Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators

  Рет қаралды 4,091

Black Hat

Black Hat

10 ай бұрын

The majority of Fortune 500 organizations are using Azure Active Directory (Azure AD) as Identity and Access Management (IAM) solution. The high adoption rate makes Azure AD a lucrative target for threat actors, including state-sponsored actors like APT29/Nobelium.
Azure AD is leveraging Microsoft's not-so-well-documented Evolved Security Service (eSTS). eSTS hides multiple security token services so that users see only Azure AD.....
By: Sravan Akkaram , Nestori Syynimaa (DrAzureAD)
Full Abstract and Presentation Materials:
www.blackhat.com/asia-23/brie...

Пікірлер
Alice in Kernel Land: Lessons Learned From the eBPF Rabbit Hole
37:59
The child was abused by the clown#Short #Officer Rabbit #angel
00:55
兔子警官
Рет қаралды 20 МЛН
We Got Expelled From Scholl After This...
00:10
Jojo Sim
Рет қаралды 77 МЛН
#HITBCW2021 D1 - Attack Scenarios Abusing Azure Active Directory - Bill Ben Haim & Zur Ulianitzky
52:15
Dirty Vanity: A New Approach to Code Injection & EDR Bypass
37:52
OffSec Live | PEN-200 (2023): Active Directory Enumeration
1:38:40
ReCertifying Active Directory Certificate Services
40:19
Black Hat
Рет қаралды 6 М.
Something Rotten in the State of Data Centers
40:27
Black Hat
Рет қаралды 8 М.