Azure pentesting tools
In the previous chapter, I listed several different third-party applications that you can use when you pentest Azure.
Everything that I’ll demonstrate here is permitted under Microsoft’s policies, as long as you’re either conducting these activities in your own Azure instance or you have permission from the owner of the Azure instance you’re working with to conduct vulnerability scanning and pentesting there.
But I believe there’s no such thing as being too cautious. So, I’m linking to Microsoft’s policies again (https://www.microsoft.com/en-us/msrc/pentest-rules-of-engagement). Please read and understand those policies so that you can abide by them, whether or not the Azure instance you’re working in is yours, because ultimately, you’re still working in Microsoft’s infrastructure either way!
Prowler
In the AWS section (Chapter 5), we found Prowler to be a very useful vulnerability...