#HITBCW2021

  Рет қаралды 5,190

Hack In The Box Security Conference

Hack In The Box Security Conference

Күн бұрын

Microsoft worked hard to integrate Azure IaaS services and Office365 products into one ecosystem. All permissions and roles are now centralized, and this makes administration so much simpler. And from the attacker's perspective, it's also great! They can abuse just a few simple APIs, and reap the benefits in exploits of Office 365 products, IaaS services, and Azure Active Directory (AAD).
Currently, security research around Azure AD and Office 365 is lacking. Only a few people and companies are working in the field. However, the myriad organizations that are using Azure AD and Office 365 are not sufficiently aware of the potential misconfigurations due to excessive privileges inside their organization.
In our session, we want to improve the state of research surrounding Azure AD.
First, we’ll examine the theory behind Azure AD. We’ll clear up core concepts surrounding Azure AD. Users and groups, role definitions, role assignments, applications, and service principals - all need to be differentiated. Then we’ll examine the relations between these concepts.
After the theory and the concepts have been elucidated, we’ll take a deep dive into a number of privilege escalation techniques. We’ll demonstrate how each gives the attacker access to sensitive information. Among others, we’ll show you:
Attacks to gain control over different types of your Azure IaaS services, such as Azure VMs and databases
Attacks to gain complete control over your Azure AD tenant
Attacks to gain access to your Office365 Services
We won’t stop with just showing you what the attacker could do. To conclude, we’ll provide you with our mitigation recommendations and best practices for securing Azure AD.
===
Bill Ben Haim is an experienced information security researcher, skilled in red teaming and penetration testing. Prior to joining XM Cyber, he was working at Anheuser-Busch InBev as the tech lead of their Internal Red Team group . Prior to that Bill worked in Ernst and Young started as information security consultant and became the Tech leader of the advanced security center in Israel.
Bill is a great fan of bug bounty and found vulnerabilities on the following comapnies: Imperva, Netflix, Netgear, General Motors, U.S. Dept of Defense and more..
Certifications - OSCP, OSCE
---
Zur Ulianitzky is an experienced information security researcher, skilled in red teaming and penetration testing. Prior to joining XM Cyber, he worked as information security consultant at Ernst & Young. Prior to that during his military service with the Israel Defense Forces, he served as software engineer and team leader.
Certification: BSc in Software Engineering

Пікірлер
TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines
59:06
TROOPERS IT Security Conference
Рет қаралды 26 М.
THE POLICE TAKES ME! feat @PANDAGIRLOFFICIAL #shorts
00:31
PANDA BOI
Рет қаралды 22 МЛН
Osman Kalyoncu Sonu Üzücü Saddest Videos Dream Engine 170 #shorts
00:27
small vs big hoop #tiktok
00:12
Анастасия Тарасова
Рет қаралды 29 МЛН
Vivaan  Tanya once again pranked Papa 🤣😇🤣
00:10
seema lamba
Рет қаралды 29 МЛН
"APT Attack Techniques in Azure Cloud" by Lina Lau, BSides Canberra 2023
23:15
Azure AD App Registrations, Enterprise Apps and Service Principals
33:44
John Savill's Technical Training
Рет қаралды 209 М.
#HITBCW2021 KEYNOTE 2 - Gremlin Apps And Gremlin Botnets - Chema Alonso
42:33
Hack In The Box Security Conference
Рет қаралды 128
Monitoring and Incident Response in Azure AD
41:31
SANS Cyber Defense
Рет қаралды 4 М.
Introducing ROADtools - Azure AD exploration for Red Teams and Blue Teams
1:32:04
What I do as a Cloud Security Engineer
15:01
Andrew Roe
Рет қаралды 89 М.
Худший продукт Apple
0:53
Rozetked
Рет қаралды 135 М.
Hisense Official Flagship Store Hisense is the champion What is going on?
0:11
Special Effects Funny 44
Рет қаралды 2,6 МЛН
Собери ПК и Получи 10,000₽
1:00
build monsters
Рет қаралды 2,1 МЛН