AZURE
Azure
Documentation : https://learn.microsoft.com/en-us/azure/virtual-machines/windows/instance-metadata-service?tabs=linux
Tips for Recon
Service Enumeration: Use tools to map out Azure-specific services (e.g., *.blob.core.windows.net, *.table.core.windows.net, *.azurewebsites.net).
Inspect Certificates & DNS: Certificates and DNS records might reveal additional subdomains and services.
Focus on Least Privilege: Assess for any unnecessary or excessive permissions.
Top 100 things to checks
Azure Blob Storage Publicly Accessible Blobs: Identify and access misconfigured blobs. Check for sensitive data exposure. SAS Token Issues: Look for overly permissive sas tokens that allow unauthorized write or delete actions.
Azure Active Directory (AAD) OAuth/OpenID Connect Misconfigurations: Test for flaws in token handling, improper redirect URI validation, or missing scope checks. Account Takeover Opportunities: Verify the security of AAD accounts. Weak or default credentials can lead to domain takeovers.
Azure Resource Manager (ARM) Unauthenticated ARM API Access: Check if any management API endpoints are exposed without authentication. RBAC Privilege Issues: Ensure proper Role-Based Access Control (RBAC) to prevent privilege escalation.
Azure Kubernetes Service (AKS) Kubernetes Dashboard Exposure: Check if the dashboard is accessible publicly, which can lead to a cluster takeover. Cluster Security Issues: Review pod security policies, network settings, and authentication mechanisms for weaknesses.
Virtual Machines (VMs) Management Port Exposure: Scan for open SSH (Linux), RDP (Windows), or WinRM ports. An exposed management port can be an entry point. NSG Rules Analysis: Review Network Security Group (NSG) rules for overly permissive settings.
Azure Functions Unauthenticated Public Access: Verify if any serverless function endpoints are exposed without authentication. Sensitive Environment Variables: Inspect function configurations for credentials or sensitive data leaks.
Azure SQL Database SQL Injection Checks: Perform tests on apps interfacing with Azure SQL to find SQL injection vulnerabilities. Firewall Misconfigurations: Ensure databases are only accessible from authorized IP ranges.
Azure Logic Apps and Automation Misconfigured Workflows: Check for exposed webhooks or automation scripts that may leak sensitive information. Unauthorized Automation Access: Ensure workflows aren’t publicly accessible without proper authentication.
Azure Key Vault Direct Secrets Access: Verify if access policies are over-permissive, allowing unauthorized users to retrieve secrets. Secrets in Code: Inspect for hardcoded secrets that should be stored securely in Key Vault.
IAM Policies & Managed Identities Over-Permissive Roles: Identify roles granting excessive permissions to users or applications. Managed Identity Exploits: Make sure managed identities are limited to necessary permissions only.
Adddionally you can : Leaks in github (or similar) - OSINT Password reuse (password leaks)
Look for : The file "azureProfile.json" contains info about logged user. "az logout" removes the token. 3rd parties breached The file "accessTokens.json" in az cli before 2.30 stored access tokens in clear text
#Few link to visit and learn more about it
https://cloud.hacktricks.xyz/pentesting-cloud/azure-security
https://medium.com/@surajtheekshanahackerone/bugbounty-writeup-subdomain-takeover-on-trafficmanager-azure-a3a80b058adc
https://senad-cavkusic.medium.com/comprehensive-guide-to-azure-subdomain-takeover-e1babfc6f3ff
https://braropad.medium.com/azure-pentesting-exploiting-the-anonymous-access-to-the-blob-storage-draft-english-d80f3831a590
https://pswalia2u.medium.com/azure-enumeration-6146291f0ebd
https://medium.com/@ajithcrajendran/finding-azure-credentials-unauthenticated-e1027b762b3a
https://medium.com/@Land2Cyber/securing-cloud-environments-bug-bounty-best-practices-for-aws-azure-and-gcp-3aa88ce6cfe1
https://sheshasai.medium.com/azure-cloud-penetration-testing-aff39d7a12c7
https://shellbr3ak.medium.com/first-time-hacking-the-cloud-205751a4c61
https://xss0r.medium.com/discovering-xss-vulnerabilitie-my-journey-into-microsofts-azure-infrastructure-5cecd53593cd
https://medium.com/@husein.ayoub/azure-dns-takeover-swisscom-7c6aacb38e8
https://portswigger.net/daily-swig/azure-devops-account-takeover-hack-earns-3-000-bug-bounty
https://medium.com/tenable-techblog/microsoft-azure-site-recovery-dll-hijacking-cd8cc34ef80c
https://medium.com/@chenshiri/hacking-azure-key-vault-c14c2e239d0a
https://padsalatushal.medium.com/subdomain-takeover-in-azure-trafficmanager-for-fun-profit-09c858ca3d0e
Last updated