🐻
jotter's den
search
Ctrlk
  • 🐻jotter's den
  • diagram-projectNetwork
    • External Recon
    • Internal Recon
    • Wireless Attacks
    • Common Protocolschevron-right
    • Linux Privilege Escalationchevron-right
    • Windows Privilege Escalationchevron-right
  • landmark-flagActive Directory
    • Initial Accesschevron-right
    • AD Certificate Serviceschevron-right
    • Post-Exploitationchevron-right
  • cloudCloud
    • Azure/O365chevron-right
      • Recon
      • Initial Access, Tokens, and MFA
      • Enumeration
      • Post-Exploitation
      • IAM and Resource Attacks
    • AWSchevron-right
    • GCP
  • spiderMalware and Evasion
    • Shellcode Loader Guidelines
    • UAC Bypasses
    • AppLocker
    • Anti-Forensicschevron-right
  • globeWeb
    • XSS / CSRF
    • IIS Servers
  • codeBinary Exploitation
    • Reversing
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. cloudCloud

Azure/O365

Reconchevron-rightInitial Access, Tokens, and MFAchevron-rightEnumerationchevron-rightPost-Exploitationchevron-rightIAM and Resource Attackschevron-right
PreviousOther Targetschevron-leftNextReconchevron-right