8000 GitHub - securesloth/noCAP: Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconfigurations.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconfigurations.

License

Notifications You must be signed in to change notification settings

securesloth/noCAP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

noCAP

The purpose of "noCAP" is to identify common misconfigurations in Conditional Access Policies (CAPs) within Microsoft Entra ID, which may be abused by threat actors to gain unauthorized access to a victim's Microsoft Azure and/or Microsoft 365 environment.

Key Features

  • Export all CAPs and set conditions
  • Export all defined user or group CAP exemptions 
  • Identify any CAP-exempt users or groups and noteworthy Entra ID role assignments 
  • Identify CAPs with potentially missing client apps 
  • Identify contradictory M365 CAPs (e.g. a CAP that includes the Exchange Online app but excludes the Office 365 app)
  • Identify sensitive CAP-exempt Entra ID role assignments (fuller role mapping is still in development) 

Prerequisites

  • Ensure that the account used to run the tool has at least the "Security Reader" Entra ID role assigned.
  • Ensure that Python and pip are installed.
  • Use the following command to clone this repo and change directories

git clone https://github.com/securesloth/noCAP.git && cd noCAP

  • Use the following command to download dependencies:

pip install -r requirements.txt

Usage

  • Use the following command to run the tool and initiate device code authentication

python noCAP.py --devicecode

  • Select your directory for exports
  • Complete the device code authentication flow and subsequent multi-factor authentication

Device Code Auth

⚠️ In light of phishing campaigns that abuse the device code authentication flow, do not enter any random device codes sent from unknown or untrusted sources ⚠️

  • You will receive the following prompt to confirm the use of Azure CLI, select "Continue"

Device Code Auth

  • noCAP will begin exporting the CAPs and identifying potential issues

Execution

About

Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconfigurations.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

0