Cloud to On-Prem (or vice-versa)
While Moving Around is mostly concerned about staying horizontally within the same cloud, here we collect techniques that are rather suited for moving from the cloud to on-premises.
Hybrid Worker Groups
Automation Accounts can run RunBooks on HybridWorker Groups. In that case, the task will be executed on a computer (typically on-premises) with SYSTEM
rights.
This can be abused to move from the cloud to on-premise: Abusing HybridWorkers
intune device management
Intunes is the Microsoft MDM solution which can manage both Linux and Windows Clinets. An Intune Administrator
can designate powershell scripts that are automatically be deployed throughout all enrolled clients. This would make for amazing spreading capabilities.
See Abusing Intunes
Application Proxy
The application proxy allows an internal application to be exposed to the public internet (while being protected by AzureAd/EntraID). If an attacker finds a vulnerability within an application-proxy exposed web site, they can execute code within that backend server.
For more information see Application Proxies
Hybrid Identity
The different Hybrid identity schemes allow connecting a local Active Directory to Azure (EntraID). Obviously, they allow an attacker to traverse from an azure environment onto the on-prem Active Directory and vice-versa.
In addition, azure supports Seamless SSO
which is a cloud-based Kerberos-Endpoint for Desktop SSO.
More Information in Hybrid Identities