.. role:: html(raw) :format: html .. title:: MAAD Attack Framework .. toctree:: :maxdepth: 2 :caption: MAAD Attack Framework (MAAD-AF) :name: _maad_af :hidden: maad_overview/maad_overview maad_fundamentals/maad_fundamentals maad_cloning/maad_cloning maad_launch/maad_launch .. toctree:: :maxdepth: 2 :caption: MAAD-AF - Modules :name: _maad_af_modules :hidden: maad_recon_azure_ad/maad_recon_azure_ad maad_redundant_access/maad_redundant_access maad_trusted_ip/maad_trusted_ip maad_disable_mbox_auditing/maad_disable_inbox_auditing maad_disable_anti_phish/maad_disable_anti_phish maad_inbox_rules/maad_inbox_rules maad_mbox_forwarding_exfil/maad_mbox_forwarding_exfil maad_user_mbox_access/maad_user_mbox_access maad_external_teams_access/maad_external_teams_access maad_ediscovery_exfil/maad_ediscovery_exfil maad_password_brute_force/maad_password_brute_force maad_disable_tenant_mfa/maad_disable_tenant_mfa maad_sharepoint_exfil/maad_sharepoint_exfil maad_remove_user_access/maad_remove_user_access maad_external_recon/maad_external_recon .. toctree:: :maxdepth: 2 :caption: MAAD-AF - Advanced Anger :name: _maad_af_advanced :hidden: maad_obfuscate_over_tor/maad_obfuscate_over_tor maad_credential_storage/maad_credential_storage .. toctree:: :maxdepth: 2 :caption: Reference :name: _reference :hidden: .. _welcome: .. figure:: ./images/MAAD_AF.png :alt: MAAD-AF -------------------------------- Welcome! -------------------------------- MAAD-AF is an adversary emulation toolkit developed by Vectra AI to perform simple, fast and effective security testing against an M365 and Azure AD tenant. Using MAAD-AF, security teams can quickly execute attacker tactics and techniques in a Microsoft 365 and Azure AD environment in order to test their detection and response capabilities for such techniques. In case it wasn't obvious enough already, MAAD-AF stands for **M**icrosoft 365 and **A**zure **AD** **A**ttack **F**ramework. What else could it possibly be? :) .. note:: Fun facts about MAAD-AF which may interest your prospects and customers - MAAD-AF is built from the ground up by [Vectra AI](https://www.vectra.ai). - MAAD-AF uses living-off-the-land techniques leveraging native services and APIs provided by Microsoft, not exploits or 0-days which risk being patched. - MAAD-AF executes techniques which are leveraged by attackers. Users can be confident that they are testing their defenses against realistic activity. - MAAD-AF is fully open source. That means a few cool things: - It is free! - Anyone can use it! - Anyone can contribute to it! (and we hope you do) - Anyone can validate and audit the code base! - MAAD-AF is no setup requirement tool. Simply download and start using it. MAAD-AF Arsenal =============== The following modules are available within MAAD-AF as of this lab's creation as of (September 2022): | Module Name | MITRE Technique | |-------------|-----------------| | Internal Recon for Azure AD | [Account Discovery](https://attack.mitre.org/techniques/T1087/) | | Create Backdoor Admin Account | [Create Account: Cloud Account](https://attack.mitre.org/techniques/T1136/003/) | | Modify Allowed IP Space | [Impair Defenses](https://attack.mitre.org/techniques/T1562/) | | Disable Mailbox Forwarding | [Impair Defenses: Disable Cloud Logs](https://attack.mitre.org/techniques/T1562/008/) | | Disable Phishing Monitoring | [Impair Defenses](https://attack.mitre.org/techniques/T1562/) | | Hide Signs of Exchange Access | [Hide Artifacts: Email Hiding Rules](https://attack.mitre.org/techniques/T1564/008/) | | Configure Exchange Mailbox Forwarding | [Email Collection: Email Forwarding Rule](https://attack.mitre.org/techniques/T1114/003/) | | Enable External Teams Access | [Data from Information Repositories](https://attack.mitre.org/techniques/T1213/) | | Use eDiscovery for Data Exfiltration | [Data from Information Repositories](https://attack.mitre.org/techniques/T1213/) | | Brute Force a Password | [Brute Force](https://attack.mitre.org/techniques/T1110/) | | Disable Tenant-level MFA Policies | [Impair Defenses](https://attack.mitre.org/techniques/T1562/) | | Exploit Sharepoint | [Data from Information Repositories: Sharepoint](https://attack.mitre.org/techniques/T1213/002/) | | External Recon | [Active Scanning](https://attack.mitre.org/techniques/T1595/) | | Obfuscate Access via TOR Proxy | [Proxy: Multi-hop Proxy](https://attack.mitre.org/techniques/T1090/003/) | About This Lab =============== In this lab, you will: #. Set up MAAD-AF (which is very easy) #. Understand the layout of the MAAD-AF tool #. Learn the purpose of the various modules within MAAD-AF .. note:: MAAD-AF is a constantly evolving in its capabilities and features. This lab is designed around the latest release of MAAD-AF as of **April 19, 2023**. While the fundamentals taught in this lab should enable a user to confidently use any future release of MAAD-AF, note that some content within this lab may differ slightly from the latest version. In the event of major changes to the MAAD-AF tool, this lab will be updated to reflect those changes. How To Use This Lab =================== #. This is a hands-on lab designed to deliver a practical knowledge of attacker techniques and use of attack tools like MAAD-AF for security testing. #. Each MAAD-AF module roughly corresponds to one module in this lab. #. Each module may call out a piece of information near the end to note for validation. #. To successfully complete the lab, you will need to complete all the modules. #. Finally, the lab is self-paced, and you can expect to finish it in under an hour.