Check out my new blog on nested app authentication.
13.08.2025 16:43 โ ๐ 6 ๐ 5 ๐ฌ 0 ๐ 0@cyb3rmonk.bsky.social
https://academy.bluraven.io Threat Hunting & Research, Detection Engineering | Microsoft Security MVP #KQL #DFIR #DataScience All is one. Opinions are my own http://posts.bluraven.io https://github.com/Cyb3r-Monk/Threat-Hunting-and-Detection
Check out my new blog on nested app authentication.
13.08.2025 16:43 โ ๐ 6 ๐ 5 ๐ฌ 0 ๐ 0๐ Azure Resource Graph limits number of results to 1000 when queried from Sentinel or Defender XDR using KQL.
There is a little trick that lets you bypass these limits.๐ค
๐
academy.bluraven.io/blog/queryin...
#KQL #MicrosoftSentinel #AzureResourceGraph #DefenderXDR
Hello, friends! I'm thrilled to announce that The Homelab Almanac, v3.0 has officially launched! There is a **ton** of new stuff in this version, including:
- Proper DNS
- PKI
- Automatic signed certificates
- New secrets management
- Proxmox clustering
- Cloud integration
๐จ BadSuccessor = Bad OPSEC
With the right audit config, it's pretty easy to detect BadSuccessor. 
academy.bluraven.io/blog/detecti...
#ThreatHunting #DetectionEngineering #ThreatDetection 
#BadSuccessor
This blog is a little bitter, but it's what it is๐ซ 
academy.bluraven.io/blog/detecti...
#ThreatHunting #DetectionEngineering
This blog is a little bitter, but it's what it is๐ซ 
academy.bluraven.io/blog/detecti...
#ThreatHunting #DetectionEngineering
Website is down?
18.05.2025 11:14 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0๐จ Test your Lateral Movement investigation skills!
We have just added a new challenge to our FREE "Hands-On Introduction to KQL for Security Analysis" course!
You can even test your AI agents' skills ๐ 
#KQL #Kusto #MicrosoftSentinel #MicrosoftDefender
academy.bluraven.io/course/intro...
๐ฃ HAPPY EASTER CAPSTONE! ๐ก๏ธ
My KQL courses now include a complete attack scenario to test your skills โ end to end.
๐ฏ Hands-on labs
๐ 20% OFF for a limited time!
Crack it open ๐
#KQL #Kusto #ThreatHunting #DetectionEngineering #DFIR
 
academy.bluraven.io
๐ NEW UPDATE:
I've added a small challenge to my FREE "Hands-On Introduction to KQL for Security Analysis" course. 
More will be coming soon!
#KQL #Kusto #MicrosoftDefender #MicrosoftSentinel
academy.bluraven.io/course/intro...
๐จ FREE unlimited lab access to "Introduction to KQL for Security Analysis" course!
Thrilled to announce that my Intro to KQL for Security Analysis lab environment is now completely free with no time restrictions!
academy.bluraven.io/course/intro...
#KQL #Kusto #ThreatHunting #Infosec
๐จ Problem with Cyber Range/Training platforms โ 
Most range platforms and training labs provide you with all the questions to solve, hinting answers to other questions.
I've implemented a trick to hide some questions that reveal hints for other questions for a real-life experience.
Stay tuned.๐
๐จ Detect C2 Beacons!
New Microsoft Defender for Endpoint telemetry provides new opportunities for threat detection!
๐
academy.bluraven.io/blog/beaconi...
#ThreatHunting #DetectionEngineering #MDE
When you group your logs by timestamp(binning) to detect threats, you probably cause false negatives. Solve it using sliding window counts!
academy.bluraven.io/blog/advance...
#KQL #ThreatHunting #DetectionEngineering
It appears Microsoft quietly mitigated most of the risk of the "Intune company portal" device compliance CA bypass by restricting the scope of Azure AD graph tokens issued to this app, making them almost useless for most abuse scenarios. Thx @domchell.bsky.social for the heads up.
20.02.2025 11:08 โ ๐ 28 ๐ 9 ๐ฌ 0 ๐ 0The phishing usually happens on a managed device, though ๐ค
18.02.2025 15:28 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0I used plaintext roadtx and then used roadrecon to dump Entra ID data. I even caused sign-in failures. There isn't any CAP in this tenant. Could that be the reason? AFAIK, it doesn't affect risk identification.
15.02.2025 15:16 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0๐ฅฒ Seems like you don't even have to use residential proxies for device code phishing for evasion. Just get a machine in one of the cloud providers' corresponding regions. ๐คทโโ๏ธ
15.02.2025 15:15 โ ๐ 7 ๐ 1 ๐ฌ 1 ๐ 0๐Fall in Love with Threat Hunting, Incident Response, and Detection Engineering using #KQL๐
Code: VLTN30
Valid until 17.02
#ThreatHunting
academy.bluraven.io
I'm for multivariate anomaly detection approach and scoring the results. However, this scoring is not static like "if X, then score += 10".
14.02.2025 12:12 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Window functions do wonders!
academy.bluraven.io/blog/advance...
#ThreatHunting #KQL
๐จ Time to check your detection queries for MDE:
DLL load events are recorded in DeviceImageLoadEvents table, NOT DeviceEvents table. I keep seeing people sharing queries with the wrong table and even with the wrong ActionType filters.
Here it is: your complete guide to building a Wireguard network that doesn't require any open ports at home, and doesn't require any third-party tools. Just Wireguard, your devices, and a little elbow grease.
taggart-tech.com/wir...
It seems like there is an easy way to block VS Code tunnels (Dev Tunnels) on Windows to prevent malicious usage. ๐ฎ
techcommunity.microsoft.com/blog/azurede...
#LOLBAS project update:
Entries now have placeholders for paths, URLs, and more. This makes it easier to visually see what parts are "variable", and for LOLBAS API users (lolbas-project.github.io/api/) it'll be easier to use with automation.
Check it out:
โญ lolbas-project.github.io
Tell me a single windows logon event (network logon) that shows the IP address, Port, and if the logon has admin privileges.
27.01.2025 17:55 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0I don't have insights into everything but I don't think so from my experience.
25.01.2025 06:53 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0Detectable by Design?
We keep failing on "shift left", "secure by design", etc. to prevent malicious activities.
How about "detectable by design" approach? It's certain your product will fail on the prevention side but you could design it in a way that makes it easy to detect malicious activities.
New Year, New Blog
academy.bluraven.io/blog/masteri...
#DetectionEngineering #SIEM #XDR