FOR509 - in Class Links
FOR509 - in Class Links
Day 2 2
Day 3 3
Day 4 4
Day 1
Adaz: Active Directory Hunting Lab in Azure
https://github.com/christophetd/Adaz
Azure SimuLand
https://www.microsoft.com/security/blog/2021/05/20/simuland-understand-adversary-
tradecraft-and-improve-detection-strategies/
Attacking Serverless Servers: Reverse-Engineering the AWS, Azure, and GCP Function
Runtime
https://youtu.be/DegAofI3fR0
Hawk: Powershell based tool for gathering information related to O365 intrusions
https://github.com/T0pCyber/hawk
AlteredSecurity/365-Stealer
365-Stealer is a phishing tool written in python3 which abused App registration to grant
consent from victim which leads to Illicit Consent Grant Attack
https://github.com/AlteredSecurity/365-Stealer
Phishing playbooks:
https://www.dragonadvancetech.com/reports/O365-IR%20Playbook_v1.0.pdf
https://github.com/PwC-IR/Business-Email-Compromise-Guide
https://www.kyberturvallisuuskeskus.fi/sites/default/files/media/publication/
T_MS365_eng_sivut200919HR.pdf
PwC-IR/Office-365-Extractor
https://github.com/PwC-IR/Office-365-Extractor
Day 2
FIRST: Global Forum of Incident Response and Security Teams
https://www.first.org/
AWS Digital Forensics Automation at Goldman Sachs - AWS Online Tech Talks
https://www.youtube.com/watch?v=CR4_a-TO_gw
Day 3
Cloud services comparison table
https://comparecloud.in/
USB-over-TCP or USB-over-RDP
https://www.net-usb.com/usb-over-rdp/
https://www.net-usb.com/usb-over-tcp/
Day 4
Automation and Scaling of Digital Forensics Tools
https://github.com/google/turbinia
https://turbinia.readthedocs.io/en/latest/user/how-it-works.html
Tutorial on privilege escalation and post exploitation tactics in Google Cloud Platform
environments
https://about.gitlab.com/blog/2020/02/12/plundering-gcp-escalating-privileges-in-google-
cloud-platform/
SygniaLabs/security-cloud-scout
https://github.com/SygniaLabs/security-cloud-scout
Bloodhound for Azure & AWS
forsetisecurity.org
Tools to secure Google Cloud Platform
https://forsetisecurity.org/
BloodHoundAD/AzureHound
https://github.com/BloodHoundAD/AzureHound
keikoproj/kube-forensics
https://github.com/keikoproj/kube-forensics