Главная
Study mode:
on
1
Intro
2
Agenda
3
Why Compromise
4
Mastery of an Attack
5
Initial Compromise
6
Areas of Attacks
7
MFA
8
Phishing
9
Voicemail
10
Dropbox
11
Phishing Contacts
12
Basic Auth
13
Mailbox
14
Mail Rules
15
Audit Log
16
VPN Traffic
17
Onward Compromise
18
Individual Motive
19
Phishing Emails
20
What can we do
21
Enable MFA
22
Audit logs
23
Basic MFA
24
Blocking Mail
25
Practice Log
26
Compromise
27
Questions
28
O365 Mailbox Bleeding
Description:
Explore current attack trends targeting Office 365 in this informative 29-minute conference talk by David Stubley of 7 Elements. Gain insights into why attackers compromise systems, the mastery required for successful attacks, and the various areas of vulnerability. Learn about initial compromise techniques, including MFA bypass, phishing, voicemail exploitation, and Dropbox manipulation. Discover how attackers leverage basic authentication, mailbox access, and mail rules for onward compromise. Understand individual motives behind phishing emails and explore effective countermeasures. Discover the importance of enabling MFA, auditing logs, implementing basic MFA, blocking suspicious mail, and practicing compromise detection. Conclude with a Q&A session addressing O365 mailbox security concerns.

O365- Current Attack Trends, David Stubley, 7 Elements

The Cyber Academy
Add to list
0:00 / 0:00