ATTACK PHASE - DISCOVERY AND RECON
Practice techniques that would help in discovering more about the target. During the discovery and recon phase we usually do not have any sort of authenticated access.
Logic App 16
Sensitive Info in Workflow
Key Vault 04
Subdomain Enumeration for Key Vault
Logic App 02
Tamper Trigger Parameter and Request
Storage Account 17
Enumerate Blob Name
Logic App 01
Tamper Trigger Parameter
Storage Account 14
Minting SAS URI
Storage Account 02
Subdomain Enumeration