mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-01-10 04:05:09 -08:00
translate 2
This commit is contained in:
@@ -403,4 +403,3 @@ Invoke-GraphRunner -Tokens $tokens
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -382,4 +382,3 @@ You **cannot** explicitly **deny** **access** to specific resources **using cond
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -203,4 +203,3 @@ pprint(microsoft_office_bearer_tokens_for_graph_api)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -110,4 +110,3 @@ az-lateral-movement-cloud-on-prem/az-phishing-primary-refresh-token-microsoft-en
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -150,4 +150,3 @@ Follow this link for the [**installation instructions**](https://www.powershellg
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -66,4 +66,3 @@ This tool allows to perform several actions like register a machine in Azure AD
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -72,4 +72,3 @@ At this point, we can gather the remaining information needed to connect to Azur
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -40,4 +40,3 @@ Considering the storage of sensitive data in plaintext, it's crucial to secure t
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -40,4 +40,3 @@ Main.py [-h] --usercert USERCERT --certpass CERTPASS --remoteip REMOTEIP
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -38,4 +38,3 @@ Just navigate to login.microsoftonline.com and add the cookie **`ESTSAUTHPERSIST
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -8,4 +8,3 @@
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -8,4 +8,3 @@
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -38,4 +38,3 @@ curl -s -H "Authorization: Bearer <token>" 'https://graph.microsoft.com/v1.0/sit
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -50,4 +50,3 @@ Check it in the original post: [https://dirkjanm.io/obtaining-domain-admin-from-
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -10,4 +10,3 @@ The blog post discusses a privilege escalation vulnerability in Azure AD, allowi
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -33,4 +33,3 @@ An automatically, this user will be **synced from AzureAD to the on-prem AD user
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -162,4 +162,3 @@ Open-AADIntOffice365Portal -ImmutableID "aodilmsic30fugCUgHxsnK==" -Issuer http:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -123,4 +123,3 @@ seamless-sso.md
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -285,4 +285,3 @@ roadrecon auth --prt-cookie <cookie> --prt-context <context> --derives-key <deri
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -8,4 +8,3 @@ To start the tests you should have access with a user with **Reader permissions
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user