Intermediate Lab red team icon    azure cloud icon   

Leverage Device Code Phishing for Initial Access

Device code phishing is a dangerous technique, both in seeming legitimate to end users and in evading detection. Get hands-on in this lab!

Overview

Device code phishing is a dangerous technique, both in seeming legitimate to end users and in evading detection. In this lab you'll get hands on with real phishing, enumerate Azure resources, exploit an active Windows user and establish command and control (C2). This lab is good for both red and blue. Strap in!

 
Scenario

Our client International Asset Management has asked us to perform a red team engagement. They want us to start externally as a threat actor would, try and breach their environment and access resources belonging to director or C-level executives. Phishing is in scope, and International Asset Management's IT partners have also agreed to be included in the test.

Lab prerequisites
  • Familiarity with the command line
  • Basic understanding of Azure
  • Basic cybersecurity knowledge
  • Basic understanding of Windows
Learning outcomes
  • Device code phishing
  • Azure enumeration using the Azure CLI and Powershell
  • Windows enumeration
  • Windows lateral movement via binary hijacking
  • Payload creation
  • Controlling target systems using a C2
platform mock(1)

Cloud Security Training To Protect Your Business

Pwned Labs for Business gives your team access to dedicated business content, including labs and cyber ranges.

We also offer in-person or remote workshops, and our cloud penetration services are helping businesses become more secure!