mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-01-27 07:14:20 -08:00
Translated ['src/pentesting-cloud/azure-security/README.md', 'src/pentes
This commit is contained in:
@@ -79,6 +79,21 @@ export REQUESTS_CA_BUNDLE=/Users/user/Downloads/cacert.pem
|
||||
```
|
||||
{{#endtab }}
|
||||
|
||||
{{#tab name="CMD" }}
|
||||
```bash
|
||||
set ADAL_PYTHON_SSL_NO_VERIFY=1
|
||||
set AZURE_CLI_DISABLE_CONNECTION_VERIFICATION=1
|
||||
set HTTPS_PROXY="http://127.0.0.1:8080"
|
||||
set HTTP_PROXY="http://127.0.0.1:8080"
|
||||
|
||||
# If this is not enough
|
||||
# Download the certificate from Burp and convert it into .pem format
|
||||
# And export the following env variable
|
||||
openssl x509 -in cacert.der -inform DER -out cacert.pem -outform PEM
|
||||
set REQUESTS_CA_BUNDLE=C:\Users\user\Downloads\cacert.pem
|
||||
```
|
||||
{{#endtab }}
|
||||
|
||||
{{#tab name="PS" }}
|
||||
```bash
|
||||
$env:ADAL_PYTHON_SSL_NO_VERIFY=1
|
||||
@@ -107,7 +122,7 @@ Ili kufanya **MitM** kwa zana na **kuangalia maombi yote** inayopeleka kwa mikon
|
||||
|
||||
### Microsoft Graph PowerShell
|
||||
|
||||
Microsoft Graph PowerShell ni SDK ya jukwaa nyingi inayowezesha ufikiaji wa APIs zote za Microsoft Graph, ikiwa ni pamoja na huduma kama SharePoint, Exchange, na Outlook, kwa kutumia kiunganishi kimoja. Inasaidia PowerShell 7+, uthibitishaji wa kisasa kupitia MSAL, identiti za nje, na maswali ya hali ya juu. Kwa kuzingatia ufikiaji wa chini wa ruhusa, inahakikisha shughuli salama na inapokea masasisho ya mara kwa mara ili kuendana na vipengele vya hivi karibuni vya Microsoft Graph API.
|
||||
Microsoft Graph PowerShell ni SDK ya jukwaa nyingi inayowezesha ufikiaji wa APIs zote za Microsoft Graph, ikiwa ni pamoja na huduma kama SharePoint, Exchange, na Outlook, kwa kutumia kiunganishi kimoja. Inasaidia PowerShell 7+, uthibitishaji wa kisasa kupitia MSAL, identiti za nje, na maswali ya hali ya juu. Kwa kuzingatia ufikiaji wa chini kabisa, inahakikisha shughuli salama na inapokea masasisho ya kawaida ili kuendana na vipengele vya hivi karibuni vya Microsoft Graph API.
|
||||
|
||||
Fuata kiungo hiki kwa [**maelekezo ya usakinishaji**](https://learn.microsoft.com/en-us/powershell/microsoftgraph/installation).
|
||||
|
||||
@@ -128,7 +143,7 @@ Moduli ya Azure Active Directory (AD), sasa **imeondolewa**, ni sehemu ya Azure
|
||||
|
||||
Fuata kiungo hiki kwa ajili ya [**maelekezo ya usakinishaji**](https://www.powershellgallery.com/packages/AzureAD).
|
||||
|
||||
## Zana za Recon & Uzingatiaji Zilizoratibiwa
|
||||
## Zana za Ufuatiliaji wa Kiotomatiki na Uzingatiaji
|
||||
|
||||
### [turbot azure plugins](https://github.com/orgs/turbot/repositories?q=mod-azure)
|
||||
|
||||
@@ -165,7 +180,7 @@ powerpipe server
|
||||
|
||||
Prowler ni chombo cha usalama cha Open Source kufanya tathmini za mbinu bora za usalama za AWS, Azure, Google Cloud na Kubernetes, ukaguzi, majibu ya matukio, ufuatiliaji wa mara kwa mara, kuimarisha na maandalizi ya uchunguzi.
|
||||
|
||||
Kimsingi, itaturuhusu kufanya mchakato wa ukaguzi wa mamia ya vipimo dhidi ya mazingira ya Azure ili kubaini makosa ya usalama na kukusanya matokeo katika json (na muundo mwingine wa maandiko) au kuyakagua kwenye wavuti.
|
||||
Kimsingi, itaturuhusu kufanya mabadiliko mia kadhaa dhidi ya mazingira ya Azure ili kupata mipangilio isiyo sahihi ya usalama na kukusanya matokeo katika json (na muundo mwingine wa maandiko) au kuyakagua kwenye wavuti.
|
||||
```bash
|
||||
# Create a application with Reader role and set the tenant ID, client ID and secret in prowler so it access the app
|
||||
|
||||
@@ -189,7 +204,7 @@ docker run --rm -e "AZURE_CLIENT_ID=<client-id>" -e "AZURE_TENANT_ID=<tenant-id>
|
||||
|
||||
Inaruhusu kufanya ukaguzi wa usanidi wa usalama wa Azure subscriptions na Microsoft Entra ID kiotomatiki.
|
||||
|
||||
Ripoti za HTML zimehifadhiwa ndani ya saraka ya `./monkey-reports` ndani ya folda ya github repository.
|
||||
Ripoti za HTML zimehifadhiwa ndani ya saraka ya `./monkey-reports` ndani ya folda ya ghala la github.
|
||||
```bash
|
||||
git clone https://github.com/silverhack/monkey365
|
||||
Get-ChildItem -Recurse monkey365 | Unblock-File
|
||||
@@ -303,7 +318,7 @@ Invoke-AzureRunCommand -Command <command> -VMName <vmname>
|
||||
```
|
||||
### [**GraphRunner**](https://github.com/dafthack/GraphRunner/wiki/Invoke%E2%80%90GraphRunner)
|
||||
|
||||
GraphRunner ni zana ya baada ya unyakuzi kwa ajili ya kuingiliana na Microsoft Graph API. Inatoa zana mbalimbali za kufanya upelelezi, kudumisha, na kuiba data kutoka kwa akaunti ya Microsoft Entra ID (Azure AD).
|
||||
GraphRunner ni zana za baada ya unyakuzi kwa ajili ya kuingiliana na Microsoft Graph API. Inatoa zana mbalimbali za kufanya upelelezi, kudumisha, na kuiba data kutoka kwa akaunti ya Microsoft Entra ID (Azure AD).
|
||||
```bash
|
||||
#A good place to start is to authenticate with the Get-GraphTokens module. This module will launch a device-code login, allowing you to authenticate the session from a browser session. Access and refresh tokens will be written to the global $tokens variable. To use them with other GraphRunner modules use the Tokens flag (Example. Invoke-DumpApps -Tokens $tokens)
|
||||
Import-Module .\GraphRunner.ps1
|
||||
|
||||
Reference in New Issue
Block a user