Intermediate Lab
![]()
Maneuver Through Azure Service Firewalls
Azure Service Firewalls have an appearance of strong security. However, subtle configuration discrepancies may introduce firewall gaps that allow attackers to slide through defenses.
Overview
Scenario
Mega Big Tech has hired our pentest firm to perform an external assessment. Since their public assets are hosted on the Microsoft Cloud, any Azure and EntraID assets are in-scope, should they be compromised throughout the engagement.
Among the many Fully Qualified Domain Names listed for the engagement, one website appears to be a promising target.
Can you help Megabigtech pinpoint and address any vulnerabilities, including exposed credentials, network security gaps, opportunities for lateral movement, and risks of data exfiltration?
Lab prerequisites
- Familiarity with Azure CLI, cURL, JSON, Python3 and SQL
- Basic web application penetration testing knowledge
- (Optional) A separate Azure subscription with Azure Cloud Shell or Azure Virtual Machine
Learning outcomes
You'll be maneuvering around (and learning to defend) Azure Service Firewalls belonging to:
- Azure PostgreSQL
- Azure MSSQL
- Storage Accounts
- CosmosDBs
- Key Vaults
Real-world context
Azure Service Firewalls (ASFs) are a crucial security measure that help deter unwanted traffic by enforcing strict rules and access controls. They significantly reduce the risk of unauthorized access by filtering out malicious requests.
However, it is important to understand that ASFs do not block all network-level access. Some Azure services are designed to communicate with addresses within the broader Azure address space - essential for their operations - even when the firewall is active. This means that, in certain cases, ASFs can be circumvented. In this lab, we showcase five services where such maneuvering is possible, highlighting the need for a layered security approach that addresses these inherent gaps.
Cloud Security Training To Protect Your Business
Pwned Labs for Business gives your team access to dedicated business content, including labs and cyber ranges.
We also offer in-person or remote workshops, and our cloud penetration services are helping businesses become more secure!