Power Pwn: An offensive security toolset for Microsoft 365

Power Pwn

An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform.

Modules:

Copilot Connector and Automator

Allow interaction with Copilot for Microsoft 365 through the WebSocket messages and undocumented APIs.
This module implements multiple capabilities than can be easily extended to implement any process that requires interaction with the Copilot.

Implementation of Copilot M365 undocumented APIs and WebSocket.
This module is responsible for the actual communication with Copilot.
It handles the authentication using Puppeteer library, sends and receives messages through the WebSocket.

Copilot Interactive Chat

Interactive chat with Copilot M365 through the terminal.

Copilot M365 ‐ Dump

Data dump is a tool for exploring information in Microsoft 365 from a Red Team perspective.

  1. Extract emails contents
  2. Sharepoint site content enumeration and extraction
  3. Password and credentials harvesting

Copilot M365 ‐ Whoami

Extracts useful information about the current user such as:

  1. Name, title, email, manager etc.
  2. Accessible documents
  3. Weekly schedule
  4. Accessible Sharepoint sites
  5. Access to financial data
  6. Emails
  7. Collaborators and Contacts

and more

Modules: Copilot Studio Hunter ‐ Deep Scan

Conducts deep scanning to find open Copilot Studio bots based on domains or tenant IDs using an automation which utilizes different Copilot Studio & Power Platform mechanics and the Power Platform API, FFUF and Puppeteer.

Copilot Studio Hunter ‐ Enum

Utilizes open-source intelligence to compile lists of environment and tenant IDs from the Power Platform API subdomains to be used by the other Copilot Studio scanning sub-modules. Uses amass.

Install a backdoor

Maintain persistency on Power Platform by installing an automation factory that creates, executes and deletes arbitrary commands.

This capability was first presented at a DEFCON30 talk titled Low Code High Risk – Enterprise Domination via Low Code Abuse

Internal phishing

Set up an internal phishing application on a Microsoft-owned domains which will automatically authenticate as users browse to your link.

This capability was first presented at a DEFCON30 talk titled Low Code High Risk – Enterprise Domination via Low Code Abuse

No‐Code Malware

Repurpose Microsoft-trusted executables, service accounts and cloud services to power a malware operation.

This capability was first presented at a DEFCON30 talk titled No-Code Malware – Windows 11 at Your Service

PowerDump

powerdump is a tool for exploring information in Microsoft PowerPlatform from a Red Team perspective. In short, this is what it does:

  • Generates access tokens for fetching available resources in Microsoft PowerApps.
  • Uses HTTP calls in Python to dump all available information in the Microsoft PowerPlatform into a local directory.
  • Generates access tokens for performing advanced actions on the discovered resources.
  • Provides a basic GUI for presenting the collected resources and data.

Spearphishing with Copilot M365

Automated spearphishing with Copilot M365.
Discovers the targets / victims, for each victim, it explores latest interactions with the compromised account or user, and crafts highly personalized emails to send to the targeted individuals or groups.

Install & Use