Session
Abusing Azure Active Directory: Who would you like to be today?
Azure AD is used by Microsoft Office 365 and over 2900 third-party apps. Although Azure AD is commonly regarded as secure, there are known security issues regarding to identity federation, pass-through authentication, and seamless single-sign-on.
In this session, using AADInternals toolkit, I will demonstrate how to create backdoors, impersonate users, and bypass MFA. Methods for detecting rogue behaviour are also introduced.
The purpose of this session is to raise awareness of the information security, the importance of the principle of least privilege, and the crucial role of on-prem security to cloud security.
Nestori Syynimaa
Principal Identity Security Researcher @ Microsoft
Tampere, Finland
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top