Главная
Study mode:
on
1
Introduction
2
Background on Karl
3
Dumping Sure Data
4
Different Ways to Dump Data
5
PowerShell Modules
6
Required Reading
7
Microburst Overview
8
Command Examples
9
Other Services
10
Primer
11
Active Directory
12
Azure Blob Storage
13
Microsoft Sequel
14
Automation Accounts
15
Sample Escalation
16
Import Module
17
Test VHD
18
Crack NTLM hash
19
Load VHD file
20
RDP in
21
Secrets
22
Password
23
Demo
24
DNS Bruteforcing
25
Conclusion
Description:
Explore techniques for attacking Azure environments using PowerShell in this 27-minute conference talk by Karl Fosaaen at Derbycon 2018. Learn about dumping sensitive data, utilizing PowerShell modules, and leveraging Microburst for various Azure services. Discover methods for exploiting Active Directory, Azure Blob Storage, Microsoft Sequel, and Automation Accounts. Follow along with command examples, sample escalation techniques, and demonstrations of DNS brute-forcing. Gain insights into required reading and essential background information for effectively penetrating Azure infrastructures.

Attacking Azure Environments with PowerShell

Add to list
0:00 / 0:00