- Guessing Azure AD credentials using MSOLSpray
https://www.youtube.com/watch?v=Ech8Ah0dGLw - Hunting Credentials in Resource Group Deployment
https://www.youtube.com/watch?v=y2HHOfs9vBA - Hunting for credentials in the container registry
https://www.youtube.com/watch?v=GpRbriI3A7Y - Exploiting privileged VM resources using Lava
https://www.youtube.com/watch?v=6If_Ne4GHC0 - Dumping Azure Storage Keys using MicroBurst
https://www.youtube.com/watch?v=PoW2H4_UMgg - Escalating privileges using Cloud Shell account
https://www.youtube.com/watch?v=ow2ACVpbpCM - Stealing and reusing tokens from an authenticated Azure admin system
https://www.youtube.com/watch?v=JukNsaVC43M
- Gathering Subscription access information with PowerZure
https://dev.to/cheahengsoon/gathering-subscription-access-information-with-powerzure-2poc - Enumerating subscription information with MicroBurst
https://dev.to/cheahengsoon/enumerating-subscription-information-with-microburst-35a1 - Exfiltering VM disks using PowerZure
https://dev.to/cheahengsoon/exfiltering-vm-disks-using-powerzure-2fp5 - Extracting credentials from App Service
https://dev.to/cheahengsoon/extracting-credentials-from-app-service-51e7 - Extracting stored passwords and certificates from Automation accounts
https://dev.to/cheahengsoon/extracting-stored-passwords-and-certificates-from-automation-accounts-f7n - Escalating Privileges using a misconfigured service principal
https://dev.to/cheahengsoon/escalating-privileges-using-a-misconfigured-service-principal-o66