Unlocking Microsoft 365: Post-Exploitation Tactics with Graph Runner | Part 2

Published: 16 April 2024
on channel: shenetworks
434
26

//GraphRunner//
Github: https://github.com/dafthack/GraphRunner
Blog: https://www.blackhillsinfosec.com/int...
Overview:    • GraphRunner: A Post-Exploitation Tool...  

// Beau Bullock @dafthack //
Site: https://dafthack.com/
Github: https://github.com/dafthack
Twitter:   / dafthack  
Youtube:    / @beau_bullock  

// shenetworks //
Site: https://shenet.works

Elevate your Microsoft 365 security strategies with Part 2 of our series, where we delve into persistence techniques using Graph Runner. This video explores how to maintain access within Microsoft 365 environments discreetly. Learn to implement sophisticated persistence modules that allow you to stay under the radar while securing footholds. Ideal for security professionals looking to enhance their defensive and offensive capabilities.


Watch video Unlocking Microsoft 365: Post-Exploitation Tactics with Graph Runner | Part 2 online without registration, duration hours minute second in high quality. This video was added by user shenetworks 16 April 2024, don't forget to share it with your friends and acquaintances, it has been viewed on our site 434 once and liked it 26 people.