Azure Basics
Azure Organization
Entra I
Azure Tokens & APIs
Basic Enumeration Tools
Exploitation of Azure Services
Entra ID IAM6
Azure IAM3
Azure Applications1
Azure Key Vault6
Azure Virtual Machine & Networking7
Storage Accounts6
Azure File Share5
Azure Table Storage1
Azure SQL Database3
Azure MySQL & PostgreSQL2
Azure CosmosDB3
Azure App Service5
Azure Research Techniques
Azure Function Apps4
Static Web Apps5
Azure Container Registry3
Azure Container Instances, Apps & Jobs7
Azure Queue2
Azure Service Bus2
Azure Automation Account3
Azure Logic Apps1
Azure Cloud Shell1
Azure Virtual Desktop2
Methodologies
White box1
Black box2
Pivoting between Entra ID & AD (Coming soon)3
Common Detection Mechanisms
Azure & Entra ID Logging & Monitoring1
Microsoft Sentinel
Microsoft Defender for Cloud & Microsoft Defender EASM
Azure Attack et Defense
Table des matières
- Azure Basics
- Azure Organization
- Entra I
- Azure Tokens & APIs
- Basic Enumeration Tools
- Exploitation of Azure Services
- Entra ID IAM6
- Azure IAM3
- Azure Applications1
- Azure Key Vault6
- Azure Virtual Machine & Networking7
- Storage Accounts6
- Azure File Share5
- Azure Table Storage1
- Azure SQL Database3
- Azure MySQL & PostgreSQL2
- Azure CosmosDB3
- Azure App Service5
- Azure Research Techniques
- Azure Function Apps4
- Static Web Apps5
- Azure Container Registry3
- Azure Container Instances, Apps & Jobs7
- Azure Queue2
- Azure Service Bus2
- Azure Automation Account3
- Azure Logic Apps1
- Azure Cloud Shell1
- Azure Virtual Desktop2
- Methodologies
- White box1
- Black box2
- Pivoting between Entra ID & AD (Coming soon)3
- Common Detection Mechanisms
- Azure & Entra ID Logging & Monitoring1
- Microsoft Sentinel
- Microsoft Defender for Cloud & Microsoft Defender EASM