentication coercion techniques.
Tweet media one
Tweet media two
Tweet media three
7
70
233
@MGrafnetter
📔 Michael Grafnetter
10 days
New blog post covering the end-to-end automation of OAuth 2.0 service/daemon application registration in Microsoft Entra ID using PowerShell Graph SDK.
Tweet card summary image
dsinternals.com
Introduction It is best practice to register applications in Entra ID using PowerShell (or another automation tool that utilizes the Microsoft Graph API), rather than adding them manually through...
0
12
51
@MGrafnetter
📔 Michael Grafnetter
1 month
RT @CQUREAcademy: Here’s a recap from the CyberGen Conference with our expert @MGrafnetter 👀. Michael was there with a workshop on AD secur….
0
1
0
@MGrafnetter
📔 Michael Grafnetter
3 months
RT @DrAzureAD: My new blog post on getting plaintext gMSA secrets available at Credits to @PyroTek3, @MGrafnetter,….
0
72
0
@MGrafnetter
📔 Michael Grafnetter
4 months
RT @gentilkiwi: Maybe #mimikatz3 will be signed by @BurgerKingFR.
0
29
0
@MGrafnetter
📔 Michael Grafnetter
5 months
Here is a new custom administrative template (ADMX) for editing and auditing Microsoft Defender Attack Surface Reduction (ASR) policies, without being exposed to the rule GUIDs.
Tweet media one
Tweet media two
Tweet media three
3
15
95
@MGrafnetter
📔 Michael Grafnetter
5 months
New Indicator of Compromise (IoC) by the NTLM Relay Attack with Shadow Credentials, thanks to bugs in Impacket, a popular Python implementation. Will probably be fixed in the near future.
Tweet card summary image
dsinternals.com
TL;DR The current implementation of the shadow credentials attack in the Impacket framework, most notably used by the ntlmrelayx.py script, contains multiple bugs, leaving unique signatures on...
1
53
154
@MGrafnetter
📔 Michael Grafnetter
5 months
#DSInternals 5.0 is out. Supports recovery of BitLocker keys, LAPS passwords, DNS zone files, contact information, organizational structure, and OS versions from #ActiveDirectory ntds.dit files. Includes some performance improvements as well. Examples:
Tweet media one
Tweet media two
6
71
244
@MGrafnetter
📔 Michael Grafnetter
1 year
Administrative registration of Passkeys (i.e. FIDO2 security keys or Microsoft Authenticator app) on behalf of other Microsoft Entra ID users is now possible using the new DSInternals.Passkeys #PowerShell module. #Passwordless
Tweet media one
2
17
72
@MGrafnetter
📔 Michael Grafnetter
1 year
When I was offered a ride to Heidelberg, I wasn't expecting this. See you at ⁦@WEareTROOPERS⁩ Roundtables!
Tweet media one
1
1
21
@MGrafnetter
📔 Michael Grafnetter
1 year
RT @PyroTek3: Domain Admin credentials delivered across the network to workstations and servers.
0
14
0
@MGrafnetter
📔 Michael Grafnetter
1 year
RT @SagieDulce: @MGrafnetter directed my attention to a new RPC filter capability!. Good job by @MSFTResearch / @Microsoft for this. I Hope….
0
5
0
@MGrafnetter
📔 Michael Grafnetter
1 year
Has anyone else noticed this ntdsutil typo, which has been present in Windows Server for as long as I can remember? It always catches my eye while creating #ActiveDirectory IFM backups, but is too silly to report to Microsoft Support. CC: @SteveSyfuhs
Tweet media one
0
0
10
@MGrafnetter
📔 Michael Grafnetter
1 year
RT @CQUREAcademy: Meet @MGrafnetter, our Cybersecurity Expert, during his #MSBuild session taking place in Riyadh, Saudi Arabia. 📅 May 7.⏰….
0
1
0
@MGrafnetter
📔 Michael Grafnetter
1 year
RT @kmcnam1:
Tweet media one
0
218
0
@MGrafnetter
📔 Michael Grafnetter
1 year
Listing all #FIDO2 security keys / #Passkeys registered in Microsoft Entra ID using Microsoft Graph #PowerShell SDK.#Passwordless
Tweet media one
Tweet media two
0
11
31
@MGrafnetter
📔 Michael Grafnetter
1 year
Extending Active Directory Users and Computers context menus with PowerShell.
Tweet media one
7
75
242