
Penetration Testing Azure for Ethical Hackers
By :

We now have a good understanding of many of the options that we have for manipulating Azure VMs as a Contributor. With this access, we will want to start gathering sensitive information and credentials from these VMs, to escalate privileges in the tenant and, potentially, the AD domain.
Here are some of the general types of information that we will want to gather from the VMs:
We have already covered finding managed identities and gathering tokens from them, but they are also a key target for extracting credential data from VMs.
While an entire book could be written on all the features of Mimikatz, we will just cover the basics that are needed for extracting credentials from Windows VMs. The most basic way of running Mimikatz is running...