Back to blog
Mar 20269 min read

The Art of Initial Access

Macros are dead. Here's what replaced them.

The infosec community produces thousands of blog posts about privilege escalation, lateral movement, and persistence. Conference talks about Kerberos abuse and EDR evasion fill every event. But the hardest part of any real engagement is not owning the domain. It's getting that first callback.

Initial access is unglamorous. Half of it is social engineering. The other half is finding the one vector that survives a modern email gateway, endpoint protection, and a user who has been through phishing training four times this year. But without it, nothing else matters. All your post-exploitation tradecraft is worthless if you cannot get a foothold.

The Graveyard

Everything you learned in 2020 is dead. Microsoft spent the last few years systematically killing every initial access vector the industry relied on.

rest-in-peace.log
KILLED IN ACTION
[DEAD] VBA Macros blocked by default since 2022
[DEAD] ISO/IMG auto-mount Mark of the Web propagation patched
[DEAD] OneNote embedded files blocked
[DEAD] LNK with remote icons flagged by every gateway
[DEAD] HTA via email blocked at every layer
[DEAD] Follina / MSDT patched and handler removed
So what actually works in 2026?

1. HTML Smuggling

The payload never crosses the wire. You send an HTML file (or a link to one) that contains a base64-encoded payload embedded in JavaScript. When the target opens the HTML in their browser, the JavaScript assembles the payload client-side and triggers a download. The email gateway never sees a binary. The proxy never sees a file transfer. The payload materialises on the endpoint out of thin air.

smuggling-flow.txt
HTML SMUGGLING FLOW
1
Email arrives with HTML attachment or link
2
Gateway scans HTML CLEAN (no binary, no macro, just JavaScript)
3
User opens HTML in browser JavaScript executes
4
JS decodes base64 blob assembles payload in memory
5
Browser triggers download payload appears on disk
The payload was never in transit. It was built locally.

Why it works: email gateways scan attachments for malicious content. They cannot execute JavaScript. The HTML file is technically clean because the payload does not exist until the browser renders it. By the time the file hits disk, it has already bypassed every network-level control.

2. Device Code Phishing

This one is elegant. Microsoft's OAuth device code flow was designed for devices without browsers: smart TVs, IoT, CLI tools. You request a device code from Azure AD, get a URL (microsoft.com/devicelogin) and a short code. Send the target a pretext: "Complete your MFA enrollment" or "Verify your account for the new security policy." They go to a legitimate Microsoft URL, enter the code, authenticate normally, and you receive their OAuth token.

WHAT THE TARGET SEES
Email from "IT Security"
Link to microsoft.com/devicelogin
Enter code: GXFZ9RQKP
Normal Microsoft login page
Normal MFA prompt
Everything looks legitimate. It IS legitimate.
WHAT ACTUALLY HAPPENS
Target authenticates your device code
Azure AD issues OAuth token to you
You now have their access + refresh tokens
Full access to M365: mail, Teams, SharePoint
Refresh token lasts up to 90 days
No payload. No file. No endpoint compromise needed.

The devastating part: there is nothing to detect on the endpoint. No file was dropped. No process was spawned. The user visited a legitimate Microsoft domain and authenticated normally. The only indicator is an unusual OAuth token grant in the Azure AD sign-in logs, and most organisations are not monitoring for that.

3. Adversary in the Middle (AiTM)

MFA was supposed to be the answer to phishing. AiTM makes it irrelevant. You stand up a reverse proxy between the target and the real login page. The target clicks your link, sees the real Microsoft (or Okta, or Google) login page rendered through your proxy, enters their credentials, completes their MFA push, and authenticates normally. Your proxy captures the session cookie in transit. You replay the cookie and you are in.

aitm-flow.txt
ADVERSARY IN THE MIDDLE
Target <--> Your Proxy <--> Real Login Page
 
[1] Target enters username + password (proxied to real server)
[2] Real server prompts for MFA (proxied to target)
[3] Target approves MFA push (proxied to real server)
[4] Real server returns session cookie (proxied to target)
[5] Proxy captures the session cookie
 
Target is logged in normally. So are you.

The user did everything right. They checked the MFA prompt. They approved it on their phone. Didn't matter. You captured the authenticated session that comes after the MFA check. You are not stealing the second factor. You are stealing the result of a successful authentication. Tools like Evilginx have made this turnkey. Stand up a proxy, register a convincing domain, send the link, wait.

4. Teams External Messaging

By default, Microsoft 365 tenants allow external users to send Teams messages to anyone in the organisation. Most companies never change this setting. Think about what that means. You can skip the email gateway entirely. No spam filter. No safe links. No attachment scanning. Just a direct message that shows up in someone's Teams chat.

Users are trained to be suspicious of emails. Nobody has been through "Teams message phishing awareness training." The guard is completely down. A message from "IT Support" asking them to "verify their credentials on the new portal" or "install this required update" lands differently when it arrives in Teams instead of their inbox.

teams-bypass.txt
EMAIL VS TEAMS DELIVERY
Via Email:
Spam filter SCANNED
Safe Links REWRITTEN
Attachment sandbox DETONATED
DMARC/SPF/DKIM VALIDATED
Via Teams External Message:
Spam filter BYPASSED
Safe Links BYPASSED
Attachment sandbox BYPASSED
Email authentication NOT APPLICABLE

The fix is a single toggle in the M365 admin centre. Disable external access or restrict it to specific domains. Almost nobody does this because legitimate external collaboration depends on it. Convenience wins over security every time.

5. Callback Phishing

Zero indicators of compromise in the email. No link. No attachment. No payload. Just a message: "Your annual subscription of $499.99 renews tomorrow. If you did not authorise this charge, call +1-XXX-XXX-XXXX to cancel."

The target calls. Your operator walks them through a "cancellation process" that involves visiting a "secure cancellation portal" (your payload delivery page) or running a "verification tool" (your stager). The user downloads and runs it voluntarily. They are the delivery mechanism.

WHAT THE GATEWAY SEES
Plain text email
No links
No attachments
No macros
No embedded content
Verdict: CLEAN. Nothing to flag.
WHAT ACTUALLY HAPPENS
Target panics about $499 charge
Calls the number (your operator)
Guided to your payload delivery site
Downloads and runs "cancellation tool"
Initial access achieved
The human was the exploit.

This works because it exploits urgency, not curiosity. An unexpected charge triggers a stress response that bypasses rational thinking. The user is not evaluating whether the email is suspicious. They are trying to stop a $499 charge. By the time they are on the phone, they will do whatever your operator says. The email gateway has nothing to scan. Machine learning has nothing to flag. You are the delivery mechanism.

The Comparison

MethodBypasses GatewayBypasses MFAComplexity
HTML SmugglingYESNOLow
Device Code PhishYESYESLow
AiTM (Evilginx)PARTIALYESMedium
Teams ExternalYESNOVery Low
Callback PhishingYESNOLow (high social)

Two of these five methods bypass MFA entirely. Three of them have nothing for an email gateway to scan. One of them involves zero technical indicators whatsoever. The common thread: none of them rely on dropping a malicious file through email. That era is over.

The Takeaway

Initial access is an arms race, and right now the offence is winning. Every time Microsoft patches a delivery vector, operators find three more. The shift is clear: the best initial access methods in 2026 do not rely on dropping files. They abuse legitimate services, legitimate protocols, and human trust. The payload is almost an afterthought. The pretext is the weapon.

If you are still trying to get a macro-enabled document through an email gateway, you are fighting a war that ended years ago. Adapt or keep bouncing off the front door.

TradecraftEvasionActive Directory

This post reflects the state of initial access techniques as of early 2026. Microsoft and email gateway vendors continuously update their defences. Validate techniques against your target environment before relying on them.