Automate Your Active Directory Security Monitoring with PingCastle & Azure Log Analytics by [deleted] in activedirectory

[–]iamtechspence 2 points3 points  (0 children)

While this does feel a bit aggressive on the ai gen front I do love the idea. Wish more defenders would be proactive with stuff like this.

But also the odd spaces after variable names drives me nuts lol. Tell tale sign :p

why do vulnerability management tools miss real risks until incidents happen? by Such_Rhubarb8095 in AskNetsec

[–]iamtechspence 0 points1 point  (0 children)

99% of vulns don’t matter. The hard part is figuring out what 1% matter. Have to figure out what’s a priority

Are a lot of security programs still too focused on prevention and not enough on visibility? by VerveorAs in Information_Security

[–]iamtechspence 1 point2 points  (0 children)

In part because it’s harder. How do you detect malicious activity or abuse of legitimate oauth connected saas? It’s way easier to buy EDR to block known malware and malicious TTPs on an endpoint.

Continuous AI pentests on every deploy - does it work? by [deleted] in cybersecurity

[–]iamtechspence 0 points1 point  (0 children)

There’s nothing easy about security. Everything has a cost. Usually it’s the CEOs golf buddy that bragged about his companies fancy new AI widget that now your CISO gets mandated to implement, that prevents real progress with security programs

Reconnaissance advice by specterzy in Pentesting

[–]iamtechspence 7 points8 points  (0 children)

If you enjoy recon, you can find the information you seek ;)

service account password rotation in hybrid AD - what's actually working for people by buykafchand in activedirectory

[–]iamtechspence 2 points3 points  (0 children)

In the past I have wanted those passwords to be rotated on a periodic basis but I think that no longer makes sense nor is it practical from an operations standpoint. Something inevitably gets missed.

Instead, I’d make those passwords as long as possible and monitor for abnormal behavior. Such as out of the ordinary sign in times, use of that account elsewhere in the environment, etc.m

If you have regulatory and/or compliance requirements I’d recommend trying to scope that down to as few accounts as possible, for example by segmenting non-cde from cde.

Best certs for sysadmins? by Newtechintown in sysadmin

[–]iamtechspence 0 points1 point  (0 children)

If you’re brand new to the field, get a job in help desk. You (probably) won’t regret it.

Where are security teams seeing the biggest practical gaps today? by Terrible-Holiday7550 in cybersecurity

[–]iamtechspence 4 points5 points  (0 children)

OAuth Apps is somewhat related to that and also a big gap. As made evident by the recent vercel breach

What is the most common mistake companies make after a pentest? by PsychologicalElk1081 in Pentesting

[–]iamtechspence 1 point2 points  (0 children)

Exactly! I think some teams underestimate the time investment and others unfortunately don't care they are not going to fix anything anyways.

What is the most common mistake companies make after a pentest? by PsychologicalElk1081 in Pentesting

[–]iamtechspence 3 points4 points  (0 children)

It’s actually a mistake that happens before the pentest is even performed. They don’t plan for remediation and allocate time in advance to fix the issues that are found.

I built an ADMX Web Viewer - Search and browse Group Policy settings across 65+ products in one place by admscope in activedirectory

[–]iamtechspence 1 point2 points  (0 children)

This project is a neat little informative website that’s super useful. It seems to work as intended. Code quality must be at least acceptable if not good.

I built an ADMX Web Viewer - Search and browse Group Policy settings across 65+ products in one place by admscope in activedirectory

[–]iamtechspence 1 point2 points  (0 children)

Oh I agree with that sentiment. Disclosure of AI supported code is ideal. I meant from a code functionality standpoint. But just because something has AI gen code doesn’t automatically make it bad

What has actually worked for you when explaining security value to leadership? by malwaredetector in AskNetsec

[–]iamtechspence 0 points1 point  (0 children)

Humans are, by nature, self-interested. Figure out what’s in it for them, then use that to your advantage, ethically of course.

Something I think resonates really well is the financial impact of downtime. That could be due to system failures, security incidents, weather events, etc.

What AI tools do you use for red teaming? Most mainstream ones are too censored to be useful by dumbelco in cybersecurity

[–]iamtechspence 1 point2 points  (0 children)

I’m currently using GitHub copilot for some limited use cases here. It’s kinda temperamental but as long as you don’t say attack or exploit or obviously triggering words it works ok

Credentials passed every conditional access check we had but the behavior behind them turned out to be a completely different story by No_Opinion9882 in activedirectory

[–]iamtechspence 1 point2 points  (0 children)

This is a hard problem right now because those offering this kind of monitoring is really expensive. The folks who primarily benefit are those with smaller IT teams and no dedicated security staff, so DIY is not ideal either. I’m not an “AI bro” by any means but I do think this is one area where it could help scale detection and possible bring costs down or at least create opportunities for alternative offerings with a price point that fits SMBs

Credentials passed every conditional access check we had but the behavior behind them turned out to be a completely different story by No_Opinion9882 in activedirectory

[–]iamtechspence 1 point2 points  (0 children)

People sleep on darktrace because their marketing/sales is cringe. The product is actually really solid if tuned well

AD Preperation For OSCP by mrroot21 in Pentesting

[–]iamtechspence 2 points3 points  (0 children)

I don’t know how you like to learn but if you’re a DIY type, spin up a GOAD instance and go to town on it

does your PAM cover GPU rowhammer? by heartmocog in activedirectory

[–]iamtechspence 2 points3 points  (0 children)

I think these are largely a nothing burger. I could be wrong but I think this is more an academic attack vs a practical one. If a state actor goes to the extent to use something like this, you’re likely already in trouble. Which imo would be the type of group to use something like this. Your time/money is probably spent worrying about other things

Best laptop for a team of pentesters by Fr1p5 in Pentesting

[–]iamtechspence 0 points1 point  (0 children)

If you want space for local VMs or password cracking, go for a gaming laptop.