Pentesting Azure Active Directory
Unauthenticated Recon
User Email Enumeration
python3 onedrive_enum.py -U users.txt -d companyname.com -v If the output urls gave us 404 File Not Found , that mean it's a bad/invalid users or
If it redirect to sigin page, that mean it's a valid user account.
Valid Email Enumeration
python3 o365creeper.py -e test@email.com
python3 o365creeper.py -f email-list.txt -o validated-out-file.txtCloud Enum
python3 cloud_enum.py -k tesla --disable-aws --disable-gcpPassword Spraying

Authenticated Recon
First, we need to install Azure Az powershell module
Connect Azure account with Connect-AzAccount

Enumerating with Powershell
Continues...
Last updated