Skip to content

Reconnaissance

Network discovery

DNS reconnaissance

DNS reconnaissance

Certificate transparency

Miscellaneous

Shodan

Eyewitness

GitHub - FortyNorthSecurity/EyeWitness: EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.

Azure Discovery

Finding tenantID

Azure IP ranges

Download Azure IP Ranges and Service Tags – Public Cloud from Official Microsoft Download Center

OpenID configuration document

Scrape Azure Resources

GitHub - lutzenfried/CloudScraper: CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.

Google Dorks

Public repositories and leaked credentials

Enumeration

Public Storage Accounts Enumeration

OneDrive Enumeration

Service Enumeration

Subdomain Takeover

User enumeration

Shadow Admin / Privileged Users Enumeration

Secrets in Azure

Not sure if this still works: GitHub - FSecureLABS/Azurite: Enumeration and reconnaissance activities in the Microsoft Azure Cloud. 

Find credentials in

  • Environment variables or source code (Azure Function)
  • .publishsettings
  • Web & app config
 $users = Get-MsolUser -All; foreach($user in $users){$props = @();$user | Get-Member | foreach-object{$props+=$_.Name}; foreach($prop in $props){if($user.$prop -like "*password*"){Write-Output ("[*]" + $user.UserPrincipalName + "[" + $prop + "]" + " : " + $user.$prop)}}}

Initial Access Attack

Password spraying

Bypass conditional access

Instance Metadata Service

Phishing

Lateral movement

Privilege escalation

Persistence

Last update: 2023-11-09
Created: November 9, 2023 18:17:11