Attack Techniques & Threat ModelingSecurity Operations for Identity

Tracking privilege escalation in Azure AD

Tracking Privilege Escalation in Azure AD (Microsoft Entra ID) Privilege escalation in Microsoft Entra ID (formerly Azure AD) rarely looks like a single “hacker flips a switch” moment. In real environments, it’s usually a chain of small, legitimate-looking changes—role assignments, consent grants, group membership edits, Conditional Access exceptions, or…
Read more
Attack Techniques & Threat ModelingSecurity Operations for Identity

Using BloodHound to map privilege escalation

Using BloodHound to Map Privilege Escalation in Active Directory Privilege escalation in Active Directory (AD) rarely happens as a single “big misconfiguration.” It’s usually a chain: a little too much delegated access here, a leftover admin right there, an ACL that nobody remembers, and suddenly an attacker (or a red team) has a clean path to Domain Admin. …
Read more
Attack Techniques & Threat ModelingSecurity Operations for Identity

Detecting Pass-the-Hash attacks

Pass-the-Hash (PtH) is a credential abuse technique where an attacker uses a captured NTLM password hash to authenticate to other systems—without ever knowing the user’s plaintext password. In an Active Directory environment, PtH is primarily a lateral movement and privilege expansion tactic: once a usable hash is obtained (often from a workstation), the attacker pivots to servers, file…
Read more