“augmenting security testing and analysis activities with microsoft 365 products augmenting security testing and analysis activities with microsoft 365 products use of microsoft 365 products in security testing is not a new concept. for a long time, i ’ ve incorporated various act…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.004SSH
69%
“. first, i drop the ssh private key for my restricted user ( on the vps ) to the compromised user ’ s profile directory. next, i drop an lnk file to somewhere that will cause user - induced execution. examples include the startup folder or the users ’ desktop for hotkey persisten…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1098.004SSH Authorized Keys
60%
“. first, i drop the ssh private key for my restricted user ( on the vps ) to the compromised user ’ s profile directory. next, i drop an lnk file to somewhere that will cause user - induced execution. examples include the startup folder or the users ’ desktop for hotkey persisten…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1110.003Password Spraying
37%
“to perform analysis on active directory. gathering details about the password policy, a list of users, groups, and computers often helps me better understand the target environment and will increase the effectiveness of any external attacks i ’ m executing. password spraying effe…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Use of Microsoft 365 products in security testing is not a new concept. For a long time, I’ve incorporated various activities using Office products into my testing regimen. In the […]