Here is short summary of the Presentation slides and demo of the Azure AD Consent Extractor @HelSec
- Attackers sends OWA upgrade link
- Victim clicks the link and accepts the upgrade
- Victim is redirected back to OWA when hitting the attacking server
- Victim receives ”OWA upgrade complete” message to email
- Meanwhile the attacking server is enjoying its new privileges on the user account
See the attack in action
If you want to know more about the consent attack, you can read my previous blog post from 2018


This version is the updated version to the one I did in 2018
0 comments on “HelSec Azure AD write-up: Phishing on Steroids with Azure AD Consent Extractor”