Azure
This playbook provides red teaming methodology for Azure environments. It covers: Azure cloud fundamentals, enumeration and exploitation techniques, real-world CTF-style scenarios, commands and tools
1. Azure Cloud Overview
Core Components
Cloud Spaces
2. Authentication in Azure
Methods
az login Connect-AzAccount Connect-MgGraph -Scopes "Directory.Read.All"az login --service-principal -u <AppID> -p <Password> --tenant <TenantID> $cred = Get-Credential # AppID + Secret Connect-AzAccount -ServicePrincipal -Tenant <TenantID> -Credential $credaz account get-access-token --resource=https://management.azure.com Connect-AzAccount -AccessToken <AAD_AccessToken>curl -H "Metadata:true" \ "http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https://management.azure.com/"
3. Enumeration Phase
AAD Discovery
4. Exploitation Scenarios
4.1 SSRF → IMDS Token Theft
4.2 ARM Token Abuse
4.3 Privilege Escalation via RBAC
4.4 Service Principal Abuse
5. Post-Exploitation
6. Lateral Movement
7. Detection & Defense
Last updated