Once you landed your self a shell or some credentials you need to ask your self a couple of questions.
You can use ScouteSuite, this is noramlly used to audit differnt security providers. ScouteSuite accepts Goolge JSON tokens to auth as a service account.
Like onprem AD Azure user (noramlly) have access to a bunch of info. This can be locked down however.
Authenticated user can go the portal.azure.com and click on ‘Azure Active Directory’. The O365 GAL has info like this as wel.
If the portal is locked down PowerShell cmdlets can be used to view the same information. This can be disabled org wide with Set-MsolCompanySettings -UsersPermissionToCreateGroupsEnabled $False
Orgs can have multiple subscriptions. Good first step is to determine what subscription you are in, the name is usually informative. Such as Prod
or Dev
. 1 Azure AD (tenant) can have multiple subscriptions. Each subscriptions can have multiple resource groups.
Get-MSolCompanyInformation
Get-AzSubscription
Get-AzContext
Get the users role assignment
Get-AzRoleAssignment
Remember, id the Azure AD portal is locked down users maybe still be able to access information using MSOnline cmdlets.
Get-MSolUser -All
Get-MSolGroup -All
Get-MSolGroupMember -GroupObjectID <GUID>
Get-AzResource
Get-AzResourceGroup
Get info/runbooks
Get-AzAutomationAccount
Get-AzAutomationRunbook -AutomationAccountName <AccountName> -ResourceGroupName <ResourceGroupName>
Export runbooks
Export-AzAutomationRunbook -AutomationAccountName <AccountName> -ResourceGroupName <ResourceGroupName> -Name <RunbookName> -Outputfolder <OutputFolder>
Tools: