Breaking The Barriers
As an APT group targeting Azure, you've discovered a web app that creates admin users, but they are heavily restricted. To gain initial access, you've created a malicious OAuth app in your tenant and now seek to deploy it into the victim's tenant. Can you bypass the restrictions and capture the flag?
The shell environment has been preloaded with your malicious OAuth app credentials and the target web app endpoint as environment variables. Use 'env | grep AZURE' or 'echo $WEB_APP_ENDPOINT' to view them.
Good luck!

Author
Lior Sonntag
"Microsoft Entra ID (Azure AD) is a critical security boundary in modern cloud environments. This challenge simulates techniques observed in real-world APT campaigns, demonstrating how attackers can gain an initial foothold, exploit misconfigurations, and move laterally. A key objective is to familiarize players with unique Entra ID features and behaviors, highlighting how it operates differently from other identity platforms."
Terminal
Terminal