Attacking with Automation - How Office 365 Automation Provides Another New Risk to the Cloud
Offered By: YouTube
Course Description
Overview
Explore the potential security risks associated with Office 365 automation in this 32-minute conference talk from Derbycon 2019. Delve into the world of Microsoft Flow, examining its evolution, capabilities, and potential vulnerabilities. Learn about Data Loss Prevention (DLP), connectors, and HTTP requests, and discover how these features can be exploited to monitor inboxes and build botnets. Investigate the concept of scope creep and firewall bypass techniques within the Microsoft Flow environment. Gain valuable insights into the new challenges posed by cloud automation and understand the importance of staying vigilant in the face of evolving cybersecurity threats.
Syllabus
Intro
What is Flow
How did we get here
DLP
Connectors
HTTP Requests
Monitoring the Inbox
What happened
Building a botnet
Building a button
Microsoft
Flow
Scope creep
Firewall bypass
Microsoft Flow
Review
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera