Summary
In this chapter, we focused on setting up a penetration testing lab environment in Microsoft Azure. We prepared a vulnerable-by-design lab setup where we can practice container breakout techniques to gain unauthorized access to host systems. Our lab environment also highlighted the potential misuse of managed identities in Azure as these inadvertently create other exploitable attack paths for attackers. After setting everything up, we performed a penetration testing simulation to validate if our lab environment had been (mis)configured correctly.
In the next chapter, our focus will shift to preparing a penetration testing lab environment on AWS. In addition to setting up an isolated network environment, we’ll focus on preparing a lab setup where we can practice pivoting techniques that can be used to access internal systems and networks using the initially compromised machine. If you are excited to learn how to build a pivoting lab, then the next chapter is for you...