Clément Notin's Avatar

Clément Notin

@cnotin.bsky.social

206 Followers  |  70 Following  |  18 Posts  |  Joined: 22.09.2023
Posts Following

Posts by Clément Notin (@cnotin.bsky.social)

Preview
Frequently Asked Questions About BadSuccessor Frequently asked questions about “BadSuccessor,” a zero-day privilege escalation vulnerability in Active Directory domains with at least one Windows Server 2025 domain controller.

🤔 We have answers to your questions on #BadSuccessor, the latest AD vulnerability www.tenable.com/blog/frequen...
🕵️ Tenable Identity Exposure customers can check their exposure with our recently released Indicator of Exposure (IoE): www.tenable.com/indicators/i...

02.06.2025 18:54 — 👍 0    🔁 0    💬 0    📌 0

Here's (finally!) what I've found about this 😉
bsky.app/profile/cnot...

24.04.2025 13:46 — 👍 3    🔁 2    💬 1    📌 0

To summarize, these hardenings are great (and the new app will likely allow to support some security features), but it doesn't prevent everything or even introduces new cracks to monitor.
There's no magic to keep this feature working anyway 😉

24.04.2025 13:39 — 👍 1    🔁 0    💬 0    📌 0

And what about the new "Microsoft Entra AD Synchronization Service" application? 🤔
It exposes a new permission: ADSynchronization.ReadWrite.All, which also allows to call the sync API when granted to a service principal ➡️ same impact

24.04.2025 13:39 — 👍 0    🔁 0    💬 1    📌 0

The Directory Synchronization Accounts role has lost most of its Entra permissions... but it retains implicit permissions to call the undocumented synchronization API 😯 ➡️ reset hybrid users' passwords
And so does the new "On Premises Directory Sync Account" Entra role 👀

24.04.2025 13:39 — 👍 0    🔁 0    💬 1    📌 0
Preview
Despite Recent Security Hardening, Entra ID Synchronization Feature Remains Open for Abuse Microsoft synchronization capabilities for managing identities in hybrid environments are not without their risks. In this blog, Tenable Research explores how potential weaknesses in these synchroniza...

Microsoft hardened the Entra ID synchronization feature last year:
- restricted permissions on Directory Synchronization Accounts role
- new dedicated sync app
Let’s find out how sync still works 🔍
Some old tricks persist—and new ones have emerged 💥
tenable.com/blog/despite... 🧵

24.04.2025 13:39 — 👍 0    🔁 1    💬 1    📌 1
Post image Post image Post image Post image

🎥 Here's the recording of last week's webinar where I shared how to protect Entra ID from real-world attacks 🏴‍☠️, beginning with federation backdoors/privesc, using Tenable Identity Exposure

24.03.2025 14:08 — 👍 1    🔁 0    💬 0    📌 0

Hey! Indeed!

23.12.2024 12:17 — 👍 0    🔁 0    💬 0    📌 0
KB5040758: Deleting a stale, corrupt, or orphaned Trust object in Active Directory - Microsoft SupportYour Privacy Choices Opt-Out Icon

⚠️ this is likely unsupported by Microsoft even though this method is advised to clean broken trust objects
support.microsoft.com/en-us/topic/...

And as described in the doc, this operation is not global: it's only effective in the same LDAP connection. It's why using ldp or LDIFDE helps

23.12.2024 10:32 — 👍 1    🔁 0    💬 0    📌 0
Post image Post image Post image

Log-in as Domain or Schema admin
- Use ldp.exe and set the "schemaUpgradeInProgress" operation to 1 using Browse -> Modify
- Now you can clear this protected attribute
- Or set any value
Then stop it by setting "schemaUpgradeInProgress" to 0

23.12.2024 10:32 — 👍 2    🔁 0    💬 1    📌 0
Preview
[MS-ADTS]: schemaUpgradeInProgress This operation causes the fschemaUpgradeInProgress field of LDAPConnection instances in dc.LDAPConnections ([MS-DRSR]

You know how some system AD attributes cannot be edited even when Domain Admin?
"Error 0x20B1 The attribute cannot be modified because it is owned by the system."
This can be bypassed using the schemaUpgradeInProgress modify operation learn.microsoft.com/en-us/opensp... 😉⬇️

23.12.2024 10:32 — 👍 2    🔁 0    💬 1    📌 0

Hello there 👋

23.12.2024 10:31 — 👍 1    🔁 0    💬 1    📌 0

Thanks!

20.12.2024 17:36 — 👍 0    🔁 0    💬 0    📌 0

Damn indeed of course! I’m tired 😅

20.12.2024 17:33 — 👍 0    🔁 0    💬 1    📌 0

But you can login without the invite? Because it was already sent earlier to the typod domain that the attacker didn’t own yet

20.12.2024 17:29 — 👍 0    🔁 0    💬 0    📌 0

I think the issue was this one by @dirkjanm.io:
dirkjanm.io/assets/raw/U...
but it was fixed

20.12.2024 12:00 — 👍 2    🔁 0    💬 0    📌 0

You mean it cannot work because the attacker would have to have the invite link too? I think so too 🤔

20.12.2024 11:57 — 👍 0    🔁 0    💬 1    📌 0

Hey! Do you remember the podcast please?

20.12.2024 11:54 — 👍 0    🔁 0    💬 0    📌 0