Daily Blog #417: Sunday Funday 7/8/18 - Compromise of Office365 Challenge

Office365 Scope of Attackers Challenge by David Cowen - Hacking Exposed Computer Forensics Blog

Hello Reader,
          The Unicorn is dead so it's time to move on with the resources that we have for an investigation. So let's see what you can do with this weeks Office365 focused challenge.

The Prize:

$100 Amazon 

The Rules:

  1. You must post your answer before Friday 7/13/18 7PM CST (GMT -5)
  2. The most complete answer wins
  3. You are allowed to edit your answer after posting
  4. If two answers are too similar for one to win, the one with the earlier posting time wins
  5. Be specific and be thoughtful 
  6. Anonymous entries are allowed, please email them to dcowen@g-cpartners.com. Please state in your email if you would like to be anonymous or not if you win.
  7. In order for an anonymous winner to receive a prize they must give their name to me, but i will not release it in a blog post

The Challenge:

Explain in a compromise of a Office365 account what you could review in the following circumstances.

Scenario a: only default logging in a E3 plan

Scenario b: Full mailbox auditing turned on

You are attempting in both scenarios to understand the

scope of the attackers access 

Also Read: Daily Blog #416

Post a Comment