Главная
Study mode:
on
1
Intro
2
Meet Josh
3
Agenda
4
Authentication
5
Authentication Types
6
Unified Log
7
Attack Lifecycle
8
Case Studies
9
First Case Study
10
Second Case Study
11
How can we stop this
12
Persistence
13
Conditional Access
14
Sophistication
15
Azure Active Directory
16
GoldSaml
17
Mail Forwarding Rules
18
Rights Delegation
19
Mail Flow Transport Rules
20
Graph API
21
EDiscovery Abuse
22
Closing Thoughts
23
Questions
Description:
Explore the increasing threat landscape of Microsoft Office 365 in this 41-minute Black Hat conference talk. Investigate how attackers are targeting cloud services, particularly Office 365, which has become the dominant email platform for enterprises worldwide. Delve into the various components of Office 365, including Exchange, Teams, SharePoint, and OneDrive, and understand why the vast amount of data stored in these services makes them attractive targets for threat actors. Learn about authentication types, the Unified Log, and the attack lifecycle through real-world case studies. Discover effective defense strategies, including conditional access, Azure Active Directory protection, and safeguarding against sophisticated techniques like GoldSAML attacks, mail forwarding rules abuse, and eDiscovery exploitation. Gain valuable insights from security experts Doug Bienstock and Josh Madeley on investigating and defending Office 365 environments against advanced persistent threats.

My Cloud is APT's Cloud - Investigating and Defending Office 365

Black Hat
Add to list