Skip to content

Commit ebd07e4

Browse files
committed
comparison reader with security reader
1 parent 5fbe82b commit ebd07e4

File tree

2 files changed

+24
-3
lines changed

2 files changed

+24
-3
lines changed

src/SUMMARY.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -398,8 +398,8 @@
398398
- [Az - Enumeration Tools](pentesting-cloud/azure-security/az-enumeration-tools.md)
399399
- [Az - Unauthenticated Enum & Initial Entry](pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/README.md)
400400
- [Az - OAuth Apps Phishing](pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.md)
401-
- [Az - Storage Unath](pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-storage-unauth.md)
402-
- [Az - VMs Unath](pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-vms-unauth.md)
401+
- [Az - Storage Unauth](pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-storage-unauth.md)
402+
- [Az - VMs Unauth](pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-vms-unauth.md)
403403
- [Az - Device Code Authentication Phishing](pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-device-code-authentication-phishing.md)
404404
- [Az - Password Spraying](pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-password-spraying.md)
405405
- [Az - Services](pentesting-cloud/azure-security/az-services/README.md)

src/pentesting-cloud/azure-security/az-permissions-for-a-pentest.md

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,30 @@
22

33
{{#include ../../banners/hacktricks-training.md}}
44

5-
To start a white box hardening review of some Entra ID tenats you need to ask for **Global Reader role on each tenant**. Moreover, to perform a hardening review of different Azure subscriptions you would need at least the **Reader permissions over all the subscriptions**.
5+
To start a white box hardening review of some Entra ID tenats you need to ask for **`Global Reader` role on each tenant**. Moreover, to perform a hardening review of different Azure subscriptions you would need at least the **`Reader`role over all the subscriptions**.
66

77
Note that if those roles aren't enough to access all the info you need, you could also ask the client for roles with the permissions you need. Just try to **minimize the amount of not read-only permissions you ask for!**
88

9+
Another option is to ask for **`Security Reader` role** instead of `Reader` if the client complaints to reduce the granted privileges. However, this increases the possibility of the pentester asking for more read roles later as the `Reader` role grants `"*/read"` while the `Security Reader` role grants:
10+
11+
```json
12+
"actions": [
13+
"Microsoft.Authorization/*/read",
14+
"Microsoft.Insights/alertRules/read",
15+
"Microsoft.operationalInsights/workspaces/*/read",
16+
"Microsoft.Resources/deployments/*/read",
17+
"Microsoft.Resources/subscriptions/resourceGroups/read",
18+
"Microsoft.Security/*/read",
19+
"Microsoft.IoTSecurity/*/read",
20+
"Microsoft.Support/*/read",
21+
"Microsoft.Security/iotDefenderSettings/packageDownloads/action",
22+
"Microsoft.Security/iotDefenderSettings/downloadManagerActivation/action",
23+
"Microsoft.Security/iotSensors/downloadResetPassword/action",
24+
"Microsoft.IoTSecurity/defenderSettings/packageDownloads/action",
25+
"Microsoft.IoTSecurity/defenderSettings/downloadManagerActivation/action",
26+
"Microsoft.Management/managementGroups/read"
27+
]
28+
```
29+
930
{{#include ../../banners/hacktricks-training.md}}
1031

0 commit comments

Comments
 (0)