Initial Access via Microsoft Teams External Tenants | Cyber Codex

Introduction: The Rise of Collaboration App Threat Vectors

Discovering Vulnerable Tenants Through Reconnaissance
Why Target Teams Tenants?
Recon Techniques
TeamsPhisher
AADInternals
Azure AD and Cloud Recon
Delivering Payloads via Microsoft Teams Messaging
Attack Surface in Messaging
Payload Types:
Example
Vulnerabilities Elevating the Threat
Token Replay and Trust Exploitation in Microsoft 365
Token Abuse Explained
AWS / GCP/ Azure Cross-Cloud Token Risk

Building a Realistic Lab for Teams Attacks
TryHackMe Labs
Hack The Box Enterprise Cloud
VulnHub Scenario
Azure Cloud Lab
GCP and AWS Cross Cloud Risk Labs
Detection Challenges and Evasion Techniques
Limited Logging in Teams
Evasion in the Wild
Hardening and Mitigation Strategies
Admin-Level Controls
End-User Education
Monitoring Tools
Real World Example
PreviousNetwork Time Protocol (NTP) Abuse for Enterprise Recon | Cyber CodexNextDeanonymizing Threat Actors: A Deep Dive | Cyber Codex
Last updated
Was this helpful?
