Abusing Cloud Administrator Role
In this section we'll tackle an attack scenario that sees us compromising a Cloud Administrator account and wanting to get access to an application we don't have access to. This application has a Contributor RBAC role to the subscription so we'll end up assigning ourselves access to the app, resetting its service principal account and logging in with the newly-set password.
The first step of the attack is adding ourselves as Application Owner, this can be done using the AZCli
Now we can reset the password of the Service Principal account
this command will return a JSON object of this format
With the SP password we are able to log into the application via single-factor log-in as the SP
The extreme summary is: once we compromise a Cloud Administrator account, we have control over all the applications in the tenant that have the Contributor RBAC role assigned to them.
Last updated