
sapir federovsky
@sapirxfed
Followers
5K
Following
4K
Media
516
Statuses
2K
Doing things @wiz_io And then doing more things at home | failed research blog: https://t.co/j2HT1Tpscs
Tel Aviv
Joined August 2015
Just me exploring new undocumented Entra APIs and doing some TTD to make Device Registration Service to change some Device attributes🙂.
sapirxfed.com
In this post, I dive into how the UpdateDevice function of dsregcmd works behind the scenes. From playing with registry values, tracing API calls in WinDbg, and intercepting requests with Burp, I e…
5
43
184
New Entra CTF by @wiz_io 🫡.I tried it and it's so fun!!!.
cloudsecuritychampionship.com
Join our monthly cloud security CTF challenge, built by top Wiz researchers. Solve real-world scenarios and rise to the top of the leaderboard.
1
7
51
Make sure you are not compromised !!!.
stepsecurity.io
Nx package on npm hijacked to steal cryptocurrency wallets, GitHub/npm tokens, SSH keys, and environment secrets through sophisticated exfiltration attack
2
2
21
WOW!!! @TEMP43487580 such a good post!!! it is so well written, interesting research and great results! Thank you! 🤩.
temp43487580.github.io
Ways of device ownership spoofing and more for persistent access to Intune
1
13
76
RT @_JohnHammond: The new Bloodhound version has some genuinely crazy cool new features -- OpenGraph really blows the doors off the potenti….
0
40
0
I really liked this post. It explains about service accounts in gcp with a lot of pictures, just how i like my posts 😁.
mitiga.io
Google Cloud Platform (GCP) continues to expand its offerings and remains a top-tier cloud infrastructure service provider. It offers a wide range of services, including Compute Engine (VMs), Google...
0
0
11
Just finished surfing lesson #3. It was the worst so far 😂.But the goal is to keep trying! 4 more lessons to go!.
1
0
9
I really waited for a blog on NAA. Going to read it first thing tomorrow! Im excited 🤩.
Why should Microsoft's Nested App Authentication (NAA) should be on your security team's radar? @Icemoonhsv breaks down NAA and shows how attackers can pivot between Azure resources using brokered authentication.
1
0
14