{"id":7462,"date":"2022-01-10T18:40:18","date_gmt":"2022-01-11T01:40:18","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7462"},"modified":"2023-04-05T12:36:12","modified_gmt":"2023-04-05T19:36:12","slug":"a-penetration-testers-perspective-whats-next-after-domain-admin","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/a-penetration-testers-perspective-whats-next-after-domain-admin\/","title":{"rendered":"A Penetration Tester\u2019s Perspective: What’s Next after Domain Admin?"},"content":{"rendered":"

Organizations have been increasingly relying on cloud services from Azure since Microsoft provides native support. As a result, CSW pentesters have been researching various attack vectors related to Azure. Our pentesters noted that after obtaining administrative privileges on the on-premise network in an engagement, it is essential to always think of attack paths or scenarios to escalate privileges or describe the maximum impact. One such thing is escalating privileges to Azure Active Directory (AD).<\/p>\n

\n

A domain administrator is a user account that can edit, create new users, delete existing users and change permissions in the Active Directory. A domain admin can modify the configurations of the Active Directory servers and therefore, any content stored on them.<\/p>\n<\/blockquote>\n

On-premise administrators might access crucial information, such as Azure Active Directory (AAD) Connect, Active Directory Federation Services (ADFS), and Active Directory Azure Active Directory Single Sign-on (SSO). Users with admin rights for these services can easily get admin rights to Azure AD to manipulate and impersonate users.<\/p>\n

In this blog, we will discuss two attack scenarios that CSW pentesters have commonly encountered during their engagements. Both the scenarios leverage misconfigurations to escalate privileges from on-premise to Azure services:<\/p>\n

    \n
  1. \n

    Azure AD Connect<\/p>\n<\/li>\n

  2. \n

    Azure Active Directory Single Sign-on<\/p>\n<\/li>\n<\/ol>\n

    <\/h2>\n

    Azure AD Connect<\/strong><\/h2>\n

    Azure AD Connect is the Microsoft tool designed to meet and accomplish hybrid identity goals. It provides the following features:<\/p>\n