Top Ad unit 728 × 90

Latest News

random

Daily Blog #417: Sunday Funday 7/8/18

Hello Reader,
          The Unicorn is dead so it's time to move on with the resources that we have for an investigation. So let's see what you can do with this weeks Office365 focused challenge.


The Prize:
$100 Amazon Giftcard

The Rules:

  1. You must post your answer before Friday 7/13/18 7PM CST (GMT -5)
  2. The most complete answer wins
  3. You are allowed to edit your answer after posting
  4. If two answers are too similar for one to win, the one with the earlier posting time wins
  5. Be specific and be thoughtful 
  6. Anonymous entries are allowed, please email them to dcowen@g-cpartners.com. Please state in your email if you would like to be anonymous or not if you win.
  7. In order for an anonymous winner to receive a prize they must give their name to me, but i will not release it in a blog post



The Challenge:
Explain in a compromise of a Office365 account what you could review in the following circumstances.

Scenario a: only default logging in a E3 plan

Scenario b: Full mailbox auditing turned on

You are attempting in both scenarios to understand the scope of the attackers access 
Daily Blog #417: Sunday Funday 7/8/18 Reviewed by David Cowen on July 08, 2018 Rating: 5

No comments:

All Rights Reserved by Hacking Exposed Computer Forensics Blog © 2014 - 2020
Powered By Blogger, Designed by Sweetheme

Contact Form

Name

Email *

Message *

Powered by Blogger.