mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2025-12-28 13:43:24 -08:00
trasnlate other half
This commit is contained in:
@@ -404,3 +404,4 @@ Invoke-GraphRunner -Tokens $tokens
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -383,3 +383,4 @@ You **cannot** explicitly **deny** **access** to specific resources **using cond
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -205,3 +205,4 @@ pprint(microsoft_office_bearer_tokens_for_graph_api)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -111,3 +111,4 @@ az-lateral-movement-cloud-on-prem/az-phishing-primary-refresh-token-microsoft-en
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -151,3 +151,4 @@ Follow this link for the [**installation instructions**](https://www.powershellg
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -73,3 +73,4 @@ At this point, we can gather the remaining information needed to connect to Azur
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -41,3 +41,4 @@ Considering the storage of sensitive data in plaintext, it's crucial to secure t
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -41,3 +41,4 @@ Main.py [-h] --usercert USERCERT --certpass CERTPASS --remoteip REMOTEIP
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -39,3 +39,4 @@ Just navigate to login.microsoftonline.com and add the cookie **`ESTSAUTHPERSIST
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -9,3 +9,4 @@
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -9,3 +9,4 @@
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -39,3 +39,4 @@ curl -s -H "Authorization: Bearer <token>" 'https://graph.microsoft.com/v1.0/sit
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -9,3 +9,4 @@ To start the tests you should have access with a user with **Reader permissions
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user