<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://dirkjanm.io/active-directory-forest-trusts-part-one-how-does-sid-filtering-work/</loc>
<lastmod>2018-09-24T18:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/</loc>
<lastmod>2019-01-21T18:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/</loc>
<lastmod>2019-02-18T18:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/worst-of-both-worlds-ntlm-relaying-and-kerberos-delegation/</loc>
<lastmod>2019-03-04T18:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/getting-in-the-zone-dumping-active-directory-dns-with-adidnsdump/</loc>
<lastmod>2019-04-25T15:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/exploiting-CVE-2019-1040-relay-vulnerabilities-for-rce-and-domain-admin/</loc>
<lastmod>2019-06-13T19:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/azure-ad-privilege-escalation-application-admin/</loc>
<lastmod>2019-09-16T19:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/office-365-network-attacks-via-insecure-reply-url/</loc>
<lastmod>2019-10-14T17:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/updating-adconnectdump-a-journey-into-dpapi/</loc>
<lastmod>2019-12-11T17:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/introducing-roadtools-and-roadrecon-azure-ad-exploration-framework/</loc>
<lastmod>2020-04-16T10:00:00+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/abusing-azure-ad-sso-with-the-primary-refresh-token/</loc>
<lastmod>2020-07-21T15:57:00+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/digging-further-into-the-primary-refresh-token/</loc>
<lastmod>2020-08-05T18:38:00+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/a-different-way-of-abusing-zerologon/</loc>
<lastmod>2020-09-24T19:00:00+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/active-directory-forest-trusts-part-two-trust-transitivity/</loc>
<lastmod>2021-06-10T18:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/ntlm-relaying-to-ad-certificate-services/</loc>
<lastmod>2021-07-28T17:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/relaying-kerberos-over-dns-with-krbrelayx-and-mitm6/</loc>
<lastmod>2022-02-22T18:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/abusing-forgotten-permissions-on-precreated-computer-objects-in-active-directory/</loc>
<lastmod>2022-10-27T08:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/introducing-roadtools-token-exchange-roadtx/</loc>
<lastmod>2022-11-09T11:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/obtaining-domain-admin-from-azure-ad-via-cloud-kerberos-trust/</loc>
<lastmod>2023-06-13T11:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/phishing-for-microsoft-entra-primary-refresh-tokens/</loc>
<lastmod>2023-10-10T16:08:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/lateral-movement-and-hash-dumping-with-temporary-access-passes-microsoft-entra/</loc>
<lastmod>2024-05-06T13:00:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/persisting-with-federated-credentials-entra-apps-managed-identities/</loc>
<lastmod>2024-07-31T18:00:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/extending-ad-cs-attack-surface-intune-certs/</loc>
<lastmod>2025-07-30T14:00:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/</loc>
<lastmod>2025-09-17T13:00:57+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/404/</loc>
</url>
<url>
<loc>https://dirkjanm.io/</loc>
</url>
<url>
<loc>https://dirkjanm.io/talks/</loc>
</url>
<url>
<loc>https://dirkjanm.io/page2/</loc>
</url>
<url>
<loc>https://dirkjanm.io/page3/</loc>
</url>
<url>
<loc>https://dirkjanm.io/page4/</loc>
</url>
<url>
<loc>https://dirkjanm.io/page5/</loc>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Abusing%20Windows%20Hello%20Without%20a%20Severed%20Hand_v3.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Attacking%20PRT%20macOS.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Attacking%20PRT%20macOS_orangecon.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/BYO%20IDP%20in%20Entra%20ID_offensivex.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/BYO%20IDP%20in%20Entra%20ID_x33fcon.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Finding%20Entra%20ID%20CA%20Bypasses%20-%20the%20structured%20way.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Im%20in%20your%20cloud%20bluehat-v1.0.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Insomnihack%20Breaking%20and%20fixing%20Azure%20AD%20device%20identity%20security.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Phishing%20the%20Phishing%20Resistant.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/TR19-Im%20in%20your%20cloud.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/TR22_Mollema_Breaking_Azure_AD_joined_endpoints_in_zero-trust_environments_v1.0.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/US-22-Mollema-Backdooring-and-hijacking-Azure-AD-accounts_final.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/US-25-Mollema-Advanced-AD-to-Entra-ID-lateral-movement-techniques-final.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Walking-your-dog-in-multiple-forests.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Windows%20Hello%20abuse%20the%20sequel.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Windows%20Hello%20abuse%20the%20sequel_itdefense_slides.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Windows%20Hello%20abuse%20the%20sequel_yellowhat.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Windows%20Hello%20from%20the%20other%20side_TR23_final.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Windows%20Hello%20from%20the%20other%20side_nsec_v1.0.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/Windows%20Hello%20from%20the%20other%20side_x33fcon.pdf</loc>
<lastmod>2025-09-17T13:11:47+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/dirkjan%20-%20DC33%20-%20Advanced%20Active%20Directory%20to%20Entra%20ID%20lateral%20movement%20techniques_final.pdf</loc>
<lastmod>2025-09-17T13:11:48+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/fantastic_policies_cloud_roundup.pdf</loc>
<lastmod>2025-09-17T13:11:48+00:00</lastmod>
</url>
<url>
<loc>https://dirkjanm.io/assets/raw/romhack_dirkjan.pdf</loc>
<lastmod>2025-09-17T13:11:48+00:00</lastmod>
</url>
</urlset>
