🦦
Otter's Notes
Ctrlk
  • Introduction
  • Articles
    • Dumping data from the Microsoft Recall folder
    • Gaining persistence on Windows with Time Providers
    • Reverse engineering LSASS to decrypt DPAPI keys
    • Intro to Hypervisor Implants
    • In-depth Windows Telemetry
  • Notes
    • Active Directory
    • AAD
      • Useful Links
      • Overview of Azure & M365
      • Enumerate Users and Domains
      • Post-exploitation Reconnaissance
      • OAuth 2.0 Abuse
      • Abusing Device Code Authentication
      • Abusing Cloud Administrator Role
      • Abusing User Administrator Role
      • AAD Federated Backdoor
      • Service Principal Abuse
      • Compromising Azure Blobs and Storage Accounts
      • Malicious Device Join
      • Disabling Auditing (Unified Audit Logs)
      • Spoofing Azure Sign-In Logs
      • Registering Fake Agents for Log Spoofing
      • Pass the PRT
      • Pass the Cookie
      • Abusing Managed Identities
      • Virtual Machine Abuse
      • Attacking Key Vaults
    • Forest Trust Abuse
    • Kerberos
    • DACL Abuse
    • ADCS
    • PowerShell
    • AWS
    • Binary Exploitation
    • Kernel Development
Powered by GitBook
On this page
  1. Notes

AAD

Some (mostly) conceptual notes about AAD

Useful LinksOverview of Azure & M365Enumerate Users and DomainsPost-exploitation ReconnaissanceOAuth 2.0 AbuseAbusing Device Code AuthenticationAbusing Cloud Administrator RoleAbusing User Administrator RoleAAD Federated BackdoorService Principal AbuseCompromising Azure Blobs and Storage AccountsMalicious Device JoinDisabling Auditing (Unified Audit Logs)Spoofing Azure Sign-In LogsRegistering Fake Agents for Log SpoofingPass the PRTPass the CookieAbusing Managed IdentitiesVirtual Machine AbuseAttacking Key Vaults
PreviousLOLBIN EnumerationNextUseful Links