This is a great addition to the usual Paul's security weekly episodes. Thanks for sharing this with us, I will definitely be looking into this in the near future!
@richcityfarms79386 жыл бұрын
This is amazing, response times as a potential indicator is genius. Loving these episodes.
@andrewchiles38767 жыл бұрын
Nice overview of MailSniper Beau!
@calmeidazim7 жыл бұрын
Thank you Beau Bullock , great video post
@dashcamdiariessa3 жыл бұрын
Where do I find video 1 please. And 2
@SecurityWeekly3 жыл бұрын
You can find the full playlist of Tradecraft episodes here: kzbin.info/aero/PLlPkFwQHxYE7Yi5jtcSyCCr8pXxP1OEkZ
@simongerges51756 жыл бұрын
How can i access others emails inboxes who are on my same domain , any trick to do it ? , our email domain is hosted on premise with a public IP , and it is exchange server 2003 , we access it using domain.com/exchange
@eselah6 жыл бұрын
can you eloborate on mail server discovery?
@scottyjayes5 жыл бұрын
Most orgs are following a generic standard referenced as Autodiscover for example a person with an email of flast@test.cc you can theoretically go to autodiscover.test.cc and it will take you to the expected login page. This standard was created to help mail apps find the users login location so naturally we can use it against them :)
@jeffsims56837 жыл бұрын
I didn't find a way to alert on password spraying?
@beau_bullock7 жыл бұрын
Hey Jeff, when a user attempts to authenticate against Exchange/OWA the credentials are actually verified by the DC. So, the best place to alert would likely be failed login attempt security logs generated at the DC. You would likely need a tool or SIEM of some sort to parse through the logs and alert accordingly. I hope that helps!
@bhaskarnallani70613 жыл бұрын
@@beau_bullock but in DC the failure attempts are not showing under security logs , but when we enabled netlogon logs on DC we are noticing the login attempts are coming from exchange. This is strange bcaz the failure attempts ideally should be captured under security logs instead captures in netlogon logs