Chapter 5: Exploiting Contributor Permissions on IaaS Services
In the previous chapter of this book, we looked at options to escalate privileges from the Reader RBAC role to the Contributor role. We will go further in this chapter by looking at how we can leverage the permissions of the Contributor role to exploit Infrastructure as a Service (IaaS) workloads with the goals of escalating privileges and exfiltrating data. We will also cover how the Contributor role can be used to hunt for other credentials that could be used to move laterally within the environment beyond the normal scope of the Contributor access role.
Here are the main topics that we will cover:
- Reviewing the Contributor RBAC role
- Understanding Contributor IaaS escalation goals
- Exploiting Azure platform features with Contributor rights
- Extracting data from Azure VMs