Table of Contents
- Azure Platform and Architecture Overview
- Building Your Own Environment
- Finding Azure Services and Vulnerabilities
- Exploiting Reader Permissions
- Exploiting Contributor Permissions on IaaS Services
- Exploiting Contributor Permissions on PaaS Services
- Exploiting Owner and Privileged Azure AD Role Permissions
- Persisting in Azure Environments

