Sharing our knowledge
Knowledge center
Arbitrary 1-click Azure tenant takeover via MS application
[dsm_breadcrumbs show_home_icon="off" separator_icon="K||divi||400" admin_label="Supreme Breadcrumbs" _builder_version="4.18.0" _module_preset="default" items_font="||||||||" items_text_color="rgba(255,255,255,0.6)" custom_css_main_element="color:...
SOAPHound — tool to collect Active Directory data via ADWS
[dsm_breadcrumbs show_home_icon="off" separator_icon="K||divi||400" admin_label="Supreme Breadcrumbs" _builder_version="4.18.0" _module_preset="default" items_font="||||||||" items_text_color="rgba(255,255,255,0.6)" custom_css_main_element="color:...
![Microsoft Defender for Endpoint Internals 0x02 — Audit Settings and Telemetry](https://falconforce.nl/wp-content/uploads/2022/07/Microsoft-Defender-for-Endpoint-Internals.jpg)
Microsoft Defender for Endpoint Internals 0x02 — Audit Settings and Telemetry
![FalconFriday — Detecting UnPACing and shadowed credentials—0xFF1E](https://falconforce.nl/wp-content/uploads/2023/01/FalconFriday — Detecting-UnPACing-and-shadowed-credentials—0xFF1E.jpg)
FalconFriday — Detecting UnPACing and shadowed credentials—0xFF1E
![FalconFriday — Detecting malicious modifications to Active Directory — 0xFF1D](https://falconforce.nl/wp-content/uploads/2023/01/FalconFriday — Detecting-malicious-modifications-to-Active-Directory — 0xFF1D.jpg)
FalconFriday — Detecting malicious modifications to Active Directory — 0xFF1D
![Debugging the undebuggable and finding a CVE in Microsoft Defender for Endpoint](https://falconforce.nl/wp-content/uploads/2023/01/Debugging-the-undebuggable-and-finding-a-CVE-in-Microsoft-Defender-for-Endpoint.jpg)
Debugging the undebuggable and finding a CVE in Microsoft Defender for Endpoint
![FalconFriday — EzETW — Got To Catch Them All…](https://falconforce.nl/wp-content/uploads/2023/02/EzETW — Got-To-Catch-Them-Al.jpg)
FalconFriday — EzETW — Got To Catch Them All…
![FalconFriday — Detecting realistic AWS cloud-attacks using Azure Sentinel — 0xFF1C](https://falconforce.nl/wp-content/uploads/2023/01/FalconFriday — Detecting-realistic-AWS-cloud-attacks-using-Azure-Sentinel — 0xFF1C.jpg)
FalconFriday — Detecting realistic AWS cloud-attacks using Azure Sentinel — 0xFF1C
FalconFriday — Suspicious named pipe events — 0xFF1B
![FalconFriday —Monitoring for public shares — 0xFF1A](https://falconforce.nl/wp-content/uploads/2023/01/FalconFriday-—Monitoring-for-public-shares — 0xFF1A.jpg)
FalconFriday —Monitoring for public shares — 0xFF1A
![FalconFriday — Code execution through Microsoft SQL Server and Oracle Database — 0xFF19](https://falconforce.nl/wp-content/uploads/2023/01/FalconFriday — Code-execution-through-Microsoft-SQL-Server-and-Oracle-Database — 0xFF19.jpg)
FalconFriday — Code execution through Microsoft SQL Server and Oracle Database — 0xFF19
Together. Secure. Today.
Stay in the loop and sign up to our newsletter
![FalconForce ico](https://falconforce.nl/wp-content/uploads/2022/09/FalconForce-ico.png)
FalconForce realizes ambitions by working closely with its customers in a methodical manner, improving their security in the digital domain.
Energieweg 3
3542 DZ Utrecht
The Netherlands
FalconForce B.V.
[email protected]
(+31) 85 044 93 34
KVK 76682307
BTW NL860745314B01