Clément Notin  

895 Followers
293 Following
144 Posts
😈 Security research (#ActiveDirectory #EntraID) & pentest
👌 Sharing technical tips and ideas
🎉 #CTF with @tipi_hack
👨‍💼 Works @tenable, opinions my own
websitehttps://clement.notin.org
twitter@cnotin
countryFrance
pronounshe/him
githubhttps://github.com/cnotin

👻 Is Windows 2000 still haunting your Active Directory?

AD trusts created in the Win2k era never get the WITHIN_FOREST flag, even after later upgrades ➡️ you could misclassify safe internal trusts as risky external ones 💥
⚠️when "trustAttributes=0"

https://www.tenable.com/blog/active-directory-trust-misclassification-why-old-trusts-look-like-insecure-external-trusts

Active Directory Security: Trusts Stuck on Windows 2000 Attributes | Tenable®

Upgrading Active Directory from Windows 2000 doesn't fix old intra-forest trusts. This security anomaly can lead to misidentification as potentially insecure external trusts. See Tenable's solution.

Tenable®
🤔 We have answers to your questions on #BadSuccessor, the latest AD vulnerability https://www.tenable.com/blog/frequently-asked-questions-about-badsuccessor
🕵️ Tenable Identity Exposure customers can check their exposure with our recently released Indicator of Exposure (IoE): https://www.tenable.com/indicators/ioe/ad/C-BAD-SUCCESSOR
Frequently Asked Questions About BadSuccessor

Frequently asked questions about “BadSuccessor,” a zero-day privilege escalation vulnerability in Active Directory domains with at least one Windows Server 2025 domain controller.

Tenable®

Microsoft hardened the Entra ID synchronization feature last year:
- restricted permissions on Directory Synchronization Accounts role
- new dedicated sync app
Let’s find out how sync still works 🔍
Some old tricks persist—and new ones have emerged 💥
https://tenable.com/blog/despite-recent-security-hardening-entra-id-synchronization-feature-remains-open-for-abuse 🧵

The Directory Synchronization Accounts role has lost most of its Entra permissions... but it retains implicit permissions to call the undocumented synchronization API 😯 ➡️ reset hybrid users' passwords
And so does the new "On Premises Directory Sync Account" Entra role 👀

And what about the new "Microsoft Entra AD Synchronization Service" application? 🤔
It exposes a new permission: ADSynchronization.ReadWrite.All, which also allows to call the sync API when granted to a service principal ➡️ same impact

To summarize, these hardenings are great (and the new app will likely allow to support some security features), but it doesn't prevent everything or even introduces new cracks to monitor.
There's no magic to keep this feature working anyway 😉

Despite Recent Security Hardening, Entra ID Synchronization Feature Remains Open for Abuse

Microsoft synchronization capabilities for managing identities in hybrid environments are not without their risks. In this blog, Tenable Research explores how potential weaknesses in these synchronization options can be exploited.

Tenable®

🎥 Here's the recording of last week's webinar where I shared how to protect Entra ID from real-world attacks 🏴‍☠️, beginning with federation backdoors/privesc, using Tenable Identity Exposure

https://www.tenable.com/webinars/3-reasons-why-its-time-to-embrace-identity-as-part-of-exposure-management?utm_campaign=00032644&utm_promoter=tenable-research&utm_medium=social&utm_content=webinar-3-18-2025&utm_source=cn

Webinar: 3 reasons why it's time to embrace identity as part of exposure management

Attackers don’t break in; they log in, exploiting hidden flaws in Active Directory and Entra ID to gain access and persistence in your environments. To help you overcome this challenge, check out this on-demand webinar with Tenable research engineer Clément Notin and security engineer Tony Archer for an eye-opening look at how adversaries exploit hybrid identity infrastructure and what you can do to counteract this threat.

Tenable®
@abartlet hi Andrew, I love what you do 😉
Oh that’s right I didn’t think about it. I guess it’s possible through a DCShadow attack which would be similar to
@gzobra Sorry! Fixed it

You know how some system AD attributes cannot be edited even when Domain Admin?
"Error 0x20B1 The attribute cannot be modified because it is owned by the system."
This can be bypassed using the schemaUpgradeInProgress modify operation https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/a21db735-6025-4244-9cfe-6ce6582114a8 😉

Log-in as Domain or Schema admin
- Use ldp.exe and set the "schemaUpgradeInProgress" operation to 1 using Browse -> Modify
- Now you can clear this protected attribute
- Or set any value
Then stop it by setting "schemaUpgradeInProgress" to 0

⚠️ this is likely unsupported by Microsoft even though this method is advised to clean broken trust objects https://support.microsoft.com/en-us/topic/kb5040758-deleting-a-stale-corrupt-or-orphaned-trust-object-in-active-directory-a4995def-7b43-4f85-86dc-29a0c66323c9
And as described in the doc, this operation is not global: it's only effective in the same LDAP connection. It's why using ldp or LDIFDE helps

[MS-ADTS]: schemaUpgradeInProgress

This operation causes the fschemaUpgradeInProgress field of LDAPConnection instances in dc.LDAPConnections ([MS-DRSR]

Amitai Cohen 🎗️ (@AmitaiCo) on X

Sketch of interpretation of Midnight Blizzard's attack flow based on @MsftSecIntel's blogpost (had to make a few assumptions, noted in grey). Big h/t to @cnotin and @EricaZelic for their analysis of this incident (links in thread) and to @LSecResearch for valuable input.

X (formerly Twitter)
@claushoumann I’m not sure anymore because it the apps could also have been created in the test tenant, then consented to in the prod tenant by the users they created, to trigger the creation of the SP in prod to which the exchange online permission was granted. Otherwise I don’t see why this step was necessary.

📃 How attackers can add a secondary token-signing certificate to an #EntraID federated authentication configuration for stealthier persistence & privesc 🙈
https://medium.com/tenable-techblog/stealthy-persistence-privesc-in-entra-id-by-using-the-federated-auth-secondary-token-signing-cert-876b21261106
Have you heard about the "nextSigningCertificate"? 😉

You'll also discover what this change means in the latest (final? 😢) version 0.9.3 of AADInternals by @DrAzureAD
"Modified ConvertTo-AADIntBackdoor to add backdoor certificate to NextSigningCertificate if the domain is already federated."
https://aadinternals.com/aadinternals/#version-info

Exploiting Entra ID for Stealthier Persistence and Privilege Escalation using the Federated Authentication’s Secondary Token-signing Certificate

Microsoft Entra ID (formerly known as Azure AD) offers a feature called federation that allows you to delegate authentication to another Identity Provider (IdP), such as AD FS with on-prem Active…

Tenable TechBlog