mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2025-12-12 07:40:49 -08:00
f
This commit is contained in:
@@ -454,7 +454,7 @@
|
||||
- [Az - Pass the Cookie](pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pass-the-cookie.md)
|
||||
- [Az - Primary Refresh Token (PRT)](pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-primary-refresh-token-prt.md)
|
||||
- [Az - PTA - Pass-through Authentication](pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pta-pass-through-authentication.md)
|
||||
- [Az - Seamless SSO](pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/seamless-sso.md)
|
||||
- [Az - Seamless SSO](pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-seamless-sso)
|
||||
- [Az - Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/README.md)
|
||||
- [Az - Blob Storage Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.md)
|
||||
- [Az - CosmosDB Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.md)
|
||||
|
||||
@@ -196,7 +196,7 @@ It's also possible to dump the password of this user.
|
||||
It's possible to use Seamless SSO with PHS, which is vulnerable to other abuses. Check it in:
|
||||
|
||||
{{#ref}}
|
||||
seamless-sso.md
|
||||
az-seamless-sso.md
|
||||
{{#endref}}
|
||||
|
||||
## Pivoting Entra ID --> AD
|
||||
|
||||
@@ -94,7 +94,7 @@ This backdoor will:
|
||||
It's possible to use Seamless SSO with PTA, which is vulnerable to other abuses. Check it in:
|
||||
|
||||
{{#ref}}
|
||||
seamless-sso.md
|
||||
az-seamless-sso.md
|
||||
{{#endref}}
|
||||
|
||||
## References
|
||||
|
||||
Reference in New Issue
Block a user