Find Privilege Escalation Paths in Microsoft Azure with AzureHound

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ม.ค. 2025

ความคิดเห็น • 9

  • @CyberCelt.
    @CyberCelt. ปีที่แล้ว

    This was great Beau. More Azure attacks using BloodHound or other tools would be amazing. Thanks

  • @meazer
    @meazer 2 ปีที่แล้ว +1

    Another great vid. really good stuff.

  • @itsm3dud39
    @itsm3dud39 3 หลายเดือนก่อน

    but how do i know which services will give privilege escalation?? can you provide any resources to learn privilege escalations in cloud??

  • @elament968
    @elament968 ปีที่แล้ว

    Hey Beau. When are you posting next? No pressure, but I always look forward to your videos 😊

  • @georgesiere161
    @georgesiere161 ปีที่แล้ว

    More like this! Good stuff!

  • @ghostdancer9993
    @ghostdancer9993 ปีที่แล้ว

    So maybe I'm mis-understanding the global admin role, but it seems I can add entitlements to any resource I want by default which seems very different in AWS where the management/payer account (which seems to be the equivalent of global admin) does not have access to certain OUs or keys for example. Only the root owner or creator of that resource would. What am I missing?

    • @jkdmyrs
      @jkdmyrs ปีที่แล้ว

      What are you missing? You’re comparing Azure and AWS… they’re different and have different policies under the hood…?

  • @lanameyers6267
    @lanameyers6267 ปีที่แล้ว

    If someone hacked me doing this, how would I go about securing my account