Unauthenticated Recon
Last updated
Last updated
Goals an outsider wants to enumerate:
User login information
Resources that exist
Desktop SSO Info
Domain names
Tenant names and information
Enumeration focuses on exposed APIs and public DNS suffixes assigned by Microsoft.
login.microsoftonline.com/<domain>/.well-known/openid-configuration
Login information, including tenant ID
Get-AADIntTenantID -Domain <domain>
autodiscover-s.outlook.com/autodiscover/autodiscover.svc
All domains of the tenant
Get-AADIntTenantDomains -Domain <domain>
login.microsoftonline.com/GetUserRealm.srf?login=<UserName>
Login information of the tenant, including tenant Name and domain authentication type
Get-AADIntLoginInformation -UserName <UserName>
login.microsoftonline.com/common/GetCredentialType
Login information, including Desktop SSO information
Get-AADIntLoginInformation -UserName <UserName>
Visit the following URL and replace DOMAIN with domain name.
Tenant ID is public information.
Awesome Azure Pentest
Cloud-Azure PayloadsAllTheThings
AADInternals by @DrAzureAD
MicroBurst (NetSPI)
BlobHunter (CyberArk)
Cloud Enum
MFASweep
O365Recon
AzureHound
Custom Bloodhound Queries for Azure
IS NOT LOGGED
DNS Queries are not logged in Azure.
API and Tenant ID queries won't be logged.
IS LOGGED
Account sign-in attempts.
Sign-in activity is recorded in
Active Directory/Entra ID > Monitoring > Sign-in logs