From a84694e794e73ee703b25338f9d69dcca29906e4 Mon Sep 17 00:00:00 2001 From: daniijal <71538616+daniijal@users.noreply.github.com> Date: Tue, 26 Jul 2022 04:38:39 -0700 Subject: [PATCH] Add hyperlink for Azure Dev account MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Thought this would make it look better 😄 --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 37eb0a6..0a5b697 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # Azure Red Team Attack and Detect Workshop -This is a vulnerable-by-design Azure lab, containing 2 x attack paths with common misconfigurations. These vulnerabilities are intended to be representative to those found in live, production environments and the attack vectors are intended to be as realistic as possible to real Threat Actors TTPs. If you would like to see what detections and alerts these attack path vectors are causing, I recommend signing up for a Microsoft E5 trial which has Microsoft Defender for Cloud as well as Azure AD premium P2 plan. Links for signing up to an Azure Developer account can be found in the resources.txt file. +This is a vulnerable-by-design Azure lab, containing 2 x attack paths with common misconfigurations. These vulnerabilities are intended to be representative to those found in live, production environments and the attack vectors are intended to be as realistic as possible to real Threat Actors TTPs. If you would like to see what detections and alerts these attack path vectors are causing, I recommend signing up for a Microsoft E5 trial which has Microsoft Defender for Cloud as well as Azure AD premium P2 plan. Sign up to an Azure Developer account [here](https://developer.microsoft.com/en-us/microsoft-365/dev-program). Each kill-chain has in its folder the Terraform script (and other pre-reqs files needed for deployment) as well as the solutions to the challenges.