Azure

Azure Pentesting

Azure AD / Entra ID

Windows server AD vs Azure AD

Windows Server AD

Azure AD

LDAP

Rest APIs

NTLM

OAuth/SAML

Kerberos

OpenID

OU Tree

Flat Structure

Domains and Forests

Tenants

Trusts

Guests

MindMap

MSFTRecon

Comprehensive enumeration without requiring authentication, helping identify potential security misconfigurations and attack vectors.

Kill Chain

OSINT

https://aadinternals.com/talks/DEFCON31_Azure%20AD%20OSINT.pdf

Azure Blob Container

Subdomain Enum

PS C:\mcrtp_bootcamp_tools\Microburst> Import-Module .\MicroBurst.psm1

PS C:\mcrtp_bootcamp_tools\Microburst> Invoke-EnumerateAzureSubDomains -Base megabigtech -Verbose

From on-prem AD

Azure AD / Entra ID

Bruteforce O365

O365 Bruteforce

MFA enabled ?

O365 Script

M365AdminAccessReviewer

Roadrecon

pipx install roadrecon

Misconfiguration

Maester

Nuclei Templates

Monkey365

ScubaGear

IAM Privilege Escalation Identification Tool

BlueMap

AzureRT - A Powershell module implementing various Azure Red Team tactics

MicroBurst - A PowerShell Toolkit for Attacking Azure

ROADtools

APEX

PowerZure

MicroBurst

Post Exploitation

Azure AD / Entra ID

Interesting Book

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Interesting Books

Resources

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

Last updated