Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Dirk jan Mollema - Im In Your Cloud Pwning Your Azure Environment - DEF CON 27 Conference

Автор: DEFCONConference

Загружено: 2019-11-15

Просмотров: 6450

Описание:

After having compromised on-premise for many years, there is now also the cloud! Now your configuration mistakes can be accessed by anyone on the internet, without that fancy next-gen firewall saving you. With this talk I’ll share my current research on Azure privileges, vulnerabilities and what attackers can do once they gain access to your cloud, or how they can abuse your on-premise cloud components. We start with becoming Domain Admin by compromising Azure AD Sync, sync vulnerabilities that allow for Azure admin account takeover and insecure Single Sign On configurations. Up next is cloud roles and privileges, backdooring Azure AD with service accounts, escalating privileges as limited admin and getting past MFA without touching someone's phone. Then we finish with cloud integrations, also known as "how a developer can destroy your whole infrastructure with a single commit": Exploring Azure DevOps, backdooring build pipelines, dumping credentials and compromising Azure Resource Manager through connected services. Besides all the fun we'll also look into how this translates into the questions you should ask yourself before moving things to the cloud and how this differs from on-premise.

Dirk-jan Mollema
Dirk-jan is one of the core researchers of Active Directory and Azure AD at Fox-IT. Amongst the open source tools published to advance the state of AD research are aclpwn, krbrelayx, mitm6, ldapdomaindump and a Python port of BloodHound. He blogs at dirkjanm.io, where he publishes about new Active Directory attack chains, which included the discovery of the PrivExchange vulnerability. He is also co-author of ntlmrelayx and contributor to several other open source tools and libraries. After discovering that breaking stuff is a lot of fun he never looked back at his freelance web developer days, but is still thankful for the knowledge and experience that those days provided him.

Twitter: @_dirkjan
Website: dirkjanm.io

Dirk jan Mollema - Im In Your Cloud Pwning Your Azure Environment - DEF CON 27 Conference

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

It’s Raining Shells - How To Find New Attack Primitives In Azure by Andy Robbins

It’s Raining Shells - How To Find New Attack Primitives In Azure by Andy Robbins

albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference

albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference

Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek - DEF CON 27 Conference

Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek - DEF CON 27 Conference

Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

Gone in 60 Seconds… How Azure AD/Entra ID Tenants are Compromised

Gone in 60 Seconds… How Azure AD/Entra ID Tenants are Compromised

Kubernetes: объяснение за 15 минут | Практическое занятие

Kubernetes: объяснение за 15 минут | Практическое занятие

Joshua Maddux - API Induced SSRF How ApplePay Scattered Vulns Across the Web - DEF CON 27 Conference

Joshua Maddux - API Induced SSRF How ApplePay Scattered Vulns Across the Web - DEF CON 27 Conference

Brent Stone - Reverse Engineering  17+ Cars in Less than 10 Minutes - DEF CON 27 Conference

Brent Stone - Reverse Engineering 17+ Cars in Less than 10 Minutes - DEF CON 27 Conference

Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

Identity Theft is Not a Joke, Azure! | Def Con 32 | Cloud Village

Identity Theft is Not a Joke, Azure! | Def Con 32 | Cloud Village

Attacking and Defending Azure with BloodHound | Andy Robbins | WWHF San Diego 2022

Attacking and Defending Azure with BloodHound | Andy Robbins | WWHF San Diego 2022

DEF CON 31 - Track the Planet! Mapping IDs, Monitoring Presence in the Azure Ecosystem  - nyxgeek

DEF CON 31 - Track the Planet! Mapping IDs, Monitoring Presence in the Azure Ecosystem - nyxgeek

Трамп опять презирает Зеленского?

Трамп опять презирает Зеленского?

Сети для несетевиков // OSI/ISO, IP и MAC, NAT, TCP и UDP, DNS

Сети для несетевиков // OSI/ISO, IP и MAC, NAT, TCP и UDP, DNS

Patrick Wardle - Harnessing Weapons of Mac Destruction - DEF CON 27 Conference

Patrick Wardle - Harnessing Weapons of Mac Destruction - DEF CON 27 Conference

Что такое Rest API (http)? Soap? GraphQL? Websockets? RPC (gRPC, tRPC). Клиент - сервер. Вся теория

Что такое Rest API (http)? Soap? GraphQL? Websockets? RPC (gRPC, tRPC). Клиент - сервер. Вся теория

#HITBCW2021 D1 — Сценарии атак с использованием Azure Active Directory — Билл Бен Хаим и Цур Улья...

#HITBCW2021 D1 — Сценарии атак с использованием Azure Active Directory — Билл Бен Хаим и Цур Улья...

Что такое TCP/IP: Объясняем на пальцах

Что такое TCP/IP: Объясняем на пальцах

Babak Javadi - Basics of Hacking Physical Access Control Systems - DEF CON 27 Wireless Village

Babak Javadi - Basics of Hacking Physical Access Control Systems - DEF CON 27 Wireless Village

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com