TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Red Teaming Microsoft: Part 1 – Active Directory Leaks via Azure

BHIS · 2018-08-31 · Read original ↗

ATT&CK techniques detected

5 predictions
T1087Account Discovery
71%
"findpeople and getpeoplefilter web service methods in owa. these techniques have been an excellent resource for red teamers but they definitely have their limitations on what data is available, how long it takes to enumerate users, how loud it is due to the number of web requests…"
T1525Implant Internal Image
53%
"output = json - - query = ' [ ]. { created : createddatetime, upn : userprincipalname, name : displayname, title : jobtitle, department : department, email : mail, userid : mailnickname, phone : telephonenumber, mobile : mobile, enabled : accountenabled } ' - - group = ' < group …"
T1087.003Email Account
45%
"users based on their access so that escalation can be accomplished. but what if you aren ’ t on the internal network but still need to determine who to target? even better, what if the target gems of the organization are hosted in the cloud and you never actually have to hit the …"
T1525Implant Internal Image
39%
"left panel, choose ‘ azure active directory ’ step 3 ) select ‘ users settings ’ step 4 ) select ‘ restrict access to azure ad administration portal ’ an alternative is to look into conditional access policies : https : / / docs. microsoft. com / en - us / azure / active - direct…"
T1059.009Cloud API
30%
"##i is a quick and easy way to authenticate against the oauth for azure while also quickly exporting the raw data. in this post, we will focus on this solution. azure powershell with a rise in awesome powershell tools like powershell empire and mailsniper, i ’ m amazed that azure…"

Summary

Mike Felch // With so many Microsoft technologies, services, integrations, applications, and configurations it can create a great deal of difficulty just to manage everything. Now imagine trying to secure […]

The post Red Teaming Microsoft: Part 1 – Active Directory Leaks via Azure appeared first on Black Hills Information Security, Inc..