Skip to content

msInvader Access Methods

mvelazco edited this page Apr 9, 2024 · 1 revision

msInvader Access Methods

msInvader utilizes various methods of access to interact with Microsoft 365 and Azure, each serving distinct purposes and providing unique advantages for simulating attack scenarios.

Graph API

The Graph API enables msInvader to access and interact with a wide array of Microsoft 365 services. It's used to simulate attacks that exploit data and functionalities available across Microsoft's cloud ecosystem.

Exchange Web Services (EWS)

EWS allows msInvader to specifically target and simulate attacks on Exchange Online services, focusing on email operations and data access. Using EWS, msInvader can simulate attackers exploiting this protocol to access and manipulate email-related data.

REST API Leveraged by the Exchange Online PowerShell Module

The Exchange Online PowerShell module, commonly abused by attackers, operates through a REST API located at https://outlook.office365.com/adminapi/beta/{tenant_id}/InvokeCommand. msInvader implements a Python client to interact with this REST API, simulating how adversaries might use PowerShell commands for malicious activities.