Recon

The goal of external recon for Azure/O365 environments should be to determine the following about a client:

  • Tenant ID

  • Tenant name

  • Azure services, such as storage accounts and associated containers

  • Valid email addresses/IDs

Automated Recon

The AADInternalsarrow-up-right PowerShell module can handle the majority of external recon about a tenant. There is an online version of the basic recon cmdlet hosted at https://osint.aadinternals.com/arrow-up-right.

# Full recon
Invoke-AADIntReconAsOutsider -DomainName jotter.onmicrosoft.com

# Tenant name, authentication type, domain name
Get-AADIntLoginInformation -UserName root@defcorphq.onmicrosoft.com

# Tenant ID
Get-AADIntTenantID -Domain defcorphq.onmicrosoft.com

MicroBurstarrow-up-right allows for the enumeration of Azure Services through subdomain lookups.

# DO NOT INCLUDE TLD
Invoke-EnumerateAzureSubDomains -Base jotter -Verbose
Invoke-EnumerateAzureBlobs -Base jotter

It's possible to discover a publicly accessible storage account, but further access to blobs or files requires enumeration of account containers. Basicblobfinderarrow-up-right is a straightforward tool for this process.

You can always confirm attribution of a storage account with a tenant ID via a curl request.

TREVORsprayarrow-up-right is a great tool to enumerate valid emails via OneDrive. Keep in mind that not all users in an Entra tenant may have OneDrive, but these are typically your most important targets regardless.

Last updated