Detection: Challenging Paradigms

Episode 34: Ryan Hausknecht (Again)

Jun 27, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
Azure's Threat Research Matrix
01:32 • 4min
3
The Future of ATRM
05:33 • 2min
4
The Importance of a Specific Category Hierarchy
07:25 • 2min
5
How to Execute a Command on a Virtual Machine in Azure
08:57 • 5min
6
Azure ED Modules and API API Calls
13:47 • 5min
7
Azure Permissions: How to Measure How So Gotcha
19:01 • 2min
8
Azure AD and the Rest API
21:06 • 2min
9
The Importance of the Rest API in Azure
23:00 • 5min
10
How to Define Execution in Azure CLI
27:47 • 2min
11
How to Defend Against a Technique That Exists in Azure
29:33 • 2min
12
AZD Tech Suite: A Text Week
32:02 • 3min
13
Azure Log Analytics
34:40 • 6min
14
Azure Activity Table
40:36 • 5min
15
How to Contribute to Azure Tech Suite
45:20 • 2min
16
The Challenges of Integrating Microsoft Products
47:13 • 2min
17
MITRE and AZD: A Comparison
48:52 • 3min
18
The Advantages of Azure Research
51:54 • 2min
19
The Importance of Scalability in Azure
53:34 • 2min
20
The Pros and Cons of Attacking Azure AD
55:53 • 2min
21
The Conundrum of Black Hat Feedback
57:56 • 3min
22
How to Start a Research Project in Azure
01:00:58 • 5min
23
Azure and the Cloud: What You Need to Know
01:05:34 • 2min
24
Azure API Monitor: How to Use It to Monitor Dynamic Analysis
01:07:20 • 2min
25
Azure AD - What Is an Operation?
01:08:51 • 2min
26
How to Create an Operation Chain in Azure
01:11:09 • 4min
27
Azure VMs: How to Detect Malicious Logins
01:15:02 • 3min
28
How to Forge a JSON Web Token for Azure Managed Identity
01:18:29 • 4min
29
Azure's Hybrid Approach to Logging
01:22:51 • 2min
30
Azure AD Joined Devices
01:24:45 • 4min
31
How to Read Microsoft Documentation
01:28:55 • 2min