An open API service indexing awesome lists of open source software.

https://github.com/Semperis/EntraGoat


https://github.com/Semperis/EntraGoat

Last synced: 3 months ago
JSON representation

Awesome Lists containing this project

README

          

# EntraGoat - A Deliberately Vulnerable Entra ID Environment

**EntraGoat** is a deliberately vulnerable Microsoft Entra ID infrastructure designed to simulate real-world identity security misconfigurations and attack vectors. EntraGoat introduces intentional vulnerabilities in your environment to provide a realistic learning platform for security professionals. It features multiple privilege escalation paths and focuses on black-box attack methodologies.

EntraGoat uses PowerShell scripts and Microsoft Graph APIs to deploy vulnerable configurations in your Entra ID tenant. This gives users complete control over the learning environment while maintaining isolation from production systems.

## ๐Ÿš€ Getting Started

### Prerequisites
- A Microsoft Entra ID tenant (Use a test/trial tenant)
- Global Administrator privileges
- Microsoft Graph PowerShell SDK
- Node.js, npm

### Installation

EntraGoat provides an interactive web interface for challenge management and PowerShell scripts for infrastructure deployment.

#### Method 1: Quick Setup (Recommended)

1. **Clone the repository**
```bash
git clone https://github.com/Semperis/EntraGoat
cd EntraGoat
```

2. **Install Microsoft Graph PowerShell SDK**
```powershell
Install-Module Microsoft.Graph -Scope CurrentUser -Force
```

3. **Run the web interface**
```bash
cd .\frontend
npm install
npm start
```

4. **Access EntraGoat at** `http://localhost:3000`

5. **Run the Setup Script for each given scenario**

#### Method 2: Manual PowerShell Setup

For individual scenarios, navigate to the specific challenge directory:

```powershell
cd scenarios
.\EntraGoat-Scenario1-Setup.ps1
```

## ๐ŸŽฏ Challenge Structure

Each scenario includes:
- **๐Ÿ“‹ Setup Script** - Deploys vulnerable configuration
- **๐Ÿงน Cleanup Script** - Removes all created objects
- **๐Ÿ“– Solution Walkthrough** - Step-by-step attack demonstration
- **๐ŸŽŒ Capture the Flag** - Hidden flags to discover

## ๐Ÿ’ฐ Pricing

EntraGoat scenarios run entirely within your existing Entra ID tenant and do not incur additional Microsoft licensing costs. The vulnerabilities are created through configuration changes only.

**Note:** Use a dedicated test tenant to avoid impacting production environments.

## ๐Ÿ‘ฅ Contributors

- **Jonathan Elkabas** - Security Researcher @Semperis
- **Tomer Nahum** - Security Research Team Lead @Semperis

## ๐ŸŽฏ Presented at

- **Black Hat USA 2025** - Arsenal
- **DEF CON 33** - Demo Labs

## ๐Ÿ“š Solutions

โš ๏ธ **Spoiler Alert!** Solution files contain complete attack walkthroughs.

Solution guides are available in the `solutions/` directory for each scenario:
- Detailed step-by-step attack procedures
- PowerShell automation scripts

## ๐Ÿ“ Resources
- [What Is EntraGoat?](https://www.semperis.com/blog/what-is-entragoat-entra-id-simulation-environment/)
- [Getting started with EntraGoat](https://www.semperis.com/blog/getting-started-with-entragoat-entra-id-simulation-lab/)
- [Scenario 1 Solution: Service Principal Ownership Abuse in Entra ID](https://www.semperis.com/blog/service-principal-ownership-abuse-in-entra-id/)
- [Scenario 2 Solution: Exploiting App-Only Graph Permissions in Entra ID](https://www.semperis.com/blog/exploiting-app-only-graph-permissions-in-entra-id/)

## ๐Ÿ–ผ๏ธ Screenshots

### Main Dashboard
![Main Dashboard](./screenshots/dashboard.png)

### Challenge Interface
![Challenge Interface](./screenshots/challenge-view.png)

### PowerShell Setup
![PowerShell Setup](./screenshots/powershell-setup.png)

## ๐Ÿค Contribution Guidelines

We welcome contributions from the security community:

- **New Scenarios** - Additional attack vectors and privilege escalation chains
- **Code Improvements** - PowerShell script optimization and error handling
- **Documentation** - Enhanced learning materials and walkthroughs
- **Bug Reports** - Issue identification and resolution
- **Feature Requests** - New functionality and improvements

## โš ๏ธ Disclaimer

**For Educational Purposes Only**

EntraGoat is designed exclusively for educational and authorized security testing purposes. Users are responsible for:
- Obtaining proper authorization before testing
- Using dedicated test environments only
- Complying with applicable laws and regulations
- Following responsible disclosure practices

The authors assume no liability for misuse of this tool.

This project is licensed under the terms of the MIT license, and is provided for educational and informational purposes only. It is intended to promote awareness and educate on misconfigurations and attack paths, that may exist on systems you own or are authorized to test. Unauthorized use of this information for malicious purposes, exploitation, or unlawful access is strictly prohibited. Semperis does not endorse or condone any illegal activity and disclaims any liability arising from misuse of the material. Additionally, Semperis does not guarantee the accuracy or completeness of the content and assumes no liability for any damages resulting from its use.

---

**Happy Hunting!** - The EntraGoat Team