sapirxfed Profile Banner
sapir federovsky Profile
sapir federovsky

@sapirxfed

Followers
5K
Following
4K
Media
516
Statuses
2K

Doing things @wiz_io And then doing more things at home | failed research blog: https://t.co/j2HT1Tpscs

Tel Aviv
Joined August 2015
Don't wanna be here? Send us removal request.
@sapirxfed
sapir federovsky
4 months
Just me exploring new undocumented Entra APIs and doing some TTD to make Device Registration Service to change some Device attributes🙂.
Tweet card summary image
sapirxfed.com
In this post, I dive into how the UpdateDevice function of dsregcmd works behind the scenes. From playing with registry values, tracing API calls in WinDbg, and intercepting requests with Burp, I e…
5
43
184
@sapirxfed
sapir federovsky
23 hours
Can't believe I'm here for 2 weeks already. Time flies when you love your work 🥰
Tweet media one
3
0
54
@sapirxfed
sapir federovsky
2 days
hello world (: Did any of you ever used the following command and it worked for him? (: "roadtx owalogin".Do you have a relevant blogpost about it?.Thanks ahead!😀.
1
1
6
@sapirxfed
sapir federovsky
6 days
Wow the github thing is crazy.
2
0
11
@sapirxfed
sapir federovsky
9 days
WOW!!! @TEMP43487580 such a good post!!! it is so well written, interesting research and great results! Thank you! 🤩.
Tweet card summary image
temp43487580.github.io
Ways of device ownership spoofing and more for persistent access to Intune
1
13
76
@sapirxfed
sapir federovsky
10 days
🤯.
2
1
27
@sapirxfed
sapir federovsky
10 days
Attackers that use Entra. We are coming to catch you 😈.
0
0
23
@sapirxfed
sapir federovsky
12 days
RT @_JohnHammond: The new Bloodhound version has some genuinely crazy cool new features -- OpenGraph really blows the doors off the potenti….
0
40
0
@sapirxfed
sapir federovsky
13 days
I really liked this post. It explains about service accounts in gcp with a lot of pictures, just how i like my posts 😁.
Tweet card summary image
mitiga.io
Google Cloud Platform (GCP) continues to expand its offerings and remains a top-tier cloud infrastructure service provider. It offers a wide range of services, including Compute Engine (VMs), Google...
0
0
11
@sapirxfed
sapir federovsky
14 days
Just finished surfing lesson #3. It was the worst so far 😂.But the goal is to keep trying! 4 more lessons to go!.
1
0
9
@sapirxfed
sapir federovsky
14 days
Im learning all sorts of cloud stuff 😀 this is an awesome tool!.Maybe I'll try to contribute to the azure functionality 😁.
0
6
76
@sapirxfed
sapir federovsky
15 days
Can't wait to feel at home here💙 .@wiz_io
Tweet media one
16
0
106
@sapirxfed
sapir federovsky
16 days
First day at work 🍾🍾🍾
Tweet media one
11
1
150
@sapirxfed
sapir federovsky
18 days
Just started watching dr who from the beginning (the renewal) after I didn't watch it for years (quit after Matt Smith 🤣) .Im excited AF
0
0
4
@sapirxfed
sapir federovsky
19 days
Hi 🤗 I'm working on the openings for this month for the (Israeli) magazine I'm editing. I would be happy to hear your experience from BH and DC! best talks, new vulns, vibes, people, everything you feel is interesting. Please comment here or dm me!
1
1
10
@sapirxfed
sapir federovsky
19 days
It's my last day of vacation before starting my new job and I'm so excited!!!!
Tweet media one
10
0
103
@sapirxfed
sapir federovsky
19 days
Lately, i see these brk_* parms at oauth authentication, I assumed it's related to NAA, but I wasn't sure how it works. I waited for the recording from a conf about it. I don't need to wait anymore! This post explains everything really well! Now I see why BroCI makes sense.
Tweet media one
0
1
18
@sapirxfed
sapir federovsky
19 days
I really waited for a blog on NAA. Going to read it first thing tomorrow! Im excited 🤩.
@SpecterOps
SpecterOps
20 days
Why should Microsoft's Nested App Authentication (NAA) should be on your security team's radar? @Icemoonhsv breaks down NAA and shows how attackers can pivot between Azure resources using brokered authentication.
1
0
14