Handler on Duty: Didier Stevens
Threat Level: green
Podcast Detail
Reversing Medium Mobile App;
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://chrt.fm/track/2748D7/https://traffic.libsyn.com/securitypodcast/6152.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Dec 13th - Dec 18th 2024 |
Application Security: Securing Web Apps, APIs, and Microservices | Online | US Eastern | Jan 27th - Feb 1st 2025 |
Interested in Internet Storm Center stickers? Check here if there are still some available for today.
Reversing and Modifying the Medium Mobile App
https://hackernoon.com/dont-publish-yet-reverse-engineering-the-medium-app-and-making-all-stories-in-it-free-48c8f2695687
Active Directory Leaks via Azure
https://www.blackhillsinfosec.com/red-teaming-microsoft-part-1-active-directory-leaks-via-azure/
Google Restricts Tech Support Ads
https://www.blog.google/products/ads/restricting-ads-third-party-tech-support-services/?mod=article_inline
https://hackernoon.com/dont-publish-yet-reverse-engineering-the-medium-app-and-making-all-stories-in-it-free-48c8f2695687
Active Directory Leaks via Azure
https://www.blackhillsinfosec.com/red-teaming-microsoft-part-1-active-directory-leaks-via-azure/
Google Restricts Tech Support Ads
https://www.blog.google/products/ads/restricting-ads-third-party-tech-support-services/?mod=article_inline
Discussion
New Discussions closed for all Podcasts older than two(2) weeks
Please send your comments to our Contact Form
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Dec 13th - Dec 18th 2024 |
Application Security: Securing Web Apps, APIs, and Microservices | Online | US Eastern | Jan 27th - Feb 1st 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Mar 3rd - Mar 8th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
First problem described as "Authenticate to your webmail portal (i.e. https://webmail.domain.com/) and Change your browser URL to: https://azure.microsoft.com/" simply does not result in the acceess the author is describing there (tested), unless maybe if the user is logging in as an Azure Administrator (but maybe not event then, I could not test this). The O365 email url is outlook.office365.com (with some other options available), so webmail.domain.com is not a very good example, again denotes lack of basic knowledge in these MS products. But no doubt that if you are an Azure Administrator with correct permissions you can see all users and more... My assumptionn is that the author used an account that was also Azure Admin and did not realise this.
The following actions also assume that the "attacker" has already stolen Admin credentials/session - like this would be so easy to do!
Of course if you can hijack admin session or steal credentials the options are limitless, no need to read the article to know this.