πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
    • Resources to study later
    • AWS (Amazon Web Services)
    • Cross-Platform
    • Google Cloud Platform (GCP)
    • Kubernetes
    • Microsoft Azure
      • Azure Blob Storage Service (Equivalent to the S3 bucket of AWS)
      • Azure Cosmos DB Service
      • Azure Services
      • Azure Web Apps
      • Anonymous Service Identification
      • Azure Architecture Theory
      • Azure CLI
      • Credentialed Enumeration
      • Data Extraction from VMs
      • Enumeration
      • Exploitation
      • Finding Azure Credentials
        • Automation Account Credentials
        • Azure Key Vault Credential Extraction
        • Hunting credentials in Azure Container Registry
        • Azure Credential attacks
        • Pfx certificates
        • System Managed Identity Secret
      • Microsoft Graph
      • Misc
      • Persistence
      • Privilege Escalation
      • Tools
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
  • Privilege Escalation
  • Red Teaming
  • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Cloud Penetration Testingchevron-right
  2. Microsoft Azure

Finding Azure Credentials

Automation Account Credentialschevron-rightAzure Key Vault Credential Extractionchevron-rightHunting credentials in Azure Container Registrychevron-rightAzure Credential attackschevron-rightPfx certificateschevron-rightSystem Managed Identity Secretchevron-right
PreviousSource Control Manager (SCM) or Kudu Consolechevron-leftNextAutomation Account Credentialschevron-right

Last updated 8 months ago