Mastering Microsoft 365 Security: Post-Exploitation with Graph Runner | Part 3

Published: 16 April 2024
on channel: shenetworks
1,156
53

//GraphRunner//
Github: https://github.com/dafthack/GraphRunner
Blog: https://www.blackhillsinfosec.com/int...
Overview:    • GraphRunner: A Post-Exploitation Tool...  

// Beau Bullock @dafthack //
Site: https://dafthack.com/
Github: https://github.com/dafthack
Twitter:   / dafthack  
Youtube:    / @beau_bullock  

// shenetworks //
Site: https://shenet.works

Conclude your learning on Microsoft 365 post-exploitation with our final video, which focuses on pillaging techniques using Graph Runner. Discover how to use various modules to extract valuable information and exploit data across Microsoft 365 services effectively. This tutorial will equip you with advanced skills to assess and enhance your organization’s security posture.


Watch video Mastering Microsoft 365 Security: Post-Exploitation with Graph Runner | Part 3 online without registration, duration hours minute second in high quality. This video was added by user shenetworks 16 April 2024, don't forget to share it with your friends and acquaintances, it has been viewed on our site 1,156 once and liked it 53 people.