Az - VMs & Network Post Exploitation

Reading time: 2 minutes

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks

Virtual Desktop

Kwa maelezo zaidi kuhusu Virtual Desktop angalia ukurasa ufuatao:

Az - Virtual Desktop

Mbinu za kawaida

  • Overwrite a MSIX package from the storage account to get RCE in any VM using that app.
  • In a remoteapp it’s possible to change the path of the binary to execute.
  • Escape from apps to a shell to get RCE.
  • Any post exploitation attack & persistence from Azure VMs.
  • It’s possible to configure a script to be executed in pool to apply custom configurations

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks