Skip to content

Gather information from an email address connected to Office 365

Notifications You must be signed in to change notification settings

netsecurity-as/recon365

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

recon365

Gather information from an email address connected to AzureAD or Office 365

Example outputsHow to find your JWT tokenUsageReferences

Example outputs

Get info on on an email address in Azure AD

$ python3 recon365.py --jwt token.txt --target bob.smith@company.no
[+] bob.smith@company.com 
 | tenantId          : 65443347-7d65-4339-b113-4cc43a0d7111
 | isShortProfile    : False
 | accountEnabled    : True
 | featureSettings   : {'coExistenceMode': 'TeamsOnly'}
 | userPrincipalName : bob.smith@company.com
 | givenName         : bob.smith@company.no
 | surname           :
 | email             : bob.smith@comapny.com
 | tenantName        : Company AS
 | displayName       : Bob Smith 
 | type              : Federated
 | mri               : 8:orgid:edb2cd41-315a-4a7a-8f24-690c234503fe
 | objectId          : edb2cd74-125a-4a7a-8f24-698c33d004gh
 | availability      : Offline
 | devicieType       : Mobile

User with a Microsoft 356 account

$ python3 recon365.py --jwt token.txt -t info@anothercompany.no
[+] info@anothercompany.no
 | skypeId           : alice-5b
 | city              : Oslo
 | state             : Oslo
 | country           : Norway
 | avatarUrl         : https://api.skype.com/users/alice-5b/profile/avatar
 | isShortProfile    : False
 | accountEnabled    : True
 | userPrincipalName : info@anothercompany.no
 | email             : info@anothercompany.no
 | displayName       : Alice Smith 
 | type              : SkypeConsumer
 | mri               : 8:alice-5b
 | availability      : PresenceUnknown
 | devicieType       : None

Get info on a domain

$ python3 recon365.py --target finalcompany.no
[+] finalcompany.no
 | State                   : 3
 | UserState               : 2
 | Login                   : finalcompany.no
 | NameSpaceType           : Federated
 | DomainName              : finalcompany.no
 | FederationGlobalVersion : -1
 | AuthURL                 : https://ok.finalcompany.no/adfs/ls/?username=finalcompany.no&wa=wsignin1.0&wtrealm=urn%3afederation%3aMicrosoftOnline&wctx=
 | FederationBrandName     : Final Company
 | CloudInstanceName       : microsoftonline.com
 | CloudInstanceIssuerUri  : urn:federation:MicrosoftOnline

How to find your JWT token

Visit https://teams.microsoft.com and fetch the JWT token from the Storage. Be aware that this token may expire after around 24 hours.

Usage

$ python3 recon365.py --help
usage: recon365.py [options]

options:
  -h, --help            show this help message and exit
  -j PATH, --jwt PATH   Path to file containing your Microsoft Teams JWT token
  -t TARGET, --target TARGET
                        Email address or domain you'd like to fetch information for
  -l FILE, --list FILE  File containing email addresses or domains you'd like to fethc information for

References

Releases

No releases published

Packages

No packages published

Languages