Skip to content

Sample Tests

There is no strict way to use MAAD-AF (be creative). The modular structure allows users to execute attack modules in any sequence. Security practitioners can leverage the documented testing paths as example playbooks or reference to build their own.

Test Path 1

An attacker compromises an identity through a phishing campaign to gain access to various Microsoft cloud services in the environment to steal high from M365 applications.

Standard employee accounts can be exploited to collect and exfiltrate critical data or abuse an identity’s reputation for greater organizational access. An attacker with access to an identity can easily access and exfiltrate data from cloud-accessible repositories, such as emails in users’ mailboxes, files in accessible SharePoint sites, teams messages, etc. During their attack, they may set up mail forwarding rules for continuous exfiltration or mailbox rules to hide signs of compromise. Once an attacker controls an account, they have access to any associated SaaS applications, leading to greater spreading through the organization.

Test Credential Privileges Required : Any identity with a exchange mailbox
MAAD-AF Technique Name MAAD-AF Modules MITRE Techniques
Access via compromised credentials Access.3 Initial Access : Valid Accounts: Cloud Accounts
Download from Sharepoint Sharepoint.4 Collection : Data from Information Repositories : Sharepoint
Setup email deletion rule Exchange.4 Defense Evasion : Hide Artifacts
Setup email forwarding Exchange.3 Collection : Email Collection

Test Path 2

Attackers have compromised a somewhat privileged identity in your environment through a credential breach. The attacker exploits the compromised identity's access & privileges to gain access to various Microsoft cloud services in the environment to perform reconnaissance, establish persistence, and perform privilege escalation.

Attackers exploit the access and privileges of the compromised identity to find valuable information within the environment and explore ways of abusing it further. In this case the attacker is exploiting the privileges of a user administrator in the environment to get all employees information which can be used in a further exploitation or in a future attack. The attacker also leverages the privilege of creating new identities in the environment to establish a backdoor that will allow for persistent access in future even the initially compromised identity were to get locked down. The attacker also attempts to assign privileges to the new backdoor account to allow execution of additional actions in the environment. Finally the attacker also attempts to reset password of another privileged identity which will allow the attacker to laterally move and perform actions with this new identities access & privileges.

Test Credential Privileges Required : User Administrator
* To execute all techniques with one credential
MAAD-AF Technique Name MAAD-AF Modules MITRE Techniques
All actions from PATH 1 # -
Access via compromised credentials Access.3 Initial Access : Valid Accounts: Cloud Accounts
Dump user information Recon.1 or Account.1 Account Discovery: Cloud Account
Deploy backdoor account Account.2 Create Account: Cloud Account
Assign role Account.3 Persistence : Manipulation: Additional Cloud Roles
Reset password for another privileged identity Account.5 Valid Accounts: Cloud Accounts

Test Path 3

Attackers have gained access to a privileged identity in your environment through credentials bought on the dark web. Attackers enumerate through various Microsoft cloud services to gain access to them using the compromised identity's access & privilege.

With this level of access & privilege, attackers want to unlock access to as much service & data as possible in the environment and then exfiltrate it. Attackers begin by modifying trusted IP configuration to bypass any resource protect by a IP based conditional access policy. To maintain persistent access to critical information, attackers add an external attacker-controlled account to teams. To avoid leaving track of their actions, attackers proceed by attempting to disable Mailbox auditing. Attrackers progress by disabling MFA on a user account and then gaining access to that executive users mailbox followed by setting up mail forwarding from the mailbox which gives them access to a lot of sensitive data. Finally attackers attempt to leverage eDiscovery, a powerful search tool in Microsoft cloud environments. They create new searches to find sensitive data across different data repositories followed by escalating privileges to eDiscovery manager to exfiltrate that data out of the environment.

Test Credential Privileges Required : `Global Administrator`
* To execute all techniques with one credential
MAAD-AF Technique Name MAAd-AF Modules MITRE Technique
All actions from PATH 1 & 2 # -
Access via compromised credentials Access.3 Initial Access : Valid Accounts: Cloud Accounts
Modify Trusted IP configuration AzureAD.1 Defense Evasion : Impair Defenses
Invite External User to Teams Teams.3 Collection : Data from Information Repositories
Disable Mailbox Auditing Exchange.5 Defense Evasion : Impair Defenses
Disable MFA Account.7 Defense Evasion : Modify Authentication Process : Multi-Factor Authentication
Gain Access to Another Users Mailbox Exchange.2 Persistence : Account Manipulation
Setup Email Forwarding Exchange.3 Collection : Email Collection
eDiscovery search Compliance.1 Collection : Automated Collection
eDiscovery Privilege Esc. (Optional) Compliance.7 Account Manipulation: Additional Cloud Roles
eDiscovery Exfil Compliance.6 Collection : Automated Collection