Unauthenticated Recon
Last updated
Last updated
With just a e-mail address or domain we can get the following information:
https://login.microsoftonline.com/getuserrealm.srf?login=%5bUSERNAME@DOMAIN%5d&xml=1
https://login.microsoftonline.com/[DOMAIN]/.well-known/openid-configuration
https://login.microsoftonline.com/common/GetCredentialType
It is a PS module that you can use for multiple attacks against AzureAD
Import-Module AADInternals.psd1 -Verbose
Invoke-AADIntReconAsOutsider -DomainName pp.onmicrosoft.com
Tenant brand: Defense Corporation
Tenant name: pp
Tenant id: 2d50cb29-5f7b-48a4-87ce-fkk49d321
DesktopSSO enabled: False
Name : pp.onmicrosoft.com
DNS : True
MX : True
SPF : True
DMARC : False
Type : Managed
STS :
C:\Python27\python.exe C:\AzAD\Tools\o365creeper\o365creeper.py -f C:\AzAD\Tools\emails.txt
test@pp.onmicrosoft.com - VALID
pp.onmicrosoft.com - INVALID
python.exe omnispray.py --type enum -uf ../users.txt --module o365_enum_office
Azure services are available at specific domains and subdomains. We can enumerate services by finding subdomains.
MicroBurst is a useful tool for security assessment for Azure. It uses Az, AzureAD, AzurRM ans MSOL tools and additional REST API calls.
Import-Module MicroBurst.psm1
Enumerate Subdomains:
Invoke-EnumerateAzureSubDomains -Base pp -Verbose
VERBOSE: Found pp.onmicrosoft.com
VERBOSE: Found pp.onmicrosoft.com
VERBOSE: Found pp.onmicrosoft.com
VERBOSE: Found pp.mail.protection.outlook.com
VERBOSE: Found pp.mail.protection.outlook.com
VERBOSE: Found pp.mail.protection.outlook.com
python3 azsubenum.py -b megabigtech --thread 10