Presentations and external blogs

Presentations

DEF CON 32: Abusing Windows Hello Without a Severed Hand (joint talk with Ceri Coburn)

Topic: Microsoft Entra, Primary Refresh Tokens, Windows Hello, Windows internals
Links: Slides (PDF) | Video recording: coming soon

Troopers 24: Attacking Primary Refresh Tokens using their MacOS implementation

Topic: Microsoft Entra, Primary Refresh Tokens, macOS
Links: Slides (PDF) | Demo video | Video recording: coming soon

Area41 2024: Phishing the Phishing Resistant - Phishing for Primary Refresh Tokens in Microsoft Entra

Topic: Microsoft Entra, Windows Hello, Credential phishing
Links: Slides (PDF) | Demo video | Video Recording

TROOPERS 23: (Windows) Hello from the other side

Topic: Azure AD, Windows Hello, Azure AD devices
Links: Abstract | Slides (PDF) | Video Recording

x33fcon 2023: (Windows) Hello from the other side

Topic: Azure AD, Windows Hello, Azure AD devices
Links: Abstract | Slides (PDF) | Video Recording

NorthSec 2023: (Windows) Hello from the other side

Topic: Azure AD, Windows Hello, Azure AD devices
Links: Abstract | Slides (PDF) | Video Recording

Insomnihack 23: Breaking and fixing Azure AD device identity security

Topic: Azure AD, Office 365, Conditional Access, Azure AD devices
Links: Abstract | Slides (PDF) | Video Recording

Black Hat USA 2022: Backdooring and Hijacking Azure AD Accounts by Abusing External Identities

Topic: Azure AD, Office 365, External Identities, B2B
Links: Abstract | Slides (PDF) | Demo video | Video recording

TROOPERS 22: Breaking Azure AD joined endpoints in Zero Trust environments

Topic: Azure AD, Office 365, Conditional Access, Azure AD devices
Links: Abstract | Slides (PDF) | Video Recording

Romhack 2021: Breaking Azure AD joined endpoints in Zero Trust environments

Topic: Azure AD, Office 365, Conditional Access
Links: Abstract | Slides (PDF) | Video Recording

Wild West Hacking Fest - Cloud Roundup Dec 2020: Fantastic Conditional Access Policies and how to bypass them

Topic: Azure AD, Office 365, Conditional Access
Links: Abstract | Slides (PDF) | Video Recording

Black Hat Asia 2020: Walking your dog in multiple forests - breaking AD trust boundaries through Kerberos vulnerabilities

Topic: Active Directory, Kerberos
Links: Abstract | Slides (PDF) | Conference recording (bad audio) | Video recording with better audio

BlueHat Seattle 2019: I’m in your cloud: A year of hacking Azure AD

Topic: Azure AD, Office 365
Links: Abstract | Slides (PDF) | Demo video | Video Recording

DEF CON 27: I’m in your cloud… pwning your Azure environment

Topic: Azure AD, Office 365
Links: Abstract | Slides (PDF) | Demo videos | Video Recording

TROOPERS 19: I’m in your cloud, reading everyone’s emails - hacking Azure AD via Active Directory

Topic: Azure AD, Office 365, Active Directory
Links: Abstract | Slides (PDF) | Slides (SlideShare) | Video recording

HITB Dubai Armory: aclpwn - Active Directory ACL exploitation with BloodHound

Topic: Active Directory, BloodHound
Links: Slides (SlideShare) | Tool

External blogs

The following blogs were (co-)authored by me on different platforms/websites:

2019-06 - Syncing yourself to Global Administrator in Azure Active Directory
2018-08 - Remote NTLM relaying through meterpreter on Windows port 445
2018-04 - Escalating privileges with ACLs in Active Directory
2018-04 - Compromising Citrix ShareFile on-premise via 7 chained vulnerabilities
2018-01 - mitm6 - Compromising IPv4 networks via IPv6
2017-05 - Relaying credentials everywhere with ntlmrelayx