O365 File Permissioned Application Consent Granted by User
Steal Application Access Token
Steal Application Access Token
Modify Registry
Phishing, Spearphishing Attachment
Use Alternate Authentication Material, Pass the Ticket
Exfiltration Over C2 Channel