BlackHat Arsenal 2025 - msInvader : Automating Adversary Simulation in M365 and Azure
mvelazco
7 views
29 slides
Oct 21, 2025
Slide 1 of 29
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
About This Presentation
msInvader is an adversary simulation tool built for blue teams, designed to simulate adversary techniques within M365 and Azure environments. This tool generates attack telemetry, aiding teams in building, testing, and enhancing detection analytics. By implementing multiple authentication mechanisms...
msInvader is an adversary simulation tool built for blue teams, designed to simulate adversary techniques within M365 and Azure environments. This tool generates attack telemetry, aiding teams in building, testing, and enhancing detection analytics. By implementing multiple authentication mechanisms, including OAuth flows for compromised user scenarios and service principals, msInvader mirrors realistic attack conditions. It interacts with Exchange Online using the Graph API, EWS, and REST API, providing comprehensive simulation capabilities. This session will explore msInvader's technical features, demonstrating its application in improving security defenses through detailed adversary simulations.
Size: 2.66 MB
Language: en
Added: Oct 21, 2025
Slides: 29 pages
Slide Content
#BHUSA @BlackHatEvents
msInvader: Automating Adversary
Simulation in M365 & Azure
Mauricio Velazco
@mvelazco
#BHUSA @BlackHatEvents
●From Arequipa, Peru
●Security Researcher at Microsoft
●@mvelazco
●https://github.com/mvelazc0
#whoami
#BHUSA @BlackHatEvents
●Personal Views: The opinions and views expressed in this presentation are
my own and do not reflect those of my employer.
●Independence: The content presented is based on my personal research
and experience.
●No Endorsement: Mention of specific tools, technologies, or companies
does not imply endorsement by my employer.
●Responsibility: I assume full responsibility for any errors or omissions in
the presentation.
Disclaimer
#BHUSA @BlackHatEvents
The New Cloud Reality
#BHUSA @BlackHatEvents
●Threat actors abuse trusted identities,
not endpoints.
●API-based access bypasses endpoint
and network controls
●Evolving cloud techniques challenge
defenders’ understanding of attacks
and telemetry
Cloud Attacks Redefine Visibility
#BHUSA @BlackHatEvents
●Realistic, repeatable cloud attack
simulations
●Visibility into post-compromise
techniques
●Attack telemetry to test and tune
detections
What Defenders Need