This commit is contained in:
carlospolop
2025-07-30 06:27:12 +02:00
parent f72768b30f
commit ebd15ccb63
14 changed files with 1 additions and 14 deletions

View File

@@ -40,4 +40,3 @@ This section covers the pivoting techniques to move from a compromised Entra ID
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -70,4 +70,3 @@ At this point, we can gather the remaining information needed to connect to Azur
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -85,4 +85,3 @@ This dumps all AD user password hashes, giving the attacker the KRBTGT hash (let
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -163,4 +163,3 @@ az rest \
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -216,4 +216,3 @@ seamless-sso.md
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -87,4 +87,4 @@ while IFS=$'\t' read -r vm_name resource_group; do
done <<< "$vm_list"
```
{{#include ../../../banners/hacktricks-training.md}}
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -161,4 +161,3 @@ Open-AADIntOffice365Portal -ImmutableID "aodilmsic30fugCUgHxsnK==" -Issuer http:
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -29,4 +29,3 @@ In order to synchronize a new user from Entra ID to the on-prem AD these are the
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -61,4 +61,3 @@ curl -o <filename_output> -L -H "Authorization: Bearer <token>" '<@microsoft.gra
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -39,4 +39,3 @@ Main.py [-h] --usercert USERCERT --certpass CERTPASS --remoteip REMOTEIP
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -36,4 +36,3 @@ Just navigate to login.microsoftonline.com and add the cookie **`ESTSAUTHPERSIST
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -365,4 +365,3 @@ curl -s -X POST \
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -105,4 +105,3 @@ seamless-sso.md
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -207,4 +207,3 @@ If the Active Directory administrators have access to Azure AD Connect, they can
{{#include ../../../banners/hacktricks-training.md}}