techspence's profile picture. 🛠️ Former Sysadmin, now Pentester | Microsoft MVP | Helping IT teams make their environment harder to attack | @SecurIT360 @cyberthreatpov

spencer

@techspence

🛠️ Former Sysadmin, now Pentester | Microsoft MVP | Helping IT teams make their environment harder to attack | @SecurIT360 @cyberthreatpov

置頂

ps - I created an AD Security resource kit for IT admins. If you want to know where to start & what issues to look for, then this is for you. You can get access to it by signing up for my free email newsletter. If you're already a subscriber, DM me for the link! 👇 Access it…

techspence's tweet image. ps - I created an AD Security resource kit for IT admins. If you want to know where to start & what issues to look for, then this is for you. You can get access to it by signing up for my free email newsletter. 

If you're already a subscriber, DM me for the link!

👇 Access it…

Assessments without action, are wasted investments.

techspence's tweet image. Assessments without action, are wasted investments.

Something I see sysadmins regularly underestimate is how overlooked shares can be dangerous. For example: - logon scripts many times reference files/exes on shares - software installs live on shares - tasks reference scripts on shares All of which, a single misconfigured…


Day 1 in a client environment, here’s what I’m checking first… Insecure services & tasks Modifiable 3rd party software Unattend files App control/powershell restrictions LAPS Writable system paths These are some of the quickest wins for local privilege escalation and sometimes…


I've got a beefy gaming laptop that does a pretty decent job at cracking. Its nice because I can also use it as a hot plate to keep my coffee warm


The more I see tiered security implementations in environments, the more I am convinced that true and strict tiered security is a myth and is completely unattainable by most. And I am actually considering even saying that it's always necessary to go to that extent. I've got…


spencer 已轉發

I very intentionally restrict the most privileged groups in our forest from logging into our machines with these policies because none of them should ever be touching a box with those kind of permissions.

A built-in Windows/AD feature that provides immense ROI for internal security… + Logon restriction GPOs Deny logon locally Deny logon through Remote Desktop Services Deny access to this computer from the network Seriously not enough orgs using these



spencer 已轉發

Heads-up on CVE-2025-55182: a CVSS 10.0 pre-auth RCE affecting React Server Components 19.x. Can be triggered through malicious HTTP payloads, so there will be chaos when a POC comes out. On that note...there are many fake POCs circulating. Be careful what you run. A POC is not…

Kostastsale's tweet image. Heads-up on CVE-2025-55182: a CVSS 10.0 pre-auth RCE affecting React Server Components 19.x. Can be triggered through malicious HTTP payloads, so there will be chaos when a POC comes out.

On that note...there are many fake POCs circulating. Be careful what you run. A POC is not…

Should I try this on my next pentest? 😅

I don't know if it still works like it did accidentally about 10 years ago when someone joined a Windows box to a domain and the box was named "LOCALHOST," but that was a pretty effective way to mess with a lot of machines all at once. Suddenly localhost isn't 127.0.0.1...



Which one are you? 1, 2, 3 or 4? 😆😅

techspence's tweet image. Which one are you?

1, 2, 3 or 4?

😆😅
techspence's tweet image. Which one are you?

1, 2, 3 or 4?

😆😅
techspence's tweet image. Which one are you?

1, 2, 3 or 4?

😆😅
techspence's tweet image. Which one are you?

1, 2, 3 or 4?

😆😅

spencer 已轉發

Zzzzz now off to bed 🥱

We have added detection for the exploit POC released for CVE-2025-55182 into our React Server honeypot 🍯 Our stream alerting logic has been updated and no action is needed from the users. 👉console.defusedcyber.com/signup

DefusedCyber's tweet image. We have added detection for the exploit POC released for CVE-2025-55182 into our React Server honeypot 🍯

Our stream alerting logic has been updated and no action is needed from the users.  

👉console.defusedcyber.com/signup


A built-in Windows/AD feature that provides immense ROI for internal security… + Logon restriction GPOs Deny logon locally Deny logon through Remote Desktop Services Deny access to this computer from the network Seriously not enough orgs using these


What makes my life more difficult as an “authorized insider threat?” Proper tiered security, network segmentation, application control, regular audits of file shares for credential files, to name a few…


Take this with a grain of salt because YMMV but I’ve seen NDR products detect ransomware when EDR did not. The hard sell for these products right now imo is: cost & tuning. They are very expensive and they take a long time to get them working well. That being said, I do think…


ChatGPT is such a buzz kill...

techspence's tweet image. ChatGPT is such a buzz kill...

Share your experiences, your journey, your perspectives. You never know how you might impact someone’s life in a positive way because of it. 🙏

If you’re waiting until you’re an “expert” to share, plz stop. @techspence shares some wisdom, then we dig into his PowerShell projects and practical security tools you can use to get ahandle on your environment. 🎧 powershellpodcast.podbean.com/e/free-securit… #security #sysadmin #powershell



Cybersecurity has no finish lines… - Tools don’t solve everything - Pentests don’t find every flaw - Hardening doesn’t close every gap - Patching never ends - Compliance is only the starting point There is no done. It’s part of what drives me every day, knowing there is much…


No doubt pentest pricing is all over the place and of course it varies depending on the engagement. From premium to super cheap. But the price of a pentest, in my opinion, should not be solely dependent upon static numbers like IPs. Just because theres only a handful of IPs…


spencer 已轉發

🚨𝗕𝗶𝗴 𝗱𝗮𝘆 𝗳𝗼𝗿 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻𝗦𝘁𝗿𝗲𝗮𝗺. 𝗢𝗻𝗲 𝗼𝗳 𝗼𝘂𝗿 𝗹𝗮𝗿𝗴𝗲𝘀𝘁 𝗿𝗲𝗹𝗲𝗮𝘀𝗲𝘀 𝘆𝗲𝘁. The platform now supports official pySigma validation fully in-browser, compiled to WebAssembly. Same validation as sigma-cli. Thanks to @sifex from…

Kostastsale's tweet image. 🚨𝗕𝗶𝗴 𝗱𝗮𝘆 𝗳𝗼𝗿 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻𝗦𝘁𝗿𝗲𝗮𝗺. 𝗢𝗻𝗲 𝗼𝗳 𝗼𝘂𝗿 𝗹𝗮𝗿𝗴𝗲𝘀𝘁 𝗿𝗲𝗹𝗲𝗮𝘀𝗲𝘀 𝘆𝗲𝘁.

The platform now supports official pySigma validation fully in-browser, compiled to WebAssembly. Same validation as sigma-cli. Thanks to @sifex from…

Active Directory misconfigs would happen A LOT less if there was was a dialogue box you had to accept before making any change, especially permissions. “Bro, you sure you want to give Domain Users FullControl over the root of the domain?”


Detecting misconfiguration in AD is at least equally if not more important than detecting threats. But the money that’s spent doesn’t match up with that.


Loading...

Something went wrong.


Something went wrong.