Session

Echoes of Intrusion: Demystifying commonly used MS Graph API Attacks

Take a peak behind the curtains of how adversaries (ab)use MS Graph API to breach corporate defenses, implant persistence mechanisms, and exfiltrate sensitive data. Through live demonstrations, we will simulate the execution of potential attack scenarios, providing invaluable insights into the adversary's playbook.

Explore attack scenarios from the field and learn how to detect such an attack by using MS Graph logs. Are you ready to dive into real world threat actors' tactics and how to defend your environment?

Miriam Wiesner

Microsoft

Nürnberg, Germany

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top