Infecting the Enterprise: Abusing Office365+Powershell for Covert C2

  Рет қаралды 9,997

Black Hat

Black Hat

Күн бұрын

As Enterprises rush to adopt Office365 for increased business agility and cost reduction, too few are taking time to truly evaluate the risk associated with this decision. This briefing will attempt to shine a light on the potential hazards of Microsoft's SaaS offerings while also demonstrating a practical example of what a malicious actor can do when Office365 is allowed into the Enterprise.
By Craig Dods
Full Abstract & Presentation Materials:
www.blackhat.c...

Пікірлер
Ichthyology: Phishing as a Science
24:28
Black Hat
Рет қаралды 36 М.
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.
Enceinte et en Bazard: Les Chroniques du Nettoyage ! 🚽✨
00:21
Two More French
Рет қаралды 42 МЛН
Support each other🤝
00:31
ISSEI / いっせい
Рет қаралды 81 МЛН
How Smartcard Payment Systems Fail
58:56
Black Hat
Рет қаралды 156 М.
What if all the world's biggest problems have the same solution?
24:52
Game of Chromes: Owning the Web with Zombie Chrome Extensions
45:39
Breaking the x86 Instruction Set
44:29
Black Hat
Рет қаралды 363 М.
Digital Vengeance: Exploiting the Most Notorious C&C Toolkits
33:11
NixOS Setup Guide - Configuration / Home-Manager / Flakes
3:01:39
Matthias Benaets
Рет қаралды 265 М.
Betraying the BIOS: Where the Guardians of the BIOS are Failing
49:51
Exploiting Network Printers
45:09
Black Hat
Рет қаралды 45 М.
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.