About The Speaker
Fascinated by the realm of serverless architectures and their security misconfigurations? Azure Function Apps have revolutionized cloud computing, offering an innovative serverless solution for executing code on demand that can interact with multiple services. However, there is a spectrum of potential security misconfigurations and abuse primitives waiting to be exploited by threat actors.
The talk will delve into various approaches to gaining access to the Function App source code that may leak sensitive information, which indeed can help us in gaining access to other services. We will also look at the approach of deploying backdoors in the Function App in many different languages like .NET, Java, Python, etc. Additionally, we will walkthrough not just the languages but also how different forms of function app deployment that can create unique attack scenarios which can lead to lateral movement or even gaining complete control over the function app codes. Furthermore, we will look through some advanced configurations of function apps that can be leveraged by attackers to pivot from cloud to on-prem servers. In this talk, we will showcase a real-life demo from one of our Azure pentests that allowed us to perform escalation and lateral movement through function apps, ultimately granting us privileged access to AADConnect Servers.
By uncovering these techniques and providing practical insights into exploitation and mitigation, this research offers valuable knowledge to the cybersecurity community and cloud pentesters. It helps organizations enhance their security posture in the context of Function Apps.
Raunak Parmar works as a Senior Cloud Security Engineer at White Knight Labs whose areas of interest include web penetration testing, Azure/AWS security, source code review, scripting, and development. He has 3.5+ years of experience in information security. He likes to research new attack methodologies and create open-source tools that can be used during Cloud Red Team activities. He has worked extensively on Azure and AWS. He is the author of Vajra, an offensive cloud security tool. He has spoken at multiple respected security conferences like Black Hat, Defcon, Nullcon, RootCon, and also at local meetups.