Abuse Info
You can modify the Azure RM resource to execute actions against Azure with the privileges of the Managed Identity Service Principal. It is also possible to extract a JSON Web Token (JWT) for the Service Principal, then use that JWT to authenticate as the Service Principal outside the scope of the Azure RM resource. Here is how you extract the JWT using PowerShell:Opsec Considerations
This will depend on which particular abuse you perform, but in general Azure will create a log event for each abuse.References
- https://attack.mitre.org/techniques/T1078/
- https://specterops.io/blog/2022/06/06/managed-identity-attack-paths-part-1-automation-accounts/
- https://m365internals.com/2021/11/30/lateral-movement-with-managed-identities-of-azure-virtual-machines
- https://github.com/BloodHoundAD/BARK
- https://specterops.io/blog/2022/08/03/introducing-bloodhound-4-2-the-azure-refactor/