🦦
Otter's Notes
search
⌘Ctrlk
🦦
Otter's Notes
  • Introduction
  • Articles
    • Dumping data from the Microsoft Recall folder
    • Gaining persistence on Windows with Time Providers
    • Reverse engineering LSASS to decrypt DPAPI keys
    • Intro to Hypervisor Implants
    • In-depth Windows Telemetry
  • Notes
    • Active Directory
    • AAD
      • Useful Links
      • Overview of Azure & M365
      • Enumerate Users and Domains
      • Post-exploitation Reconnaissance
      • OAuth 2.0 Abuse
      • Abusing Device Code Authentication
      • Abusing Cloud Administrator Role
      • Abusing User Administrator Role
      • AAD Federated Backdoor
      • Service Principal Abuse
      • Compromising Azure Blobs and Storage Accounts
      • Malicious Device Join
      • Disabling Auditing (Unified Audit Logs)
      • Spoofing Azure Sign-In Logs
      • Registering Fake Agents for Log Spoofing
      • Pass the PRT
      • Pass the Cookie
      • Abusing Managed Identities
      • Virtual Machine Abuse
      • Attacking Key Vaults
    • Forest Trust Abuse
    • Kerberos
    • DACL Abuse
    • ADCS
    • PowerShell
    • AWS
    • Binary Exploitation
    • Kernel Development
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Noteschevron-right
  2. AAD

Useful Links

  • List of Managed Identitiesarrow-up-right

  • Web applications

    • Portal.azure.com

    • admin.exchange.microsoft.com

    • compliance.microsoft.com

    • security.microsoft.com

  • Graph Explorerarrow-up-right

  • Graph PWSH SDK Documentationarrow-up-right

  • MSOnline PWSH Module documentationarrow-up-right

  • AzureCLI PSWH Modulearrow-up-right

  • JWT Decoderarrow-up-right for PRTs

  • Non-comprehensive List of Azure DNS suffixesarrow-up-right

  • Custom Bloodhound Queries for Azurearrow-up-right

PreviousAADchevron-leftNextOverview of Azure & M365chevron-right

Last updated 1 year ago