Networking in Azure
Our goal in this section is to describe how PowerShell can be used with Azure to perform network reconnaissance and profiling as part of a penetration test. Our goal is to use this information to construct a network map. Once we have a public IP address and name, we can start to use nslookup to explore the type of DNS services:
PS C:\> nslookup devtest.snowcapcyber.com Server:          192.168.1.254 Address:    192.168.1.254#53 Non-authoritative answer: devtest.snowcapcyber.com    canonical name = snowcapcyber.z13.web.core.windows.net. snowcapcyber.z16.web.core.windows.net    canonical name = web.s768fd45.store.core.windows.net. Name:    web.s768fd45.store.core.windows.net Address: 52.239.123.45
From the analysis of the DNS names, we can identify the type of service. The following table lists the available DNS suffixes: