Initial Access via Microsoft Teams External Tenants

Introduction: The Rise of Collaboration App Threat Vectors

Discovering Vulnerable Tenants Through Reconnaissance
Why Target Teams Tenants?
Recon Techniques
TeamsPhisher
AADInternals
Azure AD and Cloud Recon
Delivering Payloads via Microsoft Teams Messaging
Attack Surface in Messaging
Payload Types:
Example
Vulnerabilities Elevating the Threat
Token Replay and Trust Exploitation in Microsoft 365
Token Abuse Explained
AWS / GCP/ Azure Cross-Cloud Token Risk

Building a Realistic Lab for Teams Attacks
TryHackMe Labs
Hack The Box Enterprise Cloud
VulnHub Scenario
Azure Cloud Lab
GCP and AWS Cross Cloud Risk Labs
Detection Challenges and Evasion Techniques
Limited Logging in Teams
Evasion in the Wild
Hardening and Mitigation Strategies
Admin-Level Controls
End-User Education
Monitoring Tools
Real World Example
PreviousExploiting Misconfigurations in Azure AWS, and GCPNextLiving Off the Cloud: Abusing Cloud Services for Red Teaming
Last updated

