Hack Red Con 2024
-
Abusing DevOps to Pivot Between Cloud and On-Prem
Tom PorterDone
-
Security Operations Culture
Jordan SilvaDone
-
Modifying Impacket for Better OpSec
Ryan O'DonnellDone
-
New Kid on the Block: Getting Started in Application Security
Paige HarlanDone
-
Going Beyond CVSS: Translating Offensive Findings to Business Risk
Celina StewartDone
-
Fun With Protocols: Write a MITM Proxy with Rust
John AskewDone
-
Killing the AI Buzzword
Ben Watkins & Ryan RuddDone
-
Snakes on a Screen: Taming Offensive IronPython Techniques
Jake “Hubble” KrasnovDone
-
The CISO's Myopia
Jordan BonaguraDone
-
Ransomware Orientation: How to Infect and Extort Companies
Andrew LemonDone
Chirag Savla
Chirag Savla is a cyber security professional with 9+ years of experience. His areas of interest include penetration testing, red teaming, azure and active directory security, and post-exploitation research. For fun, he enjoys creating open-source tools and exploring new attack methodologies in his leisure. Chirag has worked extensively on Azure, Active Directory attacks and defense, and bypassing detection mechanisms. He is the author of multiple open-source tools such as Process Injection, Callidus, and others. He has presented at many conferences and local meetups and has trained people in international conferences like Blackhat, BSides Milano, HackSpaceCon, Wild West Hackin’ Fest, Vulncon.
https://twitter.com/chiragsavla94
https://www.linkedin.com/in/chirag-savla-4689161b4/
Raunak Parmar
Raunak Parmar works as a senior cloud security engineer at White Knight Labs. His areas of interest include web penetration testing, Azure/AWS security, source code review, scripting, and development. He has 4+ years of experience in information security. He enjoys researching new attack methodologies and creating open-source tools that can be used during cloud red team activities. He has worked extensively on Azure and AWS and is the author of Vajra, an offensive cloud security tool. He has spoken at multiple respected security conferences like Black Hat, Defcon, Nullcon, RootCon, HackSpaceCon, Vulncon and also at local meetups.
Workshop Description:
Fascinated by the realm of serverless architectures and their security misconfigurations? Azure Function Apps have revolutionized cloud computing, offering an innovative serverless solution for executing code on demand that can interact with multiple services. However, there is a spectrum of potential security misconfigurations and abuse primitives waiting to be exploited by threat actors.
This workshop will delve into various approaches to gaining access to the Function App source code that may leak sensitive information, which indeed can help us in gaining access to other services. We will also look at the approach of deploying backdoors in the Function App in many different languages like .NET, Java, Python, etc. Additionally, we will walkthrough not just the languages but also how different forms of function app deployment that can create unique attack scenarios which can lead to lateral movement or even gaining complete control over the function app codes. Furthermore, we will look through some advanced configurations of function apps that can be leveraged by attackers to pivot from cloud to on-prem servers. In this workshop, we will showcase a real-life demo from one of our Azure pentests that allowed us to perform escalation and lateral movement through function apps, ultimately granting us privileged access to AADConnect Servers.
By uncovering these techniques and providing practical insights into exploitation and mitigation, this research offers valuable knowledge to the cybersecurity community and cloud pentesters. It helps organizations enhance their security posture in the context of Function Apps.