The Cyber Threat Perspective cover image

Episode 99: Tool Time - OneDriveEnum & AD Miner

The Cyber Threat Perspective

00:00

Advanced User Enumeration Techniques

This chapter discusses the creation of permutated names for user enumeration in cybersecurity, using both a script with census-derived last names and brute-force tools tailored for systems like OneDrive. The speakers emphasize the effectiveness of identifying valid usernames through response codes and the challenges posed by different naming conventions. Strategies for enriching user name lists are also explored, along with potential mitigation strategies for secure environments like SharePoint.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app