Reportly: is an AzureAD user activity report tool. Prakash, 29, May 202329, May 2023 Reportly is an AzureAD user activity report tool.TABLE OF CONTENTS1 About the tool2 Usage3 Installation3.0.1 About The Author3.0.1.1 Prakash3.0.2 RelatedAbout the toolThis is a tool that will help blue teams during a cloud incident. When running the tool, the researcher will enter as input a suspicious user and a time frame and will receive a report detailing the following:Information about the userActions taken by the userActions taken on the userUser login and failure logs Example_vid.mp4 UsageWhen running the tool, a link to authentication and a device code will show, follow the link and enter the code to authenticate. Insert User principal name of a suspicious user.Insert start and end times in the following format: 2022-11-16I recommend a range of no longer than a week.After authentication, in order to create a full report choose the option “5” When the report will be ready the tool will print “Your report is ready!”. The reports are created in the executable’s directory.InstallationIn order to use the tool you will need an AzureAD application with the following delegated microsoft graph api permissions:AuditLog.Read.AllGroupMember.Read.AllRoleManagement.Read.DirectoryUser.ReadUser.Read.Alldont forget to grant admin consent To create an application go to “App registration” tab and select “New registration” option.Also, when creating the application, make sure you mark the following option as “yes”: you can find this property under the application’s “Authentication” tab.Add a secret to the application. Go to “Certificates & secrets”Add a secretImmediately copy the secret to the config file (after you watch it once, it disappears)After you created the application you need to fill the config.cfg file:clientId = application idclientSecret = application secrettenantId = tenant idDownloadAlso Read:Yuki Chan: The Ultimate Automate Pentest ToolRecoX: Ultimate Tool for Web ReconnaissanceSpiderFoot: The Ultimate Tool for Penetration TestingThe Best Kali Linux Tools for Ethical HackersPentestGPT: A GPT-empowered penetration testing toolAbout The Author Prakash See author's posts Related Cyber Security Linux Cyber Securitylinux toolstools
Linux The 5 Best Linux RDP Clients for Remote Access 1, April 20231, April 2023Remote desktop access (RDP) has become a necessity for many businesses and organizations. Linux RDP clients are the perfect solution for those who want to access their desktops from any location. They provide an easy-to-use interface, scalability, and security so that users can securely access their data and applications. If… Read More
Cyber Security WEBSITE FOOTPRINTING: Everything You Need to Know 7, January 20237, January 2023Website Footprinting helps those attackers whose main objective is to collect information about a company or a person. This information is related to the access of the company or person, related to his networks, related to security or to know about the vulnerabilities of the target. This growing information store… Read More
Linux What is linux mint? 2, June 20222, June 2022Linux Mint is a community-driven Linux distribution based on Ubuntu (which is in turn based on Debian), bundled with a variety of free and open-source applications. It can provide full out-of-the-box multimedia support for those who choose to include proprietary software such as multimedia codecs. The Linux Mint project was… Read More