Extracting data from Azure VMs
We now have a good understanding of many of the options that we have for manipulating Azure VMs as a Contributor. With this access, we will want to start gathering sensitive information and credentials from these VMs, to escalate privileges in the tenant and, potentially, the AD domain.
Here are some of the general types of information that we will want to gather from the VMs:
- Windows NTLM hashes and in-memory credentials
- Credentials stored in VM extension settings
- Sensitive files and local administrator password hashes
We have already covered finding managed identities and gathering tokens from them, but they are also a key target for extracting credential data from VMs.
Gathering local credentials with Mimikatz
While an entire book could be written on all the features of Mimikatz, we will just cover the basics that are needed for extracting credentials from Windows VMs. The most basic way of running Mimikatz is running...