Reversing Medium Mobile App;
My Next Class
Intrusion Detection In-Depth | Madrid | Mar 25th - Mar 30th 2019 |
Defending Web Applications Security Essentials | San Diego | May 9th - May 14th 2019 |
Reversing and Modifying the Medium Mobile App
https://hackernoon.com/dont-publish-yet-reverse-engineering-the-medium-app-and-making-all-stories-in-it-free-48c8f2695687
Active Directory Leaks via Azure
https://www.blackhillsinfosec.com/red-teaming-microsoft-part-1-active-directory-leaks-via-azure/
Google Restricts Tech Support Ads
https://www.blog.google/products/ads/restricting-ads-third-party-tech-support-services/?mod=article_inline
Get a free ISC sticker (login required):
https://isc.sans.edu/sticker.html
https://hackernoon.com/dont-publish-yet-reverse-engineering-the-medium-app-and-making-all-stories-in-it-free-48c8f2695687
Active Directory Leaks via Azure
https://www.blackhillsinfosec.com/red-teaming-microsoft-part-1-active-directory-leaks-via-azure/
Google Restricts Tech Support Ads
https://www.blog.google/products/ads/restricting-ads-third-party-tech-support-services/?mod=article_inline
Get a free ISC sticker (login required):
https://isc.sans.edu/sticker.html
Discussion
New Discussions closed for all Podcasts older than two(2) weeks
Please send your comments to our Contact Form
Intrusion Detection In-Depth | Madrid | Mar 25th - Mar 30th 2019 |
Defending Web Applications Security Essentials | San Diego | May 9th - May 14th 2019 |
Intrusion Detection In-Depth | San Antonio | May 28th - Jun 2nd 2019 |
Defending Web Applications Security Essentials | Munich | Jul 1st - Jul 6th 2019 |
Intrusion Detection In-Depth | London | Jul 8th - Jul 13th 2019 |
Intrusion Detection In-Depth | Boston | Jul 29th - Aug 3rd 2019 |
Defending Web Applications Security Essentials | San Jose | Aug 12th - Aug 17th 2019 |
Defending Web Applications Security Essentials | Brussels | Sep 2nd - Sep 7th 2019 |
Intrusion Detection In-Depth | London | Sep 23rd - Sep 28th 2019 |
First problem described as "Authenticate to your webmail portal (i.e. https://webmail.domain.com/) and Change your browser URL to: https://azure.microsoft.com/" simply does not result in the acceess the author is describing there (tested), unless maybe if the user is logging in as an Azure Administrator (but maybe not event then, I could not test this). The O365 email url is outlook.office365.com (with some other options available), so webmail.domain.com is not a very good example, again denotes lack of basic knowledge in these MS products. But no doubt that if you are an Azure Administrator with correct permissions you can see all users and more... My assumptionn is that the author used an account that was also Azure Admin and did not realise this.
The following actions also assume that the "attacker" has already stolen Admin credentials/session - like this would be so easy to do!
Of course if you can hijack admin session or steal credentials the options are limitless, no need to read the article to know this.