Reversing Medium Mobile App;
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/6152.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 11th - Jul 16th 2022 |
Application Security: Securing Web Apps, APIs, and Microservices | Online | Jul 11th - Jul 16th 2022 |
Reversing and Modifying the Medium Mobile App
https://hackernoon.com/dont-publish-yet-reverse-engineering-the-medium-app-and-making-all-stories-in-it-free-48c8f2695687
Active Directory Leaks via Azure
https://www.blackhillsinfosec.com/red-teaming-microsoft-part-1-active-directory-leaks-via-azure/
Google Restricts Tech Support Ads
https://www.blog.google/products/ads/restricting-ads-third-party-tech-support-services/?mod=article_inline
https://hackernoon.com/dont-publish-yet-reverse-engineering-the-medium-app-and-making-all-stories-in-it-free-48c8f2695687
Active Directory Leaks via Azure
https://www.blackhillsinfosec.com/red-teaming-microsoft-part-1-active-directory-leaks-via-azure/
Google Restricts Tech Support Ads
https://www.blog.google/products/ads/restricting-ads-third-party-tech-support-services/?mod=article_inline
Discussion
New Discussions closed for all Podcasts older than two(2) weeks
Please send your comments to our Contact Form
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 11th - Jul 16th 2022 |
Application Security: Securing Web Apps, APIs, and Microservices | Online | Jul 11th - Jul 16th 2022 |
Application Security: Securing Web Apps, APIs, and Microservices | Tokyo | Aug 29th - Sep 3rd 2022 |
Application Security: Securing Web Apps, APIs, and Microservices | Online | Japan Standard Time | Aug 29th - Sep 3rd 2022 |
Intrusion Detection In-Depth | Riyadh | Oct 8th - Oct 13th 2022 |
Intrusion Detection In-Depth | Online | Arabian Standard Time | Oct 8th - Oct 13th 2022 |
Application Security: Securing Web Apps, APIs, and Microservices | San Francisco | Dec 5th - Dec 10th 2022 |
Application Security: Securing Web Apps, APIs, and Microservices | Online | US Pacific | Dec 5th - Dec 10th 2022 |
First problem described as "Authenticate to your webmail portal (i.e. https://webmail.domain.com/) and Change your browser URL to: https://azure.microsoft.com/" simply does not result in the acceess the author is describing there (tested), unless maybe if the user is logging in as an Azure Administrator (but maybe not event then, I could not test this). The O365 email url is outlook.office365.com (with some other options available), so webmail.domain.com is not a very good example, again denotes lack of basic knowledge in these MS products. But no doubt that if you are an Azure Administrator with correct permissions you can see all users and more... My assumptionn is that the author used an account that was also Azure Admin and did not realise this.
The following actions also assume that the "attacker" has already stolen Admin credentials/session - like this would be so easy to do!
Of course if you can hijack admin session or steal credentials the options are limitless, no need to read the article to know this.