📃
Internal Pentest
CtrlK
  • Internal pentest
    • Active Directory
      • Core Concepts
        • Domain Controllers
        • AD DS Data Store
        • AD DS Schema
        • Attributes
        • Containers and Leaves
        • Object Names and Identities
        • Directory Partitions/Naming Contexts
        • Oraganizational Units, Namespaces, domains, domain trees, forests and trust relationships
      • Reconnaissance
      • Initial attack vectors
        • LLMNR/NBT-NS Poisoning
          • Intercept and Hashcat
          • SMB relay
        • IPv6 Attacks
          • Basic attack
          • Combining NTLM Relaying and Kerberos delegation
          • Other attack vectors and strategies
        • ASREPRoast
        • ADCS + PetitPotal NTLM Relay
      • Post-Compromise Enumeration
        • Powerview
        • PingCastle
        • BloodHound
        • Other
      • Post-Compromise Attacks
        • Pass the Password
        • Pass the hash
        • Token impersonation
        • ASREPRoast
        • Kerberoasting
        • DCSync
        • DCShadow
        • GPP attacks
        • Golden tickets
        • PrintNightmare
        • Other Lateral movements and attacks
      • MISC
  • Cloud pentesting
    • Microsoft AZURE
      • Definitions and fundamentals
    • AWS
Powered by GitBook
On this page

Was this helpful?

  1. Cloud pentesting

Microsoft AZURE

With clients increasingly relying on cloud services from Azure, I thought it was important to add a cloud pentesting cheat sheet that I'm going to try to update along the way with cool pentesting stuff. This page is going to focus on Azure AD technology specifically but may contain other cool tricks that I find along the way :)

PreviousMISCNextDefinitions and fundamentals

Last updated 4 years ago

Was this helpful?