Azure Attack Techniques - Part I