4.9 • 696 Ratings
🗓️ 3 November 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, November 3, 2016 edition of the Sandton and Storm Center's |
0:06.5 | Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:12.7 | John Strand's team at Black Hell Infosec came across an interesting problem with Outlook Web Access. |
0:19.4 | If you do have the Exchange Web Service enabled, which |
0:24.0 | a lot of these sites do have in order, for example, to connect with various mobile apps |
0:29.9 | to your Outlook email. The problem here is that even if you do set up two-factor authentication |
0:37.4 | for Outlook Web access, the Exchange |
0:40.4 | Web Service is still accessible via just the normal credentials. And of course, then you have |
0:47.7 | full access to the email just like you would have had if you had the two-factor authentication. So really, |
0:54.0 | the two-factor authentication doesn't really, the two-factor authentication |
0:55.2 | doesn't provide much of a meaningful deterrence for an attacker to steal your email or even change |
1:03.6 | some settings. The attacker will have full access to everything that Outlook Web Access can do |
1:10.2 | for this particular user. |
1:12.6 | Now this was reported to Microsoft but no meaningful reply was received by Microsoft. |
1:20.6 | Of course, this is a hard problem to fix. |
1:23.6 | Now, what you typically see here as a fix is that instead of just using a username and |
1:28.7 | password to log in via a web service, you do use something like OAuth or some kind of |
1:35.7 | long random token. So at least that secret is a little bit better protected than a normal |
1:42.3 | password that you would use for a human login. |
1:45.9 | The big problem here is, and this is not just a problem with this particular Outlook Web Access, |
1:51.3 | set up that two-factor authentication doesn't really work well for these web services, where we do |
1:57.0 | want applications to continuously pull, for example, for a new email. What better |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.