0xcsandker Profile Banner
Carsten Profile
Carsten

@0xcsandker

Followers
2K
Following
178
Statuses
96

Security enthusiast, Likes Windows Internals, AD & Entra — https://t.co/mVVbfkO7IO

Joined February 2017
Don't wanna be here? Send us removal request.
@0xcsandker
Carsten
4 months
@_xpn_ @Raiona_ZA Amazing, that's something that has been on my list for quite some time now... looking forward to give this a spin in my Lab. Thanks for the shoutout ♥️
1
0
2
@0xcsandker
Carsten
4 months
RT @_xpn_: New tool published which is proving to be useful. Cred1py allows execution of the CRED-1 SCCM attack published by @Raiona_ZA ove…
0
162
0
@0xcsandker
Carsten
2 years
Day 1: Happy to share I’m now part of @codewhitesec 🙌 Let‘s see where this gets us 💪
Tweet media one
2
0
55
@0xcsandker
Carsten
2 years
@EricaZelic Enjoy building it (it surely comes with some up and downs :D) Once you’re all set up, you might find some useful attack routes in here :)
0
1
5
@0xcsandker
Carsten
2 years
@EricaZelic I starten building mine based on this walkthrough and cross checken with
0
2
7
@0xcsandker
Carsten
2 years
RT @pssvdrctry: @0xcsandker opening the round table with some 🔥 takes on AzureAD vs on-prem AD #TROOPERS23 @WEareTROOPERS
0
4
0
@0xcsandker
Carsten
2 years
@DebugPrivilege @WEareTROOPERS I heard rumors it's quite a technology if well-administered 😱
0
0
2
@0xcsandker
Carsten
2 years
@mlot11 My pleasure. Glad it‘s helpful
0
0
0
@0xcsandker
Carsten
2 years
RT @_Mayyhem: SharpSCCM can now pull additional secrets such as domain join and local admin credentials found in PXE boot policies and decr…
0
66
0
@0xcsandker
Carsten
2 years
Published my latest Active Directory spotlight on SCCM. /CC: @_Mayyhem , @_nwodtuhs
2
54
134
@0xcsandker
Carsten
2 years
Aaaaand OneNote will be next: Attachments in OneNote documents are planned to be blocked if these are considered of dangerous type. List of dangerous types can be found here: Docu: Roadmap:
@0xcsandker
Carsten
2 years
Another one on the way: Microsoft has blocking internet-sourced Excel Add-Ins on its roadmap for 2023. Planned Rollout start was March '23, but seems still in development (according to Roadmap website, I've not looked into any previews). Roadmap item:
Tweet media one
1
5
20
@0xcsandker
Carsten
2 years
Another one on the way: Microsoft has blocking internet-sourced Excel Add-Ins on its roadmap for 2023. Planned Rollout start was March '23, but seems still in development (according to Roadmap website, I've not looked into any previews). Roadmap item:
Tweet media one
@0xcsandker
Carsten
2 years
Another one down: MOTW prevents VBA macros in Publisher (.pub) documents as of Feb. 14 2023 with But then again: How often is Office really updated?
Tweet media one
0
3
14
@0xcsandker
Carsten
2 years
@_wald0 👀 wow ... thank you, Andy! That's not something you hear every day, I'm really honored.
0
0
5
@0xcsandker
Carsten
2 years
RT @lastweekinfosec: Phishing in 2023 (@0xcsandker), SaltStack A-Salt (Alex Hill - @SkylightCyber), LocalPotato (@decoder_it + @elad_shamir
0
3
0
@0xcsandker
Carsten
2 years
Azure-AccessPermissions v0.2.2 Updates: - PIM assigned directory roles - Conditional Access Policies for MFA enumeration - Minor tweaks and corrections
Tweet media one
0
10
23
@0xcsandker
Carsten
2 years
Another one down: MOTW prevents VBA macros in Publisher (.pub) documents as of Feb. 14 2023 with But then again: How often is Office really updated?
Tweet media one
@0xcsandker
Carsten
2 years
Revisiting phishing with MS Office documents. Shoutout to @mariuszbit, @ptrpieter, @StanHacked, @DaWouw (@OutflankNL)
0
4
18
@0xcsandker
Carsten
2 years
@badsectorlabs @mariuszbit @ptrpieter @StanHacked @DaWouw @OutflankNL Thanks for catching that !! Blog updated.
0
0
0
@0xcsandker
Carsten
2 years
@mariuszbit @ptrpieter @StanHacked @DaWouw @OutflankNL Thank you for those kind words :)
0
0
1