I Took Over a Microsoft Cloud Account. Again.

  Рет қаралды 105,880

John Hammond

John Hammond

7 ай бұрын

jh.live/wiz || Get the big picture of your security posture across your entire cloud environment with Wiz and their Cloud Native Application Protection Platform: jh.live/wiz
Free Cybersecurity Education and Ethical Hacking
🔥KZbin ALGORITHM ➡ Like, Comment, & Subscribe!
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware

Пікірлер: 32
@GW_Oldie
@GW_Oldie 7 ай бұрын
I think the more appropriate question is not 'how do we hack an O365 account' rather, how do we stop this form of attack from working? MS currently only have CA or device registration as options that work to protect a user, but anyone using unregistered devices is basically screwed if that user gets phished. Many small businesses aren't licensed with (and cannot afford) the correct product to implement the security needed and many more, such as charities, have volunteers world-wide that use their own devices. How do these businesses implement CA effectively over such a widely distributed user-base? Would it be possible for MS to invalidate MFA tokens if the device isn't MDM registered and the IP address being used for the connection doesn't match the one against which the token was issued ??? I know they can report on this and it shows as Anomalous Token usage in Sentinel
@cobyiv
@cobyiv 4 ай бұрын
Not sure about prevent but at my org we have script automation to programmatically audit the unified log and search for M365 log-in IPs that vary in location in a specific time interval . So say a user logs in from IP A but then within a 4-hr window they are logged in to IP A and IP B a notification is sent to us. Yes, there are false positives but it has also helped us find some previously unknown compromises.
@Manavetri
@Manavetri 7 ай бұрын
Your videos are incredible, they never disappoint. Thanks for sharing
@rogue2shadow
@rogue2shadow 6 ай бұрын
I literally stood up and clapped. Well played legend!
@Pranks101
@Pranks101 7 ай бұрын
Did you bypass the email spam filter because you were apart of an active user within?
@TheBenSanders
@TheBenSanders 7 ай бұрын
Damn John, you just keep putting me on a list with these video titles. lmao
@leonardofelippine9781
@leonardofelippine9781 6 ай бұрын
Great video as usual. Another defense for this attack would be Identity Protection, with controls such as "Impossible travel situation", and Continuous Access Evaluation. Such different signals would probably trigger the defenses and block access
@JSRJS
@JSRJS 6 ай бұрын
Thinking a hardware key would be better choice (ie Yubi) to provide another layer of auth.
@asuramaru6339
@asuramaru6339 7 ай бұрын
idk if i missed something but why is the link in the phishing mail the actual microsoft link , how does this work?
@Cumander1
@Cumander1 7 ай бұрын
The phish is not the link but the real remote login capability...the link only relays this(remote login capability) to the attacked
@asuramaru6339
@asuramaru6339 7 ай бұрын
@@Cumander1 ok wait … is thos device Code the Remote Login , if he used the wrong Code it would not work. ?
@LESLEYYY0
@LESLEYYY0 7 ай бұрын
Do you need special permissions for Send-MailMessage? If not then that's a concern...
@scriptkiddie1000
@scriptkiddie1000 7 ай бұрын
@@paulus9660 secondly all good company security has smtp auth disabled for internal users meaning you need to do modernauth smtp to send that email which you cant as you need to satisfy MFA
@webdesignsbytom
@webdesignsbytom 6 ай бұрын
luckily no one uses teams, mail or calendar from them
@Cumander1
@Cumander1 7 ай бұрын
Clean
@DavidAlvesWeb
@DavidAlvesWeb 7 ай бұрын
not AGAIN!
@user-wq8cc3kq6y
@user-wq8cc3kq6y 6 ай бұрын
can you share the powershell script please
@cyberdevil657
@cyberdevil657 7 ай бұрын
badass :)
@dydarjadmin
@dydarjadmin 7 ай бұрын
🎉🎉🎉🎉🎉🎉🎉😊😊😊😊
@user-ow5nk3po3d
@user-ow5nk3po3d 7 ай бұрын
yoooooooo
@TheCyberWarriorGuy
@TheCyberWarriorGuy 7 ай бұрын
:)
@Pranks101
@Pranks101 7 ай бұрын
Second
@wagidbebar4310
@wagidbebar4310 7 ай бұрын
second
@shortylele2770
@shortylele2770 7 ай бұрын
third.
@d_cb
@d_cb 7 ай бұрын
not first :|
@floor_3d
@floor_3d 7 ай бұрын
first
@danieljordan9004
@danieljordan9004 5 ай бұрын
I’ve never heard of this before. My logarithm suggested this video for me. I’m sure I’m missing something but why are we teaching people to steal a Microsoft account?
@scriptkiddie1000
@scriptkiddie1000 7 ай бұрын
Your on Powershell and you use ECHO , Fail ,
@rohith9799
@rohith9799 7 ай бұрын
second
Windows Recall (was) a Security Nightmare
37:04
John Hammond
Рет қаралды 112 М.
Incident Response: Azure Log Analysis
19:15
John Hammond
Рет қаралды 63 М.
Super gymnastics 😍🫣
00:15
Lexa_Merin
Рет қаралды 81 МЛН
🍕Пиццерия FNAF в реальной жизни #shorts
00:41
Watermelon Cat?! 🙀 #cat #cute #kitten
00:56
Stocat
Рет қаралды 22 МЛН
Whyyyy? 😭 #shorts by Leisi Crazy
00:16
Leisi Crazy
Рет қаралды 17 МЛН
I Stole a Microsoft 365 Account. Here's How.
19:57
John Hammond
Рет қаралды 327 М.
MacOS Sequoia: 30+ INSANE CHANGES (Hands-On)
8:46
MacVince
Рет қаралды 3,7 М.
5 Best AI Side Hustles To Make $100 a Day
9:47
AI Horizons
Рет қаралды 60
Stealing Computer Passwords on Login
21:24
John Hammond
Рет қаралды 25 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 253 М.
i BACKDOORED a Desktop Shortcut (to run malware)
13:58
John Hammond
Рет қаралды 75 М.
I Hacked The Cloud: Azure Managed Identities
29:29
John Hammond
Рет қаралды 60 М.
How Hackers Exploit Vulnerable Drivers
23:58
John Hammond
Рет қаралды 42 М.
you need this FREE CyberSecurity tool
32:06
NetworkChuck
Рет қаралды 1,2 МЛН
build your own cloud
47:13
NetworkChuck
Рет қаралды 1,7 МЛН
Super gymnastics 😍🫣
00:15
Lexa_Merin
Рет қаралды 81 МЛН