PATT Migration - v0.3

pull/1/head
Swissky 2023-11-18 00:46:19 +01:00
parent e04303cbfe
commit 9730a65811
6 changed files with 17 additions and 12 deletions

View File

@ -1,4 +1,4 @@
# Microsoft Entra ID / Azure Active Directory
# Azure AD Tokens
## Access Token

View File

@ -1,4 +1,4 @@
# IAM
# Azure AD IAM
> Root Management Group (Tenant) > Management Group > Subscription > Resource Group > Resource

View File

@ -1,4 +1,6 @@
# OSINT AAD - Recon Domains
# Azure AD Enumerate
## OSINT AAD - Recon Domains
Extract openly available information for the given tenant: https://aadinternals.com/osint/
@ -7,7 +9,7 @@ Invoke-AADIntReconAsOutsider -Domain "company.com" | Format-Table
Invoke-AADIntReconAsOutsider -UserName "user@company.com" | Format-Table
```
# Azure AD - Collectors
## Azure AD - Collectors
* roadrecon
```ps1
@ -20,11 +22,11 @@ Invoke-AADIntReconAsOutsider -UserName "user@company.com" | Format-Table
```
# Azure AD - Conditionnal Access
## Azure AD - Conditionnal Access
Enumerate Conditionnal Access Policies: `roadrecon plugin policies`
# Azure AD - MFA
## Azure AD - MFA
* [dafthack/MFASweep](https://github.com/dafthack/MFASweep) - A tool for checking if MFA is enabled on multiple Microsoft Services
```ps1

View File

@ -1,4 +1,6 @@
# Illicit Consent Grant
# Azure AD Phishing
# Device Code Phishing
## Illicit Consent Grant
## Device Code Phishing

View File

@ -1,13 +1,14 @@
# Azure Runbook
# Azure Services
## Azure Runbook
Runbook must be SAVED and PUBLISHED before running it.
## Office 365
# Office 365
## Extracting Microsoft Teams Messages
### Extracting Microsoft Teams Messages
```ps1
TokenTacticsV2> RefreshTo-MSTeamsToken -domain domain.local