BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.troopers.de//tr26-cfp//speaker//H7ZLD8
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-tr26-cfp-N8JZBT@cfp.troopers.de
DTSTART;TZID=CET:20260625T154500
DTEND;TZID=CET:20260625T164500
DESCRIPTION:The increase in hybrid cloud adoption over the last decade has 
 extended traditional Active Directory domain environments into the Azure (
 and Entra ID) cloud. During that time\, penetration tests and red team ass
 essments have also been bringing Azure tenants into engagement scopes. Les
 s experienced testers are often finding themselves with an initial foothol
 d in Azure\, but lacking in experience on what an escalation path would lo
 ok like. This talk will cover all the steps along the way from initial acc
 ess through persistence. \nAttendees should walk away with some new techni
 ques\, along with a handful of potential escalation paths for furthering a
 ccess in an Azure tenant. In addition to this\, we will cover some techniq
 ues for maintaining privileged access after an initial escalation. Finally
 \, we will be introducing a new resource for identifying attack paths for 
 specific Azure services.
DTSTAMP:20260510T025807Z
LOCATION:Track 2
SUMMARY:Modern Adventures in Azure Privilege Escalation - Karl Fosaaen\, Th
 omas Elling
URL:https://cfp.troopers.de/tr26-cfp/talk/N8JZBT/
END:VEVENT
END:VCALENDAR
