July 1

Webinar takeaways: Attack Tactics 8 – Poison the Well

0  comments

My key takeaways

  • Bad documents eg with macros enabled in SharePoint? No need to bypass phishing controls anymore!
    • Documents are already trusted by users
    • Difficult to trace
  • M$ SmartLockout is effective to reduce direct attacks
    • FireProx (AWS) or Proxycannon-ng (OpenVPN) can circumvent it
  • unsolicited push notifications to bypass MFA can't be reported as phish
    • might be send esp. at beginning of the work day or after typical lunch hours
  • The cloud version of the AD is available by default in Azure as Active Directory Users and Computers (ADUC)
    • should be restricted by admins instantly
  • Implantable file types should be checked regularly on SharePoint/OneDrive
    • .docm .xlsm .pptm for Macros
    • .proj .csproj as dev artifacts
    • .bat .ps1 .vba as scripts
    • they might be poisoned but trusted by end users!
  • Macros dont try to excuted shellcode directly anymore but drop a link file in the user startup folder
  • if you see spikes and anomalies on your Azure login attemps, have a closer look!
  • FIDO2 might make this attack much harder
  • Passwords are dead
    • reduce complexity
    • enforce length

Env

additional links

User comments

  • Adrian Santangelo

    Protip: If you get to a push notification, try IMAP and POP. It's enabled by default now and bypasses MFA.

  • shmooz

    "Just because you're paranoid doesn't mean they aren't after you." ― Joseph Heller

  • Ryan | The Shootist | Editor

    One name you DON"T want to use for your cloud is "Sync Hole"

  • nand0ps

    short expiring periods leads to same password with a different number at the end

  • weston

    I would enforce 16 character passwords in my environment if I didn't think it would get me fired.


Tags

azure, red teaming, sharepoint


You may also like

Webinar takeaway – Offensive Windows Event Logs

My key takeaways there is a POC proving persistence by writing/reading shellcode from Event Log the real issue is execution as it’s a blind spot for most EDR also Defender Event logs in win are in the registry Bindings of sources to specific log local admins can create a log/source and event log entries via

Read More

Webinar takeaway – A Master Class on Offensive MSBuild

My key takeaways MSBuild is a binary that is installed by default on Windows no whitelisting required .csproj and .xml files are typical to interact with MSBuild Custom tasks are the juicy stuff Malicious code is placed in the execute function of the custom task and compiled into an dll xml will bypass detection a

Read More