• Home
  • Author
  • About
  • Referrals

Reboto

Reboto

a dumping ground for stuff I (possibly) find interesting...

@rootsecdev: The powershell code below is something everyone with an Azure AD Tenant should be running in their environment to spot check Granted OATH permissions. Attackers are utilizing malicious OATH grants for persistence

Admin / July 13, 2020

The powershell code below is something everyone with an Azure AD Tenant should be running in their environment to spot check Granted OATH permissions. Attackers are utilizing malicious OATH grants for persistence. Want to learn more? See >> https://t.co/6EcoyguimQ https://t.co/zW42DYpjAS

— Root (@rootsecdev) July 13, 2020
Share Share on Twitter Share on Facebook Share on LinkedIn
Tags: Security

About Admin

Read Next

Next

@NathanMcNulty: Top 16 Active Directory vulnerabilities found during pentests - REMEDIATION

July 13, 2020
Previous

Microsoft 365 Security for IT Pros is now (finally) available!

July 13, 2020

Latest Posts

  • Visual Studio max line lengths using a guideline

    November 21, 2022
  • Generating Markdown tables

    November 09, 2022
  • Setting up Visual Studio External Tools (Using Powershell to generate build numbers)

    November 09, 2022

Tags

SecurityDevelopmentAzureOffice365Windows 10CloudWindows ServerPowershellActive DirectoryHyper-VSQLOpenSourceMicrosoftBooksWindows 7ClimbingLinuxWindows 8Visual StudioEdgeDNSInTuneDevOpsWebStorageWSUSSourceTreeNetworkPlaystationSysAdminQubesOsSonyLearningPS5Internet ExplorerIEMarkdownhtmlToolsGhost.NETMarketingVMWAREWindows 8WIndows XPPhotographyKyoceraPrintersIT ManagementDriversMFANon-TechReferralGDPRGroup PolicyVirtualizationGITTrainingIOT
Twitter
  • twitter
  • google
  • linkedin
Reboto © 2025
Powered by Ghost. BlogInn theme by JustGoodThemes.
Back to the top