A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
โ Scribed by Matt Burrough
- Publisher
- No Starch Press
- Year
- 2018
- Tongue
- English
- Leaves
- 220
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small.
You'll learn how to:
โข Find security issues related to multi-factor authentication and management certificates
โข Make sense of Azure's services by using PowerShell commands to find IP addresses, administrative users, and firewall rules
โข Discover security configuration errors that could lead to exploits against Azure storage and keys
โข Uncover weaknesses in virtual machine settings that enable you to and acquire passwords, binaries, code, and settings files
โข Penetrate networks by enumerating firewall rules
โข Investigate specialized services like Azure Key Vault and Azure Websites
โข Know when you might be caught by viewing logs and security events
Packed with real-world examples from the author's experience as a corporate penetration tester, sample scripts from pen-tests and "Defenders Tips" that explain how companies can reduce risk, Pentesting Azure Applications provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible.
โฆ Subjects
Microsoft Azure; Password Cracking; Cybersecurity; Penetration Testing; PowerShell; Virtualization; Monitoring; Logging; Best Practices; Network Security; Mimikatz
๐ SIMILAR VOLUMES
<b>A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple.</b><br /><br />You'll learn how to:<br />-Gain access by circumventing two-factor authentication and stealing m
A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft
When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to manipulate, there are still critical security bugs that can be exploited. In response to this issue, author Kunal Relan offers a concise, deep dive into iOS Security, including all the tools