Attacking Exchange/OWA to Gain Access to AD Accounts - Tradecraft Security Weekly #3

  Рет қаралды 21,272

Security Weekly - A CRA Resource

Security Weekly - A CRA Resource

Күн бұрын

Пікірлер: 12
@MrAcouch
@MrAcouch 7 жыл бұрын
This is a great addition to the usual Paul's security weekly episodes. Thanks for sharing this with us, I will definitely be looking into this in the near future!
@richcityfarms7938
@richcityfarms7938 6 жыл бұрын
This is amazing, response times as a potential indicator is genius. Loving these episodes.
@andrewchiles3876
@andrewchiles3876 7 жыл бұрын
Nice overview of MailSniper Beau!
@calmeidazim
@calmeidazim 7 жыл бұрын
Thank you Beau Bullock , great video post
@dashcamdiariessa
@dashcamdiariessa 3 жыл бұрын
Where do I find video 1 please. And 2
@SecurityWeekly
@SecurityWeekly 3 жыл бұрын
You can find the full playlist of Tradecraft episodes here: kzbin.info/aero/PLlPkFwQHxYE7Yi5jtcSyCCr8pXxP1OEkZ
@simongerges5175
@simongerges5175 6 жыл бұрын
How can i access others emails inboxes who are on my same domain , any trick to do it ? , our email domain is hosted on premise with a public IP , and it is exchange server 2003 , we access it using domain.com/exchange
@eselah
@eselah 6 жыл бұрын
can you eloborate on mail server discovery?
@scottyjayes
@scottyjayes 5 жыл бұрын
Most orgs are following a generic standard referenced as Autodiscover for example a person with an email of flast@test.cc you can theoretically go to autodiscover.test.cc and it will take you to the expected login page. This standard was created to help mail apps find the users login location so naturally we can use it against them :)
@jeffsims5683
@jeffsims5683 7 жыл бұрын
I didn't find a way to alert on password spraying?
@beau_bullock
@beau_bullock 7 жыл бұрын
Hey Jeff, when a user attempts to authenticate against Exchange/OWA the credentials are actually verified by the DC. So, the best place to alert would likely be failed login attempt security logs generated at the DC. You would likely need a tool or SIEM of some sort to parse through the logs and alert accordingly. I hope that helps!
@bhaskarnallani7061
@bhaskarnallani7061 3 жыл бұрын
@@beau_bullock but in DC the failure attempts are not showing under security logs , but when we enabled netlogon logs on DC we are noticing the login attempts are coming from exchange. This is strange bcaz the failure attempts ideally should be captured under security logs instead captures in netlogon logs
Password Spraying Windows Active Directory Accounts - Tradecraft Security Weekly #5
10:34
Security Weekly - A CRA Resource
Рет қаралды 13 М.
Meterpreter with Categorized Domains & Trusted Certs - Tradecraft Security Weekly #4
12:06
Security Weekly - A CRA Resource
Рет қаралды 2,1 М.
風船をキャッチしろ!🎈 Balloon catch Challenges
00:57
はじめしゃちょー(hajime)
Рет қаралды 96 МЛН
How Many Balloons To Make A Store Fly?
00:22
MrBeast
Рет қаралды 119 МЛН
Laravel Routes, Closure, Controllers and Views
12:01
Hello Maruf
Рет қаралды 3
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
How much microplastic are you breathing in at home?
2:55
Sky News
Рет қаралды 9 М.
An Illustrated Guide to OAuth and OpenID Connect
16:36
OktaDev
Рет қаралды 613 М.
Microsoft 365 SPF, DKIM and DMARC; Improve Your Email Security!
17:37
Jonathan Edwards
Рет қаралды 67 М.
Proxy vs Reverse Proxy Explained
8:05
PowerCert Animated Videos
Рет қаралды 383 М.
Linux Privilege Escalation - Tradecraft Security Weekly #22
17:59
Security Weekly - A CRA Resource
Рет қаралды 47 М.
Certificates from Scratch - X.509 Certificates explained
21:50
OneMarcFifty
Рет қаралды 126 М.
風船をキャッチしろ!🎈 Balloon catch Challenges
00:57
はじめしゃちょー(hajime)
Рет қаралды 96 МЛН