Managed Identities
Exploitation Scenarios
1. Privilege Escalation via Over-Permissioned Managed Identities
2. Lateral Movement Between Resources
3. Token Theft via the IMDS (Instance Metadata Service) Endpoint
4. Persistence Through Managed Identity Abuse
5. Misuse of User-Assigned Managed Identities (UAMI)
Steps
1) Get an Azure access token from a VM
2) Run PowerShell
3) Use the Azure Module to connect to Azure
4) Retrieve information about Azure resources in our subscription
5)
Last updated