In the past few years, many companies have adopted Azure AD as an identity platform for their cloud services, often using their existing on-prem AD in a hybrid setup. Azure AD is vastly different from on-premises AD and requires a different security approach to either attack or defend.
This training explains how organizations use Azure AD to manage modern cloud-based or hybrid environments and what security challenges this brings. It is the result of many years of research into the protocols and internals of Azure AD. The training will give you the knowledge to analyze, attack, and secure Azure AD and hybrid setups from modern attacks.
The training is technical and deep-dives into core protocols such as OAuth2 and application concepts. It includes many hands-on exercises and labs, set up as challenges, to gain access to accounts and elevate privileges.
Outsider Security
@_dirkjan
Dirk-jan Mollema is a hacker and researcher of Active Directory and Azure AD security. In 2022 he started his own company, Outsider Security, where he performs penetration tests and reviews of enterprise networks and cloud environments. He blogs at dirkjanm.io, where he publishes his research, and shares updates on the many open source security tools he has written over the years.
He presented previously at TROOPERS, DEF CON, Black Hat and BlueHat and has been awarded as one of Microsoft’s Most Valuable Researchers multiple times.
In the last years, more and more companies adopted Azure AD as an identity platform for their cloud
services, often using their existing on-prem AD as a source for a hybrid setup. As a red teamer,
penetration tester, or security architect, you are probably familiar with Active Directory security
concepts. Azure AD is vastly different and is built around different concepts and protocols.
This training explains how organizations use Azure AD to manage modern cloud-based or hybrid
environments and what security challenges this brings. It is the result of many years of research into
the protocols and internals of Azure AD. It will give you the knowledge to analyze, attack, and secure
Azure AD and hybrid setups from modern attacks. The training is technical and deep-dives into core
protocols such as OAuth2 and application concepts. It includes many hands-on exercises and labs,
set up as challenges, to gain access to accounts and elevate privileges.
The training covers the following topics:
The training focuses on Azure AD’s use as an identity platform. The training does not cover Azure
Resource manager abuses, except the parts where it intersects with Azure AD. While a range of
(open source) tools are used during the training, the goal is to provide understanding of the inner
workings, not just on knowing how to run tools.
Introduction
Azure AD components – Administrator roles and privileges
Azure AD components – data interfaces
Azure AD components – applications
Hybrid environments
Identity security – Conditional Access
Primary refresh tokens and device identity
This course is meant for people with existing experience in Windows and AD security. While the
course explains Azure AD concepts without requiring prior knowledge, general knowledge of HTTP
protocols, REST APIs, command line tools and other basic offensive techniques are required for the
labs. The hybrid labs assume prior knowledge of common Active Directory attack techniques, since
the focus is on Azure AD and not on the on-premises Active Directory attack techniques.
Students will need a laptop with either a Windows or Linux based Virtual Machine on which they can
install tools and programs. A VPN connection to an online lab will be provided, this requires
unfiltered internet access from the VM and/or laptop. Note that some tools run only on Windows,
and do not function on Windows on ARM, bringing a laptop with an x64 processor and a Windows
VM is recommended.
Vectorize (Nitay Artenstein & Iddo Eldor & Jacob Bech)