Skip to content

Latest commit

 

History

History
55 lines (53 loc) · 7.1 KB

articles.md

File metadata and controls

55 lines (53 loc) · 7.1 KB

Not The Hidden Wiki

Learn Azure Hacking


  1. The Most Dangerous Entra Role - link
  2. Azure AD Kerberos Tickets: Pivoting to the Cloud - link
  3. Obtaining Domain Admin from Azure AD - link
  4. Untangling Azure Active Directory Permissions II: Privileged Access - link
  5. Azure services that can use managed identities to access other services - link
  6. How to install the Azure CLI - link
  7. Cloud - Azure Pentest - link
  8. Preventing Exposed Azure Blob Storage - link
  9. Open Azure blobs search on grayhatwarfare.com and other updates - link
  10. Introducing Project Freta: Toward trusted sensing for the cloud. link
  11. Finding Azurescape: Cross-Account Container Takeover in Azure Container Instances - link
  12. Azure Monitor: link
  13. Reference list of Azure domains (not comprehensive) - link
  14. The ultimate Entra ID (Azure AD) / Microsoft 365 hacking blog - link
  15. Dirkjanm Blog - link
  16. Abusing Azure AD SSO with the Primary Refresh Token - link
  17. Abusing dynamic groups in Azure AD for Privilege Escalation - link
  18. Attacking Azure, Azure AD, and Introducing PowerZure - link
  19. Attacking Azure & Azure AD, Part II - link
  20. Azure AD Connect for Red Teamers - link
  21. Azure AD Introduction for Red Teamers - link
  22. Azure AD Pass The Certificate - link
  23. Azure AD privilege escalation - Taking over default application permissions as Application Admin: - link
  24. Defense and Detection for Attacks Within Azure - link
  25. Hunting Azure Admins for Vertical Escalation - link
  26. Impersonating Office 365 Users With Mimikatz - link
  27. Lateral Movement from Azure to On-Prem AD - link
  28. Malicious Azure AD Application Registrations - link
  29. Moving laterally between Azure AD joined machines - link
  30. CrowdStrike Launches Free Tool to Identify and Help Mitigate Risks in Azure Active Directory - link
  31. Privilege Escalation Vulnerability in Azure Functions - link
  32. Azure Application Proxy C2 - link
  33. Recovering Plaintext Passwords from Azure Virtual Machines like It’s the 1990s - link
  34. Forensicating Azure VMs - link
  35. Network Forensics on Azure VMs - link
  36. Azure Active Directory password brute-forcing flaw - link
  37. How to Detect Azure Active Directory Backdoors: Identity Federation - link
  38. Azure App Service vulnerability exposed hundreds of source code repositories - link
  39. AutoWarp: Cross-Account Vulnerability in Microsoft Azure Automation Service - link
  40. Microsoft Azure Synapse Pwnalytics - link
  41. Microsoft Azure Site Recovery DLL Hijacking - link
  42. FabriXss (CVE-2022-35829): Abusing a Custom Role User Using CSTI and Stored XSS in Azure Fabric Explorer - link
  43. Untangling Azure Active Directory Principals & Access Permissions - link
  44. How to Detect OAuth Access Token Theft in Azure - link
  45. How to deal with Ransomware on Azure - link
  46. How Orca found Server-Side Request Forgery (SSRF) Vulnerabilities in four different Azure Services - link
  47. EmojiDeploy: Smile! Your Azure web service just got RCE’d - link
  48. Bounce the Ticket and Silver Iodide on Azure AD Kerberos - link
  49. This publication is a collection of various common attack scenarios on Microsoft Entra ID - link
  50. ThreatModel for Azure Storage - link