Learning Objective 12

Task

In the Attack Lab:

  1. Login to the Pharma Corp tenant as ‘mailapp’ by using the credentials added earlier. − Check the current API Permissions assigned to the service principal.

  2. Read the email content of [email protected].

Applies to: Attack Lab

Topic Covered: Credential Abuse and MS Graph API Permission Abuse

Solution

In Learning Objective 11, we added a new credential for the "mailapp" enterprise application.

We will use these credentials to log in using the Az PowerShell module.

$password = ConvertTo-SecureString 'Tey8Q~S3o84UUg7I_ZAIk7DYI4eNCYE5hy1auaoa' -AsPlainText -Force

$creds = New-Object System.Management.Automation.PSCredential('f0823e33-c430-4dd2-a56a-dca3c3a346a4', $password)

Connect-AzAccount -ServicePrincipal -Credential $creds -Tenant e0f999c1-86ee-47a0-bfd5-18470154b7cd

Last updated

Was this helpful?