Topics

  • Extract secrets from Key vaults by abusing managed identity.

  • Mapping attack paths by reading role assginments.

  • Extract secrets from deployment history.

  • Extract clear-text application passwords and tokens from a compromised Azure user’s workstation.

  • Extract secrets from blob storage.

Sign up to our mailing list to receive updates!

Extracting Secrets from a Compromised Environment

  • Examining Managed Identities: Investigate how attackers exploit managed identities to access Key vaults and extract sensitive information.

  • Role Assignments Scrutiny: Understand how to map potential attack paths by analyzing Azure role assignments, which might reveal pathways to escalate privileges or access restricted resources.

  • Deployment History Inspection: Discover methods to retrieve secrets and configurations from past deployments, which may not have proper protections against unauthorized access.

  • Workstation Compromise Analysis: Learn how to extract plaintext passwords, API tokens, and other sensitive data directly from the workstations of compromised Azure users, highlighting the importance of endpoint security.

  • Blob Storage Vulnerabilities: Explore techniques to uncover and exploit weaknesses in blob storage configurations, allowing unauthorized users to access and extract stored secrets.

Last updated