References

Type
Url
Description

technique

https://auth0.com/blog/why-should-use-accesstokens-to-secure-an-api/

Auth0. (n.d.). Why You Should Always Use Access Tokens to Secure APIs. Retrieved September 12, 2019.


technique

https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens

Cai, S., Flores, J., de Guzman, C., et. al.. (2019, August 27). Microsoft identity platform access tokens. Retrieved October 4, 2019.


technique

https://staaldraad.github.io/2017/08/02/o356-phishing-with-oauth/

Stalmans, E.. (2017, August 2). Phishing with OAuth and o365/Azure. Retrieved October 4, 2019.


technique

https://attack.mitre.org/techniques/T1527


technique

https://developer.okta.com/blog/2018/06/20/what-happens-if-your-jwt-is-stolen

okta. (n.d.). What Happens If Your JWT Is Stolen?. Retrieved September 12, 2019.


technique

https://www.welivesecurity.com/wp-content/uploads/2017/08/eset-gazer.pdf

ESET. (2017, August). Gazing at Gazer: Turla’s new second stage backdoor. Retrieved September 14, 2017.


technique

https://en.wikipedia.org/wiki/Screensaver

Wikipedia. (2017, November 22). Screensaver. Retrieved December 5, 2017.


technique

https://attack.mitre.org/techniques/T1180


technique

https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/41699

Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.


technique

https://tools.cisco.com/security/center/resources/integrity_assurance.html#26

Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Boot Information. Retrieved October 21, 2020.