跳到主要内容

ATTACK PHASE - DISCOVERY AND RECON

Practice techniques that would help in discovering more about the target. During the discovery and recon phase we usually do not have any sort of authenticated access.

Logic App 16

Sensitive Info in Workflow

Key Vault 04

Subdomain Enumeration for Key Vault

Logic App 02

Tamper Trigger Parameter and Request

Storage Account 17

Enumerate Blob Name

Logic App 01

Tamper Trigger Parameter

Storage Account 14

Minting SAS URI

Storage Account 02

Subdomain Enumeration