title |
---|
Backdoor Entra ID application |
Platform: Entra ID
- Persistence
- Privilege Escalation
Backdoors an existing Entra ID application by creating a new password credential on the app registration.
Warm-up:
- Create an Entra ID application
- Assign it the
User.Read.All
permission at the tenant level (for illustration purposes)
Detonation:
- Backdoor the Entra ID application by creating a new password credential
References:
- https://www.microsoft.com/en-us/security/blog/2023/12/12/threat-actors-misuse-oauth-applications-to-automate-financially-driven-attacks/
- https://www.inversecos.com/2021/10/how-to-backdoor-azure-applications-and.html
- https://posts.specterops.io/azure-privilege-escalation-via-service-principal-abuse-210ae2be2a5
- https://redfoxsec.com/blog/azure-privilege-escalation-via-service-principal/
stratus detonate entra-id.persistence.backdoor-application
Using Entra ID audit logs with the activity type Update application – Certificates and secrets management
.