Skip to content
This repository has been archived by the owner on Feb 27, 2024. It is now read-only.

SecurityRiskAdvisors/letItGo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

letItGo

About

letItGo is a tool that was developed to aid security professionals in the identification of expired tenant domains in Office 365. Prior to Microsoft releasing a fix, it was possible to purchase these domains to obtain direct access to an organizations Office 365 tenant through PowerBI and PowerAutomate. For more information on this attack, check out the blog post here: letItGo.

Usage:

letItGo is a simple tool to run. Grab the latest release or compile your own. It just takes a domain as input and then begins the searching process.

letitgo [domain].[tld]

The output will be presented in 3 different colors/buckets:

  • Red: These domains require further investigation. If a domain is marked "not found", it is likely expired and vulnerable to take-over.
  • Yellow: These domains could not be resolved via whois. These domains may require manual investigation.
  • Green: These domains are registered and cannot be purchesed until they expire. You should validate that you still own them.

Credits

  • Mark Arnold for validating the tenant takeover process.
  • Lars Karlslund for the domain retrieval idea.
  • Nestori Syynimaa for creating and maintaining AADInternals (request to Autodiscover service).
  • Peter Crampton and Pb— for helping with creating letItGo

About

Enumerate and check domains for Azure tenants

Resources

License

Security policy

Stars

Watchers

Forks

Packages

No packages published

Languages