How Hackers Persist & Privesc in Microsoft 365

Поділитися
Вставка
  • Опубліковано 24 січ 2025

КОМЕНТАРІ • 69

  • @_JohnHammond
    @_JohnHammond  23 дні тому

    wowee zowee, try out jh.live/training for more education and my newsletter at jh.live/newsletter if you want lol

  • @MatazaNz
    @MatazaNz 2 місяці тому +9

    Great, eye-opening video as always John. I manage multiple Entra ID tenants, and will be locking this behaviour down. I might add Graph Runner to my toolset for testing tenant vulnerabilities to illustrate why these things should be locked down.

  • @nicholasmartinez7011
    @nicholasmartinez7011 2 місяці тому +1

    I was just working on a project to harden our tenant and we were unable to create a dynamic group that had admin privileges. I was frustrated by this as we have hundreds of admins I have to manage and I have to assign admins to these groups manually, but after seeing this I know understand why Microsoft does not allow this. Great video!

  • @muzso
    @muzso 2 місяці тому +4

    About whether it's "necessary" that users can invite guests into the tenant ... If your users want to add somebody from outside the organization to an O365 Teams team (which is a common collaboration requirement), they have to add that person as a guest to their organization's tenant. So usually the "Member users and users assigned ... can invite guest users ..." is selected as a more restrictive setting than the default "Anyone".

  • @markc6714
    @markc6714 2 місяці тому +52

    I might be a dinosaur but I firmly believe that security should not be dynamic, and users should not be able to join or manage their group access

    • @c1ph3rpunk
      @c1ph3rpunk 2 місяці тому +2

      So long as there is a defined set of permissions on the group, what objects it can apply to and has PIM with approval behind it, being able to gain new privs, on the fly, and can be dropped automatically, helps.

    • @ahmadmansour1171
      @ahmadmansour1171 2 місяці тому +1

      well i am new to Entra and azure, can you elaborate why ?

    • @maaikevreugdemaker9210
      @maaikevreugdemaker9210 2 місяці тому

      I think it is fine to defer authority to users to things like sharepoint sites, teams or powerbi workspaces as long as it's limited to your directory right?

    • @richieMP118
      @richieMP118 2 місяці тому +1

      imo it's good to have more options, and in some environments it might be necessary, the issue here is that low privilege users might still have a lot of privileges by default, user accounts should have the minimal amount of permissions unless explicitly set by an admin

    • @bolivianPsyOp
      @bolivianPsyOp 2 місяці тому +1

      I think, as with all things, it depends on your threat model and specific org.

  • @mohdcom25
    @mohdcom25 2 місяці тому

    John is one of the legends in Cybersecurity

  • @gat2871
    @gat2871 2 місяці тому +2

    Beautiful! As always, super clear and fun to watch. Thank you!

  • @Sam_Bent
    @Sam_Bent 2 місяці тому

    Another great video, great work John!

  • @dagobert6420
    @dagobert6420 2 місяці тому +4

    Another good entry point is the enterprise apps settings in Azure. By default all users are able to register those enterprise apps and also able to grant permissions to them.

    • @Duder-y5o
      @Duder-y5o 2 місяці тому +2

      This guy gets it

    • @37thFrequency
      @37thFrequency 2 місяці тому +3

      100%
      And too many people seem completely unaware of them

    • @50PullUps
      @50PullUps 2 місяці тому +1

      Are you sure about that?
      You’re saying that non-admin users (meaning an account that holds no active role assignments) are capable of applying a role permission to an enterprise app?
      All users are capable by default of *consenting* to the delegation of permissions to an enterprise app… but the user account must already have had those permissions assigned in the first place.

    • @bolivianPsyOp
      @bolivianPsyOp 2 місяці тому

      This is also my understanding but I haven’t toyed around in those menus from a non privileged account

    • @whysoserious.5723
      @whysoserious.5723 2 місяці тому

      Could you explain this further? How has a normal User theses rights and how can he practically use it?

  • @SzymekCRX
    @SzymekCRX 2 місяці тому +1

    That was a good one. Actually checked that in my company's Azure tenant. Thank You :)

  • @eddie79it1
    @eddie79it1 Місяць тому

    what to say..thanks for the continuos showcase that is helping understand how the attacks can be done..

  • @chrisalupului
    @chrisalupului 2 місяці тому +1

    Appreciate the video John 👍

  • @Ptysolution
    @Ptysolution 2 місяці тому

    I love this guys he is s a good teacher and mentor

  • @yavuz5458
    @yavuz5458 2 місяці тому +1

    I watched like a horror movie. It is unbelievable what a hacker can do

  • @armymdc4
    @armymdc4 2 місяці тому +1

    So, what is to say that the attacker can run a powershell script and not get picked up by the SOC? I guess if we are talking smaller organizations this should get by.
    Just ramblin

  • @tmac9208
    @tmac9208 2 місяці тому

    and why you need to do audits of groups/folders/files/users routinely

  • @PeterswoLP
    @PeterswoLP 2 місяці тому

    I watched this as a sysadmin trying to protect. Glad to be protected from this shenanigans

  • @AlexTsaava
    @AlexTsaava 2 місяці тому

    Thanks you so much you probably made me a lot better in cyber security ❤❤ I even watched your 12 year old videos 😊

  • @Pumbafb
    @Pumbafb 2 місяці тому

    I’ve finished my cert iv in cyber security I would like to be a pen tester or a cyber security analyst what do I do now

  • @C.ClaytonJones-d8e
    @C.ClaytonJones-d8e 2 місяці тому

    Hi. I have evidently been hacked by someone who really dislikes me and is determined to not let my system run my way. They install vms, several Intel xtu devices, use the printer server and remote desktop. I suspected it may be near me but I need to make sure. I also need to stop them. Any ideas?

  • @immersiveinment
    @immersiveinment 2 місяці тому

    While I was downloading the aurora lite as you said in one of your videos...using brave browser, the browser showed me like "virus detected", am I hacked ...John? It all happened while downloading the aurora lite version on my laptop..

  • @tmac9208
    @tmac9208 2 місяці тому

    ? Does the icon look any different or the type column say dynamic..ruel here is dont use dynamic groups..yup

  • @TELL_ME_WHY_NOT
    @TELL_ME_WHY_NOT 2 місяці тому

    Thanks John

  • @RichDOTDOTcom
    @RichDOTDOTcom 2 місяці тому

    I'm interested to find out how to see what events are triggered on the victim side, anyone else tried looking at this from a logging perspective?

  • @Zachsnotboard
    @Zachsnotboard 2 місяці тому

    is there still no way to set up a m365 sandbox anymore ?

    • @dagobert6420
      @dagobert6420 2 місяці тому +2

      Unfortunately microsoft has stopped the test-tenant feature for dev accounts. What you can do is register for trial e3 license and when you created the tenant and it asks you for credit card you can abort the process and the tenant is still created and usable (but without licenses)

    • @Zachsnotboard
      @Zachsnotboard 2 місяці тому

      @@dagobert6420 ooo thank you, I have been looking for a solution

  • @jytan740
    @jytan740 2 місяці тому +4

    another microsoft "feature" that is exploited

  • @benardtera1090
    @benardtera1090 2 місяці тому

    Let me go through this

  • @roxyu3384
    @roxyu3384 2 місяці тому

    How would someone so stupid to create a dynamic group for admins?!

  • @johngoodbrake7056
    @johngoodbrake7056 2 місяці тому

    Doing this to my boss. Hold my beer

  • @uncleburu9464
    @uncleburu9464 2 місяці тому +1

    Wow this must be interesting

  • @srikeshmaharaj
    @srikeshmaharaj 2 місяці тому +1

    John, John, John....

  • @CalinMartinconi
    @CalinMartinconi 2 місяці тому +1

    Your title `How Hackers Persist & Privesc in Microsoft 365` , is `Privesc` and english word? For sure is a romanian one.

    • @c1ph3rpunk
      @c1ph3rpunk 2 місяці тому +6

      It’s a combination of words, ‘Privilege Escalation’, common shorthand in security.

    • @kingajaz8580
      @kingajaz8580 Місяць тому

      Privilege escalation

  • @pswalia2u
    @pswalia2u 2 місяці тому +1

    Feedback: Satisfied with persistence 🤣

  • @innxrmxst2207
    @innxrmxst2207 2 місяці тому

    12:32

  • @lxn7404
    @lxn7404 2 місяці тому

    How could this be a default behavior 🎉 sometimes I wonder if devs smoke weeds at Microsoft

  • @nigellawrence7173
    @nigellawrence7173 2 місяці тому

    john l love it

  • @srikeshmaharaj
    @srikeshmaharaj 2 місяці тому

    Finally...

  • @Fisjeie
    @Fisjeie 2 місяці тому

    type shii ✍️

  • @UkashaHacksCommunity
    @UkashaHacksCommunity 2 місяці тому +2

    First commetor. Thanks

  • @brewdir
    @brewdir 2 місяці тому

    These default configurations are sooooooooooooooo dumb lol

  • @CristiNeagu
    @CristiNeagu 2 місяці тому

    This title is very confusing to Romanians...

  • @carsonjamesiv2512
    @carsonjamesiv2512 2 місяці тому

    😃👍👍

  • @iamwitchergeraltofrivia9670
    @iamwitchergeraltofrivia9670 2 місяці тому

    So dumb windows and Microsoft

  • @oussamasky1
    @oussamasky1 2 місяці тому +1

    First

  • @chesthoIe
    @chesthoIe 2 місяці тому

    No, Dick. People count sheep to try and sleep. Is dreaming about sheep even much of a thing, possibly outside some sleepy shepherd circles?

  • @rsinistic
    @rsinistic 2 місяці тому

    Highlights the importance of RBAC and PIM .

  • @LinuxJedi
    @LinuxJedi 2 місяці тому

    maybe record both screens?