Hack Red Con 2024
-
End the Burnout - 3 things your CISO wishes you knew.
Mark Thacker
-
Doors, Cameras, and Mantraps: Oh, my!
Dylan "The Magician" Baklor
-
Registration Opens
Oct. 25
-
Opening Ceremony
Oct. 25
-
Keynote Round Table - Ed Skoudis, Dave Kennedy, Ken Nevers, Amanda Berlin
Oct. 25
-
Securing Derby 150
Jason PaytonOct. 25
-
Intro to Infrastructure Automation for Offensive Security
Alex MartirosyanOct. 25
-
CISO Roundtable
Oct. 25
-
Creating Intelligence From Malware Samples
Jon "Wally" Prather and Jeff SmealOct. 25
-
Tough Adversary? Don’t Blame Sun Tzu
Dr. Gregory CarpenterOct. 25
Chirag Savla
Chirag Savla is a cyber security professional with 9+ years of experience. His areas of interest include penetration testing, red teaming, azure and active directory security, and post-exploitation research. For fun, he enjoys creating open-source tools and exploring new attack methodologies in his leisure. Chirag has worked extensively on Azure, Active Directory attacks and defense, and bypassing detection mechanisms. He is the author of multiple open-source tools such as Process Injection, Callidus, and others. He has presented at many conferences and local meetups and has trained people in international conferences like Blackhat, BSides Milano, HackSpaceCon, Wild West Hackin’ Fest, Vulncon.
https://twitter.com/chiragsavla94
https://www.linkedin.com/in/chirag-savla-4689161b4/
Raunak Parmar
Raunak Parmar works as a senior cloud security engineer at White Knight Labs. His areas of interest include web penetration testing, Azure/AWS security, source code review, scripting, and development. He has 4+ years of experience in information security. He enjoys researching new attack methodologies and creating open-source tools that can be used during cloud red team activities. He has worked extensively on Azure and AWS and is the author of Vajra, an offensive cloud security tool. He has spoken at multiple respected security conferences like Black Hat, Defcon, Nullcon, RootCon, HackSpaceCon, Vulncon and also at local meetups.
Workshop Description:
Fascinated by the realm of serverless architectures and their security misconfigurations? Azure Function Apps have revolutionized cloud computing, offering an innovative serverless solution for executing code on demand that can interact with multiple services. However, there is a spectrum of potential security misconfigurations and abuse primitives waiting to be exploited by threat actors.
This workshop will delve into various approaches to gaining access to the Function App source code that may leak sensitive information, which indeed can help us in gaining access to other services. We will also look at the approach of deploying backdoors in the Function App in many different languages like .NET, Java, Python, etc. Additionally, we will walkthrough not just the languages but also how different forms of function app deployment that can create unique attack scenarios which can lead to lateral movement or even gaining complete control over the function app codes. Furthermore, we will look through some advanced configurations of function apps that can be leveraged by attackers to pivot from cloud to on-prem servers. In this workshop, we will showcase a real-life demo from one of our Azure pentests that allowed us to perform escalation and lateral movement through function apps, ultimately granting us privileged access to AADConnect Servers.
By uncovering these techniques and providing practical insights into exploitation and mitigation, this research offers valuable knowledge to the cybersecurity community and cloud pentesters. It helps organizations enhance their security posture in the context of Function Apps.