Karl
@kfosaaen
Followers
5K
Following
2K
Media
220
Statuses
3K
VP of Research - @netspi Co-author of “Penetration Testing Azure for Ethical Hackers” (https://t.co/R8AjWWbSyj). @kfosaaen on most other platforms
Oregon, USA
Joined June 2010
We are very excited to announce our new tool - ATEAM Thomas Elling and I have been working on this project for the last year and this tool is the result of the research that we presented at the DEF CON Cloud Village this year.
netspi.com
At DEF CON 33, NetSPI presented a talk about how Azure resources supporting Entra ID authentication expose tenant IDs, enabling attackers to attribute cloud resources to specific organizations at...
1
30
69
We're starting a new series at @NetSPI where I interview our technical leaders. First up is Patrick Sayler, Director of Social Engineering. If you want to hear some fun Social Engineering stories, check it out on YouTube - https://t.co/EZcOTXu9Cp
0
0
4
For anyone that missed it, here's the blog that explains the Deployment Scripts Managed Identity abuse technique -
netspi.com
Learn how to use Deployment Scripts to complete faster privilege escalation with Azure User-Assigned Managed Identities.
0
0
1
Another day, another tool update. We figured out that the Invoke-AzUADeploymentScript MicroBurst function was missed in the "SecureString" token updates, so tokens weren't being extracted. Casting has been fixed and UA-MI tokens are now extracting again! https://t.co/BcMVlhH7jb
github.com
A collection of scripts for assessing Microsoft Azure security - NetSPI/MicroBurst
2
4
13
Not sure if anyone else has run into tooling issues around this, but Azure App Services (including Function Apps) can now have regionality in the hostname (*.eastus-01.azurewebsites.net). I just added a fix for FuncoPop to address this -
github.com
Tools for attacking Azure Function Apps. Contribute to NetSPI/FuncoPop development by creating an account on GitHub.
0
5
10
Thanks for reading! Feel free to reach out if you have any thoughts/questions on the blog.
0
0
2
The new MicroBurst scripts that we're releasing with this blog are built off of some previous research (going back to 2018). I highly recommend checking out the previous research section of blog post to see practical examples from other researchers.
1
0
1
The WireServer service has a certificate endpoint that can be used to get the private cert for decryption of the settings, which often contain sensitive info. Although it requires admin/root permissions to access, the service can be really useful in certain situations.
1
0
1
The service provides access to an encrypted copy of VM extension "Protected" settings, that are also (usually) available on the VM already. @NetSPI covered this in a previous blog -
netspi.com
As a local admin on an Azure VM, run Get-AzureVMExtensionSettings script to decrypt VM extension settings, possibly including Administrator credentials.
1
0
1
The WireServer service (168.63.129.16) acts like a cloud-local HTTP service (similar to the IMDS), as it's only routable from Azure Virtual Machines. It provides a number of different functions, but the one we focus on for the blog is configuration management for VM extensions.
1
0
1
I have a new @NetSPI blog out today that covers the Azure WireServer service. If you're not familiar with it, I'll provide a brief explainer in the thread -🧵 https://t.co/Lxw6DI1Evt
netspi.com
The Azure WireServer service provides configuration data to Azure Virtual Machines. We'll walk through the process of decrypting that data to find sensitive information.
1
3
11
Want to start your career in #pentesting? Join NetSPI U to get hands-on penetration testing experience and work on web application projects. Apply today: https://t.co/FKNOu1om0o
#Portland #Oregon #careers
0
1
2
🎥 Missed the action at @cloudvillage_dc during @defcon ? We’ve got you covered! All Day 1 talks are now live on our YouTube channel 📺 Catch up on the insights, hacks, and cloud security deep dives you might’ve missed! 👉 Watch now: https://t.co/BdfgwntM8x
#defcon33 #defcon
youtube.com
Cloud village is an open space to meet folks interested in offensive and defensive aspects of cloud security. The village is home to various activities like ...
1
6
8
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog:
dirkjanm.io
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise...
143
907
3K
ATEAM - Azure Resource Attribution via Tenant ID Enumeration https://t.co/PHcDqJxtnu
#cyber #threathunting #infosec
reddit.com
Explore this post and more from the blueteamsec community
0
2
8
I’m very honored to have a MicroBurst card in the game. Thanks for including it @BHinfoSecurity!
BACKDOORS & BREACHES - CARD OF THE DAY Have you experienced this type of attack? Deck: Cloud Deck Attack/Procedure Type: Pivot and Escalate Attack/Procedure: Credential Store Compromise Tools: MicroBurst - https://t.co/heIhZ6FpCr Play Backdoors & Breaches for free with your
0
1
3
Slides from our talk can also be found on the GitHub page -
github.com
Contribute to NetSPI/ATEAM development by creating an account on GitHub.
0
2
5
For those that are looking for a direct link to the tool -
github.com
Contribute to NetSPI/ATEAM development by creating an account on GitHub.
2
2
8
Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications
research.eye.security
The Eye Security Research team has uncovered a new critical misconfiguration that exposed sensitive data at internal Microsoft applications.
2
6
27