Skip to content

Commit 12a7122

Browse files
committed
update
1 parent 104b052 commit 12a7122

33 files changed

Lines changed: 652 additions & 0 deletions
104 KB
Loading
94.7 KB
Loading
71.6 KB
Loading
88.8 KB
Loading
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
# Key Vault 04 - Subdomain Enumeration for Key Vault
2+
3+
> Subdomain Enumeration for Key Vault
4+
5+
:::info
6+
7+
**Scenario**
8+
9+
A key vault service has its own URL, we could check if a tenant or organization uses a key vault service through subdomain enumeration. Find and extract flag value from key vault through subdomain enumeration.
10+
11+
**Overview**
12+
13+
What is Azure key vault?
14+
15+
A Key Vault is a secure cloud service in Azure that allows us to safeguard and manage cryptographic keys, secrets, and certificates. It provides a centralized location for storing and managing sensitive information used by our applications and services.
16+
17+
What is subdomain enumeration?
18+
19+
Subdomain enumeration, also known as subdomain discovery or subdomain reconnaissance, is the process of identifying and mapping subdomains associated with a domain name.
20+
21+
**Hint**
22+
23+
- Subdomain reconnaissance.
24+
25+
**Impact**
26+
27+
- Due to high privileges to the user, the user was able to view the key vault secret.
28+
29+
**Reference**
30+
31+
- [Azure Key Vault Docs](https://learn.microsoft.com/en-us/azure/key-vault/general/overview)
32+
- [Microburst](https://github.com/NetSPI/MicroBurst)
33+
- [Azure Key Vault Secrets](https://learn.microsoft.com/en-us/azure/key-vault/general/about-keys-secrets-certificates)
34+
- [Az PowerShell](https://learn.microsoft.com/en-us/powershell/azure/new-azureps-module-az?view=azps-10.4.1)
35+
36+
:::
37+
38+
题目中已经给出了 KeyVaultName 这一关键信息
39+
40+
其实在界面中也可以看到
41+
42+
![img](img/image_20260106-200616.png)
43+
44+
在其 对象-机密 中可以看到目标
45+
46+
![img](img/image_20260108-200826.png)
47+
48+
查看其详情
49+
50+
![img](img/image_20260108-200847.png)
51+
52+
只存在有一个版本,查看具体内容
53+
54+
![img](img/image_20260109-200925.png)
55+
56+
:::info Flags
57+
58+
<details>
59+
60+
<summary> What is the flag value we obtained from key vault secret using subdomain enumeration technique? </summary>
61+
62+
```plaintext
63+
asyfrihk735asaxgthd735
64+
```
65+
66+
</details>
67+
68+
:::
83.5 KB
Loading
85.4 KB
Loading
89.3 KB
Loading
Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
# Logic App 01 - Tamper Trigger Parameter
2+
3+
> Tamper Trigger Parameter
4+
5+
:::info
6+
7+
**Scenario**
8+
9+
Some developers leave some sensitive parameters that reveal sensitive data. Find the parameter in the URL and obtain the flag.
10+
11+
**Overview**
12+
13+
What is a logic app?
14+
15+
Azure Logic Apps is a cloud-based service provided by Microsoft Azure that allows us to create and run automated workflows and integrate various applications, systems, and services.
16+
17+
What is Requests trigger?
18+
19+
Azure Logic Apps, the "Requests" trigger is a commonly used trigger that allows us to initiate a workflow whenever an HTTP request is received.
20+
21+
What is IDOR?
22+
23+
IDOR, or Insecure Direct Object Reference, is a type of security vulnerability that occurs when an application provides direct access to objects based on user-supplied input. In simpler terms, it means that an attacker can manipulate input, such as URLs or form parameters, to gain unauthorized access to data.
24+
25+
**Hint**
26+
27+
- IDORs are common web application vulnerabilities.
28+
29+
**Impact**
30+
31+
- Logic app using request trigger with parameter here acted as an IDOR vulnerability. When triggered with the "admin" parameter the logic app revealed sensitive data.
32+
33+
**Reference**
34+
35+
- [Logic Apps Docs](https://learn.microsoft.com/en-us/azure/logic-apps/logic-apps-overview)
36+
- [Logic Apps Docs](https://learn.microsoft.com/en-us/azure/connectors/connectors-native-reqres?tabs=consumption)
37+
38+
:::
39+
40+
题目给出的是 TriggerURL
41+
42+
直接 GET 请求一下看看
43+
44+
![img](img/image_20260155-205501.png)
45+
46+
注意到 url 中的 `{admin}` 参数
47+
48+
![img](img/image_20260155-205548.png)
49+
50+
修改为 `admin`
51+
52+
![img](img/image_20260156-205609.png)
53+
54+
:::info Flags
55+
56+
<details>
57+
58+
<summary> What was the parameter which revealed the flag value? (admin or debug) </summary>
59+
60+
```plaintext
61+
admin
62+
```
63+
64+
<summary> What is the flag value we obtain ? </summary>
65+
66+
```plaintext
67+
aswrafuk735asaetbjv735
68+
```
69+
70+
</details>
71+
72+
:::
106 KB
Loading

0 commit comments

Comments
 (0)