mgeeky-Penetration-Testing-.../clouds/azure/README.md

44 lines
1.2 KiB
Markdown
Raw Normal View History

2022-01-22 16:25:11 +01:00
## Azure-related penetration testing scripts, tools and Cheatsheets
- **`AzureRT`** - Powershell module implementing various cmdlets to interact with Azure and Azure AD from an offensive perspective. Helpful utilities dealing with access token based authentication, easily switching from `Az` to `AzureAD` and `az cli` interfaces, easy to use pre-made attacks such as Runbook-based command execution and more.
2022-01-22 16:26:38 +01:00
Authentication & Token mechanics:
2022-01-22 16:25:11 +01:00
2022-01-22 17:42:12 +01:00
- *`Get-ARTWhoami`*
2022-01-22 16:26:38 +01:00
- *`Connect-ART`*
- *`Connect-ARTAD`*
- *`Connect-ARTADServicePrincipal`*
- *`Get-ARTAccessTokenAzCli`*
- *`Get-ARTAccessTokenAz`*
- *`Get-ARTAccessTokenAzureAD`*
- *`Parse-JWTtokenRT`*
- *`Remove-ARTServicePrincipalKey`*
2022-01-22 16:25:11 +01:00
2022-01-22 16:26:38 +01:00
Recon and Situational Awareness:
2022-01-22 16:25:11 +01:00
2022-01-22 20:46:56 +01:00
- *`Get-ARTAccess`*
- *`Get-ARTADAccess`*
2022-01-22 16:26:38 +01:00
- *`Get-ARTResource`*
- *`Get-ARTRolePermissions`*
- *`Get-ARTADRolePermissions`*
2022-01-22 19:21:46 +01:00
- *`Get-ARTRoleAssignment`*
2022-01-22 16:26:38 +01:00
- *`Get-ARTKeyVaultSecrets`*
2022-01-22 16:25:11 +01:00
2022-01-22 16:26:38 +01:00
Privilege Escalation:
2022-01-22 16:25:11 +01:00
2022-01-22 16:26:38 +01:00
- *`Add-ARTUserToGroup`*
- *`Add-ARTUserToRole`*
2022-01-23 00:43:55 +01:00
- *`Add-ARTADAppSecret`*
2022-01-22 16:25:11 +01:00
2022-01-22 16:26:38 +01:00
Lateral Movement:
2022-01-22 16:25:11 +01:00
2022-01-22 16:26:38 +01:00
- *`Invoke-ARTAutomationRunbook`*
2022-01-23 00:43:55 +01:00
Misc:
- *`Get-ARTUserId`*
- *`Parse-JWTtokenRT`*
- *`Get-ARTRESTMethod`*