A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
β Scribed by Matt Burrough
- Publisher
- No Starch Press
- Year
- 2018
- Tongue
- English
- Leaves
- 285
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies. You'll start by learning how to approach a cloud-focused penetration test and how to obtain the proper permissions to execute it; then, you'll learn to perform reconnaissance on an Azure subscription, gain access to Azure Storage accounts, and dig into Azure's Infrastructure as a Service (IaaS). You'll also learn how to: - Uncover weaknesses in virtual machine settings that enable you to acquire passwords, binaries, code, and settings files - Use PowerShell commands to find IP addresses, administrative users, and resource details - Find security issues related to multi-factor authentication and management certificates - Penetrate networks by enumerating firewall rules - Investigate specialized services like Azure Key Vault, Azure Web Apps, and Azure Automation - View logs and security events to find out when you've been caught Packed with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations.
β¦ Table of Contents
Title Page
Copyright Page
About the Author
About the Technical Reviewer
Dedication
BRIEF CONTENTS
CONTENTS IN DETAIL
FOREWORD by Thomas W. Shinder, MD
ACKNOWLEDGMENTS
INTRODUCTION
About Penetration Testing
What This Book Is About
How This Book Is Organized
What Youβll Need to Run the Tools
1 PREPARATION
A Hybrid Approach
Getting Permission
Summary
2 ACCESS METHODS
Azure Deployment Models
Obtaining Credentials
Mimikatz
Best Practices: Usernames and Passwords
Usernames and Passwords
Best Practices: Management Certificates
Finding Management Certificates
Best Practices: Protecting Privileged Accounts
Encountering Two-Factor Authentication
Summary
3 RECONNAISSANCE
Installing PowerShell and the Azure PowerShell Module
Service Models
Best Practices: PowerShell Security
Authenticating with the PowerShell Module and CLI
Authenticating with Management Certificates
Best Practices: Service Principals
Authenticating with Service Principals
Best Practices: Subscription Security
Gathering Subscription Information
Gathering Information on Networking
Consolidated PowerShell Scripts
Summary
4 EXAMINING STORAGE
Best Practices: Storage Security
Accessing Storage Accounts
Where to Find Storage Credentials
Accessing Storage Types
Summary
5 TARGETING VIRTUAL MACHINES
Best Practices: VM Security
Virtual Hard Disk Theft and Analysis
Exploring the VHD with Autopsy
Cracking Password Hashes
Password Hash Attack Tools
Using a VHDβs Secrets Against a VM
Resetting a Virtual Machineβs Credentials
Summary
6 INVESTIGATING NETWORKS
Best Practices: Network Security
Avoiding Firewalls
Cloud-to-Corporate Network Bridging
Summary
7 OTHER AZURE SERVICES
Best Practices: Key Vault
Examining Azure Key Vault
Targeting Web Apps
Best Practices: Automation
Leveraging Azure Automation
Summary
8 MONITORING, LOGS, AND ALERTS
Azure Security Center
Operations Management Suite
Secure DevOps Kit
Custom Log Handling
Summary
GLOSSARY
INDEX
π SIMILAR VOLUMES
<b>A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple.</b><br /><br />You'll learn how to:<br />-Gain access by circumventing two-factor authentication and stealing m
A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small. You'll learn how to: β’ Find security issues related to multi-factor authentication and management certificates β’ Make
When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to manipulate, there are still critical security bugs that can be exploited. In response to this issue, author Kunal Relan offers a concise, deep dive into iOS Security, including all the tools