Chapter 6: Exploiting Contributor Permissions on PaaS Services
In the previous chapter, we explored how the Contributor role can be used to exploit Azure resources for Infrastructure as a Service (IaaS)-centered scenarios. We focused on how the Contributor role's credentials can be leveraged to escalate permissions to the Azure RBAC Owner role, hunt for other credentials, and exfiltrate data from virtual machines. In this chapter, we will explore how to achieve similar objectives for Platform as a Service (PaaS) scenarios. There will be some overlap of the general concepts in this chapter, but we will be focusing on how these concepts differ as they apply to PaaS scenarios.
In this chapter, we are going to cover the following main topics:
- Preparing for Contributor (PaaS) exploit scenarios
- Attacking storage accounts
- Pillaging keys, secrets, and certificates from key vaults
- Leveraging web apps for lateral movement and escalation
- Extracting credentials...