Offensive Cloud Security

Abusing Azure Arc for lateral movement

What is Azure Arc ?

According to Microsoft, Azure Arc is a bridge that extends the Azure platform to help you build applications and services with the flexibility to run across datacenters, at the edge, and in multi-cloud environments.

In simple words, Azure Arc is designed to allow you to manage resource on-premises, other public cloud (AWS, GCP, Alibaba, etc.) and edge devices (IoT) from Azure Portal.

Currently, the supported resource types which are hosted outside of Azure are the following:

  • Physical and Virtual Windows and Linux Servers
  • Kubernetes Clusters
  • Azure data services (SQL Managed Instance and PostgreSQL Hyperscale)
  • SQL Server
  • VMWare vSphere or Azure Stack HCI

Why Azure Arc ? The benefits of using Azure Arc are the following:

  • Centralize platform (Azure) to manage all resources (Azure, on-premises and multi-cloud)
  • Deploy policies and maintain compliance and governance
  • Utilize Azure Security Center
  • Patching Management
  • Azure Monitor — Forward event viewer logs to your SIEM
  • Utilize RBAC, tagging and identity policies
  • Use Automation like extension where you can install application that provide post-deployment configuration
  • There’s no cost to start. Just pay for policies and other azure services that is attached. (e.g. Azure Defender or Azure Monitor)

How to onboard on-premise or multi-cloud resource ?

Onboarding is very simple either if you want to onboard one or multiple servers.

From Azure Portal search for Azure Arc:

At left-hand side, under Infrastructure click Servers and then Add: For the purpose of the demo, we are going to onboard

By |2024-11-16T09:41:32+02:0016/11/2024|Categories: #BreachingAzure, Offensive Cloud Security|Tags: |Comments Off on Abusing Azure Arc for lateral movement

Intro To AWS Enumeration – Part 1

Hello and welcome to CloudBreach’s first blog post on “Introduction to AWS Enumeration” with a special emphasis on the security aspects. In the dynamic realm of cloud security, the paramount first step of any offensive security engagement is undoubtedly enumeration. This methodical process of gathering comprehensive information about target systems is not just a preliminary step; it is the cornerstone upon which successful security engagements are built. Even in the intricate and expansive cloud environments, the principle of ‘Enumeration First’ holds its ground as the key to unveiling the concealed vulnerabilities and potential attack vectors.

Our short blog delves deep into unlocking the secrets of unauthenticated AWS S3 enumeration through the lens of a potential adversary. Upcoming blogposts will explore the security dimensions other AWS services.

What is Amazon S3 ?

Amazon Simple Storage Service (Amazon S3) is a scalable object storage service provided by Amazon Web Services (AWS). It is designed to store and retrieve any amount of data from anywhere on the web.

Image Source: Amazon S3 Documentation [https://aws.amazon.com/s3/]

In the context of AWS enumeration, particularly when discussing Amazon S3, there are two main types of enumeration: unauthenticated and authenticated. Each type has its own methodologies, tools, limitations. In this article, we will focus

By |2024-03-10T13:26:25+02:0005/02/2024|Categories: #BreachingAWS, Offensive Cloud Security|Tags: , , , |Comments Off on Intro To AWS Enumeration – Part 1
Go to Top