This commit is contained in:
carlospolop
2025-07-30 06:48:21 +02:00
parent ebd15ccb63
commit 84bc28f8bb
4 changed files with 3 additions and 3 deletions

View File

@@ -454,7 +454,7 @@
- [Az - Pass the Cookie](pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pass-the-cookie.md)
- [Az - Primary Refresh Token (PRT)](pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-primary-refresh-token-prt.md)
- [Az - PTA - Pass-through Authentication](pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pta-pass-through-authentication.md)
- [Az - Seamless SSO](pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/seamless-sso.md)
- [Az - Seamless SSO](pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-seamless-sso)
- [Az - Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/README.md)
- [Az - Blob Storage Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.md)
- [Az - CosmosDB Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.md)

View File

@@ -196,7 +196,7 @@ It's also possible to dump the password of this user.
It's possible to use Seamless SSO with PHS, which is vulnerable to other abuses. Check it in:
{{#ref}}
seamless-sso.md
az-seamless-sso.md
{{#endref}}
## Pivoting Entra ID --> AD

View File

@@ -94,7 +94,7 @@ This backdoor will:
It's possible to use Seamless SSO with PTA, which is vulnerable to other abuses. Check it in:
{{#ref}}
seamless-sso.md
az-seamless-sso.md
{{#endref}}
## References