From 40391ca8e79bf7b3cd1fdfba52288a4a69ad2c64 Mon Sep 17 00:00:00 2001 From: Nick Frichette Date: Sat, 19 Mar 2022 12:00:13 -0500 Subject: [PATCH] Updated the Azure Index Page --- content/azure/anonymous-blob-access.md | 2 +- content/azure/index.md | 2 +- content/azure/soft-deleted-blobs.md | 3 +-- 3 files changed, 3 insertions(+), 4 deletions(-) diff --git a/content/azure/anonymous-blob-access.md b/content/azure/anonymous-blob-access.md index a20f568e..2c13f492 100644 --- a/content/azure/anonymous-blob-access.md +++ b/content/azure/anonymous-blob-access.md @@ -4,7 +4,7 @@ title: Anonymous Blob Access description: Finding and accessing files stored in Azure Storage Accounts without authentication. --- -Originally Research: [0xPwN Blog - Create an Azure Vulnerable Lab: Part #1 – Anonymous Blob Access](https://0xpwn.wordpress.com/2022/03/05/setting-up-an-azure-pentest-lab-part-1-anonymous-blob-access/) +Original Research: [0xPwN Blog - Create an Azure Vulnerable Lab: Part #1 – Anonymous Blob Access](https://0xpwn.wordpress.com/2022/03/05/setting-up-an-azure-pentest-lab-part-1-anonymous-blob-access/) "Storage Accounts" is the service provided by Azure to store data in the cloud. A storage account can used to store: diff --git a/content/azure/index.md b/content/azure/index.md index 7fde48c7..1124f590 100644 --- a/content/azure/index.md +++ b/content/azure/index.md @@ -5,4 +5,4 @@ hide: - toc --- ## Oh no! -There is no content here! The material on this site is generated by volunteers who share their cloud hacking knowledge. Are you familiar with hacking Azure and want to be an awesome contributor? You can suggest content through an [Issue](https://github.com/Hacking-the-Cloud/hackingthe.cloud/issues) or submit a [Pull Request](https://github.com/Hacking-the-Cloud/hackingthe.cloud/pulls). +There is very little content here! The content on this site is generated by volunteers who share their cloud hacking knowledge. Are you familiar with hacking Azure and want to be an awesome contributor? You can suggest content through an [Issue](https://github.com/Hacking-the-Cloud/hackingthe.cloud/issues) or submit a [Pull Request](https://github.com/Hacking-the-Cloud/hackingthe.cloud/pulls). diff --git a/content/azure/soft-deleted-blobs.md b/content/azure/soft-deleted-blobs.md index 882646dc..2465e009 100644 --- a/content/azure/soft-deleted-blobs.md +++ b/content/azure/soft-deleted-blobs.md @@ -4,8 +4,7 @@ title: Soft Deleted Blobs description: Recovering and accessing files in private Storage Accounts that have been deleted. --- - -Orginally posted on [0xPwN Blog - Create an Azure Vulnerable Lab: Part #3 – Soft Deleted Blobs](https://0xpwn.wordpress.com/2022/03/09/create-an-azure-vulnerable-lab-part-3-soft-deleted-blobs/) +Original Research: [0xPwN Blog - Create an Azure Vulnerable Lab: Part #3 – Soft Deleted Blobs](https://0xpwn.wordpress.com/2022/03/09/create-an-azure-vulnerable-lab-part-3-soft-deleted-blobs/) In this tutorial we will see how data that has been deleted from a private Storage Account Container can still be a risk in some cases. Even if we know the full path of resources uploaded to a private container, Azure requires authentication to be accessed. To provide access we can choose between: