mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-02-05 19:32:24 -08:00
Translated ['src/pentesting-cloud/azure-security/az-privilege-escalation
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
## 虚拟机与网络
|
||||
## VMS & 网络
|
||||
|
||||
有关 Azure 虚拟机和网络的更多信息,请查看:
|
||||
|
||||
@@ -87,7 +87,7 @@ Set-AzVMAccessExtension -ResourceGroupName "<rsc-group>" -VMName "<vm-name>" -Na
|
||||
{{#endtab }}
|
||||
{{#endtabs }}
|
||||
|
||||
还可以利用知名扩展在虚拟机内执行代码或执行特权操作:
|
||||
还可以滥用知名扩展在虚拟机内执行代码或执行特权操作:
|
||||
|
||||
<details>
|
||||
|
||||
@@ -167,7 +167,7 @@ Set-AzVMDscExtension `
|
||||
|
||||
最后两个权限可以通过与租户共享应用程序来避免。
|
||||
|
||||
利用示例以执行任意命令:
|
||||
执行任意命令的利用示例:
|
||||
|
||||
{{#tabs }}
|
||||
{{#tab name="Linux" }}
|
||||
@@ -351,6 +351,6 @@ https://book.hacktricks.wiki/en/pentesting-web/ssrf-server-side-request-forgery/
|
||||
|
||||
### TODO: Microsoft.Compute/virtualMachines/WACloginAsAdmin/action
|
||||
|
||||
根据[**文档**](https://learn.microsoft.com/en-us/azure/role-based-access-control/permissions/compute#microsoftcompute),此权限允许您通过Windows Admin Center以管理员身份管理资源的操作系统。因此,这似乎允许访问WAC以控制虚拟机...
|
||||
根据[**文档**](https://learn.microsoft.com/en-us/azure/role-based-access-control/permissions/compute#microsoftcompute),此权限允许您通过 Windows Admin Center 以管理员身份管理资源的操作系统。因此,这似乎允许访问 WAC 来控制虚拟机...
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
Reference in New Issue
Block a user