Got a list of potential corporate emails? You can verify which ones are valid Azure AD accounts without any authentication using tools like CredMaster or Quiet Riot. Once you have confirmed valid addresses, they become candidates for password spraying attacks. Bonus: if the organization uses the same email for AWS root accounts, you can pivot your targeting there too. https://hackingthe.cloud/azure/enum_email_addresses/?mtm_campaign=social_mastodon
