Exploitation
App Service Exploitation and Credentials ExtractionApplication Proxy AbuseAutomation Accounts Credentials ExtractionAzure Container App Code ExecutionContributor PermissionsDumping Azure storage keysDynamic Group Memberships exploitationExecuting VM extensionsIllicit Consent Grant phishingPass-the-PRTPassword Hash Sync AbusePillaging Keys, Secrets and Certificates from Key VaultsExploiting privileged VM resourcesReader PermissionsSession HijackingSource Control Manager (SCM) or Kudu Console
Last updated