malmoeb Profile Banner
Stephan Berger Profile
Stephan Berger

@malmoeb

Followers
28K
Following
58
Media
1K
Statuses
3K

Head of Investigations @InfoGuardAG https://t.co/A5lnFAu7eX

Joined October 2012
Don't wanna be here? Send us removal request.
@malmoeb
Stephan Berger
4 days
Today I learned: SeManageVolumePrivilege While reading the HTB write-up for Certificate, I learned about SeManageVolumePrivilege. [1] A video by Grzegorz Tworek goes into great detail about how to abuse SeManageVolumePrivilege.[2] The privilege provides direct access to the
Tweet card summary image
0xdf.gitlab.io
Certificate starts with a school website that accepts assignment uploads in limited formats that includes zip archives. I’ll show two ways to bypass the filters in PHP and upload a webshell - first...
0
13
53
@malmoeb
Stephan Berger
5 days
Coming back to Maester! Do you know about the awesome Conditional Access What-If tests? [1] The first image is from the official documentation and shows how easily you can build your own test scenario. The second image shows the results from a tenant where I ran the test. I
0
4
48
@malmoeb
Stephan Berger
6 days
What is Maester? [1] Maester is a PowerShell-based test automation framework that helps you stay in control of your Microsoft security configuration. Such an awesome tool - test details can be filtered by passed, failed, and skipped. Failed tests come with detailed
5
19
108
@malmoeb
Stephan Berger
7 days
SentinelOne published their analysis about PhantomCaptch. [1] One of the (many) interesting parts of this report is: "The script also disabled PowerShell command history logging via Set-PSReadlineOption -HistorySaveStyle SaveNothing as a means of evading forensic analysis." I
1
30
129
@malmoeb
Stephan Berger
7 days
Today I learned: Using diskshadow to fetch the NTDS.dit. As mentioned several times, I love reading the HTB writeups from 0xdf because I always learn something new. Like here [1]: "To dump the domain hashes, I’ll want to get the C:\Windows\NTDS.dit file. Unfortunately, this file
Tweet card summary image
0xdf.gitlab.io
Baby is an easy Windows Active Directory box. I’ll start by enumerating LDAP to find a default credential, and spray it to find another account it works on. From there, I’ll abuse Backup Operators /...
0
86
330
@LETHAL_DFIR
LETHAL FORENSICS
8 days
Microsoft-Analyzer-Suite v1.7.0 released today! This update includes a new PowerShell script for analyzing Microsoft Service Principal Sign-In Logs.🚀 Check out the changelog for more information. Happy M365/Azure Threat Hunting! #M365 #Azure #EntraID #BEC #DFIR #Microsoft
Tweet card summary image
github.com
[1.7.0] - 2025-10-21 Added ServicePrincipal-Analyzer → Wiki Config.json: ImportExcel - Custom Color Scheme Fixed Minor fixes and improvements Fig 1: ServicePrincipal-Analyzer Fig 2: Hunt.xlsx...
0
17
50
@malmoeb
Stephan Berger
8 days
Lately, I’ve talked about (alternative) forensic artifacts where the retention time might be higher than your classical Security Event Logs, or might not be the first artifact to be deleted in an "anti-forensics" operation by a threat actor. We recently used the
0
18
65
@malmoeb
Stephan Berger
9 days
In various business email compromise (BEC) cases, we later discovered that although the customer had set up a conditional access (CA) policy to enforce multi-factor authentication, mistakes had been made during the implementation of said policies. For example, certain resources
6
92
444
@malmoeb
Stephan Berger
10 days
We recently took over an APT investigation from another forensic company. While reviewing analysis reports from the other company, we discovered that the attackers had been active in the network for months and had deployed multiple backdoors. One way they could regain root
dfir.ch
Technical blog by Stephan Berger (@malmoeb)
4
93
561
@malmoeb
Stephan Berger
11 days
Second story from a recent coffee break with my pentest colleague. During a retest for a client, they discovered the same ESC1 vulnerability they had reported before. Why is that dangerous and also super critical? "Active Directory Certificate Services (AD CS) is the backbone of
1
20
98
@malmoeb
Stephan Berger
12 days
Coffee break with one of our pentesters. He casually mentioned to me, "The last attack simulation was pretty cool. We used gowitness (a website screenshot utility written in Golang, to generate screenshots of web interfaces) to find internal services [1]. In doing so, we found a
1
10
31
@malmoeb
Stephan Berger
13 days
During a recent engagement, the customer provided us with access to their extensive data collection in Splunk. One thing I checked was Sysmon’s Event ID 13 (RegistryEvent - Value Set) for modifications to various keys used for credential stealing (NetworkProvider, Notification
1
23
154
@malmoeb
Stephan Berger
19 days
My colleague @p0w1_ keeps on finding flaws and vulnerabilities in EDRs, as if it were a stroll in the park 😂 well done - keep up the pace!
@InfoGuard_Labs
InfoGuard Labs
19 days
New blog post by @p0w1_ : We looked into Microsoft Defender for Endpoint's cloud communication and found multiple vulnerabilities. Want to intercept isolation requests as an unauthenticated attacker? Or upload hidden malware to IR? MSRC: low severity 🤷 https://t.co/SZ5yeZXfJB
1
7
35
@SidesBer
BSides Berlin
19 days
#BSidesBerlin Speaker Showcase @malmoeb will dissect Mythic—a modern macOS attack framework—covering C2 comms, persistence, OPSEC tricks, and detection paths. Get your tickets here👉 https://t.co/kJPlqQJTwI @SecurityBSides #RedTeam #macOS
0
3
10
@malmoeb
Stephan Berger
1 month
Love that Minesweeper reference here :) They tried hard to blend in; however, certain metadata about a file is baked into the PE header. Attackers can rename binaries all they want, but fields like original_file_name or inconsistencies in headers often give them away. Yes, you
0
9
45
@malmoeb
Stephan Berger
1 month
In today's BEC (Business E-Mail Compromise) case, I stumbled (again) over the "Set-MailboxJunkEmailConfiguration" operation. I talked about it a while back. [1] The attacker also created a new Inbox rule for moving incoming emails for target personnel to a designated folder.
2
52
223
@malmoeb
Stephan Berger
1 month
My team colleague, Yann Malherbe, wrote an in-depth blog post about the Automation of VHDX Investigations with 🦖. Enjoy. https://t.co/UxCXtfJb4a
0
11
36
@malmoeb
Stephan Berger
1 month
Nostalgia 😢
0
0
2
@malmoeb
Stephan Berger
1 month
My first keynote will be about how we spend billions on (cyber) security but remain insecure. I’ll use a recent case as an example, which my colleague Asger Deleuran Strunk investigated: At the end of March, the first malicious login happened. The attacker continued to log in
6
20
115
@malmoeb
Stephan Berger
1 month
Mandiant mentioned the User Access Logs in their newest report [1]. We use the UAL extensively in our investigations, as this artifact can retain logs for a longer period of time, as outlined by Mandiant (and also covered in my Anti-Forensics presentation). "In addition to EDR
2
26
162