Skip to content

Commit c3c43b4

Browse files
committed
f
1 parent dfa658e commit c3c43b4

14 files changed

+1
-14
lines changed

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,4 +40,3 @@ This section covers the pivoting techniques to move from a compromised Entra ID
4040
{{#include ../../../banners/hacktricks-training.md}}
4141

4242

43-

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-arc-vulnerable-gpo-deploy-script.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,4 +70,3 @@ At this point, we can gather the remaining information needed to connect to Azur
7070

7171
{{#include ../../../banners/hacktricks-training.md}}
7272

73-

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-cloud-kerberos-trust.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,4 +85,3 @@ This dumps all AD user password hashes, giving the attacker the KRBTGT hash (let
8585
{{#include ../../../banners/hacktricks-training.md}}
8686

8787

88-

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-cloud-sync.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,4 +163,3 @@ az rest \
163163

164164

165165
{{#include ../../../banners/hacktricks-training.md}}
166-

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-connect-sync.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,4 +216,3 @@ seamless-sso.md
216216
{{#include ../../../banners/hacktricks-training.md}}
217217
218218
219-

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-domain-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,4 +87,4 @@ while IFS=$'\t' read -r vm_name resource_group; do
8787
done <<< "$vm_list"
8888
```
8989

90-
{{#include ../../../banners/hacktricks-training.md}}
90+
{{#include ../../../banners/hacktricks-training.md}}

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-federation.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,4 +161,3 @@ Open-AADIntOffice365Portal -ImmutableID "aodilmsic30fugCUgHxsnK==" -Issuer http:
161161
{{#include ../../../banners/hacktricks-training.md}}
162162
163163
164-

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-hybrid-identity-misc-attacks.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,4 +29,3 @@ In order to synchronize a new user from Entra ID to the on-prem AD these are the
2929
{{#include ../../../banners/hacktricks-training.md}}
3030

3131

32-

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-local-cloud-credentials.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,4 +61,3 @@ curl -o <filename_output> -L -H "Authorization: Bearer <token>" '<@microsoft.gra
6161
{{#include ../../../banners/hacktricks-training.md}}
6262

6363

64-

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pass-the-certificate.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,4 +39,3 @@ Main.py [-h] --usercert USERCERT --certpass CERTPASS --remoteip REMOTEIP
3939
{{#include ../../../banners/hacktricks-training.md}}
4040

4141

42-

0 commit comments

Comments
 (0)