Clément Notin
@cnotin.bsky.social
📤 191
📥 67
📝 18
🤔 We have answers to your questions on
#BadSuccessor
, the latest AD vulnerability
www.tenable.com/blog/frequen...
🕵️ Tenable Identity Exposure customers can check their exposure with our recently released Indicator of Exposure (IoE):
www.tenable.com/indicators/i...
loading . . .
Frequently Asked Questions About BadSuccessor
Frequently asked questions about “BadSuccessor,” a zero-day privilege escalation vulnerability in Active Directory domains with at least one Windows Server 2025 domain controller.
https://www.tenable.com/blog/frequently-asked-questions-about-badsuccessor
4 months ago
0
0
0
Microsoft hardened the Entra ID synchronization feature last year: - restricted permissions on Directory Synchronization Accounts role - new dedicated sync app Let’s find out how sync still works 🔍 Some old tricks persist—and new ones have emerged 💥
tenable.com/blog/despite...
🧵
loading . . .
Despite Recent Security Hardening, Entra ID Synchronization Feature Remains Open for Abuse
Microsoft synchronization capabilities for managing identities in hybrid environments are not without their risks. In this blog, Tenable Research explores how potential weaknesses in these synchroniza...
https://tenable.com/blog/despite-recent-security-hardening-entra-id-synchronization-feature-remains-open-for-abuse
5 months ago
1
0
2
🎥 Here's the recording of last week's webinar where I shared how to protect Entra ID from real-world attacks 🏴☠️, beginning with federation backdoors/privesc, using Tenable Identity Exposure
6 months ago
0
1
0
You know how some system AD attributes cannot be edited even when Domain Admin? "Error 0x20B1 The attribute cannot be modified because it is owned by the system." This can be bypassed using the schemaUpgradeInProgress modify operation
learn.microsoft.com/en-us/opensp...
😉⬇️
loading . . .
[MS-ADTS]: schemaUpgradeInProgress
This operation causes the fschemaUpgradeInProgress field of LDAPConnection instances in dc.LDAPConnections ([MS-DRSR]
https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/a21db735-6025-4244-9cfe-6ce6582114a8
10 months ago
1
2
0
Hello there 👋
10 months ago
1
1
0
you reached the end!!
feeds!
log in