Adversaries map and navigate cloud attack paths by chaining misconfigurations, over-privileged principals, and exposed secrets in pursuit of privilege escalation and broader objectives. In this talk, we explore core attack primitives in Azure, Entra ID, and Microsoft 365, demonstrate how to simulate...
Adversaries map and navigate cloud attack paths by chaining misconfigurations, over-privileged principals, and exposed secrets in pursuit of privilege escalation and broader objectives. In this talk, we explore core attack primitives in Azure, Entra ID, and Microsoft 365, demonstrate how to simulate end-to-end attack chains, and analyze the resulting telemetry to uncover the traces these attacks leave behind.
A reusable capability (configuration, permission, or credential) that an adversary abuses within
an attack path to move laterally, escalate privileges or access data inside a tenant.
✘Examples
Service Principal Credential Injection: Abuse a permission (Entra ID Role or direct Owner
assignment) create client secrets or upload certifications for any app registration.
MailBox Access: Abuse the Graph Mail.Read Application permission to exfiltrate mailbox contents
via Microsoft Graph API.
KeyVault Secret Access: With Key Vault Contributor on the vault scope, modify access policies so
an a new identity can read secrets.