Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to exploit Microsoft 365 environments through the "ConsentFix" attack technique in this cybersecurity tutorial. Discover how attackers can escalate from endpoint compromise to full identity takeover within Microsoft 365 ecosystems. Explore the technical details of consent-based attacks that leverage OAuth applications and permissions to maintain persistent access across cloud environments. Understand the attack chain from initial endpoint access through identity compromise, examining real-world scenarios where malicious actors abuse Microsoft's consent framework. Gain insights into detection methods, defensive strategies, and mitigation techniques to protect against these sophisticated identity-focused attacks targeting modern cloud infrastructures.
Syllabus
Hacking Endpoint to Identity (Microsoft 365): "ConsentFix"
Taught by
John Hammond