How Hackers Persist & Privesc in Microsoft 365

แชร์
ฝัง
  • เผยแพร่เมื่อ 23 พ.ย. 2024

ความคิดเห็น • 66

  • @MatazaNz
    @MatazaNz 17 วันที่ผ่านมา +7

    Great, eye-opening video as always John. I manage multiple Entra ID tenants, and will be locking this behaviour down. I might add Graph Runner to my toolset for testing tenant vulnerabilities to illustrate why these things should be locked down.

  • @muzso
    @muzso 18 วันที่ผ่านมา +4

    About whether it's "necessary" that users can invite guests into the tenant ... If your users want to add somebody from outside the organization to an O365 Teams team (which is a common collaboration requirement), they have to add that person as a guest to their organization's tenant. So usually the "Member users and users assigned ... can invite guest users ..." is selected as a more restrictive setting than the default "Anyone".

  • @nicholasmartinez7011
    @nicholasmartinez7011 14 วันที่ผ่านมา +1

    I was just working on a project to harden our tenant and we were unable to create a dynamic group that had admin privileges. I was frustrated by this as we have hundreds of admins I have to manage and I have to assign admins to these groups manually, but after seeing this I know understand why Microsoft does not allow this. Great video!

  • @simple-security
    @simple-security 18 วันที่ผ่านมา +10

    Defender's summary:
    PIM, PIM for groups, conditional access, access reviews FTW.
    (And the user settings you mentioned at 25:15)
    Thanks John!

  • @markc6714
    @markc6714 19 วันที่ผ่านมา +52

    I might be a dinosaur but I firmly believe that security should not be dynamic, and users should not be able to join or manage their group access

    • @c1ph3rpunk
      @c1ph3rpunk 19 วันที่ผ่านมา +2

      So long as there is a defined set of permissions on the group, what objects it can apply to and has PIM with approval behind it, being able to gain new privs, on the fly, and can be dropped automatically, helps.

    • @ahmadmansour1171
      @ahmadmansour1171 18 วันที่ผ่านมา +1

      well i am new to Entra and azure, can you elaborate why ?

    • @maaikevreugdemaker9210
      @maaikevreugdemaker9210 18 วันที่ผ่านมา

      I think it is fine to defer authority to users to things like sharepoint sites, teams or powerbi workspaces as long as it's limited to your directory right?

    • @richieMP118
      @richieMP118 18 วันที่ผ่านมา +1

      imo it's good to have more options, and in some environments it might be necessary, the issue here is that low privilege users might still have a lot of privileges by default, user accounts should have the minimal amount of permissions unless explicitly set by an admin

    • @bolivianPsyOp
      @bolivianPsyOp 17 วันที่ผ่านมา

      I think, as with all things, it depends on your threat model and specific org.

  • @mohdcom25
    @mohdcom25 13 วันที่ผ่านมา

    John is one of the legends in Cybersecurity

  • @SzymekCRX
    @SzymekCRX 18 วันที่ผ่านมา +1

    That was a good one. Actually checked that in my company's Azure tenant. Thank You :)

  • @gat2871
    @gat2871 18 วันที่ผ่านมา +2

    Beautiful! As always, super clear and fun to watch. Thank you!

  • @dagobert6420
    @dagobert6420 18 วันที่ผ่านมา +4

    Another good entry point is the enterprise apps settings in Azure. By default all users are able to register those enterprise apps and also able to grant permissions to them.

    • @Duder-y5o
      @Duder-y5o 18 วันที่ผ่านมา +2

      This guy gets it

    • @CF39D4FB4A
      @CF39D4FB4A 18 วันที่ผ่านมา +3

      100%
      And too many people seem completely unaware of them

    • @50PullUps
      @50PullUps 17 วันที่ผ่านมา +1

      Are you sure about that?
      You’re saying that non-admin users (meaning an account that holds no active role assignments) are capable of applying a role permission to an enterprise app?
      All users are capable by default of *consenting* to the delegation of permissions to an enterprise app… but the user account must already have had those permissions assigned in the first place.

    • @bolivianPsyOp
      @bolivianPsyOp 17 วันที่ผ่านมา

      This is also my understanding but I haven’t toyed around in those menus from a non privileged account

    • @whysoserious.5723
      @whysoserious.5723 16 วันที่ผ่านมา

      Could you explain this further? How has a normal User theses rights and how can he practically use it?

  • @Ptysolution
    @Ptysolution 16 วันที่ผ่านมา

    I love this guys he is s a good teacher and mentor

  • @armymdc4
    @armymdc4 17 วันที่ผ่านมา +1

    So, what is to say that the attacker can run a powershell script and not get picked up by the SOC? I guess if we are talking smaller organizations this should get by.
    Just ramblin

  • @tmac9208
    @tmac9208 15 วันที่ผ่านมา

    and why you need to do audits of groups/folders/files/users routinely

  • @immersiveinment
    @immersiveinment 12 วันที่ผ่านมา

    While I was downloading the aurora lite as you said in one of your videos...using brave browser, the browser showed me like "virus detected", am I hacked ...John? It all happened while downloading the aurora lite version on my laptop..

  • @AlexTsaava
    @AlexTsaava 15 วันที่ผ่านมา

    Thanks you so much you probably made me a lot better in cyber security ❤❤ I even watched your 12 year old videos 😊

  • @Pumbafb
    @Pumbafb 2 วันที่ผ่านมา

    I’ve finished my cert iv in cyber security I would like to be a pen tester or a cyber security analyst what do I do now

  • @RichDOTDOTcom
    @RichDOTDOTcom 18 ชั่วโมงที่ผ่านมา

    I'm interested to find out how to see what events are triggered on the graph side, anyone else tried looking at this from a logging perspective?

  • @yavuz5458
    @yavuz5458 18 วันที่ผ่านมา +1

    I watched like a horror movie. It is unbelievable what a hacker can do

  • @PeterswoLP
    @PeterswoLP 17 วันที่ผ่านมา

    I watched this as a sysadmin trying to protect. Glad to be protected from this shenanigans

  • @chrisalupului
    @chrisalupului 18 วันที่ผ่านมา +1

    Appreciate the video John 👍

  • @Elizabeth-n8e4b
    @Elizabeth-n8e4b 18 วันที่ผ่านมา

    Need some guidance! I have USDT in my SafePal wallet with the seed phrase (obscure disagree shoe question clown holiday Tunnel stock inmate found scan pet). How can I transfer it to Binance?

  • @tmac9208
    @tmac9208 15 วันที่ผ่านมา

    ? Does the icon look any different or the type column say dynamic..ruel here is dont use dynamic groups..yup

  • @jytan740
    @jytan740 18 วันที่ผ่านมา +4

    another microsoft "feature" that is exploited

  • @Sam_Bent
    @Sam_Bent 19 วันที่ผ่านมา

    Another great video, great work John!

  • @TELL_ME_WHY_NOT
    @TELL_ME_WHY_NOT 19 วันที่ผ่านมา

    Thanks John

  • @uncleburu9464
    @uncleburu9464 19 วันที่ผ่านมา +1

    Wow this must be interesting

  • @benardtera1090
    @benardtera1090 19 วันที่ผ่านมา

    Let me go through this

  • @srikeshmaharaj
    @srikeshmaharaj 18 วันที่ผ่านมา +1

    John, John, John....

  • @Zachsnotboard
    @Zachsnotboard 18 วันที่ผ่านมา

    is there still no way to set up a m365 sandbox anymore ?

    • @dagobert6420
      @dagobert6420 18 วันที่ผ่านมา +2

      Unfortunately microsoft has stopped the test-tenant feature for dev accounts. What you can do is register for trial e3 license and when you created the tenant and it asks you for credit card you can abort the process and the tenant is still created and usable (but without licenses)

    • @Zachsnotboard
      @Zachsnotboard 18 วันที่ผ่านมา

      @@dagobert6420 ooo thank you, I have been looking for a solution

  • @roxyu3384
    @roxyu3384 10 วันที่ผ่านมา

    How would someone so stupid to create a dynamic group for admins?!

  • @pswalia2u
    @pswalia2u 18 วันที่ผ่านมา +1

    Feedback: Satisfied with persistence 🤣

  • @lxn7404
    @lxn7404 12 วันที่ผ่านมา

    How could this be a default behavior 🎉 sometimes I wonder if devs smoke weeds at Microsoft

  • @CalinMartinconi
    @CalinMartinconi 19 วันที่ผ่านมา +1

    Your title `How Hackers Persist & Privesc in Microsoft 365` , is `Privesc` and english word? For sure is a romanian one.

    • @c1ph3rpunk
      @c1ph3rpunk 19 วันที่ผ่านมา +5

      It’s a combination of words, ‘Privilege Escalation’, common shorthand in security.

  • @srikeshmaharaj
    @srikeshmaharaj 18 วันที่ผ่านมา

    Finally...

  • @johngoodbrake7056
    @johngoodbrake7056 16 วันที่ผ่านมา

    Doing this to my boss. Hold my beer

  • @nigellawrence7173
    @nigellawrence7173 17 วันที่ผ่านมา

    john l love it

  • @Fisjeie
    @Fisjeie 19 วันที่ผ่านมา

    type shii ✍️

  • @CristiNeagu
    @CristiNeagu 18 วันที่ผ่านมา

    This title is very confusing to Romanians...

  • @brewdir
    @brewdir 18 วันที่ผ่านมา

    These default configurations are sooooooooooooooo dumb lol

  • @innxrmxst2207
    @innxrmxst2207 17 วันที่ผ่านมา

    12:32

  • @carsonjamesiv2512
    @carsonjamesiv2512 18 วันที่ผ่านมา

    😃👍👍

  • @UkashaHacksCommunity
    @UkashaHacksCommunity 19 วันที่ผ่านมา +2

    First commetor. Thanks

  • @iamwitchergeraltofrivia9670
    @iamwitchergeraltofrivia9670 18 วันที่ผ่านมา

    So dumb windows and Microsoft

  • @oussamasky1
    @oussamasky1 19 วันที่ผ่านมา +1

    First

  • @rsinistic
    @rsinistic 18 วันที่ผ่านมา

    Highlights the importance of RBAC and PIM .

  • @chesthoIe
    @chesthoIe 19 วันที่ผ่านมา

    No, Dick. People count sheep to try and sleep. Is dreaming about sheep even much of a thing, possibly outside some sleepy shepherd circles?

  • @LinuxJedi
    @LinuxJedi 18 วันที่ผ่านมา

    maybe record both screens?