Go from security novice to ethical hacking expert and discover vulnerabilities before attackers can exploit them with the help of real-world attack simulations and hands-on labs
Key Features
Discover how attackers find and abuse cloud misconfiguration, weak identity controls, and exposed IDs
Learn advanced techniques for privilege escalation, moving across Azure tenants, and maintaining persistence
Stay ahead of evolving threats with cutting-edge attack techniques, automated exploits, and real-world case studies
Purchase of the print or Kindle book includes a free PDF eBook
Book DescriptionThe rapid growth of cloud computing and Microsoft Azure's vast capabilities have made it a prime target for attackers. Penetration Testing Azure for Ethical Hackers is your hands-on guide to staying ahead of these threats by learning how to identify and fix vulnerabilities before they're exploited.
Building on the success of its predecessor, this second edition is fully updated to cover modern attack strategies, sophisticated privilege escalation methods, and emerging Azure security challenges. Starting with the setting up of a dedicated Azure penetration testing environment, the book systematically guides you through reconnaissance methods, lateral movement tactics, and persistence techniques specifically engineered for Azure cloud environments. Through real-world case studies, step-by-step attack simulations, and mitigation strategies, you'll develop practical skills for strengthening your organization's security posture.
By the end, you'll be equipped with the knowledge and technical skills needed to perform advanced Azure security assessments effectively.What you will learn
Set up an Azure pentesting lab personalized for you
Anonymously search for high-risk misconfigurations and vulnerabilities
Execute initial access attacks like credential theft and phishing
Escalate privileges via misconfigured roles and resource policies
Exploit service credentials, access keys, Azure Key Vault, and tokens
Exfiltrate data from Azure Storage, SQL database, and serverless applications
Maintain persistence using Logic Apps, Azure Functions, and identities
Who this book is forThis book is for cybersecurity professionals, penetration testers, cloud security specialists, and IT administrators who want to simulate real-world attacks on Microsoft Azure environments. If you're an Azure administrator, developer, or DevOps engineer looking to secure your infrastructure against potential attackers, this book is an essential guide to identifying and mitigating risks effectively.
Auflage
Sprache
Verlagsort
Editions-Typ
Maße
Höhe: 235 mm
Breite: 191 mm
ISBN-13
978-1-83588-058-6 (9781835880586)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
David Okeyode is a leading cloud security architect with extensive experience in Azure security consulting, training, and research. He has authored multiple cloud security courses and speaks at major cybersecurity events worldwide. Rogier Dijkman is a cloud security architect, security researcher, and active contributor to multiple security projects. With deep expertise in Microsoft Azure, he has developed numerous tools for both offensive and defensive security within Azure and Entra ID. As the founder of the SecureHats community, Rogier actively shares his insights and innovations through his blog and various security initiatives. His contributions to the field have earned him recognition as a Microsoft Security MVP for several years. As a Practice Director at NetSPI, Karl leads the Cloud Penetration Testing service line and oversees NetSPI's Portland, OR office. Karl holds a BS in Computer Science from the University of Minnesota and has over a decade of consulting experience in the computer security industry. Karl spends most of his research time focusing on Azure security and contributing to the NetSPI blog. As part of this research, Karl created the MicroBurst toolkit on GitHub to house many of the PowerShell tools that he uses for testing Azure.
Table of Contents
Azure Platform and Architecture Overview
Building Your Azure Pentesting Environment
Anonymous Discovery and Reconnaissance
Initial Access and Credential Theft
Privilege Escalation Attacks
Hunting and Harvesting Service Credentials
Data Exfiltration Attacks
Code Execution Attacks
Persistence Attacks and Defense Evasion