labs.zenity.io
Open in
urlscan Pro
2606:4700::6812:4528
Public Scan
URL:
https://labs.zenity.io/p/links-materials-living-off-microsoft-copilot
Submission: On August 22 via manual from US — Scanned from DE
Submission: On August 22 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST /create
<form method="post" action="/create" class="group w-full rounded-wt bg-transparent"><input hidden="" value="" name="ref"><input hidden="" value="" name="bhba"><input hidden="" value="cf1dbfde-88ca-48c4-a7db-daece80e170a" name="visit_token"><input
type="hidden" value="" name="cf-turnstile-response"><input type="hidden" value="/" name="redirect_path"><input type="hidden" value="true" name="sent_from_orchid"><input type="hidden" value="/p/links-materials-living-off-microsoft-copilot"
name="fallback_path"><input type="hidden" value="true" name="is_recaptcha_enabled"><input type="hidden" value="false" name="double_opt"><input type="hidden" value="false" name="trigger_redirect"><input hidden=""
value="Oops, something went wrong." name="subscribe_error_message"><input hidden="" value="Subscribed!" name="subscribe_success_message">
<div class="flex flex-col">
<div class="flex w-full flex-col items-center sm:flex-row overflow-hidden p-1 rounded-lg" style="background-color: rgb(249, 250, 251); border: none;">
<div class="flex w-full items-center" style="background-color: rgb(249, 250, 251);"><input autocomplete="email" required=""
class="wt-button-font z-10 w-full border-none bg-transparent placeholder-shown:text-ellipsis text-lg focus:text-lg active:text-lg sm:text-lg" placeholder="Enter Your Email for Nerd Content" type="email" name="email"
style="font-family: Inter; color: rgb(17, 24, 39);"></div><input class="cursor-pointer px-5 py-3 font-semibold w-full sm:w-auto text-lg focus:text-lg active:text-lg sm:text-lg rounded-md" type="submit" value="Subscribe"
style="background-color: rgb(112, 0, 255); color: rgb(249, 250, 251); font-family: Inter;">
</div>
</div>
</form>
Text Content
Zenity Labs Meet Us In PersonJoin Us Subscribe 0 0 * Zenity Labs * Posts * Links and materials for Living off Microsoft Copilot LINKS AND MATERIALS FOR LIVING OFF MICROSOFT COPILOT LINKS, SOURCE CODE, TOOLS AND SLIDES FOR BLACKHAT USA 2024 Michael Bargury August 08, 2024 This is a post with all of the links and additional materials for a talk I gave at BlackHat USA 2024 titled Living off Microsoft Copilot. TABLE OF CONTENTS * Slides * Demos: * Tools * LOLCopilot * 15 Ways to Break Your Copilot * Other talks mentioned * Johann Rehberger @wunderwuzzi23 * Pliny the Prompter @elder_plinius and the BASI com … * Mark Russinovich @markrussinovich * On credentials sharing SLIDES AND DEMOS Here they are (split into two parts due to size): part 1, part 2. All of the demos are up on YouTube. DEMOS: * RCE - getting Copilot to search for, analyze and exfiltrate sensitive data via Bing search results, by Tamir Ishay Sharbat - video * RCE - getting Copilot to manipulate banking information while keeping original file references for trustworthiness, by Tamir Ishay Sharbat - video * RCE - getting Copilot to lure its users to our malicious phishing website, by Gal Malka - video * Post-compromise - abusing Copilot with powerpwn to automate spear phishing for all of your victim’s collaborators, by Lana Salameh - video * Post-compromise - manually using copilot to craft a malicious spear phishing email, by Lana Salameh - video * Post-compromise - abusing Copilot to bypass DLP and MIP, accessing sensitive content without leaving a trace, by Tamir Ishay Sharbat - video TOOLS AND RESEARCH LOLCOPILOT Is an offensive security tool that allows you to abuse Copilot to live of the land of O365. It allows you to use Copilot via an API, automates data gathering (whoami++) and crafts spear phishing emails in the compromised user’s style to all of their collaborators. The whoami module takes whoami to a whole new level - find top collaborators, documents, password resent emails. LOLCopilot whoami module Modules: Copilot M365 ‐ Whoami An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform - mbrg/power-pwn github.com/mbrg/power-pwn/wiki/Modules:-Copilot-M365-%E2%80%90-Whoami The Spear Phishing module finds all of your collaborators, for each it find the latest interaction you’ve had with them and crafts the perfect response to get them to believe your phish. Copilot will write a message in your style learning from your inbox. Modules: Spearphishing with Copilot M365 An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform - mbrg/power-pwn github.com/mbrg/power-pwn/wiki/Modules:-Spearphishing-with-Copilot-M365 15 WAYS TO BREAK YOUR COPILOT Plugins are a way for AI to actually DO things on your behalf, which makes them extra dangerous. Check out my other BH talk this year for more info on Copilot Studio, the platform behind Copilot M365 plugins. OTHER PEOPLE’S WORK JOHANN REHBERGER @WUNDERWUZZI23 Johann is the best when it comes to AI app hacking. He found the first AI RCE AFAIK. I really recommend you check out his blog. PLINY THE PROMPTER @ELDER_PLINIUS AND THE BASI COMMUNITY Pliny has broken any LLM out there. If you're into jailbreaking check them out. MARK RUSSINOVICH @MARKRUSSINOVICH Mark has published really fundamental AI security work. I especially recommend checking out his threat model for AI apps and his work on jailbreaking (Crescendo, Skeleton Key). USING TEAMS FOR TRUSTWORTHY PHISHING Attackers can use Teams to send a message across tenants, luring their victims to provide sensitive info or execute malware. Check out TeamPhisher. Securely Adopt Microsoft Copilot With Zenity zenity.io/remote-copilot-execution REPLY Most popular Add your comment Login Login or Subscribe to participate. KEEP READING INSIDE MICROSOFT 365 COPILOT: A TECHNICAL BREAKDOWN A SUMMARY OF ZENITY RESEARCH PUBLISHED AT BLACKHAT 2024 New Attack Vectors Discovered for Initial Access and Post-Compromise ACCESS COPILOT FOR M365 THROUGH THE TERMINAL View more Zenity Labs Latest research, tools and talks about building and breaking copilots and no-code apps Home Posts Authors © 2024 Zenity Labs. Privacy Policy Terms of Use Powered by beehiiv