Posts
Media
Videos
Starter Packs
Reposted by Andy Robbins
Microsoft introduced nested application auth (NAA) in 2024. Researchers spotted FOCI similarities & dubbed it brokered client IDs (BroCI).
@1cemoon.bsky.social documents NAA flows and BroCI—filling a gap for research on Microsoft identity protocols. ghst.ly/3Jdhp7Z
@1cemoon.bsky.social documents NAA flows and BroCI—filling a gap for research on Microsoft identity protocols. ghst.ly/3Jdhp7Z
NAA or BroCI...? Let Me Explain - SpecterOps
This writeup is a summary of knowledge and resources for nested application authentication (NAA) and brokered client IDs (BroCI)
ghst.ly
Andy Robbins
@andyrobbins.bsky.social
· Sep 17
Reposted by Andy Robbins
Dirk-jan
@dirkjanm.io
· Sep 17
One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise ...
dirkjanm.io
Reposted by Andy Robbins
Reposted by Andy Robbins
Reposted by Andy Robbins
SpecterOps
@specterops.io
· Sep 4
BloodHound Operator: The Six Degrees Of Master Yoda - SpecterOps
A Technical Dive Into BloodHound OpenGraph With BloodHound Operator & Master Yoda… TL;DR: The latest version of BloodHound introduces BloodHound OpenGraph. This new feature allows for ingestion of any...
ghst.ly
Andy Robbins
@andyrobbins.bsky.social
· Aug 27
BloodHound 8.0 T-Shirt Fundraiser, Supporting Hope for HIE
Hope for HIE is the global voice for families affected by Hypoxic Ischemic Encephalopathy. As the world’s largest HIE support network, Hope for HIE offers personalized resources, education, and a deep...
ghst.ly
Andy Robbins
@andyrobbins.bsky.social
· Aug 14
Reposted by Andy Robbins
Hope Walker
@1cemoon.bsky.social
· Aug 13
Why should Microsoft's Nested App Authentication (NAA) should be on your security team's radar? @1cemoon.bsky.social breaks down NAA and shows how attackers can pivot between Azure resources using brokered authentication. ghst.ly/45h2Zw3
Going for Broke(ring) – Offensive Walkthrough for Nested App Authentication - SpecterOps
In depth walkthrough for using nested app authentication (NAA), or BroCI, for offensive engagements to access information and resources.
ghst.ly
Andy Robbins
@andyrobbins.bsky.social
· Aug 4
Andy Robbins
@andyrobbins.bsky.social
· Aug 1
Attack Graph Model Design Requirements and Examples - SpecterOps
TL;DR OpenGraph makes it easy to add new nodes and edges into BloodHound, but doesn’t design your data model for you. This blog post has everything you need to get started with proper attack graph mod...
specterops.io
Andy Robbins
@andyrobbins.bsky.social
· Aug 1
Reposted by Andy Robbins
Andy Robbins
@andyrobbins.bsky.social
· Jul 30
Reposted by Andy Robbins
Andy Robbins
@andyrobbins.bsky.social
· Jul 21
Reposted by Andy Robbins
Reposted by Andy Robbins
Jonas Bülow Knudsen
@jonas-bk.bsky.social
· Jun 25
Good Fences Make Good Neighbors: New AD Trusts Attack Paths in BloodHound - SpecterOps
The ability of an attacker controlling one domain to compromise another through an Active Directory (AD) trust depends on the trust type and configuration. To better map these relationships and make i...
specterops.io