Stealing Azure Key Vault Secrets With Azure Managed Identities
When doing Azure penetration testing, one of the prevalent ways to get initial access or escalate privilege is by finding credentials. Credentials on GitHub, in
When doing Azure penetration testing, one of the prevalent ways to get initial access or escalate privilege is by finding credentials. Credentials on GitHub, in
TLDR; It is often assumed that the Contributor role cannot read secrets from key vaults. This is inaccurate and is often abused when doing Azure
TLDR; A common point of confusion when learning about Azure and Azure AD is roles and permissions. Azure has over 200 services Azure AD is
Three similarly named services, with some differences and a lot of confusion. I’ll try to alleviate some of the confusion around Active Directory Domain Services,
When installing the Azure AD Connect tool a user must be created with sufficient permissions to synchronize password hashes to the cloud. What happens if
A go-to technique for both red teamers and APTs alike is password spraying. It can be particularly effective again Azure and O365 accounts. Especially when
Early October, a path traversal vulnerability was reported to be affecting Apache and to be exploited in the wild (CVE-2021-41773). Shortly after CVE-2021-42013 was reported as
In a previous article we explained what path/directory traversal is. And we looked at what happens behind the scenes on the server side. In this article we