🦦
Otter's Notes
search
⌘Ctrlk
🦦
Otter's Notes
  • Introduction
  • Articles
    • Dumping data from the Microsoft Recall folder
    • Gaining persistence on Windows with Time Providers
    • Reverse engineering LSASS to decrypt DPAPI keys
    • Intro to Hypervisor Implants
    • In-depth Windows Telemetry
  • Notes
    • Active Directory
    • AAD
      • Useful Links
      • Overview of Azure & M365
      • Enumerate Users and Domains
      • Post-exploitation Reconnaissance
      • OAuth 2.0 Abuse
      • Abusing Device Code Authentication
      • Abusing Cloud Administrator Role
      • Abusing User Administrator Role
      • AAD Federated Backdoor
      • Service Principal Abuse
      • Compromising Azure Blobs and Storage Accounts
      • Malicious Device Join
      • Disabling Auditing (Unified Audit Logs)
      • Spoofing Azure Sign-In Logs
      • Registering Fake Agents for Log Spoofing
      • Pass the PRT
      • Pass the Cookie
      • Abusing Managed Identities
      • Virtual Machine Abuse
      • Attacking Key Vaults
    • Forest Trust Abuse
    • Kerberos
    • DACL Abuse
    • ADCS
    • PowerShell
    • AWS
    • Binary Exploitation
    • Kernel Development
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Notes

AAD

Some (mostly) conceptual notes about AAD

Useful Linkschevron-rightOverview of Azure & M365chevron-rightEnumerate Users and Domainschevron-rightPost-exploitation Reconnaissancechevron-rightOAuth 2.0 Abusechevron-rightAbusing Device Code Authenticationchevron-rightAbusing Cloud Administrator Rolechevron-rightAbusing User Administrator Rolechevron-rightAAD Federated Backdoorchevron-rightService Principal Abusechevron-rightCompromising Azure Blobs and Storage Accountschevron-rightMalicious Device Joinchevron-rightDisabling Auditing (Unified Audit Logs)chevron-rightSpoofing Azure Sign-In Logschevron-rightRegistering Fake Agents for Log Spoofingchevron-rightPass the PRTchevron-rightPass the Cookiechevron-rightAbusing Managed Identitieschevron-rightVirtual Machine Abusechevron-rightAttacking Key Vaultschevron-right
PreviousLOLBIN Enumerationchevron-leftNextUseful Linkschevron-right