#HITBCW2021

  Рет қаралды 5,459

Hack In The Box Security Conference

Hack In The Box Security Conference

Күн бұрын

Microsoft worked hard to integrate Azure IaaS services and Office365 products into one ecosystem. All permissions and roles are now centralized, and this makes administration so much simpler. And from the attacker's perspective, it's also great! They can abuse just a few simple APIs, and reap the benefits in exploits of Office 365 products, IaaS services, and Azure Active Directory (AAD).
Currently, security research around Azure AD and Office 365 is lacking. Only a few people and companies are working in the field. However, the myriad organizations that are using Azure AD and Office 365 are not sufficiently aware of the potential misconfigurations due to excessive privileges inside their organization.
In our session, we want to improve the state of research surrounding Azure AD.
First, we’ll examine the theory behind Azure AD. We’ll clear up core concepts surrounding Azure AD. Users and groups, role definitions, role assignments, applications, and service principals - all need to be differentiated. Then we’ll examine the relations between these concepts.
After the theory and the concepts have been elucidated, we’ll take a deep dive into a number of privilege escalation techniques. We’ll demonstrate how each gives the attacker access to sensitive information. Among others, we’ll show you:
Attacks to gain control over different types of your Azure IaaS services, such as Azure VMs and databases
Attacks to gain complete control over your Azure AD tenant
Attacks to gain access to your Office365 Services
We won’t stop with just showing you what the attacker could do. To conclude, we’ll provide you with our mitigation recommendations and best practices for securing Azure AD.
===
Bill Ben Haim is an experienced information security researcher, skilled in red teaming and penetration testing. Prior to joining XM Cyber, he was working at Anheuser-Busch InBev as the tech lead of their Internal Red Team group . Prior to that Bill worked in Ernst and Young started as information security consultant and became the Tech leader of the advanced security center in Israel.
Bill is a great fan of bug bounty and found vulnerabilities on the following comapnies: Imperva, Netflix, Netgear, General Motors, U.S. Dept of Defense and more..
Certifications - OSCP, OSCE
---
Zur Ulianitzky is an experienced information security researcher, skilled in red teaming and penetration testing. Prior to joining XM Cyber, he worked as information security consultant at Ernst & Young. Prior to that during his military service with the Israel Defense Forces, he served as software engineer and team leader.
Certification: BSc in Software Engineering

Пікірлер
How Strong is Tin Foil? 💪
00:26
Preston
Рет қаралды 142 МЛН
А ВЫ ЛЮБИТЕ ШКОЛУ?? #shorts
00:20
Паша Осадчий
Рет қаралды 9 МЛН
Good teacher wows kids with practical examples #shorts
00:32
I migliori trucchetti di Fabiosa
Рет қаралды 4 МЛН
GIANT Gummy Worm Pt.6 #shorts
00:46
Mr DegrEE
Рет қаралды 110 МЛН
"APT Attack Techniques in Azure Cloud" by Lina Lau, BSides Canberra 2023
23:15
#HITB2023HKT D2T2 - GPTHound: Your Active Directory Security Assistant - John Jiang
45:48
Hack In The Box Security Conference
Рет қаралды 213
Monitoring and Incident Response in Azure AD
41:31
SANS Cyber Defense
Рет қаралды 4,2 М.
EDITED EDITION - Getting Started in Pentesting The Cloud-Azure | Beau Bullock | 1-Hour
1:07:03
Black Hills Information Security
Рет қаралды 29 М.
#HITBCW2021 KEYNOTE 2 - Gremlin Apps And Gremlin Botnets - Chema Alonso
42:33
Hack In The Box Security Conference
Рет қаралды 135
TR19: I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory
48:15
Смартфоны через 10 лет
0:12
История одного вокалиста
Рет қаралды 706 М.
Нашли телефон спустя 5 лет
0:25
Up Your Brains
Рет қаралды 6 МЛН
iPhone 7
0:13
ARGEN
Рет қаралды 13 МЛН