Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Azure: Can you GA?

Premium room

Azure challenge for cloud pentesters: find the attack path and escalate to Global Admin.

medium

90 min

308

To access material, start machines and answer questions login.

Scenario: In this challenge, as a cloud pentester, you will recon and attack an Azure tenant to see if you can manage to own it.

High-Level Guidance

  • Perform Entra ID reconnaissance (Recon).
  • Identify attack paths (AP).
  • Determine your Course of Action (COA).
  • Develop your scripts.
  • Attack!
  • Own the tenant!

Rules of Engagement ()

Even if you can after successful privilege escalation:

  • Do NOT create additional users
  • Do NOT modify existing users
  • Do NOT temper with this Azure tenant by any means
  • This is a shared training tenant and hence respect the of the environment
  • Leave it as you found it

Start the Lab

To start the challenge, click the Cloud Details button below. On the pop-up, click Join Lab. Find your credentials in the Credentials tab, click on Open Lab and log in to the Azure Portal (opens in new tab) with the Username and the Temporary Access Pass. (make sure you first logged out of any previous lab account).

Answer the questions below

Initiated challenge deployment.

Lay of the Land

We already have a compromised Azure account, potentially by means of:

  • attacks
  • Unsecured network
  • Weak passwords
  • Vulnerabilities in applications

Log in to the tenant and do some initial recon to see what else is up.

Answer the questions below

What is theTenant ID?

What is the  Primary Domain?

How many App Registrations are there in this tenant?

What is the user flag?

Have you checked out administrators and their roles yet?

Answer the questions below

Which user (UPN) has the Application Administrator role assignment?

Which application (app registration) could be a potential target for privilege escalation?

Answer the questions below
Target app: Display Name?

Which administrator role assignment of the target app can be abused for privilege escalation?

Attack path analysis is mainly the visual representation of the path an attacker could take to exploit vulnerabilities. Following recon, now you must have chosen your attack path.

How can you utilize the existing:

  • App Registrations
  • Enterprise Applications (Service Principals)
  • Administrators
  • Users

in order to find an attack path to Global Administrator (GA)?

Answer the questions below

Which user (display name) is the obvious candidate, i.e., target user, for a Global Administrator?

What's the role assignment for this user?

Which application is the obvious candidate, i.e. target app, to abuse for privilege escalation?

What's the role assignment for this application?

AzureHound the tenant and you shall find your path!
Answer the questions below

I think I got the idea now. The question is, can I GA?

Time to put your scripting skills to test. Can you generate a new client secret for the target app?

Answer the questions below

Done. What will I do with it?

There are many ways to generate a new secret. When using a PowerShell script to do it, you will need to create an object. Which object did you have to use to create a new client secret?

Can you authenticate to the tenant as the target app?

Answer the questions below

Oh, I see what you are after. All roads lead to GA!

Remember! You are not you anymore. You are the target app. Can you promote your own lab user to Global Administrator? Yet to be seen, indeed. But beware, once you are up there, you don't have much time.

Answer the questions below

Now, prove that you are a GA by creating an Administrative Unit, with name au-<yourlabid>, so that everyone knows that you GA'ed, indeed.