Skip to content

Commit 2e2175d

Browse files
committed
update
1 parent 41163ea commit 2e2175d

7 files changed

Lines changed: 81 additions & 2 deletions

File tree

docs/Independent-Environment/RedLabs/LearningPaths/LOGIC APPS PWNER/LogicApp13/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Logic App actions are individual steps or tasks that we can include within a Log
4949

5050
![img](img/image_20260105-230540.png)
5151

52-
出发后,在 Blob Container 中出现了新文件
52+
触发后,在 Blob Container 中出现了新文件
5353

5454
![img](img/image_20260106-230603.png)
5555

@@ -61,7 +61,7 @@ Logic App actions are individual steps or tasks that we can include within a Log
6161

6262
<details>
6363

64-
<summary> What was the data protection feature used by the storage container in this challenge? (blob versioning or soft delete) </summary>
64+
<summary> What was the data protection feature used by the storage container in this challenge? (blob versioning or soft delete) </summary>
6565

6666
```plaintext
6767
blob versioning
158 KB
Loading
80.5 KB
Loading
205 KB
Loading
226 KB
Loading
237 KB
Loading
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
# Logic App 14 - Abuse Action and Storage Container Recovery
2+
3+
> Abuse Action and Storage Container Recovery
4+
5+
:::info
6+
7+
**Scenario**
8+
9+
Logic apps use connectors that perform defined actions when triggered, which when misconfigured or when the trigger URL is exposed could reveal sensitive data. Abuse the storage blob connector and obtain the flag.
10+
11+
**Overview**
12+
13+
What is SAS URL (Shared Access Signature URL)?
14+
15+
A SAS URL (Shared Access Signature URL) is a URL that contains a shared access signature token. It allows secure access to specific resources within an Azure Storage account for a limited period, without requiring the account key. SAS URLs provide us with a way to grant granular access permissions to clients or applications without exposing the storage account keys.
16+
17+
**Hint**
18+
19+
- Get deleted items.
20+
21+
**Impact**
22+
23+
- Previously soft-deleted sensitive files could contain sensitive data which could be used to increase the attack surface of the target.
24+
25+
**Reference**
26+
27+
- [Logic Apps Docs](https://learn.microsoft.com/en-us/azure/logic-apps/logic-apps-overview)
28+
- [Storage Blob Docs](https://learn.microsoft.com/en-us/azure/storage/blobs/storage-blobs-overview)
29+
- [Azure Storage Explorer](https://azure.microsoft.com/en-in/products/storage/storage-explorer)
30+
- [Azure Blob Storage Connector](https://learn.microsoft.com/en-us/azure/connectors/connectors-create-api-azureblobstorage?tabs=consumption)
31+
- [Shared Access Signature](https://learn.microsoft.com/en-us/azure/storage/common/storage-sas-overview)
32+
33+
:::
34+
35+
题目给出了 TriggerURL 和 ContainerSASURL
36+
37+
首先连接到 Blob Container 发现里面没有数据
38+
39+
![img](img/image_20260133-203347.png)
40+
41+
尝试触发 TriggerURL
42+
43+
![img](img/image_20260134-203445.png)
44+
45+
查看Blob颗粒的设置
46+
47+
![img](img/image_20260135-203526.png)
48+
49+
恢复选中项
50+
51+
![img](img/image_20260136-203609.png)
52+
53+
即可得到
54+
55+
![img](img/image_20260136-203641.png)
56+
57+
:::info Flags
58+
59+
<details>
60+
61+
<summary> What was the data protection feature used by the storage container for blobs in this challenge? (blob versioning or soft delete) </summary>
62+
63+
```plaintext
64+
soft delete
65+
```
66+
67+
</details>
68+
69+
<details>
70+
71+
<summary> What is the flag value we obtain ? </summary>
72+
73+
```plaintext
74+
asohvmtl735asmcexhf735
75+
```
76+
77+
</details>
78+
79+
:::

0 commit comments

Comments
 (0)