Threat Research

EntraGoat Scenario 6: Exploiting Certificate-Based Authentication to Impersonate Global Admin in Entra ID

EntraGoat Scenario 6: Exploiting Certificate-Based Authentication to Impersonate Global Admin in Entra ID

  • Jonathan Elkabas and Tomer Nahum
  • Aug 12, 2025

Editor’s note This scenario is part of a series of examples demonstrating the use of EntraGoat, our Entra ID simulation environment. You can read an overview of EntraGoat and its value here. Certificate Bypass Authority–Root Access Granted EntraGoat Scenario 6 details a privilege escalation technique in Microsoft Entra ID where…

EntraGoat Scenario 2: Exploiting App-Only Graph Permissions in Entra ID

EntraGoat Scenario 2: Exploiting App-Only Graph Permissions in Entra ID

  • Jonathan Elkabas and Tomer Nahum
  • Aug 05, 2025

In our second EntraGoat attack scenario, follow the steps from a carelessly leaked certificate to capture the Global Admin password—and full Entra ID compromise.

EntraGoat Scenario 1: Service Principal Ownership Abuse in Entra ID

EntraGoat Scenario 1: Service Principal Ownership Abuse in Entra ID

  • Jonathan Elkabas and Tomer Nahum
  • Aug 05, 2025

How can a compromised low-privileged user account exploit service principal ownership—and complete an Entra ID tenant takeover? Find out when you dive into EntraGoat Scenario 1.

Getting Started with EntraGoat: Breaking Entra ID the Smart Way

Getting Started with EntraGoat: Breaking Entra ID the Smart Way

  • Jonathan Elkabas and Tomer Nahum
  • Aug 04, 2025

Ready to jump in and get your hooves dirty in EntraGoat? Start here. These quick-start steps will get you into your first attack scenario.

What Is EntraGoat? A Deliberately Vulnerable Entra ID Simulation Environment

What Is EntraGoat? A Deliberately Vulnerable Entra ID Simulation Environment

  • Jonathan Elkabas and Tomer Nahum
  • Aug 04, 2025

What’s the best way to build cyber resilience? Practice! Meet EntraGoat, your safe space for hands-on, CTF-style learning. Track attack paths, hunt down identity misconfigurations, and expose access control flaws—while building resilience against real-world threats.

Golden dMSA: What Is dMSA Authentication Bypass?

Golden dMSA: What Is dMSA Authentication Bypass?

  • Adi Malyanker | Security Researcher
  • Jul 16, 2025

Delegated Managed Service Accounts are designed to revolutionize service account management. But Semperis researchers have discovered a critical design flaw that attackers can exploit for persistence and privilege escalation in AD environments with dMSAs. Learn about Golden dMSA and its risks.

How to Block BadSuccessor: The Good, Bad, and Ugly of dMSA Migration

How to Block BadSuccessor: The Good, Bad, and Ugly of dMSA Migration

  • Jorge de Almeida Pinto
  • Jul 10, 2025

The BadSuccessor privilege escalation technique presents a severe risk to Active Directory environments that use delegated Managed Service Accounts. Learn how blocking dMSA migration prevents attackers from misusing a dMSA to take over an AD domain.

nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications

nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications

  • Eric Woodruff
  • Jun 25, 2025

Key findings In testing 104 applications, Semperis found 9 (or roughly 9%) that were vulnerable to nOAuth abuse. As the abuse has been already disclosed, the ability to perform nOAuth is low complexity. nOAuth abuse exploits cross-tenant vulnerabilities and can lead to SaaS application data exfiltration, persistence, and lateral movement.…