Azure Active Directory (Entra ID) is Microsoft's cloud identity service and the backbone of Azure security. Unlike on-premises AD, Azure AD uses OAuth/OIDC tokens instead of Kerberos. Attacking Azure AD means compromising identities, abusing OAuth flows, and exploiting application misconfigurations.
Azure AD attacks can lead to massive impact: access to Office 365 email, SharePoint documents, Azure resources, and any application using Azure AD for authentication. A compromised Global Administrator has complete control over the entire organization's cloud presence.
Azure AD Powers Everything
Azure AD is not just for Azure - it's the identity provider for Microsoft 365, third-party apps, and custom applications. Compromising Azure AD often means compromising everything Microsoft-related.
Azure AD Security Concepts
Azure AD Enumeration
Password Attacks
Smart Lockout
Azure AD has smart lockout that can lock accounts after failed attempts. Password spraying should be done very slowly (one attempt per user per hour) and with authorization. Lockouts alert defenders!
Application Attacks
Check App Permissions
Run Get-AzureADServiceAppRoleAssignment on service principals to find apps with dangerous permissions. Common risky ones: RoleManagement.*, Application.*, Directory.*, Mail.* with application (not delegated) consent.
Privilege Escalation
Azure AD Persistence
Golden SAML
If an organization uses ADFS for federation, the token signing certificate is the "golden ticket" equivalent. With it, you can forge authentication tokens for any user, including Global Admins.
Azure AD Attack Methodology
Azure AD Compromise Flow
1
Initial AccessPhishing, password spraying, credential stuffing, or exploiting OAuth misconfigurations.
2
EnumerationMap users, groups, roles, applications, and service principals using AzureHound or ROADtools.
3
Identify Attack PathsFind privilege escalation paths: app ownership, group membership, role assignments, dangerous permissions.
4
Privilege EscalationExploit found paths to gain higher privileges. Target Global Admin or high-privilege application.
5
Data AccessAccess sensitive data: mailboxes, SharePoint, Teams, Azure resources accessible with escalated privileges.
6
PersistenceCreate backdoor apps, add secrets to existing apps, create admin users, or establish federation trust.
Knowledge Check
Challenges
Key Takeaways
- Azure AD controls access to Microsoft 365, Azure, and integrated apps
- App owners can add secrets - owning a high-priv app enables escalation
- Privileged Authentication Admin can reset ANY password including Global Admin
- Application permissions (vs delegated) are especially dangerous
- Device code phishing can bypass MFA protections
- Use AzureHound/ROADtools to map attack paths visually