Penetration Testing Azure for Ethical Hackers by David Okeyode | Karl Fosaaen

Penetration Testing Azure for Ethical Hackers by David Okeyode | Karl Fosaaen

Author:David Okeyode | Karl Fosaaen
Language: eng
Format: epub
Publisher: Packt Publishing Pvt Ltd
Published: 2021-09-23T00:00:00+00:00


Hands-on exercise – hunting for credentials in the container registry

In this exercise, we will pull container images from an Azure container registry to hunt for credentials that may be embedded in them. As for tools, we will be using the Azure CLI and Docker for the examples in this exercise.

Here are the tasks that we will complete in this exercise:

Task 1: Authenticate to the Azure environment from WSL using the Reader role.

Task 2: Enumerate the container registries in the subscription.

Task 3: Generate a Docker login for the registry and authenticate in WSL.

Task 4: Enumerate the container images and tags in the registry.

Task 5: Pull the images and hunt for credentials in them.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.