Azure Attack Techniques - Part II