Post

Azure Cloud Security Pentesting Skills

Azure Cloud Security Pentesting Skills

Azure Cloud Security Pentesting Skills

A good interview with Karl Fosaaen of NetSPI about pentesting Azure. I recommend his book and his blog.

  • Start with config review - find the cloud footprint.
  • Find vulnerabilities, misconfiguration. Then pentest to demonstrate.
  • See what managed identity there are, what roles they have, what resources they can access. Formulate the path - compromise one, pivot to another resource that has other privileges.
  • Public storage accounts are an easy place to start - there’s API’s to pull it and scrape it.
  • If you have read access to resource group then you can also see all the deployment - these may contain secrets, eg if you forgot to mark something as a secure string.
  • System assigned managed identity - assigned by Azure to a specific resource.
  • User-assigned managed identities - assigned by user to multiple resources. Can be shared - potential for sharing too widely.
  • If you’ve got contributor access to assign managed identities then you can assign it to resources you own and give them permissions.
  • Tools on NetSPI site - eg MicroBurst for Azure discovery.
  • Mitre cloud att&ck framework - broad.
  • Azure specific - Azure Threat Research Matrix.

This also reminded me of Varonis - see who can and does access resources - remove unnecessary access. Enterprise only - no pricing page - schedule a demo.

PS: I bought the book and started reading it. It’s kinda like a pentester’s handbook.

This post is licensed under CC BY 4.0 by the author.