I Hacked The Cloud: Azure Managed Identities

Поделиться
HTML-код
  • Опубликовано: 10 апр 2024
  • jh.live/alteredsecurity || Altered Security has just released their new "Advanced Azure Attacks" course and "Certified Azure Red Team Expert" certification -- use code HAMMOND20 for 20% off ALL THREE of their Azure courses! jh.live/alteredsecurity
    🗨️ "I Hacked The Cloud" -- compromising an Azure website, swiping the access token for the managed identity of the web app, leveraging permissions to gain code execution on a virtual machine, and extracting credentials for further access! 😎 💬
    Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
    📧JOIN MY NEWSLETTER ➡ jh.live/email
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware
    🔥RUclips ALGORITHM ➡ Like, Comment, & Subscribe!

Комментарии • 62

  • @darshannaik1676
    @darshannaik1676 2 месяца назад +13

    I regulary Watch Your Video , But today i wanna say thank you to you man,.. You are doing great job. You Motivate me to work in the cyber security field in interesting way.
    Thank You John Sir !!🙏🏻🙏🏻

    • @RajuSingh-pr8ec
      @RajuSingh-pr8ec 2 месяца назад

      Pjuup the
      :⁠-⁠[8⁠-:⁠'⁠(😮

  • @DePhoegonIsle
    @DePhoegonIsle 2 месяца назад +10

    If this isn't a complete course on why you should disable code or execution of things on an entire directory, or ya know disable direct access to user uploades using an set to call the files in a sanitized way, as clean text only.
    I have to admit it's cool to see some of these things, but alot of these vulnerablities come off more as Pebuac sorts of the one who setup that web service, and less in 'it's in the cloud'.

  • @fredrikzels2637
    @fredrikzels2637 2 месяца назад +1

    This was great. I understood most of it. Started out with PS and now i'm learning linux OS to understand the basics before I go to networks and further.

  • @diabilliq
    @diabilliq 2 месяца назад +2

    very cool writeup! this is something that will get mitigated once CAE (continuous access evaluation) support managed identities.

  • @antifreeze44
    @antifreeze44 2 месяца назад +2

    John's the best there is. These are so Insighful.

  • @greob
    @greob 2 месяца назад +1

    Very nice demonstration!

  • @PracticalAIinstitute
    @PracticalAIinstitute 2 месяца назад +2

    NICE!! well done and thanks for theat

  • @xCheddarB0b42x
    @xCheddarB0b42x 2 месяца назад +2

    Rad stuff. I guess one way to learn Azure AD I mean Entra ID is to learn some attack chains.

  • @Sleeping_Aizawa
    @Sleeping_Aizawa 2 месяца назад +3

    😊 love how your skills have evolved into beautiful public resources for knowledge, understanding, and wisdom. Thank you for all you time and teachings

  • @malikgenius4u
    @malikgenius4u Месяц назад

    great demo ... i didnt know it could escalate this far... secure sites are the key to protect cloud env.

  • @zanidd
    @zanidd 2 месяца назад +2

    I actually wanted to get a blue team cert after the CBBH, but this looks too tempting

  • @logiciananimal
    @logiciananimal 2 месяца назад +1

    If one needs a name, the initial access of the managed identity endpoint is effectively a case of SSRF - server side request forgery.

  • @starlox0
    @starlox0 2 месяца назад +1

    Really awesome video 🎉.....i also learning cloud security 😀

  • @Hybrid_Netowrks
    @Hybrid_Netowrks Месяц назад

    As always John the king of security

  • @gvoden
    @gvoden Месяц назад

    another great video!

  • @papidulzuratravel8715
    @papidulzuratravel8715 Месяц назад

    Amazing thanks!

  • @ancipital
    @ancipital 2 месяца назад

    Interesting stuff - thanks!

  • @NicolasPare
    @NicolasPare 2 месяца назад +1

    John has 'dirbuster' integrated right into his browser's auto complete suggestions :)

  • @IvanStamenkovicSeemsIndie
    @IvanStamenkovicSeemsIndie 2 месяца назад +1

    I am literally right now deploying AKS cluster, and also using Managed Identities for internal stuff. Damn, have to watch this :D

  • @simbad3311
    @simbad3311 2 месяца назад +1

    Really cool mate👍

  • @BillAnt
    @BillAnt 2 месяца назад +1

    Boom, another vuln got Hammonded! :D

  • @creatorofimages7925
    @creatorofimages7925 2 месяца назад +1

    Ah, I see John on the quick side of things. >:D The whole Azure *Tree* with all the Kubernetes Cluster Setups and Managements is beautifully riddled with ... holes. :D

  • @MsDuketown
    @MsDuketown 2 месяца назад +5

    Great uses of SAAS tools! These git-flows all lead back home, and with resources beyond 09-01-2017... So working with URI's is similar to working with URL's, but without the universal curl commandeer? Awesome! Who could of think of that?
    Next up Amazon AWS? Cloudfare? Some other CDN, like fonts for Google?

  • @hazembenmadhi9500
    @hazembenmadhi9500 Месяц назад

    does there is any ctf challenge for demo this attack or something similar to it like azure active directory attacks?

  • @HitemAriania
    @HitemAriania 2 месяца назад +6

    Sir, its Entra ID sir

  • @ALEXWARELLC
    @ALEXWARELLC 2 месяца назад +2

    Security is only as good as the person who sets it up.

  • @xx-be2uz
    @xx-be2uz 2 месяца назад +1

    I do not understand in 06:31 where did you gather the api-version from

  • @youtonew
    @youtonew 2 месяца назад +1

    if we know that there is the page after uploads and we know page name (like you you create your own sheell and there you spesify the C and then you modify the url c=whoami and its executed if we dont upload this kind of shell) then how we execute commands in url

  • @ambroserapose5082
    @ambroserapose5082 2 месяца назад +1

    Hey John, I am a victim of someone hacking my multiple accounts gmail microsoft Facebook twitter etc maybe through my phone or somehow they got access to my Google password manager, Is there any safety steps I can take other than changing password and adding 2 factor authenticator app? Any help is appreciated.

  • @CesSanchez
    @CesSanchez 2 месяца назад +1

    Shoulnd't it be Entra ID, instead of Azure AD, in the cert?

  • @david3199
    @david3199 2 месяца назад +1

    HI John

  • @KyAreTR
    @KyAreTR 2 месяца назад +4

    Isnt all of your attack possible because of the website and code uploaded to the i guess webapp? And not because of Azure, WebApps, Functions or other PaaS in Azure?
    The Title seems very Clickbaity. Please educate me

    • @ryandawson1220
      @ryandawson1220 2 месяца назад

      I agree on this one. When an RCE happens on your server, they will always have access to secrets in one form or fashion. We are pulling our secrets in via Azure Keyvault at runtime with a managed identity, so this particular video interested me. This makes it super easy for the attacker to get access to the Keyvault to pull secrets. However if they are already on the server, they could dump memory and get them this one.
      I think the one take away is to make sure your managed identities are properly scoped. Don't use one managed identity for all applications.

    • @KyAreTR
      @KyAreTR 2 месяца назад

      Agree. Use system managed identity and use IAM to grant access to needed ressources and thats it. And i really do hope that people do not have VMs with PublicIPs available in azure...use a loadbalancer at least infront of it.

    • @rnts08
      @rnts08 2 месяца назад

      110% clickbait. The vulnerability is SSI, which has been known for 20+ years surfacing again due to clueless DevOps managing infrastructure.

  • @55mga
    @55mga 2 месяца назад +1

    Your videos are great. Keep it up, it really helps us all learn. But I admit the conditions for this hack were staged for the hacking adventure, but it shows how multiple vulnerabilities can be used. Thank you.

  • @carsonjamesiv2512
    @carsonjamesiv2512 2 месяца назад

    COOL!

  • @alone_rider_988
    @alone_rider_988 2 месяца назад +2

    Bro do you know how does someone exploited all the data of boat company

  • @joelanzo
    @joelanzo 2 месяца назад

    Serious

  • @basavarajtippannavar3092
    @basavarajtippannavar3092 2 месяца назад

    Bro where is the XZ back door proof of concept video

  • @JohnSmith-jc7dk
    @JohnSmith-jc7dk 2 месяца назад

    You cant get away with this.

  • @shakibbro2
    @shakibbro2 Месяц назад

    please 1 video how to hacked gmail password please please new video
    🙏🙏🙏🙏🙏🙏

  • @peaktheweak
    @peaktheweak 2 месяца назад

    is it just me or did he look at the eclipse a little too long? eyes r a lil red lookin

  • @velo1337
    @velo1337 2 месяца назад

    funny that windows defender detects this as a trojan

  • @jmanuelng
    @jmanuelng 2 месяца назад

    😱

  • @courageousmelon5654
    @courageousmelon5654 2 месяца назад +2

    Azure Active Directory? Don't you mean Entra ID? 🤮

  • @jwspock1690
    @jwspock1690 2 месяца назад

    top

  • @user-ef1rs5to5y
    @user-ef1rs5to5y 2 месяца назад

    Is bro still at the hotel that he leaked the address to in his last video? 😭 be safe bro

  • @lachine1
    @lachine1 2 месяца назад

    early gang

  • @user-yw1lb5ru7p
    @user-yw1lb5ru7p 2 месяца назад

    Old hackers descend ppl from sky to earth sow y will never reach them😂😂😂

  • @SamuraiXSenpai.
    @SamuraiXSenpai. Месяц назад

    Hack my company if you can HOHOHOHO 👹👺👺

  • @fredrikzels2637
    @fredrikzels2637 2 месяца назад

    This was great. I understood most of it. Started out with PS and now i'm learning linux OS to understand the basics before I go to networks and further.