YoVDO

My Cloud is APT's Cloud - Investigating and Defending Office 365

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Microsoft Office 365 Courses Azure Active Directory Courses Cloud Security Courses

Course Description

Overview

Explore the increasing threat landscape of Microsoft Office 365 in this 41-minute Black Hat conference talk. Investigate how attackers are targeting cloud services, particularly Office 365, which has become the dominant email platform for enterprises worldwide. Delve into the various components of Office 365, including Exchange, Teams, SharePoint, and OneDrive, and understand why the vast amount of data stored in these services makes them attractive targets for threat actors. Learn about authentication types, the Unified Log, and the attack lifecycle through real-world case studies. Discover effective defense strategies, including conditional access, Azure Active Directory protection, and safeguarding against sophisticated techniques like GoldSAML attacks, mail forwarding rules abuse, and eDiscovery exploitation. Gain valuable insights from security experts Doug Bienstock and Josh Madeley on investigating and defending Office 365 environments against advanced persistent threats.

Syllabus

Intro
Meet Josh
Agenda
Authentication
Authentication Types
Unified Log
Attack Lifecycle
Case Studies
First Case Study
Second Case Study
How can we stop this
Persistence
Conditional Access
Sophistication
Azure Active Directory
GoldSaml
Mail Forwarding Rules
Rights Delegation
Mail Flow Transport Rules
Graph API
EDiscovery Abuse
Closing Thoughts
Questions


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube