window.location='https://www.youtube.com/watch?v=dQw4w9WgXcQ'| aadinternals.com
Tenant information This Open-source Intelligence (OSINT) tool will extract openly available information for the given tenant. The tool is using APIs mentioned in my previous blog post and in MS Graph API documentation. Domain details is returned only for the 20 first domains. For complete recon information, please use AADInternals PowerShell module. Note: CBA status is valid ONLY if email of an existing user is given. Using tenant id, domain name, or email of non-existing user may show false ...| AADInternals.com
On this page you’ll find recordings and slides from my conference talks around the 🌎🌏🌍. Enjoy!| AADInternals.com
imageMapResize(); Introduction According to Verizon’s Data Breach Investigations Report 2020, externals attackers are considerable more common than internal attackers. In the cloud era, attacking the organisation from the outside is much more difficult, if not impossible. Therefore, to be able to access organisation’s data, one must gain some level of legitimate access to the organisation. The Azure AD and Microsoft 365 kill chain is a collection of recon techniques and hacking tools I’...| AADInternals.com
Tools for hacking and administering Azure AD & Microsoft 365| AADInternals.com
Important links| aadinternals.com
AAD Internals PowerShell module| aadinternals.com