Cloud Penetration Testing with Azure - Master Initial Access
- Description
- Curriculum
- FAQ
- Reviews
Welcome to “Cloud Penetration Testing with Azure – Master Initial Access,” your ultimate guide to mastering cloud-specific penetration testing and ethical hacking in Microsoft Azure. Designed for all skill levels, this course combines comprehensive theoretical knowledge with hands-on practical exercises to enhance your cloud security expertise with NO prior cloud knowledge required.
This course is ideal for both beginners and experienced cybersecurity professionals looking to deepen their knowledge and skills in cloud security.
We begin by setting up your pentesting lab environment using FREE Microsoft 365 and Azure subscriptions. You’ll secure admin accounts, configure Entra ID user accounts, and leverage tools like AAD Internals for effective reconnaissance and target identification.
Our focus then shifts to mastering initial access techniques within Azure environments. You’ll master methods such as brute force attacks, password spraying, and sophisticated phishing strategies using tools like EvilGinx and GraphSpy.
You will exploit Azure cloud storage by setting up a pentesting lab for blob hunting, using tools like MicroBurst and ForexBuster to perform predictable resource location attacks.
Throughout the course, you’ll use a variety of powerful tools, including PowerShell scripts to setup lab for penetration testing.
You will learn how to use following tools:
-
AAD Internals
-
O365Spray
-
Evilginx
-
GraphSpy
-
MicroBurst
-
FeroxBuster
-
and more…
The practical approach ensures you can apply your skills directly to Azure environments.
By the end of this course, you’ll have a solid foundation in cloud penetration testing, equipping you with the knowledge and tools to detect, prevent, and secure cloud environment effectively.
-
6Domain Name Discovery: Methods and ToolsVideo lesson
-
7Introduction to AAD InternalsVideo lesson
-
8Essential Methods for Getting DomainsVideo lesson
-
9Accessing OpenID Information Made SimpleVideo lesson
-
10Microsoft Entra ID ExplainedVideo lesson
-
11Reconnaissance of Azure from an Outsider's PerspectiveVideo lesson
-
12Microsoft Entra ID Roles and Azure Permissions ExplainedVideo lesson
-
13Understanding Naming Convention EssentialsVideo lesson
-
14Exploring User Enumeration as an OutsiderVideo lesson
-
15Conducting User Enumeration on Multiple Accounts from OutsideVideo lesson
-
16Understanding Brute Force Attack TechniqueVideo lesson
-
17Password Spray Attacks ExplainedVideo lesson
-
18Step-by-Step Guide Performing a Password Spray AttackVideo lesson
-
19Introduction to Phishing Framework to Bypass MFAVideo lesson
-
20Understanding the Prerequisites for Phishing LabVideo lesson
-
21Setting Up Infrastructure for EvilGinxVideo lesson
-
22Evilginx Installation Guide for PentestersVideo lesson
-
23Setting Up MFA Before Phishing AttemptVideo lesson
-
24Executing Phishing Attacks Using EvilGinxVideo lesson
-
25Device Code Phishing TechniquesVideo lesson
-
26Understanding GraphSpy: Overview and ApplicationVideo lesson
-
27GraphSpy Installation and ConfigurationVideo lesson
-
28Executing Device Code Phishing AttacksVideo lesson
-
29Introduction to Storage HuntingVideo lesson
-
30Cloud Storage Account ExplainedVideo lesson
-
31Creating Pentesting Lab for Blob HuntingVideo lesson
-
32Setting up Pentesting Tool to Exploit Blob StorageVideo lesson
-
33How to Exploit Cloud Storage AccountVideo lesson
-
34Other Tools for Blob HuntingVideo lesson
-
35Predictable Resource Location Attack with FeroxBusterVideo lesson

External Links May Contain Affiliate Links read more