https://github.com/Semperis/EntraGoat
  
  
     
    https://github.com/Semperis/EntraGoat
  
        Last synced: 3 months ago 
        JSON representation
    
- Host: GitHub
 - URL: https://github.com/Semperis/EntraGoat
 - Owner: Semperis
 - License: mit
 - Created: 2025-07-15T12:57:24.000Z (4 months ago)
 - Default Branch: main
 - Last Pushed: 2025-08-03T16:51:00.000Z (3 months ago)
 - Last Synced: 2025-08-03T18:26:25.455Z (3 months ago)
 - Language: PowerShell
 - Size: 2.54 MB
 - Stars: 0
 - Watchers: 0
 - Forks: 0
 - Open Issues: 1
 - 
            Metadata Files:
            
- Readme: README.md
 - License: LICENSE
 
 
Awesome Lists containing this project
- awesome-entra - EntraGoat - Deliberately vulnerable Microsoft Entra ID infrastructure to simulate security misconfigurations and attack vectors [](https://badgen.net/github/stars/Semperis/EntraGoat) (Tools / CLI)
 - awesome-starts - Semperis/EntraGoat - A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges. (others)
 
README
          # EntraGoat - A Deliberately Vulnerable Entra ID Environment

**EntraGoat** is a deliberately vulnerable Microsoft Entra ID infrastructure designed to simulate real-world identity security misconfigurations and attack vectors. EntraGoat introduces intentional vulnerabilities in your environment to provide a realistic learning platform for security professionals. It features multiple privilege escalation paths and focuses on black-box attack methodologies.
EntraGoat uses PowerShell scripts and Microsoft Graph APIs to deploy vulnerable configurations in your Entra ID tenant. This gives users complete control over the learning environment while maintaining isolation from production systems.
## ๐ Getting Started
### Prerequisites
- A Microsoft Entra ID tenant (Use a test/trial tenant)
- Global Administrator privileges
- Microsoft Graph PowerShell SDK
- Node.js, npm
### Installation
EntraGoat provides an interactive web interface for challenge management and PowerShell scripts for infrastructure deployment.
#### Method 1: Quick Setup (Recommended)
1. **Clone the repository**
   ```bash
   git clone https://github.com/Semperis/EntraGoat
   cd EntraGoat
   ```
2. **Install Microsoft Graph PowerShell SDK**
   ```powershell
   Install-Module Microsoft.Graph -Scope CurrentUser -Force
   ```
3. **Run the web interface**
   ```bash
   cd .\frontend
   npm install
   npm start
   ```
4. **Access EntraGoat at** `http://localhost:3000`
5. **Run the Setup Script for each given scenario**
#### Method 2: Manual PowerShell Setup
For individual scenarios, navigate to the specific challenge directory:
```powershell
cd scenarios
.\EntraGoat-Scenario1-Setup.ps1
```
## ๐ฏ Challenge Structure
Each scenario includes:
- **๐ Setup Script** - Deploys vulnerable configuration
- **๐งน Cleanup Script** - Removes all created objects
- **๐ Solution Walkthrough** - Step-by-step attack demonstration
- **๐ Capture the Flag** - Hidden flags to discover
## ๐ฐ Pricing
EntraGoat scenarios run entirely within your existing Entra ID tenant and do not incur additional Microsoft licensing costs. The vulnerabilities are created through configuration changes only.
**Note:** Use a dedicated test tenant to avoid impacting production environments.
## ๐ฅ Contributors
- **Jonathan Elkabas** - Security Researcher @Semperis
- **Tomer Nahum** - Security Research Team Lead @Semperis
## ๐ฏ Presented at
- **Black Hat USA 2025** - Arsenal
- **DEF CON 33** - Demo Labs
## ๐ Solutions
โ ๏ธ **Spoiler Alert!** Solution files contain complete attack walkthroughs.
Solution guides are available in the `solutions/` directory for each scenario:
- Detailed step-by-step attack procedures
- PowerShell automation scripts
## ๐  Resources
- [What Is EntraGoat?](https://www.semperis.com/blog/what-is-entragoat-entra-id-simulation-environment/)
- [Getting started with EntraGoat](https://www.semperis.com/blog/getting-started-with-entragoat-entra-id-simulation-lab/)
- [Scenario 1 Solution: Service Principal Ownership Abuse in Entra ID](https://www.semperis.com/blog/service-principal-ownership-abuse-in-entra-id/)
- [Scenario 2 Solution: Exploiting App-Only Graph Permissions in Entra ID](https://www.semperis.com/blog/exploiting-app-only-graph-permissions-in-entra-id/)
## ๐ผ๏ธ Screenshots
### Main Dashboard

### Challenge Interface

### PowerShell Setup

## ๐ค Contribution Guidelines
We welcome contributions from the security community:
- **New Scenarios** - Additional attack vectors and privilege escalation chains
- **Code Improvements** - PowerShell script optimization and error handling
- **Documentation** - Enhanced learning materials and walkthroughs
- **Bug Reports** - Issue identification and resolution
- **Feature Requests** - New functionality and improvements
## โ ๏ธ Disclaimer
**For Educational Purposes Only**
EntraGoat is designed exclusively for educational and authorized security testing purposes. Users are responsible for:
- Obtaining proper authorization before testing
- Using dedicated test environments only
- Complying with applicable laws and regulations
- Following responsible disclosure practices
The authors assume no liability for misuse of this tool.
This project is licensed under the terms of the MIT license, and is provided for educational and informational purposes only. It is intended to promote awareness and educate on misconfigurations and attack paths, that may exist on systems you own or are authorized to test. Unauthorized use of this information for malicious purposes, exploitation, or unlawful access is strictly prohibited. Semperis does not endorse or condone any illegal activity and disclaims any liability arising from misuse of the material. Additionally, Semperis does not guarantee the accuracy or completeness of the content and assumes no liability for any damages resulting from its use.
---
**Happy Hunting!** - The EntraGoat Team