@424f424f
github.com/rvrsh3ll
medium.com/@rvrsh3ll
https://enterpriseattack.futuresec.io/
https://slides.com/rvrsh3ll/azure-console
Black Hills Information Security
Beware of the terms of service. Microsoft may suspend and ban your subscription for violations such as hosting malware and domain fronting.
https://learn.microsoft.com/en-us/azure/cloud-shell/overview
az group create --name myResourceGroup --location eastus
az vm create -n MyVm -g MyResourceGroup --image UbuntuLTS --generate-ssh-keys --public-ip-sku Standard
microsoft.com/devicelogin
Receive access and refresh tokens from device logins
RefreshTo-OtherServices
Read / Send Email
Read / Send Teams
Enumerate AzureAD
https://github.com/rvrsh3ll/TokenTactics
Co-Developer @0xBoku
Assortment of Azure apps
Easily deployable with Az
Phishing sites*
Drive-by downloads*
C2 redirection*
*.azurewebsites.net
Dynamic Device Codes
* Subject to Microsoft Terms of Use
https://github.com/rvrsh3ll/Azure-App-Tools
Azure Log - Source IP
Azure Log - Source IP
https://www.blackhillsinfosec.com/dynamic-device-code-phishing/
Send-MailMessage -SmtpServer company-com.mail.protection.outlook.com -From company@service-now.com
-To administrator@company.com -Subject "Ticket for upgrade" -Message "Totally legit" -Attachment .\ClickMe.rdp
https://sender.office.com/
Token Audience
User and Permissions
2. Switch Audience
POST /owa/ HTTP/2
Host: outlook.office.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:106.0) Gecko/20100101 Firefox/106.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 2703
Referer: https://login.microsoftonline.com/
Origin: https://login.microsoftonline.com
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Te: trailers
code=0.A&id_token=ey
https://github.com/rvrsh3ll/TokenTactics/blob/main/resources/example_requests/owa_request_v2.txt
https://www.trustedsec.com/blog/hacking-your-cloud-tokens-edition-2-0/
https://github.com/dirkjanm/ROADtools
https://github.com/BloodHoundAD/BARK
https://github.com/BloodHoundAD/AzureHound
https://github.com/Flangvik/TeamFiltration
steve@blackhillsinfosec.com
https://futuresec.io