📘
DFIR
search
⌘Ctrlk
📘
DFIR
  • Networking
    • Networking
  • Windows
    • Administration
    • Forensics
    • Cheat Sheet
    • Investigation
    • Internals
    • Active Directory
    • MISC
  • Linux
    • Forensics
    • SSH
    • Linux WebShells
    • Directories of Interest
    • Internals
  • Enterprise Architecture
    • CI/CD Pipline
    • Citrix
    • Web Applications
    • The Cloud
      • AWS
      • Azure
        • Hunting
        • Admin
        • Securing Azure
        • CheatSheet
        • Detections
        • Forensics
        • Attacking Azure
        • Fundementals
        • Logging
      • M365
      • Cloud Labs
    • vSphere
    • Containers
    • Troubleshooting
  • Mac
    • Forensics
  • Attacker Information
    • Adversary Operations
    • Actor Playbooks
    • Abused Domains
  • IR Playbook
    • Activity from Unmanaged Host
    • Recommendations
  • Reverse Engineering
    • Python - Pyinstaller
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Enterprise Architecturechevron-right
  2. The Cloudchevron-right
  3. Azure

Hunting

LogoHunting in Azure subscriptions | Microsoft Community HubTECHCOMMUNITY.MICROSOFT.COMchevron-right
LogoAzure Attack Paths ManagementSofblockschevron-right
LogoExploring Azure Cloud Attack Vectors In 2024 — Compromising Sensitive Storage Account ContainersMediumchevron-right
LogoMURKY PANDA: Trusted-Relationship Cloud Threat | CrowdStrikeCrowdStrike.comchevron-right
https://www.elastic.co/docs/reference/security/prebuilt-rules/rules/integrations/azure/persistence_azure_global_administrator_role_assignedwww.elastic.cochevron-right
LogoOffice365 Attacks: Bypassing MFA, Achieving Persistence and More - Part Iwww.inversecos.comchevron-right
LogoAttacks on Azure AD and M365: Pawning the cloud, PTA Skeleton Keys and more - PART IIwww.inversecos.comchevron-right
PreviousAzurechevron-leftNextAdminchevron-right

Last updated 4 months ago