Beginner-friendly red team icon   azure

Abuse Azure Logic App Automation

Automation can make an admin's life easier, but without proper validation it can help hackers too!

Overview

We all want to automate tasks, and focus on more enjoyable problems! However, we have to be careful to restrict access to the automation to only those who need it and be wary of user-provided data. This fun lab explores a realistic Azure Logic App that automates tasks across the Microsoft Cloud, and beyond!

 
Scenario

Our red team has been conducting an open-source intelligence gathering operation focused on our organization. During this process, they uncovered a potentially concerning social media post made by one of our newly appointed managers. The post appears to contain information that could be leveraged by malicious actors. You've been assigned to investigate this discovery further. Your task is to analyze the provided social media post and assess its potential for establishing an initial foothold in our systems. We need you to explore possible attack vectors, evaluate the risk to our organization, and determine how this information might be exploited by potential adversaries.

Lab prerequisites
  • Basic Windows and Linux command line knowledge
  • Understanding of Microsoft Azure
  • Be a member of the Pwned Labs Discord (https://discord.gg/pwnedlabs)
Learning outcomes
  • Enumeration and exfiltration of information from M365
  • Abuse Azure Logic Apps automation
Real-World Context

Modern organizations face significant security risks from two primary sources: employee oversharing on social media and hastily implemented internal automation processes. Social media platforms often become inadvertent sources of valuable information for threat actors, potentially facilitating initial access to organizational systems.

This risk is compounded by the increasing pressure to streamline operations through automation, leading to the rapid development of internal processes that may lack robust security measures. These internal automation projects, frequently treated as side tasks with limited resources and expertise, often fulfill basic functional requirements but fall short of the security standards applied to external-facing products. The combination of easily accessible information through social media and vulnerable internal automation creates a complex security landscape that malicious actors can exploit.

Pwned Labs:
Your cloud security training ground

Experience, real-world, byte sized cloud security labs for training cyber warriors. From beginners to pros, our engaging platform allows you to secure your defenses, ignite your career and stay ahead of threats.

Join us at any stage of your journey