So, next week I’ve been given a task of pentesting an azure windows machine next week. Now, I do have ampful pentest experience, but I don’t think I’ve done much work again azure machines.
Would my exploits and enumeration be evolved around azure and finding exploits within how the machine is set up with azure or does it just work like a VM (azure is the vm for example) and I attack the windows machine.
I’m being given a public IP and that’s it.
This is all for the purpose of logs and data for our SOC and SIEM. Nothing malicious.
Thanks guys! Any help is much appreciated.