goEnumBruteSpray – User Enumeration And Password Bruteforce On Azure, ADFS, OWA, O365 And Gather Emails On Linkedin
The recommended module is o365 for
SearchEngine
This module should be used to retrieve a list of email addresses before validating them through a user enumeration module. The company name will be searched on Google and Bing with a dork to find people working in the company (site:linkedin.com/in+"%s"
). The results title will be parsed to output email addresses in the specified format.
Azure
User enumeration
The Azure module is only available to enumerate the users of a tenant. The authentication request will be made on https://autologon.microsoftazuread-sso.com
, a detailed response shows if the account does not exist, a MFA is required, if the account is locked, …
ADFS
Passwords bruteforce / spray
The ADFS module is only available to bruteforce or spray a password. The authentication request is sent to https://<target>/adfs/ls/idpinitiatedsignon.aspx?client-request-id=<randomGUID>&pullStatus=0
. An error message can informs the user if the password is expired
O365
This module allows to
Passwords bruteforce / spray
As for the user enumeration, two modes are available: oauth2 and autodiscover (not implemented yet). The Oauth2 is the recommended mode, it allows to get much information thanks to the
OWA
This module allows to enumerate users and bruteforce / spray passwords.
User enumeration
Enumeration is made with authentication requests.