CARTP Certified Azure Red Team Professional
  • README
  • Introduction
    • Topics
  • Recon & Discovery
    • Topics
  • Initial Access
    • Topics
  • Enumeration
    • Topics
  • Privilege Escalation
    • Page 5
  • Lateral Movement
    • Topics
  • Persistence
    • Topics
  • Data Mining
    • Topics
    • Page 8
  • Defenses
    • Topics
  • Defenses Bypass
    • Topics
Powered by GitBook
On this page
  1. Data Mining

Topics

PreviousTopicsNextPage 8

Last updated 1 year ago

  • Extract secrets from Key vaults by abusing managed identity.

  • Mapping attack paths by reading role assginments.

  • Extract secrets from deployment history.

  • Extract clear-text application passwords and tokens from a compromised Azure user’s workstation.

  • Extract secrets from blob storage.

Extracting Secrets from a Compromised Environment

  • Examining Managed Identities: Investigate how attackers exploit managed identities to access Key vaults and extract sensitive information.

  • Role Assignments Scrutiny: Understand how to map potential attack paths by analyzing Azure role assignments, which might reveal pathways to escalate privileges or access restricted resources.

  • Deployment History Inspection: Discover methods to retrieve secrets and configurations from past deployments, which may not have proper protections against unauthorized access.

  • Workstation Compromise Analysis: Learn how to extract plaintext passwords, API tokens, and other sensitive data directly from the workstations of compromised Azure users, highlighting the importance of endpoint security.

  • Blob Storage Vulnerabilities: Explore techniques to uncover and exploit weaknesses in blob storage configurations, allowing unauthorized users to access and extract stored secrets.

Sign up to our mailing list to receive updates!