Overview
Theconfluence listspaces command enumerates spaces within a Confluence instance, providing the foundational reconnaissance needed to understand organizational structure, team organization, and information architecture. Spaces are the highest-level organizational unit in Confluence, typically representing teams, departments, projects, or functional areas.
This is typically the first command executed during Confluence reconnaissance, as spaces must be identified before enumerating their pages and attachments.
Syntax
Required Parameters
The base URL of the Confluence instance (e.g.,
https://example.atlassian.net)Optional Parameters
Authentication cookie (
cloud.session.token or tenant.session.token). If omitted, the command will attempt anonymous access (if enabled on the target)Specific space key to retrieve detailed information about. Returns metadata for a single space (e.g., “ENG”, “IT”, “HR”)
Return all spaces in the Confluence instance, overriding the limit parameter
Maximum number of spaces to return. Default is 100
Filter spaces by type. Common values include
global (team/department spaces) and personal (user personal spaces)Save command output to a specified file for offline analysis and processing
Examples
- List All Spaces
- Get Specific Space
- Filter by Type
- Limited Enumeration
- Personal Spaces Only
- Anonymous Access Test
Use Cases
Red Team Perspectives
Red Team Perspectives
Initial Reconnaissance and Mapping
- Understand organizational structure through space names and organization
- Identify teams, departments, and business units
- Map the scope and scale of the Confluence deployment
- Discover naming conventions and organizational patterns
- Identify high-value spaces (IT, Security, Engineering, HR, Finance)
- Locate spaces likely to contain credentials or sensitive data
- Find spaces owned by high-privilege users
- Discover project-specific spaces that may contain valuable intelligence
- Identify what spaces are accessible via anonymous access
- Determine the scope of access with compromised credentials
- Compare accessible spaces to understand permission boundaries
- Find over-permissioned spaces with sensitive content
- Enumerate personal spaces of high-value targets (admins, executives, developers)
- Identify users who actively use personal spaces
- Locate personal documentation that may contain credentials or secrets
- Find sensitive information users keep in private spaces
- Determine which spaces to target for page enumeration
- Plan attachment enumeration based on space names and purposes
- Identify spaces appropriate for social engineering operations
- Map reconnaissance workflow: spaces → pages → attachments → content
- Discover active projects and business initiatives from space names
- Identify deprecated or archived spaces with historical data
- Understand team structure and organizational hierarchy
- Locate security, infrastructure, and operations spaces
Blue Team Perspectives
Blue Team Perspectives
Security Posture Assessment
- Audit what spaces are accessible via anonymous access
- Identify spaces that should be restricted but are not
- Review space permissions and access controls
- Verify that sensitive spaces have appropriate restrictions
- Inventory spaces containing sensitive or regulated data
- Ensure proper data classification on high-risk spaces
- Audit compliance with data governance policies
- Identify shadow IT or unauthorized documentation spaces
- Verify that space permissions align with business requirements
- Identify over-permissioned spaces (too many users with access)
- Review personal spaces to ensure appropriate privacy
- Audit external user access to spaces
- Search for suspicious spaces created by compromised accounts
- Identify spaces created recently that may be malicious
- Find spaces with unusual names or purposes
- Review space access patterns during incident response
- Map organizational structure and team organization
- Understand information architecture and documentation practices
- Identify active vs. inactive teams and projects
- Track organizational changes through space creation/deletion
- Monitor for space enumeration activity (API calls listing all spaces)
- Alert on enumeration by accounts that don’t typically access Confluence
- Track external IP addresses enumerating spaces
- Identify enumeration followed by targeted page/attachment access
- Flag anonymous access attempts to enumerate spaces
- During compromise, determine which spaces were accessible to attacker
- Assess the scope of potential data exposure based on space access
- Prioritize investigation based on space sensitivity
- Review space access logs to track attacker activity
Output
The command returns detailed information about each space:- Space key (short identifier, e.g., “IT”, “ENG”, “HR”)
- Space name (full name)
- Space type (global, personal)
- Space status (current, archived)
- Space description
- Homepage URL
- Creation date
- Number of pages in the space
- Permissions information (who can access)
Detection Considerations
API Request Monitoring- API calls to list spaces generate web server logs
- Bulk enumeration (—all flag) creates distinct patterns
- Multiple rapid API calls may trigger rate limiting
- Space access and enumeration events are logged
- Audit logs include username, timestamp, IP address, and user agent
- Accessing space metadata may generate specific audit event types
- UEBA solutions may flag unusual space enumeration patterns
- Accounts that don’t typically use Confluence enumerating spaces is suspicious
- Enumeration outside business hours raises alerts
- First-time Confluence access by an account may be flagged
- Anonymous enumeration attempts may be logged separately
- Organizations with restricted anonymous access will block the operation
- Failed anonymous access attempts indicate reconnaissance activity
- Web proxy logs capture space enumeration traffic
- External IP addresses accessing Confluence APIs may be flagged
- Unusual user agent strings may indicate automation
OPSEC Considerations
-
Timing and Rate
- Perform enumeration during business hours when activity is normal
- Space out API calls to mimic human browsing patterns
- Avoid rapid-fire automated enumeration that clearly indicates tooling
- Consider the compromised account’s typical usage times
-
Account Context
- Ensure the compromised account normally accesses Confluence
- Verify the account has legitimate reasons to view space listings
- Match the user’s typical behavior patterns and access scope
- Consider whether the account’s role justifies space enumeration
-
Scope Management
- Start with limited enumeration before using —all flag
- Target specific spaces if intelligence indicates high-value targets
- Avoid blanket enumeration if you have specific targets identified
- Balance intelligence requirements with operational security
-
Type Filtering
- Consider whether enumerating personal spaces is worth the detection risk
- Personal space enumeration is unusual behavior for most accounts
- Focus on global spaces for team/department reconnaissance
- Only enumerate personal spaces if targeting specific high-value users
-
Output Management
- Use —output parameter to save results for offline analysis
- Avoid re-running enumeration unnecessarily
- Process results offline to minimize interactive session time
- Secure output files as they contain organizational intelligence
-
Operational Planning
- Use space enumeration as the foundation for subsequent operations
- Plan page enumeration based on high-value spaces identified
- Prioritize spaces for deeper investigation (attachments, content)
- Map the full reconnaissance workflow before executing
-
Alternative Approaches
- Consider gathering space information through social engineering
- Use public Confluence pages (if accessible) to identify spaces
- Leverage other intelligence sources before internal enumeration
- Evaluate whether enumeration is necessary given existing intelligence
-
Session Management
- Minimize total time in the environment
- Consolidate reconnaissance to reduce the detection window
- Clear browser/tool artifacts after operations
- Consider rotating infrastructure between operations
Related Commands
- confluence listpages - Next step: enumerate pages within identified spaces
- confluence listattachments - Enumerate attachments from high-value spaces
- confluence search - Search across spaces for specific content
- jira listprojects - Similar reconnaissance for Jira projects