_sigil Profile Banner
Katie Knowles Profile
Katie Knowles

@_sigil

Followers
2K
Following
2K
Media
144
Statuses
1K

Senior Security Researcher @ Datadog. 🐕 Head in the (Azure) clouds. Sometimes blogging, always curious. Aim to be, rather than to seem.

Toronto, Ontario
Joined September 2010
Don't wanna be here? Send us removal request.
@_sigil
Katie Knowles
1 month
🕵️‍♀️ Looking to escalate privileges with a first-party Microsoft app? How do federated domain backdoors work? And what's an app reg, really? All this and more in our new @datadoghq Security Labs post:.
Tweet card summary image
securitylabs.datadoghq.com
Backdooring Microsoft's applications is far from over. Adding service principal credentials to these apps to escalate privileges and obfuscate activities has been seen in nation-state attacks, and...
0
25
60
@_sigil
Katie Knowles
5 days
RT @Frichette_n: 😭 Old and busted: Cloud attackers making noisy List/Describe calls. 🔥 New hotness: Laundering enumeration calls through a….
Tweet card summary image
securitylabs.datadoghq.com
Discover how attackers could quietly enumerate AWS resources via Resource Explorer, and how Datadog and AWS worked together to close the visibility gap.
0
9
0
@grok
Grok
5 days
Join millions who have switched to Grok.
243
264
2K
@_sigil
Katie Knowles
10 days
🎉 Exciting news: The Office 365 Exchange Online SP privilege escalation we documented in "I SPy" is no longer possible! We've updated the post to reflect this. Thanks to Eli Guy for the tip on this one:.
Tweet card summary image
securitylabs.datadoghq.com
Backdooring Microsoft's applications is far from over. Adding service principal credentials to these apps to escalate privileges and obfuscate activities has been seen in nation-state attacks, and...
0
8
29
@_sigil
Katie Knowles
11 days
RT @SpecterOps: Why should Microsoft's Nested App Authentication (NAA) should be on your security team's radar? @Icemoonhsv breaks down NAA….
Tweet card summary image
specterops.io
In depth walkthrough for using nested app authentication (NAA), or BroCI, for offensive engagements to access information and resources.
0
21
0
@_sigil
Katie Knowles
14 days
Great seeing everyone at @defcon!! I'll always be in love with seeing so many hackers, villages, and talks from every corner of the world in one place.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
2
11
@_sigil
Katie Knowles
16 days
RT @netbiosX: Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications
Tweet card summary image
research.eye.security
The Eye Security Research team has uncovered a new critical misconfiguration that exposed sensitive data at internal Microsoft applications.
0
5
0
@_sigil
Katie Knowles
16 days
RT @TomerNahum1: Today, together with Jonathan Elkabas, we're releasing EntraGoat - A Deliberately Vulnerable Entra ID Environment. Your o….
0
230
0
@_sigil
Katie Knowles
17 days
RT @chrispy_sec: If anybody is interested in Azure DevOps and how attackers might go about abusing OIDC connections used in pipelines then….
Tweet card summary image
labs.reversec.com
Workload Identity Federation - is it all it makes out to be? Does it really prevent attackers from extracting credentials from pipeline identities that use modern authentication technique?
0
6
0
@_sigil
Katie Knowles
24 days
Excited to see folks at DEFCON next week!! Ready to see some great talks and get those conference steps in. 👟.
0
1
11
@_sigil
Katie Knowles
2 months
We're looking for a curious AI security researcher to join us! 👀.
@Frichette_n
Nick Frichette
2 months
Join my team! We’re looking for a Senior Security Researcher specializing in Generative AI. You’ll have the opportunity to be a part of one of the leading security research organizations in the industry and shape Datadog’s security products! A 🧵.
0
2
7
@_sigil
Katie Knowles
2 months
This is a great point! Ensuring your cloud admins aren't synced users will prevent the federated domain takeover scenario, as only synced users are vulnerable.
@DrAzureAD
Dr. Nestori Syynimaa
2 months
@_sigil Nice talk Katie!.The easiest way to prevent the attack you demonstrated is to avoid giving admin permissions to synced users (=no ImmutableID).
0
0
4
@_sigil
Katie Knowles
2 months
☁️ My fwd:cloudsec talk, "I SPy: Rethinking Entra ID research for new paths to Global Admin", is up! Learn what a service principal is, how Microsoft's first-party apps could be backdoored, and one weird trick they haven't fixed yet:
3
31
77
@_sigil
Katie Knowles
2 months
Thank you for a great week, @fwdcloudsec!! So many fantastic conversations and sessions. See you next year!
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
0
15
@_sigil
Katie Knowles
2 months
RT @kfosaaen: I have a new post out on the @NetSPI blog today. This one is on extracting sensitive information from the Azure Load Testing….
0
21
0
@_sigil
Katie Knowles
2 months
RT @chrispy_sec: My talk was published mega quickly as its own video by @fwdcloudsec (thanks btw!). So feel free to check it out if you wan….
0
12
0
@_sigil
Katie Knowles
2 months
Thanks for joining!.
@Frichette_n
Nick Frichette
2 months
It’s a packed house over at @_sigil talk on Azure Service Principals, a history on backdooring them, and more!
Tweet media one
0
1
14
@_sigil
Katie Knowles
2 months
When the hotel has a free drink for your panic rehearsals. Looking forward to @fwdcloudsec! 🥂
Tweet media one
3
0
40
@_sigil
Katie Knowles
2 months
RT @_dirkjan: Since several people already asked: the slides from @fabian_bader and myself for @WEareTROOPERS are available! "Finding Entra….
dirkjanm.io
0
88
0
@_sigil
Katie Knowles
2 months
RT @fabian_bader: One of the results of the joined research with @_dirkjan is . Basically the yellow pages for Micr….
0
69
0