diff --git a/src/pentesting-cloud/azure-security/az-services/az-azuread.md b/src/pentesting-cloud/azure-security/az-services/az-azuread.md index d8e4dc58d..1cfedb5d7 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-azuread.md +++ b/src/pentesting-cloud/azure-security/az-services/az-azuread.md @@ -152,7 +152,8 @@ curl "$IDENTITY_ENDPOINT?resource=https://vault.azure.net&api-version=2017-09-01 {{#endtab }} {{#tab name="MS Graph" }} -```powershellGet-MgTenantRelationshipDelegatedAdminCustomer +```bash +Get-MgTenantRelationshipDelegatedAdminCustomer # Install the Microsoft Graph PowerShell module if not already installed Install-Module Microsoft.Graph -Scope CurrentUser @@ -296,7 +297,7 @@ curl -X GET "https://graph.microsoft.com/beta/roleManagement/directory/roleDefin {{#tab name="MS Graph" }} -```powershell +```bash # Enumerate users using Microsoft Graph PowerShell Get-MgUser -All @@ -455,7 +456,7 @@ Get-AzRoleAssignment -ResourceGroupName {{#endtab }} {{#tab name="MS Graph" }} -```powershell +```bash # Enumerate groups using Microsoft Graph PowerShell Get-MgGroup -All @@ -591,7 +592,7 @@ $RequestParams = @{ {{#endtab }} {{#tab name="MS Graph" }} -```powershell +```bash # Get Service Principals using Microsoft Graph PowerShell Get-MgServicePrincipal -All @@ -802,7 +803,7 @@ Get-AzADAppCredential {{#tab name="MS Graph" }} -```powershell +```bash # List Applications using Microsoft Graph PowerShell Get-MgApplication -All @@ -906,7 +907,7 @@ az role assignment list --all --query "[?principalName=='admin@organizationadmin {{#tab name="MS Graph" }} -```powershell +```bash # List all available role templates using Microsoft Graph PowerShell Get-MgDirectoryRoleTemplate -All @@ -1047,7 +1048,7 @@ Get-AzureADMSScopedRoleMembership -Id | fl * {{#endtab }} {{#tab name="MS Graph" }} -```powershell +```bash # Enumerate devices using Microsoft Graph PowerShell Get-MgDevice -All