Skip to content

Privesc

Colby Farley edited this page Apr 7, 2026 · 4 revisions

privesc

privesc is the escalation-path command for AzureFox.

Use it when the question is no longer "who has access?" but "which visible path could turn this foothold into more control?"

What This Command Answers

  • Which visible paths could broaden access quickly?
  • Which path is most likely to matter first?
  • Which path is closest to the current foothold or another already-interesting principal?

Run It

azurefox privesc --output table

For saved structured output:

azurefox privesc --output json

Example Table Output

severity principal path asset current
high azurefox-lab-sp direct-role-abuse - yes
high ua-app public-identity-pivot vm-web-01 no

When To Use It

  • after Permissions shows strong principals
  • when you want likely escalation stories instead of raw identity evidence
  • when you need to prioritize the most actionable control-expansion paths first

What To Look For

  • paths involving the current identity
  • role-assignment or delegation rights that could expand control
  • workload-linked identities that could become a cleaner pivot than a user account
  • concise reasoning that explains why a path matters immediately

Why It Matters

Privilege inventory is useful, but escalation paths usually determine what changes next.

privesc compresses identity, role, and attachment context into a smaller set of high-signal paths so you can spend time validating the path most likely to change what you can do in the tenant.

What Should Stand Out First

  • the path with the highest impact
  • the path closest to the current foothold
  • the path that is easiest to understand and validate
  • whether the current identity or another already-interesting principal is involved

If You See..., Go Next To...

  • If you see path_type=direct-role-abuse, go next to RBAC because it shows the exact role assignment evidence and scope behind that escalation path.
  • If you see path_type=public-identity-pivot, go next to Managed-Identities and endpoints because one shows the workload-to-identity path and the other shows the ingress path into that workload.
  • If the path depends on a service principal or application trust edge, go next to Role-Trusts because it explains who can modify the identity that makes the path possible.

What To Do Next

  • Validate the underlying evidence in RBAC or Managed Identities.
  • Use Role Trusts if the path appears to depend on indirect control.
  • If the current identity is involved, treat that path as a priority before broader inventory work.

Boundary

privesc should surface credible escalation paths backed by readable evidence.

It is not an exploit framework, a proof engine, or a claim that every imaginable attack chain is present.

Clone this wiki locally