MCADDF

[REALWORLD-020]: Token Replay CAE Evasion (Entra ID)

1. METADATA HEADER

Attribute Details
Technique ID REALWORLD-020
MITRE ATT&CK v18.1 T1550 (Use of Web Session Cookie / Use of Stolen Tokens); related to T1556.009 (Modify Authentication Process: Conditional Access Policies)
Tactic Credential Access; Defense Evasion; Persistence
Platforms Microsoft Entra ID, Microsoft 365, CAE‑enabled SaaS (Exchange Online, SharePoint Online, Teams, Graph‑based apps)
Severity High to Critical
CVE N/A
Technique Status ACTIVE
Last Verified 2026-01-10
Affected Versions Entra ID tenants using OAuth 2.0 / OIDC tokens with or without Continuous Access Evaluation (CAE) and Token Protection
Patched In Not fully patched; partially mitigated by CAE, Token Protection, strict network enforcement and device binding
Author SERVTEPArtur Pchelnikau

2. EXECUTIVE SUMMARY

Operational Risk

Compliance Mappings

Framework Control / ID Description
CIS Benchmark CIS Microsoft 365 / Entra ID CAE and session management Requires secure configuration of session controls and token lifetimes.
DISA STIG Identity and endpoint hardening STIGs Token protection, secure authentication, and device security.
CISA SCuBA Cloud identity protection Emphasises detection and revocation of token theft and replay incidents.
NIST 800-53 AC-2, AC-7, AC-12, IA-2 Session management, account control, and strong authentication.
GDPR Art. 32 Requires appropriate security of processing, including robust session and token protections.
DORA Art. 9 ICT risk management for identity and session controls in financial organisations.
NIS2 Art. 21 Includes secure identity and session handling for essential services.
ISO 27001 A.5.15, A.8.2 Secure user authentication and protection of access credentials and sessions.
ISO 27005 Token Theft and Replay Risk scenario where theft of tokens undermines identity assurance and revocation.

3. TECHNICAL PREREQUISITES

Supported Versions:

4. ENVIRONMENTAL RECONNAISSANCE

Assess CAE and Token Protection Posture

Endpoint Reconnaissance (Token Stores)

5. DETAILED EXECUTION METHODS AND THEIRS STEPS

METHOD 1 – Classic Token Replay Against Non‑CAE or Partially Protected Apps

Supported Versions: Any Entra tenant with legacy or non‑CAE aware applications.

Step 1: Steal Tokens

Objective: Obtain a valid token or session cookie.

Execution Examples:

Step 2: Replay Token From Attacker Infrastructure

Objective: Use the stolen token to authenticate from a different device or location.

Execution:

Result:

METHOD 2 – CAE Evasion by Targeting Non‑Enforced Paths and Split‑Path Networks

Supported Versions: Entra tenants where CAE is configured but network paths or apps are not fully CAE‑enforced.

Step 1: Identify CAE‑Capable Apps and Policies

Defensive View:

Step 2: Target Non‑CAE Apps or Legacy Protocols

Objective: Use tokens against services that do not evaluate CAE signals or where Conditional Access is weaker.

Execution:

Step 3: Exploit Split‑Path or Inconsistent Network Enforcement

Objective: Bypass strict network conditions that would otherwise revoke or block tokens.

Execution:

6. ATTACK SIMULATION AND VERIFICATION (Atomic Red Team)

7. TOOLS AND COMMANDS REFERENCE

8. SPLUNK DETECTION RULES

Rule: Token Replay or Session Hijack Pattern

index=o365 OR index=azure sourcetype="o365:management:activity" \
  Operation="UserLoggedIn"
| stats earliest(ClientIP) as first_ip, latest(ClientIP) as last_ip, \
        earliest(City) as first_city, latest(City) as last_city \
        by UserId, SessionId
| where first_ip!=last_ip OR first_city!=last_city

9. MICROSOFT SENTINEL DETECTION

Query: Possible Token Replay in Entra ID Sign‑In Logs

SigninLogs
| summarize \
    firstTime=min(TimeGenerated), lastTime=max(TimeGenerated), \
    firstIp=arg_min(TimeGenerated, IPAddress).IPAddress, \
    lastIp=arg_max(TimeGenerated, IPAddress).IPAddress \
  by UserPrincipalName, SessionId
| where firstIp != lastIp

10. WINDOWS EVENT LOG MONITORING

11. SYSMON DETECTION PATTERNS

12. MICROSOFT DEFENDER FOR CLOUD

13. MICROSOFT PURVIEW (UNIFIED AUDIT LOG)

Search-UnifiedAuditLog -StartDate (Get-Date).AddDays(-1) -EndDate (Get-Date) \
  -Operations 'UserLoggedIn' \
  | Export-Csv '.\\user-logins.csv' -NoTypeInformation

14. DEFENSIVE MITIGATIONS

15. DETECTION AND INCIDENT RESPONSE

Step Phase Technique Description
1 Initial Access Phishing / AiTM User authenticates through adversary‑in‑the‑middle or compromised host.
2 Credential Access Token theft (T1552, T1550) Access, refresh or PRT tokens stolen.
3 Current Step REALWORLD-020 – Token Replay CAE Evasion Reuse tokens while avoiding or outrunning CAE controls.
4 Persistence Long‑lived refresh tokens without Token Protection Continued access until tokens are revoked or expire.
5 Impact Data theft or further lateral movement Abuse cloud APIs and apps under victim identity.

17. REAL-WORLD EXAMPLES