%TEMP% Profile
%TEMP%

@TEMP43487580

Followers
928
Following
1K
Media
12
Statuses
199

Red Team | Beginner @FujitsuOfficial ex @secureworks

opnions are not my own
Joined March 2021
Don't wanna be here? Send us removal request.
@sapirxfed
sapir federovsky
1 month
There are many people who inspire me, but @_dirkjan tops the list.🤭 Beyond being a genius, he’s also one of the kindest people in our community. This episode by @merill shows it perfectly 😀 https://t.co/yoysUipayh
Tweet card summary image
entra.news
From Curiosity to CVE: The Story Behind Entra’s Wildest Exploit
1
5
46
@TEMP43487580
%TEMP%
2 months
Happy to share that I've joined @FujitsuOfficial! I will be doing the same thing, so stay tuned for the next technique I’ll be dropping 🔥
0
1
17
@kinako_software
kinako
2 months
@TEMP43487580 is one of the most brilliant hackers I’ve ever met. He taught me countless things, far more than I could ever put into a single post. I strongly recommend you follow him instead of me! (yes I'm 100% serious!😄) It was a great pleasure working with you...😎
1
2
13
@ITguySoCal
Joe Stocker
3 months
Restricting Entra ID Device join via a group managed by an Access Package could stop this Intune Enrollment Restriction bypass technique. For example create an Entra ID access package to onboard new employees and then they are removed from the group after 3 days. They can
@TEMP43487580
%TEMP%
3 months
I just started a new blog, and this is my first post. I took a bit of PTO, so this is a little record of some fun I had playing around with Intune during that time. It's about enrollment restriction bypass😄 https://t.co/o9CcXHN4b8
1
10
87
@TEMP43487580
%TEMP%
3 months
I just started a new blog, and this is my first post. I took a bit of PTO, so this is a little record of some fun I had playing around with Intune during that time. It's about enrollment restriction bypass😄 https://t.co/o9CcXHN4b8
Tweet card summary image
temp43487580.github.io
Ways of device ownership spoofing and more for persistent access to Intune
15
68
244
@TEMP43487580
%TEMP%
3 months
might be a useful endpoint to see if the target tenant can use Intune for device management? It returns error with the tid of my another tenant where Intune tiral license has ended.
1
1
14
@unsigned_sh0rt
Garrett
4 months
This is awesome work @TEMP43487580 ! SCCM recon from the MP
@TEMP43487580
%TEMP%
4 months
Uploaded mprecon, a tiny script I made while learning SCCM. It pulls info from MP server like DP locations, site version, build number, SMSID, and device's primary user etc. No special privileges are required. Sometimes works without authentication🤯
0
3
14
@TEMP43487580
%TEMP%
4 months
Turns out I wasn’t the only one talking to management points for profiling SCCM sites lol @unsigned_sh0rt breaks down the mechanism in detail. Highly recommend his article! https://t.co/gzmJTgiXYm
Tweet card summary image
specterops.io
Network Access Account, Task Sequence, and Collection Settings policies can be recovered from SCCM by relaying a remote management point site system to the site database server.
0
1
9
@TEMP43487580
%TEMP%
4 months
Uploaded mprecon, a tiny script I made while learning SCCM. It pulls info from MP server like DP locations, site version, build number, SMSID, and device's primary user etc. No special privileges are required. Sometimes works without authentication🤯
Tweet card summary image
github.com
a small script to collect information from a management point - GitHub - temp43487580/mprecon: a small script to collect information from a management point
1
21
79
@TEMP43487580
%TEMP%
5 months
The slides from #TROOPERS25 are now available🔥 The key point in the talk is that Device Registration Service is often forgotten in Conditional Access, leading to various abuse. This talk introduces one of the examples and explains lateral movement tips. https://t.co/gUcMFvRkxI
@TEMP43487580
%TEMP%
5 months
It was great to attend #TROOPERS25! Beautiful city, nice weather, talented researchers. My talk was just based on how Entra works but I hope it contributed to the community. Thanks for everyone I had a chance to talk to! No jet lug now. Time to go home😂 https://t.co/VPV45RsbmE
0
29
87
@TEMP43487580
%TEMP%
5 months
GraphSpy was extremely powerfull in the last engagement, and happy to see pytune integrated with it👏
@RedByte1337
Keanu Nys
5 months
⚒️ 𝑪𝒓𝒐𝒔𝒔 𝒕𝒐𝒐𝒍 𝒔𝒖𝒑𝒑𝒐𝒓𝒕 — Import/Export device certificates, Primary Refresh Tokens, and WinHello keys to easily switch between your favorite tools (e.g. roadtools, AADInternals, pytune, ...) while keeping track of all your certificates/tokens/keys in GraphSpy.
0
0
6
@_dirkjan
Dirk-jan
5 months
Since several people already asked: the slides from @fabian_bader and myself for @WEareTROOPERS are available! "Finding Entra ID CA bypasses-the structured way". We talked about FOCI, BroCI, CA bypasses, scopes and getting tons of tokens. Check it at
dirkjanm.io
1
87
230
@TEMP43487580
%TEMP%
5 months
Also dropping the link to the new feature added to BAADTokenBroker. https://t.co/dRkG01KB66
Tweet card summary image
github.com
0
2
15
@TEMP43487580
%TEMP%
5 months
It was great to attend #TROOPERS25! Beautiful city, nice weather, talented researchers. My talk was just based on how Entra works but I hope it contributed to the community. Thanks for everyone I had a chance to talk to! No jet lug now. Time to go home😂 https://t.co/VPV45RsbmE
Tweet card summary image
github.com
tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it - temp43487580/EntraPassTheCert
2
23
87
@fabian_bader
Fabian Bader
5 months
One of the results of the joined research with @_dirkjan is https://t.co/Garwvx3Bzy Basically the yellow pages for Microsoft first party apps. #TROOPERS25
10
70
200
@you0708
NAKATSURU You
6 months
Excited to share that our proposal for BSidesLV, led by Fumiya IMAI, got accepted! Stay tuned for more details!
1
1
18
@TEMP43487580
%TEMP%
7 months
👏
@jyadon_sec
jyadon
7 months
My talk was accepted in BSides Laa Vegas!
0
0
3
@DrAzureAD
Dr. Nestori Syynimaa
7 months
Happy to share that my talk "The Ultimate Guide for Protecting Hybrid Identities in Entra ID" was accepted to @WEareTROOPERS! https://t.co/y6OS9JW4x3
2
8
85