Device Identities
- azure ad joined
- organization owned devices, intunes (windows 10/11, server 2019)
- azure ad registered/workplace joined
- BYOD or organization owned
- w10+, macos, ubuntu, mobile devices
- hybrid azure ad joined
- joined on-prem AD
When a machine joines azure AD the following groups become part of the local administrators group: - global administrators - azure ad joined device local administrator - user who joined the machine to azure
CloudAP SSP requests and caches PRT on device. The PRT contains all the claims for the current user.
Abuse this by Extracting the PRT and using it to perform SSO
extract PRT with RoadTools
ROADToken.exe
or Get-AADIntUserPRTToken
(as the target user, so we might need to use SessionExecCommand
):
alternative: use mimikatz
do something with the PRT
Visit https://login.microsoftonline.com/login.srf , set x-ms-RefreshTokenCredential
(with httpOnly too), if it does not work, redo it.