• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
  • / yourpost
home / dummies / Hacking Microsoft Teams: Detailed guide

Hacking Microsoft Teams: Detailed guide

10/12/2020 10:07 by Anastasis Vasileiadis

We live in an age where technology is part of our lives and a primary valuable resource for personal and professional work. The use of online video conferencing platforms such as Zoom and Microsoft Teams has become necessary in recent months due to the COVID-19 pandemic.

This article provides a detailed guide on how to hack Microsoft Teams with a simple GIF image.

The vulnerability posted in April to mid-2020 could be exploited by a remote user, and Microsoft immediately fixed the bug a few days after the revelation. However, this scenario should be understood as a real threat facing not only Microsoft Teams but also all applications that maintain the same mode of operation.

Even if a malicious user does not have sensitive information from a group account, the defect can be used to launch an attack on the organization's accounts, such as a worm, to obtain account credentials and then access all of them. target user chat sessions.

Figure 1 below shows how this attack can be performed on a large company.

1 418 - Hacking Microsoft Teams: A Detailed Guide

Figure 1: Microsoft Teams Attack Workflow

In detail, the attack can be exploited by following these steps:

  1. A malicious GIF image is prepared and created by hackers and sent to a first victim during a video conference call.
  2. The victim opens and sees the message with the GIF image embedded. At this point, the hacker impersonates the victim and spreads the GIF image with the payload to the accounts of the organization's teams like a worm, infecting a large group of employees.
  3. The message spreads and other victims are affected.
  4. The victim group vouchers are sent to the hacker.
  5. Hackers can use the data to access information, contacts, messages of the victim and so on.

As described above, the vulnerability is based on a simple GIF image and how groups handle authentication on image resources. Below, the initial payload is presented.

giphy - Hacking Microsoft Teams: Detailed guide

 

2 365 - Hacking Microsoft Teams: A Detailed Guide

 

Figure 2: H GIF image sent to the first victim.

In detail, when opening the application (for both mobile devices and desktops), a JSON Web Token (JWT) is created, the access badge, during this process. This badge allows the user to view images shared by the person or others in a chat / conference / teleconference.

Because of this, a cookie called "authtoken" that provides access to a resource server "api.spaces.skype.com" can act as an abuse to create the "Skype token", giving access to send messages, create groups, add new users or remove users from groups, change permissions to groups through the Teams API and so on.

 

3 303 - Hacking Microsoft Teams: A Detailed Guide

 

Figure 3: The distinctive JWT was filtered using this vulnerability.

Next step: takeover attack

Upon receipt of this privileged badge, it may be misused to interact with other internal systems in the Microsoft ecosystem. In order to execute a successful attack, two subdomains were identified as vulnerable to takeover attacks:

  • aadsync-test.teams.microsoft.com
  • data-dev.teams.microsoft.com

By receiving this information, a hacker can force a user to access the downloaded domains. After that, the victim browser will automatically send the cookie to the rogue's remote server. You can now create the Skype badge and access all the account data of the victim group.

Details including confidential information, appointments and calendar information, competing data, secrets, passwords, private information, business strategy, plans and procedures can now be used to execute other types of attackers.

Hacking Microsoft Teams: Detailed guide was last modified: 10 December, 2020, 10: 08 am by Anastasis Vasileiadis

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: dummiestag: hack, Microsoft Teams

You May Also Like

How To Hack A Phone Charger
The OpenWebQuest Web Exploration Platform has been hacked
What Supply Chain Hack is and how you can stay safe

About Us Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Previous Post: « Facebook Instagram & WhatsApp will see companies split
Next Post: Wireshark 3.4.1: network protocol analyzer »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loading Cancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.