diff --git a/src/pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-container-registry-unauth.md b/src/pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-container-registry-unauth.md new file mode 100644 index 000000000..88c947523 --- /dev/null +++ b/src/pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-container-registry-unauth.md @@ -0,0 +1,22 @@ +# Az - Container Registry Unauth + +{{#include ../../../banners/hacktricks-training.md}} + +## Container Registry Unauth + +Per ulteriori informazioni sul container registry, controlla: + +{{#ref}} +../az-services/az-container-registry.md +{{#endref}} + +### Accesso Pull Anonimo + +È possibile **consentire l'accesso pull anonimo alle immagini** all'interno di un registry. +```bash +# Authorize anonymous pulls +az acr update --name --anonymous-pull-enabled true +``` +Quindi, **chiunque conosca il nome del registro** può estrarre immagini da `.azurecr.io`. + +{{#include ../../../banners/hacktricks-training.md}}