Cloud Hacking: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
(Created page with "== Office 365 & Azure == * Extremely in-depth technical info on everything https://o365blog.com * https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html * https://blog.xpnsec.com/azuread-connect-for-redteam * AAD Connect Cloud Sync: as local admin impersonate or retrieve managed password of the provagentgMSA account to dcsync. ** see: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Direc...")
 
mNo edit summary
Line 1: Line 1:
== Office 365 & Azure ==
== Amazon - AWS ==
* Extremely in-depth technical info on everything https://o365blog.com
* https://hackingthe.cloud/aws/general-knowledge/aws_organizations_defaults
 
== Microsoft - Azure ==
* https://hackingthe.cloud/azure/abusing-managed-identities
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html
* https://blog.xpnsec.com/azuread-connect-for-redteam
* https://blog.xpnsec.com/azuread-connect-for-redteam
Line 7: Line 10:
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md
* https://www.inversecos.com
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html


=== Tools ===
=== Microsoft Office 365 - o365 ===
* https://github.com/nyxgeek/o365recon
* Extremely in-depth technical info on everything https://o365blog.com
* https://github.com/dirkjanm/ROADtools
 
* https://github.com/fox-it/adconnectdump
== Google Cloud Platform - GCP ==
* https://github.com/LMGsec/o365creeper
* https://cloud.hacktricks.xyz/pentesting-cloud/gcp-security
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html
* https://hackingthe.cloud/gcp/general-knowledge/client-credential-search-order
* https://github.com/rvrsh3ll/TokenTactics
 
* https://github.com/nyxgeek/onedrive_user_enum
== Cloud Hacking Tools ==
* https://github.com/dafthack/MSOLSpray
* https://github.com/nyxgeek/o365recon - Retrieve information via O365 and AzureAD with a valid cred
* https://github.com/dafthack/MFASweep
* https://github.com/dirkjanm/ROADtools - A collection of Azure AD tools for offensive and defensive security purposes
* https://github.com/fox-it/adconnectdump - Dump Azure AD Connect credentials for Azure AD and Active Directory
* https://github.com/LMGsec/o365creeper - Python script that performs email address validation against Office 365 without submitting login attempts.  
* https://github.com/rvrsh3ll/TokenTactics - Azure JWT Token Manipulation Toolset
* https://github.com/nyxgeek/onedrive_user_enum - OneDrive user enumeration - pentest tool to enumerate valid o365 users
* https://github.com/dafthack/MSOLSpray - A password spraying tool for Microsoft Online accounts (Azure/O365)
* https://github.com/dafthack/MFASweep - A tool for checking if MFA is enabled on multiple Microsoft Services

Revision as of 20:45, 20 September 2023

Amazon - AWS

Microsoft - Azure

Microsoft Office 365 - o365

Google Cloud Platform - GCP

Cloud Hacking Tools