Authenticated Recon

Automation

o365Recon

Automate all of the below commands with o365Recon.

AzureBloodHound

Visualize recon.

Custom queries for Azure are helpful.

AADInternals

Subscriptions

SharePoint

Service Principals

Conditional Access Policies

What is it?

Conditional Access Policies are stored and displayed as JSON.

Policy named geolocation that enables MFA for all users.

MFASweep/Conditional Access Policies

Uses APIs to see if a user can authenticate or is blocked by Access Policies.

MFASweep output

Unified Audit Log Settings

Important to know what traces your leaving behind for defense evasion.

Enumerate Users

Obtaining detailed information on a user can help identify their location for Conditional Access Policy bypasses.

Get-ADDIntUsers | Select UserPrincipalName, ObjectID, ImmuatableID

Enumerating Administrators

Get-AADIntGlocalAdmins

Enumerating Sync Account

Detect

  • API calls are not logged within Azure, so AADInternals will not detected.

  • Azure Sign-Ins are logged but difficult to baseline.

Interactive
Non-Interactive
  • Application header can be forged, so it is unreliable to baseline.

Below is a list of Application IDs and their name used for sign-ins.

Last updated