You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/pentesting-cloud/azure-security/az-services/az-azuread.md
+59Lines changed: 59 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1176,6 +1176,63 @@ Get-AzureADMSScopedRoleMembership -Id <id> | fl #Get role ID and role members
1176
1176
{{#endtab }}
1177
1177
{{#endtabs }}
1178
1178
1179
+
## Microsoft Graph delegated SharePoint data exfiltration (SharePointDumper)
1180
+
1181
+
Attackers with a **delegated Microsoft Graph token** that includes **`Sites.Read.All`** or **`Sites.ReadWrite.All`** can enumerate **sites/drives/items** over Graph and then**pull file contents** via **SharePoint pre-authentication download URLs** (time-limited URLs embedding an access token). The [SharePointDumper](https://github.com/zh54321/SharePointDumper) script automates the full flow (enumeration → pre-auth downloads) and emits per-request telemetry for detection testing.
1182
+
1183
+
### Obtaining usable delegated tokens
1184
+
1185
+
- SharePointDumper itself **does not authenticate**; supply an access token (optionally refresh token).
1186
+
- Pre-consented **first-party clients** can be abused to mint a Graph token without registering an app. Example `Invoke-Auth` (from [EntraTokenAid](https://github.com/zh54321/EntraTokenAid)) invocations:
1187
+
1188
+
```powershell
1189
+
# CAE requested by default; yields long-lived (~24h) access token
0 commit comments