🦦
Otter's Notes
search
⌘Ctrlk
🦦
Otter's Notes
  • otterIntroduction
  • Articles
    • bombDumping data from the Microsoft Recall folder
    • bombGaining persistence on Windows with Time Providers
    • magnifying-glassReverse engineering LSASS to decrypt DPAPI keys
    • magnifying-glassIntro to Hypervisor Implants
    • magnifying-glassIn-depth Windows Telemetry
    • bombWindows of Opportunity: exploiting race conditions in Seclogon to dump LSASS
  • Notes
    • Active Directory
    • AAD
      • Useful Links
      • Overview of Azure & M365
      • Enumerate Users and Domains
      • Post-exploitation Reconnaissance
      • OAuth 2.0 Abuse
      • Abusing Device Code Authentication
      • Abusing Cloud Administrator Role
      • Abusing User Administrator Role
      • AAD Federated Backdoor
      • Service Principal Abuse
      • Compromising Azure Blobs and Storage Accounts
      • Malicious Device Join
      • Disabling Auditing (Unified Audit Logs)
      • Spoofing Azure Sign-In Logs
      • Registering Fake Agents for Log Spoofing
      • Pass the PRT
      • Pass the Cookie
      • Abusing Managed Identities
      • Virtual Machine Abuse
      • Attacking Key Vaults
    • Forest Trust Abuse
    • Kerberos
    • DACL Abuse
    • ADCS
    • PowerShell
    • AWS
    • Binary Exploitation
    • Kernel Development
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Notes

AAD

Some (mostly) conceptual notes about AAD

Useful Linkschevron-rightOverview of Azure & M365chevron-rightEnumerate Users and Domainschevron-rightPost-exploitation Reconnaissancechevron-rightOAuth 2.0 Abusechevron-rightAbusing Device Code Authenticationchevron-rightAbusing Cloud Administrator Rolechevron-rightAbusing User Administrator Rolechevron-rightAAD Federated Backdoorchevron-rightService Principal Abusechevron-rightCompromising Azure Blobs and Storage Accountschevron-rightMalicious Device Joinchevron-rightDisabling Auditing (Unified Audit Logs)chevron-rightSpoofing Azure Sign-In Logschevron-rightRegistering Fake Agents for Log Spoofingchevron-rightPass the PRTchevron-rightPass the Cookiechevron-rightAbusing Managed Identitieschevron-rightVirtual Machine Abusechevron-rightAttacking Key Vaultschevron-right
PreviousLOLBIN Enumerationchevron-leftNextUseful Linkschevron-right