
Keanu Nys
@RedByte1337
Followers
825
Following
127
Media
15
Statuses
86
Offensive Security Lead @ Spotit. Creator of GraphSpy
Belgium
Joined August 2014
๐I'm finally releasing GraphSpy to the public!๐ต๏ธ.A powerful offensive security tool focused on making initial access and post-compromise enumeration in Microsoft Entra and M365 much more convenient during penetration tests and red team assessments!.
github.com
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI - RedByte1337/GraphSpy
2
135
366
I just noticed that the domain enumeration technique with the Autodiscover endpoint is suddenly not working anymore. This is what tools like @DrAzureAD's AADInternals (Get-AADIntTenantDomains) used to allow unauthenticated enumeration of all domains linked to an Entra ID tenant.
6
17
86
RT @nikhil_mitt: Grab a seat for one of @AlteredSecurity's three popular Red Team classes at @BlackHatEvents . Azure Attacks Advanced (In-โฆ.
0
5
0
โค๏ธโ๐ฅ If you want to support the development of GraphSpy and get early access to new features, check out the ๐ฌ๐ฉ๐จ๐ง๐ฌ๐จ๐ซ ๐ฉ๐๐ ๐ here: Thanks to @infosecnoodle and @q8fawazo for already supporting GraphSpy before this public announcement. โค๏ธ.
0
0
5
โ๏ธ ๐ช๐๐๐๐ ๐๐๐๐ ๐๐๐๐๐๐๐ โ Import/Export device certificates, Primary Refresh Tokens, and WinHello keys to easily switch between your favorite tools (e.g. roadtools, AADInternals, pytune, . ) while keeping track of all your certificates/tokens/keys in GraphSpy.
1
0
2
๐ช ๐ท๐น๐ป ๐ช๐๐๐๐๐๐ โ Generate ๐๐๐ ๐๐จ๐จ๐ค๐ข๐๐ฌ using the Primary Refresh Tokens in GraphSpy, allowing signing in to ๐๐ง๐ฒ ๐ฐ๐๐๐ฌ๐ข๐ญ๐ ๐ฎ๐ฌ๐ข๐ง๐ ๐๐ง๐ญ๐ซ๐ ๐๐ ๐๐ฎ๐ญ๐ก๐๐ง๐ญ๐ข๐๐๐ญ๐ข๐จ๐ง, without needing the ๐ฎ๐ฌ๐๐ซ'๐ฌ ๐ฉ๐๐ฌ๐ฌ๐ฐ๐จ๐ซ๐ ๐จ๐ซ ๐๐
๐!.
1
0
0
๐ฅ๏ธ ๐จ๐๐๐๐๐๐๐๐
๐๐๐๐-๐๐๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐ โ New ๐๐ฎ๐ญ๐จ๐ฆ๐๐ญ๐ข๐ ๐๐๐ญ๐ข๐จ๐ง๐ฌ can be configured to set up persistence within 5 seconds (e.g. ๐ซ๐๐ ๐ข๐ฌ๐ญ๐๐ซ๐ข๐ง๐ /๐ฃ๐จ๐ข๐ง๐ข๐ง๐ ๐ ๐๐๐ฏ๐ข๐๐, requesting a ๐๐๐, ๐๐ง๐ซ๐จ๐ฅ๐ฅ๐ข๐ง๐ WinHello).
1
0
0
๐ค ๐จ๐๐๐๐๐๐๐๐
๐
๐๐๐๐๐ ๐๐๐
๐ ๐๐๐๐๐ โ Skip the first step where the victim needs to fill in the code. GraphSpy ๐ ๐๐ง๐๐ซ๐๐ญ๐๐ฌ ๐ญ๐ก๐ ๐๐๐ฏ๐ข๐๐ ๐๐จ๐๐ ad-hoc, fills it in on the legit devicelogin page, and redirects the user to complete the flow.
1
0
1
RT @lastweekinfosec: ProxyBlobing (@_atsika), SonicWall n-days (@SinSinology), Drag and Pwnd (@d4d89704243), Loki C2 2.0 (@0xBoku), and morโฆ.
blog.badsectorlabs.com
ProxyBlobing (@_atsika), SonicWall n-days (@SinSinology), Drag and Pwnd (@d4d89704243), Loki C2 2.0 (@0xBoku), GraphSpy 1.5.0 (@RedByte1337), and more!
0
8
0
RT @janbakker_: ๐กLearn how to restrict device code flow in Entra ID!.
janbakker.tech
For good reasons, device code flow in Entra ID is getting a lot of attention. Attackers heavily use it to get access to Microsoft 365 accounts and data. Device code phishing is very effective, as...
0
4
0
RT @merill: I just published this week's Entra newsletter!. Featuring @12Knocksinna, @alitajran, @Christian_Frohn, @Ciraltos, @DanielatOCN,โฆ.
0
12
0
RT @mrgretzky: Defenders use cross-origin requests through CSS url() or injected JS to leak your phishing URL in the HTTP Referer header.โฆ.
0
35
0
Last week to register in the Azure Red Team Expert bootcamp from @AlteredSecurity!.Join me during the 4 live sessions in October to level up your Azure Red Teaming skills.
alteredsecurity.com
This 2-week advanced bootcamp is designed to help security professionals in taking their Azure Red Team skills to the next level.
0
1
3