BSidesLuxembourg 2025

Unpacking Azure Initial Access Attack Techniques
2025-06-18 , Main Stage

As the persistent migration to cloud infrastructures keeps growing, Microsoft Azure has become a mainstay of modern enterprise environments and, therefore, an increasingly attractive target for attackers. This talk covers Azure initial access, from beginner techniques to leading-edge offensive strategies. Attendees will hear about misconfigurations, identity-based attacks, and real-world exploitation scenarios threat actors utilize to gain a foothold in Azure environments. From security newcomers to Azure to red teamers looking to up their game, this session offers hands-on insight and actionable techniques for understanding and defending against modern cloud threats.

I am currently leading the Offensive Security R&D at Hacknowledge SA and a member of the offensive security team. Coming from a blue team background, I transitioned to the red side, focusing on offensive tool development, cloud penetration testing, and purple teaming. With expertise in both attack and defense, I work on advancing adversary emulation, bypassing detection techniques, and automated security assessments.

François-Jérôme is a confirmed professional with 8 years in the Offensive Security field.

He is leading the Hacknowledge offensive security team.

He has been working on a variety of missions, including Red Team engagements, adversary simulation tests with creative phishing scenarios, as well as all sorts of penetration tests (web application, internal, external, physical, etc.).

He also has experience in incident response, which is an advantage when he has to bypass detection/protection mechanisms.

Eager for knowledge and enthusiast, he participates in online security challenges (CTF) as well as training courses that have allowed him to acquire numerous certifications (OSCP, OSWA, GXPN, GCFA, GREM, etc.).