Podcast Detail

Reversing Medium Mobile App;

If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/6152.mp3

Podcast Logo
SANS Daily Network Security Podcast (Stormcast) for Tuesday, September 4th 2018

Interested in Internet Storm Center stickers? Check here if there are still some available for today.

Spotify spotify logo


Regarding the "Active Directory Leaks via Azure", I think this article is incorrect and misleading at least.
First problem described as "Authenticate to your webmail portal (i.e. https://webmail.domain.com/) and Change your browser URL to: https://azure.microsoft.com/" simply does not result in the acceess the author is describing there (tested), unless maybe if the user is logging in as an Azure Administrator (but maybe not event then, I could not test this). The O365 email url is outlook.office365.com (with some other options available), so webmail.domain.com is not a very good example, again denotes lack of basic knowledge in these MS products. But no doubt that if you are an Azure Administrator with correct permissions you can see all users and more... My assumptionn is that the author used an account that was also Azure Admin and did not realise this.

The following actions also assume that the "attacker" has already stolen Admin credentials/session - like this would be so easy to do!
Of course if you can hijack admin session or steal credentials the options are limitless, no need to read the article to know this.
Posted by Nor on Wed Sep 05 2018, 08:12

New Discussions closed for all Podcasts older than two(2) weeks
Please send your comments to our Contact Form