Post

Azure Pentesting — References, Tools & Cheatsheet

Azure Pentesting — References, Tools & Cheatsheet

A living reference for Azure and Entra ID offensive security tools, blogs, official docs, and useful API endpoints.

If you are completely new to Azure it is recommended to go through Microsoft training material for Azure to get familiar with it. It helped me understand Azure a lot better than I might have if I hadn’t gone through it. I especially want to emphasize “Manage security controls for identity and access” module from AZ-500 Training.

Open Interactive Cheatsheet


Tools


Deployable Environments

Note: You have to activate Azure and Entra ID P2 free trials to be able to deploy these.

NameURL
BadZurehttps://github.com/mvelazc0/BadZure
EntraGoathttps://github.com/Semperis/EntraGoat

Blogs & Research


Official Microsoft Docs


Useful API Endpoints

PurposeURL
Check if tenant uses Entra IDhttps://login.microsoftonline.com/getuserrealm.srf?login=user@COMPANY.com&xml=1
Get Tenant IDhttps://login.microsoftonline.com/<domain>/.well-known/openid-configuration
Device loginhttps://microsoft.com/devicelogin
OAuth token endpointhttps://login.microsoftonline.com/Common/oauth2/token?api-version=1.0

Key GUIDs

Role / PermissionGUID
Global Administrator62e90394-69f5-4237-9190-012177145e10
Privileged Role Administratore8611ab8-c189-46e8-94e1-60213ab1f814
Privileged Authentication Administrator7be44c8a-adaf-4e2a-84d6-ab2649e08a13
Application Administrator9b895d92-2cd3-44c7-9d02-a6ac2d5ea5c3
Cloud Application Administrator158c047a-c907-4556-b7ef-446551a6b5f7
User Administratorfe930be7-5e62-47db-91af-98c3a49a38b1
AppRoleAssignment.ReadWrite.All06b708a9-e830-4db3-a914-8e69da51d44f
Application.ReadWrite.All1bfefb4e-e0b5-418b-a88f-73c46d2cc8e9
Application.ReadWrite.OwnedBy18a4783c-866b-4cc7-a460-3d5e5662c884
Directory.ReadWrite.All19dbc75e-c2e2-444c-a770-ec69d8559fc7
Directory.Read.All7ab1d382-f21e-4acd-a863-ba3e13f7da61
Organization.ReadWrite.All292d869f-3427-49a8-9dab-8c70152b74e9
RoleManagement.ReadWrite.Directory9e3f62cf-ca93-4e0f-b9a4-8c7d4e3b4f8a
Microsoft Graph SP (all tenants)216e59bf-6c38-42b9-9211-734fe4d2f3bb
This post is licensed under CC BY 4.0 by the author.