Exploiting Misconfigurations in Azure AWS, and GCP

The Cloud as a Primary Attack Surface
Reconnaissance and Enumeration
Azure:
Credentialed Access (via Az CLI):
MicroBurst (PowerShell)
Google Cloud Platform (GCP):
Enumeration with gcloud CLI:
CloudFox Sample Command:

AWS (Amazon Web Services)
High Impact Misconfigurations in GCP, AWS, and Azure
Azure Misconfigurations
Misconfigurations, Attack Vector & Impact:
GCP Misconfigurations
Misconfigurations, Attack Vector & Impact:
AWS Misconfigurations
Misconfigurations, Attack Vector & Impact:
Privilege Escalation and Lateral Movement
Azure Escalation Chain Example:
GCP Escalation Chain Example:
AWS Escalation Chain Example:
Hands-On Labs and Simulations
Azure Labs
GCP Labs
AWS Labs
Blue Team Countermeasures
Final Thoughts
PreviousExploiting Kerberos Delegation in Active Directory in 2025NextInitial Access via Microsoft Teams External Tenants
Last updated
