labs.zenity.io Open in urlscan Pro
2606:4700::6812:4528  Public Scan

URL: https://labs.zenity.io/p/links-materials-living-off-microsoft-copilot
Submission: On August 22 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST /create

<form method="post" action="/create" class="group w-full rounded-wt bg-transparent"><input hidden="" value="" name="ref"><input hidden="" value="" name="bhba"><input hidden="" value="cf1dbfde-88ca-48c4-a7db-daece80e170a" name="visit_token"><input
    type="hidden" value="" name="cf-turnstile-response"><input type="hidden" value="/" name="redirect_path"><input type="hidden" value="true" name="sent_from_orchid"><input type="hidden" value="/p/links-materials-living-off-microsoft-copilot"
    name="fallback_path"><input type="hidden" value="true" name="is_recaptcha_enabled"><input type="hidden" value="false" name="double_opt"><input type="hidden" value="false" name="trigger_redirect"><input hidden=""
    value="Oops, something went wrong." name="subscribe_error_message"><input hidden="" value="Subscribed!" name="subscribe_success_message">
  <div class="flex flex-col">
    <div class="flex w-full flex-col items-center sm:flex-row overflow-hidden p-1 rounded-lg" style="background-color: rgb(249, 250, 251); border: none;">
      <div class="flex w-full items-center" style="background-color: rgb(249, 250, 251);"><input autocomplete="email" required=""
          class="wt-button-font z-10 w-full border-none bg-transparent placeholder-shown:text-ellipsis text-lg focus:text-lg active:text-lg sm:text-lg" placeholder="Enter Your Email for Nerd Content" type="email" name="email"
          style="font-family: Inter; color: rgb(17, 24, 39);"></div><input class="cursor-pointer px-5 py-3 font-semibold w-full sm:w-auto text-lg focus:text-lg active:text-lg sm:text-lg rounded-md" type="submit" value="Subscribe"
        style="background-color: rgb(112, 0, 255); color: rgb(249, 250, 251); font-family: Inter;">
    </div>
  </div>
</form>

Text Content

Zenity Labs
Meet Us In PersonJoin Us
Subscribe


0

0

 * Zenity Labs
 * Posts
 * Links and materials for Living off Microsoft Copilot


LINKS AND MATERIALS FOR LIVING OFF MICROSOFT COPILOT


LINKS, SOURCE CODE, TOOLS AND SLIDES FOR BLACKHAT USA 2024

Michael Bargury
August 08, 2024




This is a post with all of the links and additional materials for a talk I gave
at BlackHat USA 2024 titled Living off Microsoft Copilot.


TABLE OF CONTENTS

 * Slides
   
   * Demos:

 * Tools
   
   * LOLCopilot
   
   * 15 Ways to Break Your Copilot

 * Other talks mentioned
   
   * Johann Rehberger @wunderwuzzi23
   
   * Pliny the Prompter @elder_plinius and the BASI com …
   
   * Mark Russinovich @markrussinovich
   
   * On credentials sharing


SLIDES AND DEMOS

Here they are (split into two parts due to size): part 1, part 2.

All of the demos are up on YouTube.


DEMOS:

 * RCE - getting Copilot to search for, analyze and exfiltrate sensitive data
   via Bing search results, by Tamir Ishay Sharbat - video

 * RCE - getting Copilot to manipulate banking information while keeping
   original file references for trustworthiness, by Tamir Ishay Sharbat - video

 * RCE - getting Copilot to lure its users to our malicious phishing website, by
   Gal Malka - video

 * Post-compromise - abusing Copilot with powerpwn to automate spear phishing
   for all of your victim’s collaborators, by Lana Salameh - video

 * Post-compromise - manually using copilot to craft a malicious spear phishing
   email, by Lana Salameh - video

 * Post-compromise - abusing Copilot to bypass DLP and MIP, accessing sensitive
   content without leaving a trace, by Tamir Ishay Sharbat - video


TOOLS AND RESEARCH


LOLCOPILOT

Is an offensive security tool that allows you to abuse Copilot to live of the
land of O365. It allows you to use Copilot via an API, automates data gathering
(whoami++) and crafts spear phishing emails in the compromised user’s style to
all of their collaborators.

The whoami module takes whoami to a whole new level - find top collaborators,
documents, password resent emails.

LOLCopilot whoami module

Modules: Copilot M365 ‐ Whoami

An offensive security toolset for Microsoft 365 focused on Microsoft Copilot,
Copilot Studio and Power Platform - mbrg/power-pwn

github.com/mbrg/power-pwn/wiki/Modules:-Copilot-M365-%E2%80%90-Whoami



The Spear Phishing module finds all of your collaborators, for each it find the
latest interaction you’ve had with them and crafts the perfect response to get
them to believe your phish. Copilot will write a message in your style learning
from your inbox.



Modules: Spearphishing with Copilot M365

An offensive security toolset for Microsoft 365 focused on Microsoft Copilot,
Copilot Studio and Power Platform - mbrg/power-pwn

github.com/mbrg/power-pwn/wiki/Modules:-Spearphishing-with-Copilot-M365




15 WAYS TO BREAK YOUR COPILOT



Plugins are a way for AI to actually DO things on your behalf, which makes them
extra dangerous. Check out my other BH talk this year for more info on Copilot
Studio, the platform behind Copilot M365 plugins.


OTHER PEOPLE’S WORK


JOHANN REHBERGER @WUNDERWUZZI23

Johann is the best when it comes to AI app hacking. He found the first AI RCE
AFAIK. I really recommend you check out his blog.





PLINY THE PROMPTER @ELDER_PLINIUS AND THE BASI COMMUNITY

Pliny has broken any LLM out there. If you're into jailbreaking check them out.




MARK RUSSINOVICH @MARKRUSSINOVICH

Mark has published really fundamental AI security work. I especially recommend
checking out his threat model for AI apps and his work on jailbreaking
(Crescendo, Skeleton Key).





USING TEAMS FOR TRUSTWORTHY PHISHING

Attackers can use Teams to send a message across tenants, luring their victims
to provide sensitive info or execute malware. Check out TeamPhisher.




Securely Adopt Microsoft Copilot With Zenity

zenity.io/remote-copilot-execution




REPLY

Most popular
Add your comment

Login
Login or Subscribe to participate.

KEEP READING


INSIDE MICROSOFT 365 COPILOT: A TECHNICAL BREAKDOWN








A SUMMARY OF ZENITY RESEARCH PUBLISHED AT BLACKHAT 2024

New Attack Vectors Discovered for Initial Access and Post-Compromise






ACCESS COPILOT FOR M365 THROUGH THE TERMINAL 





View more

Zenity Labs

Latest research, tools and talks about building and breaking copilots and
no-code apps

Home

Posts

Authors



© 2024 Zenity Labs.

Privacy Policy

Terms of Use

Powered by beehiiv