Skip to content

Backdoor Entra ID application

Platform: Entra ID

MITRE ATT&CK Tactics

  • Persistence
  • Privilege Escalation

Description

Backdoors an existing Entra ID application by creating a new password credential.

Warm-up:

  • Create an Entra ID application and associated service principal
  • Assign it the Directory Readers role at the tenant level (for illustration purposes)

Detonation:

  • Backdoor the Entra ID application by creating a new password credential

Notes: The warm-up mimics what happens when you create an App Registration through the Azure portal. When you use the Azure portal, creating an App Registration automatically creates an associated service principal. When using the Microsoft Graph API, the service principal needs to be created separately.

References:

Instructions

Detonate with Stratus Red Team
stratus detonate entra-id.persistence.backdoor-application

Detection

Using Entra ID audit logs with the activity type Update application – Certificates and secrets management.