#Redteaming
Explore tagged Tumblr posts
Text
OWASP's LLM AI Security & Governance Checklist: 13 action items for your team

Artificial intelligence is developing at a dizzying pace. And if it's dizzying for people in the field, it's even more so for those outside it, especially security professionals trying to weigh the risks the technology poses to their organizations. That's why the Open Web Application Security Project (OWASP) has introduced a new cybersecurity and governance checklist for those security pros who are striving to protect against the risks of hasty or insecure AI implementations. https://jpmellojr.blogspot.com/2024/04/owasps-llm-ai-security-governance.html
#Checklist#OWASP#LLM#Security#Privacy#ThreatModeling#AIAssets#RiskManagement#Compliance#ModelCards#RAG#RedTeaming#Challenges#Prioritization
2 notes
¡
View notes
Text
Red Team Strategies to Fortify Your Cybersecurity Posture
Is your organization truly prepared to handle a full-scale cyberattack? Red team assessments mimic real-world adversaries to uncover blind spots in your defence strategy. This detailed guide explores multiple red teaming approachesâexternal, internal, social engineering, physical intrusion, and app-focusedâto help organizations enhance detection, response, and overall cyber resilience in today's threat landscape.
#SecurityStrategy#RedTeaming#IncidentResponse#CyberSecurityTesting#AdvancedPersistentThreats#RiskManagement
0 notes
Text
youtube
1 note
¡
View note
Text
@number-one-fan-of-heavy
@number-one-fan-of-doktor
@cefromagegrille
@scrumpy-swillin-scotsman
@flammableunicorn
@yawurstnightmare
@leadshootingcupid
AND LASTLY
@stringsnwires
It has come to my attention that one of our teammates have not been taking care if himself properly! As his boyfriend, teammate, and friend, I think that he needs an intervention! So here we are! We all know he is a grown man, so I do not believe in childish solutions, but you have to realize Dell that we all care for you and believe that you are an important part of the team! If you do not take care of your health and value it as much as we all do then you will not only be leaving yourself vulnerable to harm and low performance, but your team as well! Even your platoon of anonymous mailbox people!
You need to sleep more and stop working until exhaustion! Food and water can only take you part of the way. I will not stand by and watch my teammate destroy his body and mind slowly!
56 notes
¡
View notes
Note
Hello!! Do you post TF2? If you do then can you do Sniper x Male!Reader please?/nf /lh
-â¨đŤ
no. im kidding of course i can write for the silly!!
SNIPER WITH A MALE READER đđ ŕŁŞË Ö´đ
doesnât realize he has a huge crush on you untill he goes âyn would make a good boyfriend..wait-â
gives you his hat and likes to see you wear it.
takes you out on a roadtrip and possibly camping, there would be some stargazing.
doesnât know what gay means. he just likes men, specifically you. he doesnât know that its a thing.
asks scout for relationship advice, regrets it.
has his own bird, and keeps him in his van so only he and sometimes you can see it. i feel like he would either have a rosella or a laughing kookaburra.
way more clingy than he looks, hes just to embarrassed to cuddle in public. but when in private hes all over you.
teaches you how to play the saxophone đˇ
his biggest insecurity would be his crooked smile, and its up to you to comfort him and tell him hes gorgeous!!
has 0 fucking spice tolerance. like this man can not eat anything with peppers or pepper powder without choking.
since tf2 canonically takes place in the 60s/70s, youâre probably going to have to hide your relationship.
loves sunglasses. he collects them and lets you borrow them.
a silly nerd, especially when it comes to anything nature related or gun range related. please listen to him.
#headcanons#hcs#headcanons ;#mini headcanon#x reader#tf2#medic#scout#sniper#red#male reader#demoman team fortress 2#tf2 sniper#spy#christian brutal sniper#engie#mick mundy#team fortress 2 medic#team fortress 2 scout#tf2 scout#tf2 sniper x reader#fypăˇ#miss pauling#redteam
99 notes
¡
View notes
Text
thinkin abt qphil with no backpack falling over himself the moment theyâre dropped into purgatory, ragged wings exposed and fluttering, trying helplessly to counterbalance. thinkin abt phil sitting on the floor, frustrated, explaining the backpack situation to the others, how he needs the extra weight to keep his balance. thinkin abt baghera (wingless, like him; flightless, like him) offering him a hand up, giving him the choice to take it, which he does; offers her shoulder for him to hold onto for the time being, which he does. thinkin about cellbit and carre tying their jackets together to fashion a makeshift sling while jaiden and charlie go looking for heavy stones. the stones go in the sling, and baghera helps phil tie it tight down tight, distributing weight across his back. and as theyâre tying it down, cellbit suggests that phil is team leader, and they all wholeheartedly agree. just,, yeah.
89 notes
¡
View notes
Text
Entra ID Lateral Movement And Expanding Permission Usage

Abusing Intimate Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments: (In)tune to Takeovers
Recently, a client received assistance from the Mandiant Red Team in visualizing the potential consequences of an advanced threat actor breach. In order to compromise the tenantâs installed Entra ID service principals, Mandiant migrated laterally from the customerâs on-premises environment to their Microsoft Entra ID tenant during the evaluation.
Using a popular security architecture that involves Intune-managed Privileged Access Workstations (PAWs), we will discuss in this blog post a new method by which adversaries can move laterally and elevate privileges within Microsoft Entra ID by abusing Intune permissions (DeviceManagementConfiguration.ReadWrite.All) granted to Entra ID service principals. We also offer suggestions and corrective actions to stop and identify this kind of attack.
A pretext
The client had a well-developed security architecture that adhered to the Enterprise Access model suggested by Microsoft, which included:
An Active Directory-based on-premises setting that adheres to the Tiered Model.
A Microsoft Entra Connect Sync-synchronized Entra ID environment that synchronizes on-premises identities and groups with Entra ID. PAWs, which were completely cloud-native and controlled by Intune Mobile Device Management (MDM), were used to administrate this environment. They were not connected to the on-premises Active Directory system. To access these systems, IT managers used a specific, cloud-native (non-synced) administrative account. These cloud-native administrative accounts were the only ones allocated Entra ID roles (Global Administrator, Privileged Role Administrator, etc.).
A robust security barrier was created by separating administrative accounts, devices, and privileges between the Entra ID environment and the on-premises environment:
Because Entra ID privileged roles are associated with unique, cloud-native identities, a compromise of the on-premises Active Directory cannot be utilized to compromise the Entra ID environment. This is an excellent practice for Microsoft.
An âair gapâ between the administration planes of the two environments is successfully created by using distinct physical workstations for administrative access to cloud and on-premises resources. Attackers find it very challenging to get through air gaps.
Strong Conditional Access regulations imposed by Privileged Identity Management assigned roles to the administrative accounts in Entra ID, necessitating multi-factor authentication and a managed, compliant device. Additionally, Microsoft recommends these best practices.
Attack Path
One of the objectives of the evaluation was to assign the Mandiant Red Team the task of obtaining Global Administrator access to the Entra ID tenant. Mandiant was able to add credentials to Entra ID service principals (microsoft.directory/servicePrincipals/credentials/update) by using a variety of methods that are outside the purview of this blog post. This gave the Red Team the ability to compromise any preloaded service principal.
There are a number well-known methods for abusing service principal rights to get higher permissions, most notably through the usage of RoleManagement.See AppRoleAssignment and ReadWrite.Directory.Application and ReadWrite.All.ReadWrite.All rights for Microsoft Graph.
However, the Mandiant Red Team had to reconsider their approach because none of these rights were being used in the customerâs environment.
Mandiant found a service principle that was given the DeviceManagementConfiguration after using the superb ROADTools framework to learn more about the customerâs Entra ID system.Go ahead and write.Permission is granted.Image credit to Google Cloud
The service principal is able to âread and write Microsoft Intune device configuration and policiesâ with this authorization.
Clients running Windows 10 and later can execute the unique PowerShell scripts used by Intune for device management. Administrators have an alternative to configuring devices with settings not accessible through the configuration policies or the apps section of Intune by using the ability to run scripts on local devices. When the device boots up, management scripts with administrator rights (NT AUTHORITY\SYSTEM) are run.
The configuration of Device Management.Go ahead and write.To list, read, create, and update management scripts via the Microsoft Graph API, all permissions are required.
The Microsoft Graph API makes it simple to write or edit the management script. An example HTTP request to alter an existing script is displayed in the accompanying figure.PATCH https://graph.microsoft.com/beta/deviceManagement/ deviceManagementScripts/<script id> { "@odata.type": "#microsoft.graph.deviceManagementScript", "displayName": "<display name>", "description": "<description>", "scriptContent": "<PowerShell script in base64 encoding>", "runAsAccount": "system", "enforceSignatureCheck": false, "fileName": "<filename>", "roleScopeTagIds": [ "<existing role scope tags>" ], "runAs32Bit": false }
The caller can provide a display name, file name, and description in addition to the Base64-encoded value of the PowerShell script content using the Graph API. Depending on which principle the script should be run as, the runAsAccount parameter can be set to either user or system. RoleScopeTagIds references Intuneâs Scope Tags, which associate people and devices. The DeviceManagementConfiguration can likewise be used to construct and manage them.Go ahead and write. Permission is granted.
The configuration of Device Management.Go ahead and write.By changing an existing device management script to run a PowerShell script under Mandiantâs control, Mandiant was able to go laterally to the PAWs used for Entra ID administration with full authorization. The malicious script is run by the Intune management script when the device reboots as part of the userâs regular workday.
By implanting a command-and-control device, Mandiant could give the PAWs any instructions. The Red Team obtained privileged access to Entra ID by waiting for the victim to activate their privileged role through Azure Privileged Identity Management and then impersonating the privileged account (for example, by stealing cookies or tokens). By taking these actions, Mandiant was able to fulfill the assessmentâs goal and gain Global Administrator rights in Entra ID.
Remediation and Recommendations
To avoid the attack scenario, Mandiant suggests the following hardening measures:
Review your organizationâs security principals for the DeviceManagementConfiguration.ReadWrite.All permission: DeviceManagementConfiguration should be handled by organizations that use Microsoft Intune for device management.Go ahead and write.Since it grants the trustee authority over the Intune-managed devices and, consequently, any identities connected to the devices, all permissions are considered sensitive.
Mandiant advises businesses to routinely check the authorizations given to Azure service principals, with a focus on the DeviceManagementConfiguration.Along with other sensitive permissions (like RoleManagement), there is the ReadWrite.All permission.See AppRoleAssignment and ReadWrite.Directory.Application and ReadWrite.All.ReadWrite.All.
Businesses that manage PAWs with Intune should exercise extra caution when assigning Intune privileges (either via DeviceManagementConfiguration).Use Entra roles like Intune Role Administrator or ReadWrite.All.
Enable Intuneâs multiple admin approval: Intune allows you to use Access Policies to demand a second administratorâs approval before applying any changes. By doing this, an attacker would be unable to use a single compromised account to create or alter management scripts.
Think about turning on activity logs for the Microsoft Graph API: Graph API Activity logs, which provide comprehensive details about Graph API HTTP requests made to Microsoft Graph resources, can be enabled to aid in detection and response efforts.
Make use of the features that Workload ID Premium licenses offer: With a Workload-ID Premium license, Mandiant suggests using these features to:
Limit the use of privileged service principals to known, reliable places only. By guaranteeing that only trustworthy places are used, this reduces the possibility of unwanted access and improves security.
Enable risk detections in Microsoft Identity Protection to improve service principal security. When risk factors or questionable activity are found, this can proactively prohibit access.
Keep an eye on service principal sign-ins proactively: Monitoring service principal sign-ins proactively can aid in identifying irregularities and possible dangers. Incorporate this information into security procedures to set off notifications and facilitate quick action in the event of unwanted access attempts.
Mandiant has a thorough grasp of the various ways attackers may compromise their targetâs cloud estate with some hostile emulation engagements, Red Team Assessments, and Purple Team Assessments.
Read more on Govindhtech.com
#EntraID#EntraIDLateral#Lateral#Mandiant#MicrosoftEntraID#RedTeam#Windows10#News#Technews#Technology#Technologynews#Technologytrends#govindhtech
3 notes
¡
View notes
Text
I think the street level heroes would be friends
procreate 4hrs
#MarvelComics#Deadpool#spiderman#Marvel#art#digitalart#spideypool#Daredevil#mattmurdock#peterparker#wadewilson#marvelteamred#teamred#redteam#moonknight#venom#marcspector#eddiebrock
30 notes
¡
View notes
Text
Art of my blu engie and red tf2 oc runt, I may do comics someday
3 notes
¡
View notes
Text
1 note
¡
View note
Text
Let the war beginâŚ
#tf2#team fortress 2#redteam#tf2 soldier#roleplay#tf2 rp blog#ask blog#tf2 ask blog#america#usa#soldier screams
8 notes
¡
View notes
Note
scout x very chatty reader? one that yaps as much as him
SCOUT WITH A YAPPER READER ĘÉ
so happy, will listen to you for HOURS on end.
however, hes very confused when you listen to him talk about his favourite Bonk! flavour for almost 3 hours. nobodyâs listened to him that much before.
sniper needs earplugs because of the two of you
kisses you to shut you up sometimes, doesnât matter if youâre dating or not.
you guys keep each other entertained for HOURS on end, itâs fantastic for the rest of the team because they donât have to babysit scout.
has only gotten angry ONCE due to your yapping behaviour, but he apologized with cuddles and a giant blanket.
unlike him, you know how to control your behaviour sometimes. heâs a bit louder than you.
you are both a literal menace duo, the rest of the team are shaking in their boots.
deadass starts contests with you to see which one is more of a talker.
tries to be mysterious and fails so hard itâs funny.
âbaby donât you think too much?â
âthe hells that supposed to mean?â
#headcanons#hcs#headcanons ;#mini headcanon#x reader#tf2#medic#scout#redteam#redspy#redscout#red#bluetf2#blue#demoman tf2#tf#team fortress two medic#tf2 scout#team fortress 2#tf2 fanart#team fortress two scout#team fortress two pyro#jeremy scout#heavy weapons guy#misha is talking#team fortress#fypppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppp#fypăˇ
58 notes
¡
View notes
Text
theyre having a time
3 notes
¡
View notes