SecurityRiskAdvisors / letItGo

Enumerate and check domains for Azure tenants

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

letItGo

About

letItGo is a tool that was developed to aid security professionals in the identification of expired tenant domains in Office 365. Prior to Microsoft releasing a fix, it was possible to purchase these domains to obtain direct access to an organizations Office 365 tenant through PowerBI and PowerAutomate. For more information on this attack, check out the blog post here: letItGo.

Usage:

letItGo is a simple tool to run. Grab the latest release or compile your own. It just takes a domain as input and then begins the searching process.

letitgo [domain].[tld]

The output will be presented in 3 different colors/buckets:

  • Red: These domains require further investigation. If a domain is marked "not found", it is likely expired and vulnerable to take-over.
  • Yellow: These domains could not be resolved via whois. These domains may require manual investigation.
  • Green: These domains are registered and cannot be purchesed until they expire. You should validate that you still own them.

Credits

  • Mark Arnold for validating the tenant takeover process.
  • Lars Karlslund for the domain retrieval idea.
  • Nestori Syynimaa for creating and maintaining AADInternals (request to Autodiscover service).
  • Peter Crampton and Pb— for helping with creating letItGo

About

Enumerate and check domains for Azure tenants

License:GNU General Public License v3.0


Languages

Language:Go 100.0%