Hacking the Cloud - Cloud Security Alliance · Hacking the Cloud PENETRATION TESTING IN AZURE....

29
Hacking the Cloud PENETRATION TESTING IN AZURE

Transcript of Hacking the Cloud - Cloud Security Alliance · Hacking the Cloud PENETRATION TESTING IN AZURE....

Hacking the CloudPENETRATION TESTING IN AZURE

Agenda

• > whoami

• Why Red Team

• Attack Methodology

• Best Practices

Matt Burrough

The Purpose of a Red Team

• Penetration Testers whose aim is to find security weaknesses before a real attacker can

• Best Friends/Archrivals of the Blue Team (Defenders)

• Often operate with “Assume Breach” mindset

• Exercises the detection and response capabilities of the security operations teams

• Complements existing security controls (code reviews, SDL, auditing)

Methodology

1. Establish Scope / Get Permission

2. Initial Reconnaissance

3. Gain Subscription Access

4. Cloud Service Exploitation & Pivot

1. Scoping: A Hybrid Approach

Private Cloud

Public Cloud

CorporateNetwork

Permission

• https://security-forms.azure.com/penetration-testing

• https://security-forms.azure.com/penetration-testing/terms

2. Reconnaissance

• Intranet pages

• SharePoint

• GitHub / VSO

• LinkedIn

• Leaked Password Lists

• Nmap

• Nessus

3. Gaining Access

• Phishing

• Leaked Credentials

• Stolen Credentials

• Two-Factor Authentication Bypass

Phishing

• Check Employee Readiness

• Validate Security Operations Response

Leaking Credentials

• Management Certificates

• .PublishSettings Files

• .Config Files

• Storage Account Keys

Management Certificates

.PublishSettings Files

.Config Files

Storage Account Keys

Stolen Credentials

• Password Lists

• Password Cracking

• Mimikatz

Password Lists

Password Cracking

• Dictionary

• Brute Force

Mimikatz

Two-Factor Bypass

• Service Accounts

• Piggy Backing

• Cookie Theft

Cookie Theft

4. Cloud Service Exploitation / Pivoting

• Misconfigurations

• Firewall Rules / ACLs

• Security Monitoring

• Design Flaws

• Data Theft

• VHD Downloads

Firewall Rules & ACLs

Lack of Monitoring For Changes

• Adding User or Management Cert to Subscription

• Adding/removing a role to an RBAC user

Design Flaws

• Find vulnerabilities, exploit them.

VHD Cloning

Best Practices

• Enable & use any security features available

• Enable 2FA

• Use alt-accounts and SAWs/PAWs

• Audit your logs regularly and alert on key events

• Separate DEV and PROD, Logging

• Least Privilege

Thanks!MAT T B UR R O UGHMAT T B URR @MICR OSOFT.COM@ MAT T B UR RO UGH