Skip to content

Commit 45695f6

Browse files
committed
fix
1 parent 2a89f14 commit 45695f6

File tree

8 files changed

+16
-16
lines changed

8 files changed

+16
-16
lines changed

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-cloud-kerberos-trust.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Az - Cloud Kerberos Trust
22

3-
{{#include ../../../../banners/hacktricks-training.md}}
3+
{{#include ../../../banners/hacktricks-training.md}}
44

55
**This post is a summary of** [**https://dirkjanm.io/obtaining-domain-admin-from-azure-ad-via-cloud-kerberos-trust/**](https://dirkjanm.io/obtaining-domain-admin-from-azure-ad-via-cloud-kerberos-trust/) **which can be checked for further information about the attack. This technique is also commented in** [**https://www.youtube.com/watch?v=AFay_58QubY**](https://www.youtube.com/watch?v=AFay_58QubY)**.**
66

@@ -82,7 +82,7 @@ This dumps all AD user password hashes, giving the attacker the KRBTGT hash (let
8282

8383

8484

85-
{{#include ../../../../banners/hacktricks-training.md}}
85+
{{#include ../../../banners/hacktricks-training.md}}
8686

8787

8888

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-cloud-sync.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Az - Cloud Sync
22

3-
{{#include ../../../../banners/hacktricks-training.md}}
3+
{{#include ../../../banners/hacktricks-training.md}}
44

55

66
## Basic Information
@@ -162,5 +162,5 @@ az rest \
162162

163163

164164

165-
{{#include ../../../../banners/hacktricks-training.md}}
165+
{{#include ../../../banners/hacktricks-training.md}}
166166

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-connect-sync.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Az - Connect Sync
22

3-
{{#include ../../../../banners/hacktricks-training.md}}
3+
{{#include ../../../banners/hacktricks-training.md}}
44

55
## Basic Information
66

@@ -213,7 +213,7 @@ seamless-sso.md
213213
- [https://www.silverfort.com/blog/exploiting-weaknesses-in-entra-id-account-synchronization-to-compromise-the-on-prem-environment/](https://www.silverfort.com/blog/exploiting-weaknesses-in-entra-id-account-synchronization-to-compromise-the-on-prem-environment/)
214214
- [https://posts.specterops.io/update-dumping-entra-connect-sync-credentials-4a9114734f71](https://posts.specterops.io/update-dumping-entra-connect-sync-credentials-4a9114734f71)
215215
216-
{{#include ../../../../banners/hacktricks-training.md}}
216+
{{#include ../../../banners/hacktricks-training.md}}
217217
218218
219219

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-domain-services.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Az - Microsoft Entra Domain Services
22

3-
{{#include ../../../../banners/hacktricks-training.md}}
3+
{{#include ../../../banners/hacktricks-training.md}}
44

55
## Domain Services
66

@@ -87,4 +87,4 @@ while IFS=$'\t' read -r vm_name resource_group; do
8787
done <<< "$vm_list"
8888
```
8989

90-
{{#include ../../../../banners/hacktricks-training.md}}
90+
{{#include ../../../banners/hacktricks-training.md}}

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-federation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Az - Federation
22

3-
{{#include ../../../../banners/hacktricks-training.md}}
3+
{{#include ../../../banners/hacktricks-training.md}}
44

55
## Basic Information
66

@@ -158,7 +158,7 @@ Open-AADIntOffice365Portal -ImmutableID "aodilmsic30fugCUgHxsnK==" -Issuer http:
158158
- [https://learn.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fed](https://learn.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fed)
159159
- [https://www.cyberark.com/resources/threat-research-blog/golden-saml-newly-discovered-attack-technique-forges-authentication-to-cloud-apps](https://www.cyberark.com/resources/threat-research-blog/golden-saml-newly-discovered-attack-technique-forges-authentication-to-cloud-apps)
160160
161-
{{#include ../../../../banners/hacktricks-training.md}}
161+
{{#include ../../../banners/hacktricks-training.md}}
162162
163163
164164

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-hybrid-identity-misc-attacks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Hybrid Identity Miscellaneous Attacks
22

3-
{{#include ../../../../banners/hacktricks-training.md}}
3+
{{#include ../../../banners/hacktricks-training.md}}
44

55

66
## Forcing Synchronization of Entra ID users to on-prem
@@ -26,7 +26,7 @@ In order to synchronize a new user from Entra ID to the on-prem AD these are the
2626
- [https://activedirectorypro.com/sync-on-prem-ad-with-existing-azure-ad-users/](https://activedirectorypro.com/sync-on-prem-ad-with-existing-azure-ad-users/)
2727
- [https://www.orbid365.be/manually-match-on-premise-ad-user-to-existing-office365-user/](https://www.orbid365.be/manually-match-on-premise-ad-user-to-existing-office365-user/)
2828

29-
{{#include ../../../../banners/hacktricks-training.md}}
29+
{{#include ../../../banners/hacktricks-training.md}}
3030

3131

3232

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pta-pass-through-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Az - PTA - Pass-through Authentication
22

3-
{{#include ../../../../banners/hacktricks-training.md}}
3+
{{#include ../../../banners/hacktricks-training.md}}
44

55
## Basic Information
66

@@ -102,7 +102,7 @@ seamless-sso.md
102102
- [https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-pta](https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-pta)
103103
- [https://aadinternals.com/post/on-prem_admin/#pass-through-authentication](https://aadinternals.com/post/on-prem_admin/#pass-through-authentication)
104104

105-
{{#include ../../../../banners/hacktricks-training.md}}
105+
{{#include ../../../banners/hacktricks-training.md}}
106106

107107

108108

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/seamless-sso.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Az - Seamless SSO
22

3-
{{#include ../../../../banners/hacktricks-training.md}}
3+
{{#include ../../../banners/hacktricks-training.md}}
44

55
## Basic Information
66

@@ -204,7 +204,7 @@ If the Active Directory administrators have access to Azure AD Connect, they can
204204
- [https://aadinternals.com/post/on-prem_admin/](https://aadinternals.com/post/on-prem_admin/)
205205
- [TR19: I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory](https://www.youtube.com/watch?v=JEIR5oGCwdg)
206206
207-
{{#include ../../../../banners/hacktricks-training.md}}
207+
{{#include ../../../banners/hacktricks-training.md}}
208208
209209
210210

0 commit comments

Comments
 (0)