- Active Directory Leaks via Azure https://www.blackhillsinfosec.com/red-teaming-microsoft-part-1-active-directory-leaks-via-azure/ 27 comments netsec
Linking pages
Linked pages
- Microsoft Azure https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/SignIns 187 comments
- JMESPath — JMESPath http://jmespath.org 151 comments
- Cloud Computing Services | Microsoft Azure https://azure.microsoft.com 47 comments
- GitHub - ustayready/CredSniper: CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens. https://github.com/ustayready/credsniper 30 comments
- Sign in to your account https://microsoft.com/devicelogin 0 comments
- GitHub - dafthack/MailSniper: MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used as a non-administrative user to search their own email, or by an administrator to search the mailboxes of every user in a domain. https://github.com/dafthack/MailSniper 0 comments
Related searches:
Search whole site: site:blackhillsinfosec.com
Search title: Red Teaming Microsoft: Part 1 - Active Directory Leaks via Azure - Black Hills Information Security
See how to search.