A vulnerable Azure architecture that is online 24/7. The environment provides several flags that can be found by exploiting Azure vulnerabilities.
- Link to tool is: https://brokenazure.cloud
- File issues at: https://github.com/SecuraBV/brokenbydesign-azure/issues
- Link to website source code is: https://github.com/SecuraBV/brokenbydesign-azure-website
- Created by: https://www.secura.com/
- Azure CLI installed and in your $PATH
- Terraform installed and in your $PATH
- SQL Command line installed and in your $PATH
- Azure Functions Core Tools installed and in your $PATH
- OpenVPN to complete the challenges
- sshpass installed and in your $PATH
- Login using the
az login - Make sure the certificates (
files/key.pemandfiles/cert.pem) are still valid, currently untill 2032. - Run
terraform initto install required providers - Run
terraform planto see changes (You can also skip this step) - Run
terraform applyto apply changes - If you want to destroy the environment, run
Terraform destroy
- Certificate and key expire
Mar 19 14:36:57 2032 GMT - Make sure
Security defaultsisdisabled(otherwise MFA is required on the DevOps user) - Error:
The subscription is not registered to use namespace 'Microsoft.Sql'please runaz provider register --namespace Microsoft.Sql - Error:
The subscription is not registered to use namespace 'Microsoft.Web'please runaz provider register --namespace Microsoft.Web
- DevOps user is able to modify own profile ex. password and MFA
- Run a runbook script every hour to reset password and MFA
- DevOps user may leak IP adresses, geo-locations, browser version and OS type in profile settings
- Reset whole environment (or only user) to minimize leaked information
- Maybe change cloudName (presented when logging in as service principal) to a flag?
Run openssl req -newkey rsa:2048 -new -nodes -x509 -days 3650 -keyout key.pem -out cert.pem.
Make sure to add the application-id and tenant-id to the cert.pem in format:
-----BEGIN AZURE_DETAILS-----
Tenant id: TENANT_ID_HERE
App-id: APP_ID_HERE
-----END AZURE_DETAILS-----
