diff --git a/pentesting-cloud/azure-security/az-services/az-file-shares.md b/pentesting-cloud/azure-security/az-services/az-file-shares.md index 400d3a0e4..5ca733e45 100644 --- a/pentesting-cloud/azure-security/az-services/az-file-shares.md +++ b/pentesting-cloud/azure-security/az-services/az-file-shares.md @@ -43,6 +43,9 @@ Learn & practice GCP Hacking: +az storage share-rm list --storage-account # To see the deleted ones too --include-deleted # Get dirs/files inside the share az storage file list --account-name --share-name ## If type is "dir", you can continue enumerating files inside of it @@ -65,6 +69,33 @@ az storage file list --account-name --share-name --snapshot az storage file download-batch -d . --account-name --source --snapshot ``` {% endcode %} +{% endtab %} + +{% tab title="Az PowerShell" %} +{% code overflow="wrap" %} +```powershell +Get-AzStorageAccount + +# List File Shares +Get-AzStorageShare -Context (Get-AzStorageAccount -ResourceGroupName "" -Name "").Context + +# Get Directories/Files Inside the Share +Get-AzStorageFile -ShareName "" -Context (Get-AzStorageAccount -ResourceGroupName "" -Name "").Context +Get-AzStorageFile -ShareName "" -Path "" -Context (Get-AzStorageAccount -ResourceGroupName "" -Name "").Context + +# Download a Complete Share +Get-AzStorageFileContent -ShareName "" -Destination "C:\Download" -Path "" -Context (Get-AzStorageAccount -ResourceGroupName "" -Name "").Context + +# Get Snapshots/Backups +Get-AzStorageShare -Context (Get-AzStorageAccount -ResourceGroupName "" -Name "").Context | Where-Object { $_.SnapshotTime -ne $null } + +# List Contents of a Snapshot/Backup +Get-AzStorageFile -ShareName "" -Context (New-AzStorageContext -StorageAccountName "" -StorageAccountKey (Get-AzStorageAccountKey -ResourceGroupName "" -Name "" | Select-Object -ExpandProperty Value) -SnapshotTime "") + +``` +{% endcode %} +{% endtab %} +{% endtabs %} {% hint style="info" %} By default `az` cli will use an account key to sign a key and perform the action. To use the Entra ID principal privileges use the parameters `--auth-mode login --enable-file-backup-request-intent`.