Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Introduction
00:00 • 2min
Azure's Threat Research Matrix
01:32 • 4min
The Future of ATRM
05:33 • 2min
The Importance of a Specific Category Hierarchy
07:25 • 2min
How to Execute a Command on a Virtual Machine in Azure
08:57 • 5min
Azure ED Modules and API API Calls
13:47 • 5min
Azure Permissions: How to Measure How So Gotcha
19:01 • 2min
Azure AD and the Rest API
21:06 • 2min
The Importance of the Rest API in Azure
23:00 • 5min
How to Define Execution in Azure CLI
27:47 • 2min
How to Defend Against a Technique That Exists in Azure
29:33 • 2min
AZD Tech Suite: A Text Week
32:02 • 3min
Azure Log Analytics
34:40 • 6min
Azure Activity Table
40:36 • 5min
How to Contribute to Azure Tech Suite
45:20 • 2min
The Challenges of Integrating Microsoft Products
47:13 • 2min
MITRE and AZD: A Comparison
48:52 • 3min
The Advantages of Azure Research
51:54 • 2min
The Importance of Scalability in Azure
53:34 • 2min
The Pros and Cons of Attacking Azure AD
55:53 • 2min
The Conundrum of Black Hat Feedback
57:56 • 3min
How to Start a Research Project in Azure
01:00:58 • 5min
Azure and the Cloud: What You Need to Know
01:05:34 • 2min
Azure API Monitor: How to Use It to Monitor Dynamic Analysis
01:07:20 • 2min
Azure AD - What Is an Operation?
01:08:51 • 2min
How to Create an Operation Chain in Azure
01:11:09 • 4min
Azure VMs: How to Detect Malicious Logins
01:15:02 • 3min
How to Forge a JSON Web Token for Azure Managed Identity
01:18:29 • 4min
Azure's Hybrid Approach to Logging
01:22:51 • 2min
Azure AD Joined Devices
01:24:45 • 4min
How to Read Microsoft Documentation
01:28:55 • 2min


