
Dirk-jan
@_dirkjan
Followers
28K
Following
4K
Media
170
Statuses
2K
Hacker at @OutsiderSec. Researches AD and Azure (AD) security. Likes to play around with Python and write tools that make work easier.
Joined December 2017
Some big personal news: last year I decided to start my own company. Today I'm making it official and announcing Outsider Security (@OutsiderSec). My focus will be on Azure AD and Active Directory security, converting my research experience into in-depth tests and advice.
102
87
1K
RT @TEMP43487580: I just started a new blog, and this is my first post. I took a bit of PTO, so this is a little record of some fun I had p….
temp43487580.github.io
Ways of device ownership spoofing and more for persistent access to Intune
0
63
0
If you didn't find my Black Hat / Def Con slides yet, they are available on . Also includes the demo videos where I use actor tokens from on-prem to access SharePoint online and get Global Admin.
dirkjanm.io
2
68
189
RT @RedTeamPT: 👀Turns out MS-EVEN can do a lot more than NULL auth:. In addition to leaking environment variables, it is possible to coerce….
0
44
0
This is awesome research and worth a watch!.
Thanks to everyone who joined my DEFCON33 talk!🎉.For those of you who missed it and are interested in seeing how we can extract cleartext credentials and bypass MFA directly from the official Microsoft login page, I just uploaded the recording to YouTube:.
1
19
101
RT @NathanMcNulty: Le sigh. This isn't bypassing FIDO auth (it's called passkeys now btw). It's just asking the user to use a weaker met….
0
15
0
RT @SpecterOps: PDQ SmartDeploy versions prior to 3.0.2046 used static, hardcoded encryption keys for cred storage. Low-privileged users co….
specterops.io
TL;DR: Prior to version 3.0.2046, PDQ SmartDeploy used static, hardcoded, and universal encryption keys for secure credential storage. Low-privileged users may recover and decrypt privileged creden...
0
51
0
RT @AmberWolfSec: You can read about our overall research project at and learn about a SAML Authentication bypass i….
blog.amberwolf.com
AmberWolf Security Research Blog
0
13
0
At the @msftsecresponse party with @secbughunter (and many others). Collecting all the clippy pins!
1
0
26
Good article from Bleeping Computer about the Exchange hybrid tradecraft I dropped at Black Hat yesterday, with some of my comments on the techniques:
bleepingcomputer.com
CISA has issued an emergency directive ordering all Federal Civilian Executive Branch (FCEB) agencies to mitigate a critical Microsoft Exchange hybrid vulnerability tracked as CVE-2025-53786 by...
3
22
94
RT @CISACyber: ⚠️MS Exchange server hybrid deployment elevation of privilege vulnerability CVE-2025-53786 could allow a threat actor with a….
0
122
0