Automated Recon

ROAD Tools

  • RoadRecon (https://github.com/dirkjanm/ROADtools) is a tool for enumerating Entra ID environments!

  • RoadRecon uses a different version '1.61-internal' of AADGraph API that provides more information.

  • Enumeration using RoadRecon includes three steps

    • Authentication

    • Data Gathering

    • Data Exploration

  • roadrecon supports username/password, access and refresh tokens, device code flow (sign-in from another device) and PRT cookie.

cd C:\\AzAD\\Tools\\ROADTools
.\\venv\\Scripts\\activate
roadrecon auth -u [test@defcorphq.onmicrosoft.com](<mailto:test@defcorphq.onmicrosoft.com>) -p V3ryH4rdt0Cr4ckN0OneCanGu3ssP@ssw0rd

roadrecon gather 
roadrecon plugin policies 
roadrecon gui

StormSpotter - Dated

  • StormSpotter (https://github.com/Azure/Stormspotter) is a tool from Microsoft for creating attack graphs of Azure resources.

  • It uses the Neo4j graph database to create graphs for relationships in Azure and Entra ID!

  • It has following modules

    • Backend – This is used for ingesting the data in the Neo4j database

    • Frontend (WebApp) – This is the UI used for visualizing the data.

    • Collector – This is used to collect the data from Azure.

  • Start the backend service

cd C:\\AzAD\\Tools\\stormspotter\\backend\\
pipenv shell
python ssbackend.pyz
  • In a new process, Start the frontend webserver

cd C:\\AzAD\\Tools\\stormspotter\\frontend\\dist\\spa\\
quasar.cmd serve -p 9091 --history
  • Use Stormcollector to collect the data.

cd C:\\AzAD\\Tools\\stormspotter\\stormcollector\\
pipenv shell
az login -u test@defcorphq.onmicrosoft.com -p V3ryH4rdt0Cr4ckN0OneCanGu3ssP@ssw0rd
python C:\\AzAD\\Tools\\stormspotter\\stormcollector\\sscollector.pyz cli
  • Log-on to the webserver athttp://localhost:9091 using the following: Username: neo4j Password: BloodHound Server: bolt://localhost:7687

BloodHound

# Run the collector to gather data
$passwd = ConvertTo-SecureString "SuperVeryEasytoGuessPassword@1234" -AsPlainText -Force
$creds = New-Object System.Management.Automation.PSCredential("test@defcorphq.onmicrosoft.com", $passwd) 
Connect-AzAccount -Credential $creds 
Connect-AzureAD -Credential $creds 
. C:\\AzAD\\Tools\\AzureHound\\AzureHound.ps1
Invoke-AzureHound -Verbose

Last updated