Topics
Last updated
Last updated
Extract secrets from Key vaults by abusing managed identity.
Mapping attack paths by reading role assginments.
Extract secrets from deployment history.
Extract clear-text application passwords and tokens from a compromised Azure user’s workstation.
Extract secrets from blob storage.
Examining Managed Identities: Investigate how attackers exploit managed identities to access Key vaults and extract sensitive information.
Role Assignments Scrutiny: Understand how to map potential attack paths by analyzing Azure role assignments, which might reveal pathways to escalate privileges or access restricted resources.
Deployment History Inspection: Discover methods to retrieve secrets and configurations from past deployments, which may not have proper protections against unauthorized access.
Workstation Compromise Analysis: Learn how to extract plaintext passwords, API tokens, and other sensitive data directly from the workstations of compromised Azure users, highlighting the importance of endpoint security.
Blob Storage Vulnerabilities: Explore techniques to uncover and exploit weaknesses in blob storage configurations, allowing unauthorized users to access and extract stored secrets.