🦦
Otter's Notes
Ctrlk
  • Introduction
  • Articles
    • Dumping data from the Microsoft Recall folder
    • Gaining persistence on Windows with Time Providers
    • Reverse engineering LSASS to decrypt DPAPI keys
    • Intro to Hypervisor Implants
    • In-depth Windows Telemetry
  • Notes
    • Active Directory
    • AAD
      • Useful Links
      • Overview of Azure & M365
      • Enumerate Users and Domains
      • Post-exploitation Reconnaissance
      • OAuth 2.0 Abuse
      • Abusing Device Code Authentication
      • Abusing Cloud Administrator Role
      • Abusing User Administrator Role
      • AAD Federated Backdoor
      • Service Principal Abuse
      • Compromising Azure Blobs and Storage Accounts
      • Malicious Device Join
      • Disabling Auditing (Unified Audit Logs)
      • Spoofing Azure Sign-In Logs
      • Registering Fake Agents for Log Spoofing
      • Pass the PRT
      • Pass the Cookie
      • Abusing Managed Identities
      • Virtual Machine Abuse
      • Attacking Key Vaults
    • Forest Trust Abuse
    • Kerberos
    • DACL Abuse
    • ADCS
    • PowerShell
    • AWS
    • Binary Exploitation
    • Kernel Development
Powered by GitBook
On this page
  1. Notes
  2. AAD

Useful Links

  • List of Managed Identities

  • Web applications

    • Portal.azure.com

    • admin.exchange.microsoft.com

    • compliance.microsoft.com

    • security.microsoft.com

  • Graph Explorer

  • Graph PWSH SDK Documentation

  • MSOnline PWSH Module documentation

  • AzureCLI PSWH Module

  • JWT Decoder for PRTs

  • Non-comprehensive List of Azure DNS suffixes

  • Custom Bloodhound Queries for Azure

PreviousAADNextOverview of Azure & M365

Last updated 1 year ago