Identity Attack Chain Diagrams
Visual representations of common attack paths across hybrid and multi-cloud environments, including ASCII diagrams for documentation.
Hybrid AD → Entra ID Attack Chain
+----------------+ +-------------------+ +------------------+
| Compromised | | AD Credentials | | Entra ID Access |
| Endpoint |-----| Exfiltrated |-----| Obtained |
+----------------+ +-------------------+ +------------------+
| | |
v v v
+----------------+ +-------------------+ +------------------+
| Lateral | | Privilege | | Cloud Resource |
| Movement | | Escalation | | Access |
+----------------+ +-------------------+ +------------------+
This diagram shows the progression of an attack from a compromised endpoint through Active Directory to Entra ID and cloud resources.
Okta → AWS IAM Attack Chain
+----------------+ +-------------------+ +------------------+
| Phished | | Okta Session | | AWS IAM Role |
| User |-----| Hijacked |-----| Assumed |
+----------------+ +-------------------+ +------------------+
| | |
v v v
+----------------+ +-------------------+ +------------------+
| MFA Bypass | | Privilege | | S3 Bucket |
| Attempted | | Escalation | | Exfiltration |
+----------------+ +-------------------+ +------------------+
This diagram illustrates an attack path from a phished user through Okta to AWS IAM role assumption and S3 bucket exfiltration.