Azure Attack Techniques - Part III