πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
    • Resources to study later
    • AWS (Amazon Web Services)
    • Cross-Platform
    • Google Cloud Platform (GCP)
    • Kubernetes
    • Microsoft Azure
      • Azure Blob Storage Service (Equivalent to the S3 bucket of AWS)
      • Azure Cosmos DB Service
      • Azure Services
      • Azure Web Apps
      • Anonymous Service Identification
      • Azure Architecture Theory
      • Azure CLI
      • Credentialed Enumeration
      • Data Extraction from VMs
      • Enumeration
      • Exploitation
        • App Service Exploitation and Credentials Extraction
        • Application Proxy Abuse
        • Automation Accounts Credentials Extraction
        • Azure Container App Code Execution
        • Contributor Permissions
        • Dumping Azure storage keys
        • Dynamic Group Memberships exploitation
        • Executing VM extensions
        • Illicit Consent Grant phishing
        • Pass-the-PRT
        • Password Hash Sync Abuse
        • Pillaging Keys, Secrets and Certificates from Key Vaults
        • Exploiting privileged VM resources
        • Reader Permissions
        • Session Hijacking
        • Source Control Manager (SCM) or Kudu Console
      • Finding Azure Credentials
      • Microsoft Graph
      • Misc
      • Persistence
      • Privilege Escalation
      • Tools
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
  • Privilege Escalation
  • Red Teaming
  • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Cloud Penetration Testingchevron-right
  2. Microsoft Azure

Exploitation

App Service Exploitation and Credentials Extractionchevron-rightApplication Proxy Abusechevron-rightAutomation Accounts Credentials Extractionchevron-rightAzure Container App Code Executionchevron-rightContributor Permissionschevron-rightDumping Azure storage keyschevron-rightDynamic Group Memberships exploitationchevron-rightExecuting VM extensionschevron-rightIllicit Consent Grant phishingchevron-rightPass-the-PRTchevron-rightPassword Hash Sync Abusechevron-rightPillaging Keys, Secrets and Certificates from Key Vaultschevron-rightExploiting privileged VM resourceschevron-rightReader Permissionschevron-rightSession Hijackingchevron-rightSource Control Manager (SCM) or Kudu Consolechevron-right
PreviousUser Group Membership Checkchevron-leftNextApp Service Exploitation and Credentials Extractionchevron-right

Last updated 8 months ago