Az - VMs & Network Post Exploitation
Reading time: 2 minutes
tip
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Virtual Desktop
For more info about Virtual Desktop check the following page:
Common techniques
- Overwrite a MSIX package from the storage account to get RCE in any VM using that app.
- In a remoteapp it’s possible to change the path of the binary to execute.
- Escape from apps to a shell to get RCE.
- Any post exploitation attack & persistence from Azure VMs.
- It’s possible to configure a script to be executed in pool to apply custom configurations
tip
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.