From 293ae05fb9e99bf657f1994e0a536a7a31d37f05 Mon Sep 17 00:00:00 2001 From: SirBroccoli Date: Sat, 15 Nov 2025 17:27:13 +0100 Subject: [PATCH] Update pentesting-cloud-methodology.md structure Removed sections on Attack Graph and Office365, and added a section on Common Cloud Security Features. --- src/pentesting-cloud/pentesting-cloud-methodology.md | 11 ++--------- 1 file changed, 2 insertions(+), 9 deletions(-) diff --git a/src/pentesting-cloud/pentesting-cloud-methodology.md b/src/pentesting-cloud/pentesting-cloud-methodology.md index a24603c76..9aa8f5ec6 100644 --- a/src/pentesting-cloud/pentesting-cloud-methodology.md +++ b/src/pentesting-cloud/pentesting-cloud-methodology.md @@ -446,16 +446,9 @@ aws-security/ azure-security/ {{#endref}} -### Attack Graph +## Common Cloud Security Features -[**Stormspotter** ](https://github.com/Azure/Stormspotter)creates an “attack graph” of the resources in an Azure subscription. It enables red teams and pentesters to visualize the attack surface and pivot opportunities within a tenant, and supercharges your defenders to quickly orient and prioritize incident response work. - -### Office365 - -You need **Global Admin** or at least **Global Admin Reader** (but note that Global Admin Reader is a little bit limited). However, those limitations appear in some PS modules and can be bypassed accessing the features **via the web application**. - - -## Confidential Computing +### Confidential Computing {{#ref}} confidential-computing/luks2-header-malleability-null-cipher-abuse.md