<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Microsoft-Device-Code-Phishing on Jesus Oseguera</title><link>https://r0tbyt3.dev/tags/microsoft-device-code-phishing/</link><description>Recent content in Microsoft-Device-Code-Phishing on Jesus Oseguera</description><generator>Hugo</generator><language>en-us</language><atom:link href="https://r0tbyt3.dev/tags/microsoft-device-code-phishing/index.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft Device Code Phishing</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/microsoft-device-code-phishing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/offensive-phishing-operations/aitm-and-mfa-bypass/microsoft-device-code-phishing/</guid><description>Microsoft Device Code Phishing Microsoft Device Code Phishing - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Adversary in the Middle (AitM) via Evilginx Customizing Evilginx OPSEC Configuration Dynamic Device Code Phishing Evilginx Phishlet Development Evilginx URL Rewriting GitHub Device Code Phishing GitLab Device Code Phishing Illicit Consent Grant Invisible Proxy OPSEC Considerations Manual TOTP Harvesting MFA Bypass Azure AitM Phishing MFA Bypass Building an Invisible Proxy MFA Bypass Building an Invisible Proxy via Cloudflare Workers Protecting Evilginx Server via Caddy</description></item></channel></rss>