Home Security #adversary-in-the-middle

Tagged #adversary-in-the-middle

10 posts

Microsoft 365 AiTM Defense

AiTM phishing, what actually happens, and what breaks each step

The attack in plain English, mapped to ATT&CK, and which defensive control kills which step. Read this before …

Overview / Threat Model 8 min
Microsoft 365 AiTM Defense

Sentinel detection, same session, two sources

When an attacker replays a stolen cookie, the same session ID shows up from two different IPs within …

Detection 5 min
Microsoft 365 AiTM Defense

Sentinel detection, sign-in from a hosting ASN

Real users sign in from residential ISPs and corporate networks. Attackers replaying cookies sign in from rented VPS. …

Detection 6 min
Microsoft 365 AiTM Defense

Sentinel detection, suspicious sign-in plus persistence action

The highest-fidelity detection in this bundle. Catches the chain: dodgy sign-in, then within 2 hours a forwarding rule, …

Detection 6 min
Microsoft 365 AiTM Defense

Conditional Access policies that actually break AiTM

Five Conditional Access policies, deployed in this order, make AiTM economically unviable against your tenant. Plus the rollout …

Mitigation 10 min
Microsoft 365 AiTM Defense

AiTM incident response, what to do when the alert fires at 2am

Step-by-step runbook for when an AiTM detection lights up. Revoke, reset, audit, clean persistence, pivot-hunt. Exact PowerShell included.

Playbook 8 min
LinkedIn AiTM Defense

LinkedIn AiTM phishing, what actually happens, step by step

The attack in plain English. What gets captured, when reCAPTCHA matters, why li_at is the prize, and which …

Overview / Threat Model 10 min
LinkedIn AiTM Defense

Detecting LinkedIn AiTM, three queries and a Python monitor

SPL queries for credentials submitted to a non-LinkedIn domain, li_at replayed from a new ASN, and impossible travel …

Detection 10 min
LinkedIn AiTM Defense

Controls that break LinkedIn AiTM. FIDO2, CASB, and the ones that do not work

FIDO2 makes the attack structurally impossible. CASB session policies catch the rest. Password managers, security awareness, and SSO …

Mitigation 10 min
LinkedIn AiTM Defense

LinkedIn AiTM incident response runbook

Triage, contain, scope, notify, preserve evidence. The full sequence with exact LinkedIn URLs and timing expectations from real …

Playbook 9 min