MSFTRecon is a reconnaissance tool designed for red teamers and security professionals to map Microsoft 365 and Azure tenant infrastructure. It performs comprehensive enumeration without requiring authentication, helping identify potential security misconfigurations and attack vectors.
# Clone the repository
git clone https://github.com/Arcanum-Sec/msftrecon.git
cd msftrecon
# Create virtual environment
python3 -m venv venv
source venv/bin/activate
# Install requirements
pip install -r requirements.txt
chmod +x msftrecon.py
Basic scan:
./msftrecon.py -d example.com
JSON output:
./msftrecon.py -d example.com -j
Government cloud:
./msftrecon.py -d example.gov --gov
China cloud:
./msftrecon.py -d example.cn --cn
[+] Target Organization:
Tenant Name: Contoso
Tenant ID: 1234abcd-1234-abcd-1234-1234abcd1234
[+] Federation Information:
Namespace Type: Managed
Brand Name: Contoso
Cloud Instance: microsoftonline.com
[+] Azure AD Configuration:
Tenant Region: NA
[+] Azure AD Connect Status:
Identity Configuration: Managed (Cloud Only)
Authentication Type: Managed
[!] Identity Insights:
* Cloud-only authentication detected
* All authentication handled in Azure AD
* Focus on cloud-based attack vectors
MSFTRecon provides valuable insights for red teamers:
-
Identity Attack Vectors
- Identifies authentication methods for targeted attacks
- Reveals potential password spray opportunities
- Highlights federation configurations for SAML attacks
-
Application Attack Surface
- Discovers exposed enterprise applications
- Identifies OAuth abuse opportunities
- Reveals admin consent endpoints for phishing
-
Infrastructure Insights
- Maps Azure services for lateral movement
- Identifies B2C configurations
- Discovers potential storage misconfigurations
-
Security Control Awareness
- Detects MDI presence for evasion planning
- Identifies conditional access configurations
- Reveals authentication requirements
Contributions are welcome! Please feel free to submit a Pull Request.
This tool is intended for legal security assessments and penetration testing only. Users must obtain proper authorization before conducting security assessments. The authors are not responsible for any misuse or damage caused by this tool.
This project is licensed under the MIT License
- Based on research and techniques from various Microsoft 365 and Azure security resources, plus check_mdi.py
jhaddix