Section 2: Authenticated Access to Azure
The second part of the book will cover the core attacks that are available to authenticated users in an Azure environment. They will be separated by the general subscription rights (Reader, Contributor, Owner) required for each attack. This section also explains persistence methods available to attackers once they've gained access to a privileged Azure AD account.
This part of the book comprises the following chapters:
- Chapter 4, Exploiting Reader Permissions
- Chapter 5, Exploiting Contributor Permissions on IaaS Services
- Chapter 6, Exploiting Contributor Permissions on PaaS Services
- Chapter 7, Exploiting Owner and Privileged Azure AD Role Permissions
- Chapter 8, Persisting in Azure Environments