Главная
Study mode:
on
1
Intro
2
What is Flow
3
How did we get here
4
DLP
5
Connectors
6
HTTP Requests
7
Monitoring the Inbox
8
What happened
9
Building a botnet
10
Building a button
11
Microsoft
12
Flow
13
Scope creep
14
Firewall bypass
15
Microsoft Flow
16
Review
Description:
Explore the potential security risks associated with Office 365 automation in this 32-minute conference talk from Derbycon 2019. Delve into the world of Microsoft Flow, examining its evolution, capabilities, and potential vulnerabilities. Learn about Data Loss Prevention (DLP), connectors, and HTTP requests, and discover how these features can be exploited to monitor inboxes and build botnets. Investigate the concept of scope creep and firewall bypass techniques within the Microsoft Flow environment. Gain valuable insights into the new challenges posed by cloud automation and understand the importance of staying vigilant in the face of evolving cybersecurity threats.

Attacking with Automation - How Office 365 Automation Provides Another New Risk to the Cloud

Add to list