Summary
In this chapter, we learned about the many ways that a lesser-privileged Reader role can enumerate sensitive information in a subscription. As a penetration tester, we need to be prepared for any kind of situation, so having some escalation options in such a limited role can be very helpful.
In the following chapter, we will go through the different ways that an attacker can utilize Azure IaaS services, as a subscription Contributor, to escalate their privileges in a tenant. This chapter will focus on the many ways that commands can be executed on VMs, and how to pivot through the infrastructure services.