%TEMP%
@TEMP43487580
Followers
928
Following
1K
Media
12
Statuses
199
Red Team | Beginner @FujitsuOfficial ex @secureworks
opnions are not my own
Joined March 2021
There are many people who inspire me, but @_dirkjan tops the list.🤭 Beyond being a genius, he’s also one of the kindest people in our community. This episode by @merill shows it perfectly 😀 https://t.co/yoysUipayh
entra.news
From Curiosity to CVE: The Story Behind Entra’s Wildest Exploit
1
5
46
Happy to share that I've joined @FujitsuOfficial! I will be doing the same thing, so stay tuned for the next technique I’ll be dropping 🔥
0
1
17
@TEMP43487580 is one of the most brilliant hackers I’ve ever met. He taught me countless things, far more than I could ever put into a single post. I strongly recommend you follow him instead of me! (yes I'm 100% serious!😄) It was a great pleasure working with you...😎
1
2
13
Restricting Entra ID Device join via a group managed by an Access Package could stop this Intune Enrollment Restriction bypass technique. For example create an Entra ID access package to onboard new employees and then they are removed from the group after 3 days. They can
I just started a new blog, and this is my first post. I took a bit of PTO, so this is a little record of some fun I had playing around with Intune during that time. It's about enrollment restriction bypass😄 https://t.co/o9CcXHN4b8
1
10
87
I just started a new blog, and this is my first post. I took a bit of PTO, so this is a little record of some fun I had playing around with Intune during that time. It's about enrollment restriction bypass😄 https://t.co/o9CcXHN4b8
temp43487580.github.io
Ways of device ownership spoofing and more for persistent access to Intune
15
68
244
might be a useful endpoint to see if the target tenant can use Intune for device management? It returns error with the tid of my another tenant where Intune tiral license has ended.
1
1
14
#TROOPERS25 AD & Entra ID Security track resources, on the @ERNW_ITSec blog @Insinuator Featuring @Jonas_B_K @martinhaller_IT @TEMP43487580 @JsQForKnowledge @fabian_bader @_dirkjan @ShitSecure @DrAzureAD @kazma_tw @subat0mik @unsigned_sh0rt @ericonidentity
https://t.co/dmbl9iZSPj
1
34
88
This is awesome work @TEMP43487580 ! SCCM recon from the MP
Uploaded mprecon, a tiny script I made while learning SCCM. It pulls info from MP server like DP locations, site version, build number, SMSID, and device's primary user etc. No special privileges are required. Sometimes works without authentication🤯
0
3
14
Turns out I wasn’t the only one talking to management points for profiling SCCM sites lol @unsigned_sh0rt breaks down the mechanism in detail. Highly recommend his article! https://t.co/gzmJTgiXYm
specterops.io
Network Access Account, Task Sequence, and Collection Settings policies can be recovered from SCCM by relaying a remote management point site system to the site database server.
0
1
9
Uploaded mprecon, a tiny script I made while learning SCCM. It pulls info from MP server like DP locations, site version, build number, SMSID, and device's primary user etc. No special privileges are required. Sometimes works without authentication🤯
github.com
a small script to collect information from a management point - GitHub - temp43487580/mprecon: a small script to collect information from a management point
1
21
79
The slides from #TROOPERS25 are now available🔥 The key point in the talk is that Device Registration Service is often forgotten in Conditional Access, leading to various abuse. This talk introduces one of the examples and explains lateral movement tips. https://t.co/gUcMFvRkxI
It was great to attend #TROOPERS25! Beautiful city, nice weather, talented researchers. My talk was just based on how Entra works but I hope it contributed to the community. Thanks for everyone I had a chance to talk to! No jet lug now. Time to go home😂 https://t.co/VPV45RsbmE
0
29
87
GraphSpy was extremely powerfull in the last engagement, and happy to see pytune integrated with it👏
⚒️ 𝑪𝒓𝒐𝒔𝒔 𝒕𝒐𝒐𝒍 𝒔𝒖𝒑𝒑𝒐𝒓𝒕 — Import/Export device certificates, Primary Refresh Tokens, and WinHello keys to easily switch between your favorite tools (e.g. roadtools, AADInternals, pytune, ...) while keeping track of all your certificates/tokens/keys in GraphSpy.
0
0
6
Since several people already asked: the slides from @fabian_bader and myself for @WEareTROOPERS are available! "Finding Entra ID CA bypasses-the structured way". We talked about FOCI, BroCI, CA bypasses, scopes and getting tons of tokens. Check it at
dirkjanm.io
1
87
230
Also dropping the link to the new feature added to BAADTokenBroker. https://t.co/dRkG01KB66
github.com
0
2
15
It was great to attend #TROOPERS25! Beautiful city, nice weather, talented researchers. My talk was just based on how Entra works but I hope it contributed to the community. Thanks for everyone I had a chance to talk to! No jet lug now. Time to go home😂 https://t.co/VPV45RsbmE
github.com
tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it - temp43487580/EntraPassTheCert
2
23
87
One of the results of the joined research with @_dirkjan is https://t.co/Garwvx3Bzy Basically the yellow pages for Microsoft first party apps. #TROOPERS25
10
70
200
Excited to share that our proposal for BSidesLV, led by Fumiya IMAI, got accepted! Stay tuned for more details!
1
1
18
Happy to share that my talk "The Ultimate Guide for Protecting Hybrid Identities in Entra ID" was accepted to @WEareTROOPERS! https://t.co/y6OS9JW4x3
2
8
85
Incredible line-up for the #TROOPERS25 AD & Entra ID Security Track, featuring @Jonas_B_K @martinhaller_IT @_dirkjan @fabian_bader @DrAzureAD @ShitSecure @subat0mik & many more https://t.co/9Yk5PkhgBZ
linkedin.com
Wow! These are the talks of this year's TROOPERS Conference & Workshops AD & Entra ID Security Track: Jonas Bülow Knudsen: Breaking Boundaries. Unraveling AD Cross-Forest Attack Paths https://lnkd....
1
20
42