Infecting the Enterprise: Abusing Office365+Powershell for Covert C2
As Enterprises rush to adopt Office365 for increased business agility and cost reduction, too few are taking time to truly evaluate the risk associated with this decision. This briefing will attempt to shine a light on the potential hazards of Microsoft's SaaS offerings while also demonstrating a practical example of what a malicious actor can do when Office365 is allowed into the Enterprise.
By Craig Dods
Full Abstract & Presentation Materials:
https://www.blackhat.com/us-17/briefings.html#infecting-the-enterprise-abusing-office365-pluspowershell-for-covert-c2
Видео Infecting the Enterprise: Abusing Office365+Powershell for Covert C2 канала Black Hat
By Craig Dods
Full Abstract & Presentation Materials:
https://www.blackhat.com/us-17/briefings.html#infecting-the-enterprise-abusing-office365-pluspowershell-for-covert-c2
Видео Infecting the Enterprise: Abusing Office365+Powershell for Covert C2 канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUsAbusing Microsoft Kerberos: Sorry You Guys Don't Get ItLies and Damn Lies: Getting Past the Hype of Endpoint Security SolutionsThe NSA Playset: A Year Of Toys And ToolsFileless Malware Demystifiedprogrammers_are_evil() - Live at LinuxFest NW 2018SirenJack: Cracking a 'Secure' Emergency Warning Siren SystemWhat's on the Wireless? Automating RF Signal IdentificationDEF CON 22 - Grant Bugher - Detecting Bluetooth Surveillance SystemsThe Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege EscalationInvoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)Exploiting Network PrintersDEFCON 20: The Art Of The ConMaltego - Cyber Weapons Lab - Research like an OSINT AnalystHow We Created the First SHA-1 Collision and What it Means for Hash SecurityAttacking Hypervisors Using Firmware And HardwareT405 Hunting Lateral Movement for Fun and Profit Mauricio VelazcoDoes Dropping USB Drives in Parking Lots and Other Places Really Work?Owning a Building: Exploiting Access Control and Facility Management Systems by Billy Rios