diff --git a/src/pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-container-registry-unauth.md b/src/pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-container-registry-unauth.md index 7c0cf5dea..2d97413a0 100644 --- a/src/pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-container-registry-unauth.md +++ b/src/pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-container-registry-unauth.md @@ -22,4 +22,3 @@ az acr update --name --anonymous-pull-enabled true Then, **anyone knowing the registry name** can pull images from `.azurecr.io`. {{#include ../../../banners/hacktricks-training.md}} -