SSPR/MFA

What Is SSPR

Attack

If you have control of an MFA method that is available to a user, you can reset their password without knowing their password.

Detect

Hunt for known bad MFA devices

Below scripts lists all MFA methods by every user and lists their properties.

What logs are available?

Audit Logs:

Password is not required for SSPR, only an alternate authentication method.

SSPR activity flow:

  1. User submitted their user ID

  2. User was presented with verification options

  3. User started the mobile app code verification option

  4. User completed the mobile app code verification option

  5. User completed all verification steps required to reset their password

  6. User submitted a new password

  7. Reset user password

  8. Update StsRefreshTokenValidFrom Timestamp

  9. Successfully completed reset.

First MFA:

AuthenticationFlavor is updated from null, to authenticator (not sure why):

  • "AuthenticatorFlavor":null,

  • "AuthenticatorFlavor":"Authenticator",

LastAuthenticatedTimestamp is sometimes updated (note sure when):

  • "LastAuthenticatedTimestamp":"2023-10-25T06:38:08.344692Z",

  • "LastAuthenticatedTimestamp":"2024-12-12T12:38:08.344692Z",

Get audit log details, OData queries not support for filtering. Will have to get through graph explorer and copy paste to .txt file.

Sign-In Logs:

Mitigate

Last updated