Setting up the target resources
With our isolated network environment ready, we can now proceed with setting up the target VM instance, along with a few additional resources such as the Azure Key Vault (containing an additional flag secret) and a vulnerable container running inside the VM instance with elevated privileges:
Figure 5.8 – The target resources we will set up in this section
In this section, we will set up the target VM instance inside VNet 01, similar to how we set up the target VM instance in the previous chapter. One major difference we will have in this chapter is that we will run the Metasploitable 2 container instead of the OWASP Juice Shop container. Like OWASP Juice Shop, Metasploitable 2 intentionally includes a variety of insecure configurations and vulnerable software packages. While Metasploitable 2 was primarily designed and distributed as a vulnerable VM, it is possible to configure and run it as a container. We will run...