All Projects → 0x09AL → AzureCLI-Extractor

0x09AL / AzureCLI-Extractor

Licence: other
A tool to extract and abuse access tokens from AzureCLI for bypassing 2FA/MFA.

Programming Languages

C#
18002 projects

Projects that are alternatives of or similar to AzureCLI-Extractor

Passcat
Passwords Recovery Tool
Stars: ✭ 164 (+281.4%)
Mutual labels:  redteam
Fudgec2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+344.19%)
Mutual labels:  redteam
Cobalt Arsenal
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
Stars: ✭ 230 (+434.88%)
Mutual labels:  redteam
Aboutsecurity
A list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (+286.05%)
Mutual labels:  redteam
Remote Desktop Caching
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (+297.67%)
Mutual labels:  redteam
Doxycannon
A poorman's proxycannon and botnet, using docker, ovpn files, and a dante socks5 proxy
Stars: ✭ 216 (+402.33%)
Mutual labels:  redteam
Invoke Apex
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (+276.74%)
Mutual labels:  redteam
Credsleaker
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
Stars: ✭ 247 (+474.42%)
Mutual labels:  redteam
Cypheroth
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
Stars: ✭ 179 (+316.28%)
Mutual labels:  redteam
Leakscraper
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Stars: ✭ 227 (+427.91%)
Mutual labels:  redteam
Taie Redteam Os
泰阿安全实验室-基于XUbuntu私人订制的红蓝对抗渗透操作系统
Stars: ✭ 170 (+295.35%)
Mutual labels:  redteam
Stracciatella
OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup
Stars: ✭ 171 (+297.67%)
Mutual labels:  redteam
Serpentine
C++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (+402.33%)
Mutual labels:  redteam
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (+286.05%)
Mutual labels:  redteam
Cobalt Strike Cheatsheet
Some notes and examples for cobalt strike's functionality
Stars: ✭ 241 (+460.47%)
Mutual labels:  redteam
Redteam Hardware Toolkit
🔺 Red Team Hardware Toolkit 🔺
Stars: ✭ 163 (+279.07%)
Mutual labels:  redteam
Dns Persist
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
Stars: ✭ 191 (+344.19%)
Mutual labels:  redteam
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+486.05%)
Mutual labels:  redteam
I See You
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+472.09%)
Mutual labels:  redteam
Malwless
Test Blue Team detections without running any attack.
Stars: ✭ 215 (+400%)
Mutual labels:  redteam

AzureCLI-Extractor

AzureCLI-Extractor abuses the insecure storage of AzureCLI access and refresh tokens, bypassing Multi-Factor Authentication to create a new global administrator.

AzureCLI

AzureCLI is a command-line tool which allows system administrators to easily manage Azure Sources. Additionally, this tool is designed to be easy to learn but powerful enough to build custom automation using Azure Resources. Before using any of the features of the tool, the users needs to sign in with the az login command. This type authentication supports Multi-Factor Authentication and is the most popular one. When a user tries to login, Azure-CLI opens an Azure sign-in page which will allow you to sign in, and after a successful login, it will send the Access Token Information on a local web server it started.

As can bee seen from the image below the tokens are stored in clear-text.

Technically, this is not a vulnerability as that's how it's supposed to work. The behaviour can be improved by saving the access and refresh tokens only when, the users specifies so.

In case an attacker manages to extract the content of the accessToken.json file, by compromising a backup server, using a file read primitive etc. This tool can be used to create a new Global Admin account. Since it uses the Graph API to create the user, it will bypass Multi-Factor authentication.

Usage

AzureCLI-Extractor supports the following commands :

  • adduser - Adds a Global Admin User.

    • -d, --displayname Required. User display name.

    • -u, --username Required. Account username.

    • -a, --accountprincipal Required. The account principal name. It should be something like [email protected] / [email protected] .

    • -p, --password Required. Account password.

    • --help Display this help screen.

    • --version Display version information.

  • gettoken - Retrieve an updated user access token.

Example

Retrieve an updated token.

Add a new global admin user.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].