Guarding the Bridge: New Attack Vectors in Azure AD Connect
Tags
Common Information
Type | Value |
---|---|
UUID | 0c44102d-c27d-4194-854f-b9eb8344b071 |
Fingerprint | bd78cd49555023d5 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Aug. 2, 2023, midnight |
Added to db | Nov. 8, 2023, 10:45 p.m. |
Last updated | Nov. 12, 2024, 11:50 a.m. |
Headline | Guarding the Bridge: New Attack Vectors in Azure AD Connect |
Title | Guarding the Bridge: New Attack Vectors in Azure AD Connect |
Detected Hints/Tags/Attributes | 63/2/16 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 67 | ✔ | — | https://blog.sygnia.co/rss.xml | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 61 | login.microsoftonline.com |
|
Details | Domain | 285 | microsoft.net |
|
Details | Domain | 8 | sygnia.co |
|
Details | Domain | 4 | aadinternals.com |
|
Details | Domain | 10 | blog.xpnsec.com |
|
Details | Domain | 11 | dirkjanm.io |
|
Details | 5 | contact@sygnia.co |
||
Details | File | 1 | miiserver.exe |
|
Details | File | 5 | machine.config |
|
Details | File | 1 | loadclr.dll |
|
Details | File | 1 | azureadconnect_abuse.dll |
|
Details | Url | 9 | https://login.microsoftonline.com |
|
Details | Url | 1 | http://login.microsoftonline.com |
|
Details | Url | 1 | https://aadinternals.com/aadinternals |
|
Details | Url | 1 | https://blog.xpnsec.com/azuread-connect-for-redteam |
|
Details | Url | 1 | https://dirkjanm.io/updating-adconnectdump-a-journey-into-dpapi |