
nyxgeek
@nyxgeek
Followers
6K
Following
53K
Media
774
Statuses
11K
rebel scum, nerfherder, dogged and relentless.
Joined June 2012
New blog is out!. OneDrive to Enum Them All. Major updates:.• database storage.• logging of previous runs.• easily append digits or strings to usernames.• stale job detection.• skip tried usernames. Special thanks to @DrAzureAD and @thetechr0mancer!.
3
125
263
CVE-2014-2120 is being exploited in the wild.
There has been active exploitation of Ciscos ASA WebVPN login page allowing unauthenticated attackers to exploit insufficient input validation, enabling remote XSS attacks via malicious links. via The Hacker News. #hacking #infosec #cybersecurity.
6
28
184
Today marks 7 years that I’ve been at @TrustedSec . I’m really lucky to have found such a great group of people who love hacking stuff as much as I do. Such a terrific company to work for, and have met so many amazing people over the years working here.
8
11
169
Happy Labor Day! Going to celebrate with a tool release:. guestlist from my #defcon31 talk is out!. Featuring fireprox rotation (thnx @ustayready) and sqlite db. Default is to use @DrAzureAD silent enum method. Graph method also supported. Updates to come.
2
72
149
My first deep dive on OneDrive Enum. This walks through how to create a gang of bots to scrape for you. Part 1: OneDrive Enum Basics, Infrastructure Setup. Coming soon.Part 2: Username Lists, Org Lists, Automated Scraping.Part 3: Data Analysis.
My #defcon talk had three parts:. 1. Enumerating 24 million users via OneDrive.2. Monitoring 100,000 Microsoft employees via Teams presence.3. Mapping out 30,000 guest relationships between companies with user enum. Which would you like to see a deep dive on first?.
3
53
142
I love enum4linux but the machine list feature (-M) was never implemented. After years of procrastinating, I finally added it. Since I'm not sure how often @portcullislabs reviews PRs, and since I'm excited to share it, here's the fork:.
4
32
138
Password cracking got you down?. Try out hate_crack -- with a fresh new crack option from @Bandrel that is perfect for targeting organization-specific passwords. Really awesome work by @Spoonman1091 and @Bandrel !.
3
36
124
I just love AAD Internals ( from @DrAzureAD . Great tools, but also a fantastic resource for digging into how those tools work. It's obvious that a lot of time and effort has been put into this collection.
1
20
110
I love o365. Great attack surface with user-enum, and it’s everywhere. Plus, once you get creds you can start querying for more info. Truly, a gift from Microsoft!.
Senior Security Consultant @nyxgeek helps you hone your brute-force attacks against O365, and shows you how to extract valuable user lists and group memberships once you have credentials.
5
26
101
Today is my cakeday at @TrustedSec - 5 years! Longest I've ever worked somewhere. Might have something to do with all the amazing coworkers I have. :D.
9
6
94
Here’s another way to perform user enumeration of o365 users by checking to see if a user’s OneDrive url exists. The upside is this doesn’t make a login attempt. The downside is that it only works for users who have accessed OneDrive.
In our latest #blog post, Senior Security Consultant @nyxgeek takes us through a simple, passive method of performing user #enumeration via @onedrive.
3
24
93
Teams RCE is why everyone should disable the default, open, configuration of Microsoft Teams where anybody is allowed to message people at your organization. You can still allow-list specific domains if you need b2b chat.
2022 Microsoft Teams RCE.#Microsoft #RCE .
2
32
83
New version of onedrive_user_enum -- now with threading and support for international domains. Big thanks to @jarsnah12 and @initroott for the additions!.
1
37
73
Any cloud folks with an interest in hacking looking to make the jump from Cloud DevOps/SysAdmin -> Cloud Penetration Testing ?. We are looking for people with skills in AWS and GCP to join the Cloud Pentesting Team at @TrustedSec . Please DM me if interested.
5
36
69
Well, that was short-lived. If you just get a "doh" error when you run the tool, that's because the request now gives a 403. This might be the fastest fix that I've seen from Microsoft. I did not expect them to fix it, because it would break the Graph Explorer demo.
Finally posted TeamsTracker code from my DC31 talk. It proxies through Microsoft Graph Explorer to make unauthenticated Teams Presence/OOO lookups and logs them to a local db. Requires UUID of Azure account. Takes a CSV export from TeamFiltration, or a.
2
10
64