Lares Labs
  • Home
  • About
  • The Team
  • Pentesting 101
  • Social Engineering 101
  • GitHub
  • Contact Us
  • Lares.com

Lee Kagan

purpleteam

Hunting Azure Admins for Vertical Escalation: Part 2

This post is part 2 in the Hunting Azure Admins for Vertical Escalation series. Part 1 of this series detailed the usage and functionality of Azure authentication tokens, file locations that cache the tokens during a user session (“%USERPROFILE%\.Azure\TokenCache.dat”), methods for locating user exported Azure context files
Apr 2, 2020 3 min read
purpleteam

Hunting Azure Admins for Vertical Escalation

In this post, we will look at a rather simple, but important procedure when attacking organizations that leverage cloud providers such as Microsoft Azure. There is a lot of excellent public research on attacking Azure, however, most research tends to focus on tactics that assume you have first obtained some
Mar 13, 2020 7 min read
Page 1 of 1
Lares Labs © 2025
  • Twitter
  • GitHub
  • LinkedIn
Powered by Lares