spencer
@techspence
Followers
14K
Following
114K
Media
3K
Statuses
45K
š ļø Former Sysadmin, now Pentester | Microsoft MVP | Helping IT teams make their environment harder to attack | @SecurIT360 @cyberthreatpov
š°AD Security Resource Kit ā¬ļø
Joined November 2010
ps - I created an AD Security resource kit for IT admins. If you want to know where to start & what issues to look for, then this is for you. You can get access to it by signing up for my free email newsletter. If you're already a subscriber, DM me for the link! š Access it
3
30
169
I scheduled this post to go live on Friday fully betting something spicy would happen...lets see if this pans out š
1
0
4
What if we just got rid of the security products that were not carrying their weight and put that money into better trained & more knowledgeable peopleā¦
2
0
13
Iām rooting for you to have a clean pentest reportā¦but honestly, I kind of hope you donāt. You learn way more when we find the dumb stuff like creds dumped on a share or Domain Users with Full Control on the DC OU. What did your last pentest actually teach you, what did you
6
0
12
What we need less of: Products that promise to solve ALL your problems (and even some you donāt have) automatically while you sleep except you end up paying money to introduce new problems you also canāt solve What we need more of: products that solve distinct problems that can
0
0
3
@techspence Microsoft Learn has a host of free learning paths for Active Directory, Identity and Access Management, and any cert of theirs one might find useful. https://t.co/bcd9Eyu7XN I'd also recommend getting comfortable with control groups from either MCSB or CIS benchmarks
learn.microsoft.com
Active Directory Domain Services
2
1
7
A strong defense starts long before an incident. We distilled 20+ years of Mandiant breach experience into a practical guide for building an effective #IncidentResponse plan. Stay prepared, not reactive. Read the guide ā”ļø https://t.co/QiIM9E0eRa
2
49
179
America needs you! Join U.S. Immigration and Customs Enforcement today.
7K
16K
72K
šš¤šŖš¤š
I got microsoft to change their whole bounty program! they finally listened. critical vulns now count even if theyāre āout of scopeā, as long as they impact microsoftās ecosystem. Pictured below is the exact post to make it happen. We have been having very respectful
0
0
17
> Starting today, if aĀ criticalĀ vulnerabilityĀ has a direct andĀ demonstrableĀ impact toĀ ourĀ onlineĀ services,āÆitāsāÆeligible for a bounty award.Ā Regardless of whether the codeĀ is owned and managed byĀ Microsoft, a third-party, orĀ isĀ openĀ source, we willĀ do whatever it takes to
This is very interesting https://t.co/4pJchAVKnq
6
14
121
Consistency is a funny thing. No one sees it if they are not there along side you. @kamakauzy thanks for being the best co-host and partner in crime with this podcast. I really really appreciate all the support you all have shown for our content and podcast. Literally the only
1
1
9
Whatās working for threat actors once they get inside? Lots of the same things that are still working for us during internal pentests. While we have morals and they donāt⦠we try our best to use the same/similar TTPs so clients get as close to a taste of what to expect as we
1
2
34
This holiday, skip the stress. USDA Prime steaks delivered to their door. They'll thank you later. 8 FREE Steak Burgers + FREE shipping ($145 value) on orders $149+ Use code SANTA149 ā
1
4
39
Stay tuned for more insights from zack. he and I recorded a video the other day. Working on editing and getting it out on the youtubes!
I like to be transparent, so hereās a thread on some of the biggest misses (false negatives) weāve had in detecting insider threats with AI. I also talk about false positives and what I think is needed to really unlock the value of AI in cybersecurity (especially detection).
2
0
14
Internal pentest findings that shouldnāt exist in 2025, part 2 - Domain Users members of Domain Admins - Default new user password thatās never changed - Services with unquoted service paths - Unattend xml files with plaintext creds - Non-unique local admin password, for
8
11
136
Cybersecurity is both easier than we expect and harder than we hope all in one rollercoaster of emotion.
4
0
12
Some of the best content on hardening AD by Jerry Devore https://t.co/NbMPcJvSO3
techcommunity.microsoft.com
0
1
21
Another repo thatās not strictly training but is a giant list of resources is by @ThePoolmanjim on the AD subreddit https://t.co/LCtpxZtqIl
reddit.com
Explore this post and more from the activedirectory community
1
2
24
Iāve never taken any training from this outfit, so I cannot attest to quality, if anyone can please share what they think of the stuff here https://t.co/jXK4YPqfH1
2
0
8
Put a calendar hold for a meeting** on Friday. (**Playing pickleball)
1
1
9
Not formal training courses but one of the best central places for AD Security knowledge by @PyroTek3
https://t.co/K0Sl4fAVyg
1
0
31