changed to a public number, such as the headquarters'
phone number.
4.3 Future Work
Microsoft has over 140 portals administering their
cloud services, such as Azure and Microsoft 365, and
over 50 portals for consuming them (Fowler, 2022).
Each of these portals uses APIs to access the back-
end services. Studying these APIs could reveal
candidates for gathering new OSINT.
4.4 Limitations
Two openly available data sets were used to conduct
this research. The data sets were not curated, so they
may contain outdated or missing data. However, our
findings are in line with other available information
regarding the Azure AD adoption rate, which
indicates that the datasets were accurate.
4.5 Acknowledgements
This research used an unpublished version (v0.6.7) of
the AADInternals toolkit to gather OSINT. The tool
will be published in March 2022 after Microsoft has
fixed vulnerabilities found and reported during this
research. This paper does not contain any OSINT
gathered exploiting these vulnerabilities. The author
would like to thank Microsoft Security Response
Center (MSRC) for cooperating with reported
vulnerabilities.
4.6 Conclusions
This paper demonstrated how anyone could gather
open-source intelligence (OSINT) from any
organisation using Azure AD. The OSINT was
collected from Fortune 500 organisations and 2000
the most highly ranked universities.
The findings revealed that most of the studied
organisations are using Azure AD. It was possible to
collect information about which hybrid identity
authentication methods organisations were using.
This information is extremely valuable to threat
actors, as it reveals which attack vectors can be used
to compromise the target organisation. Especially
organisations using AD FS and seamless SSO are
exciting targets, as compromising on-premises
environment allows threat actors to impersonate any
user of the target organisation.
For some organisations, information of the
primary technical contact, including full name and
phone number, could be gathered. This information is
also extremely valuable, as these people often have
Global Administrator privileges to Azure AD.
Therefore, they are primary targets for social
engineering attacks.
REFERENCES
Dofo. (2019). Domain Names of Fortune 500 Companies.
Retrieved from https://dofo.com/blog/fortune-500-
domain-names/
Forrester. (2020). The Total Economic Impact™ Of
Securing Apps With Microsoft AzureActive Directory.
28. Retrieved from https://aka.ms/aadtei
Fowler, Adam. (2022). Microsoft Portals. Retrieved from
https://msportals.io/
Glassman, Michael, & Kang, Min Ju. (2012). Intelligence
in the internet age: The emergence and evolution of
Open Source Intelligence (OSINT). Computers in
Human Behavior, 28(2), 673-682. doi:https://doi.org/
10.1016/j.chb.2011.11.014
InfoSecurity Magazine. (2014). Active Directory Flaw
Could Threaten 95% of Fortune 500 with Massive
Information Heist. InfoSecurity Magazine(July 16).
Retrieved from https://www.infosecurity-
magazine.com/news/active-directory-flaw-could/
Microsoft. (2021a). Azure AD Connect sync: Understand
and customize synchronization. Retrieved from
https://docs.microsoft.com/en-us/azure/active-
directory/hybrid/how-to-connect-sync-whatis
Microsoft. (2021b). What is Azure Active Directory?
Retrieved from https://docs.microsoft.com/en-
us/azure/active-directory/fundamentals/active-
directory-whatis
Microsoft. (2021c). What is hybrid identity with Azure
Active Directory? Retrieved from
https://docs.microsoft.com/en-us/azure/active-
directory/hybrid/whatis-hybrid-identity
Microsoft. (2022a). Azure Active Directory Seamless
Single Sign-On. Retrieved from https://docs.micro
soft.com/en-us/azure/active-directory/hybrid/how-to-
connect-sso
Microsoft. (2022b). Get Office 365 free for your entire
school. Retrieved from https://www.microsoft.com/en-
us/microsoft-365/academic/compare-office-365-
education-plans
Microsoft. (2022c). What is a Primary Refresh Token?
Retrieved from https://docs.microsoft.com/en-
us/azure/active-directory/devices/concept-primary-
refresh-token
MSRC. (2020). Customer Guidance on Recent Nation-State
Cyber Attacks. Retrieved from https://msrc-
blog.microsoft.com/2020/12/13/customer-guidance-
on-recent-nation-state-cyber-attacks/
Palhière, Aymeric. (2020). Azure AD Introduction for Red
Teamers. Retrieved from https://www.synacktiv.com/
en/publications/azure-ad-introduction-for-red-teamers.
html