Event Hack Red Con 2024 starts on Oct 25, 2024, 10:00:00 AM (America/Kentucky/Louisville)
Mastering the Art of Attacking Azure Function Apps
2Hr Workshop
Location: Workshop 2 - 10/26/24, 11:30 AM - 10/26/24, 1:30 PM (America/Kentucky/Louisville) (2 hours)
Chirag Savla
Senior Cloud Security Engineer
Chirag Savla
Senior Cloud Security Engineer

Chirag Savla

Chirag Savla is a cyber security professional with 9+ years of experience. His areas of interest include penetration testing, red teaming, azure and active directory security, and post-exploitation research. For fun, he enjoys creating open-source tools and exploring new attack methodologies in his leisure. Chirag has worked extensively on Azure, Active Directory attacks and defense, and bypassing detection mechanisms. He is the author of multiple open-source tools such as Process Injection, Callidus, and others. He has presented at many conferences and local meetups and has trained people in international conferences like Blackhat, BSides Milano, HackSpaceCon, Wild West Hackin’ Fest, Vulncon.

https://twitter.com/chiragsavla94

 https://www.linkedin.com/in/chirag-savla-4689161b4/

 Raunak Parmar

Raunak Parmar works as a senior cloud security engineer at White Knight Labs. His areas of interest include web penetration testing, Azure/AWS security, source code review, scripting, and development. He has 4+ years of experience in information security. He enjoys researching new attack methodologies and creating open-source tools that can be used during cloud red team activities. He has worked extensively on Azure and AWS and is the author of Vajra, an offensive cloud security tool. He has spoken at multiple respected security conferences like Black Hat, Defcon, Nullcon, RootCon, HackSpaceCon, Vulncon and also at local meetups.

https://twitter.com/trouble1_raunak

 https://www.linkedin.com/in/trouble1raunak/


Workshop Description:

Fascinated by the realm of serverless architectures and their security misconfigurations? Azure Function Apps have revolutionized cloud computing, offering an innovative serverless solution for executing code on demand that can interact with multiple services. However, there is a spectrum of potential security misconfigurations and abuse primitives waiting to be exploited by threat actors.

This workshop will delve into various approaches to gaining access to the Function App source code that may leak sensitive information, which indeed can help us in gaining access to other services. We will also look at the approach of deploying backdoors in the Function App in many different languages like .NET, Java, Python, etc. Additionally, we will walkthrough not just the languages but also how different forms of function app deployment that can create unique attack scenarios which can lead to lateral movement or even gaining complete control over the function app codes. Furthermore, we will look through some advanced configurations of function apps that can be leveraged by attackers to pivot from cloud to on-prem servers. In this workshop, we will showcase a real-life demo from one of our Azure pentests that allowed us to perform escalation and lateral movement through function apps, ultimately granting us privileged access to AADConnect Servers.

By uncovering these techniques and providing practical insights into exploitation and mitigation, this research offers valuable knowledge to the cybersecurity community and cloud pentesters. It helps organizations enhance their security posture in the context of Function Apps.