# Insomnihack

It’s Raining Shells - How to Find New Attack Primitives in Azure?

Speaker. Andy Robbins @_wald0

Abuses vs Bugs

Advantages of abuses:

Research methodology

OSINT example to find people to learn from: site:linkedin.com "microsoft" "graph" "architect"

Remark. Documentation is not accurate and up to date. Go beyond documentation.

How to explore Azure

Remark. Not all the authorization is stored in the JWT -> probably you have more permission than what the JWT describes.

Steps:

Resources.

Automatically extracting static anti-virus signatures

Speaker. Vladimir Meier @plowsec

The AV performs multiple steps:

A CI/CD pipeline was set up to automate AV scans. Two reasons for this against using Virus Total:

Heavy usage of taviso’s loadlibrary and vmrun to run an executable “headless” with VMWare.

If file is no longer present then it was detected.

One way to detect AV signatures is to perform divide et impera, see dsplit , and check which chunk is marked as detected.

Issue. plain divide et impera would lead to a corrupted PE, you need PE format aware mutations.

Issue. When the signature spans between two chunks is not detected correctly with divide et impera -> see interval trees

Strings can be identified with the same logic and replaced, meaning

This is accomplished with

Resources.

REW-sploit: dissect payloads with ease

Speaker. Cesare Pizzi @red5heep

See REW-sploit

Resource. (unrelated) asciicinema

Symbolic Execution Demistified

Speaker. Jannis Kirschner @xorkiwi

See SymbolicExecutionDemystified

Managing large-scale response

Speaker. Mathias Fuchs @mathias_fuchs

What you need:

Defender tools

Always on:

On efficiency: have a small dataset from many machines to understand where to focus and then have a large dataset from few interesting machines.

Interesting finding: capacity management often detects ransomware earlier than AV/EDR. For instance a NAS is full

Detection can be done by counting number of occurrences of certain events, outliers will point out systems to check.

As incident responder you want to minimize false negatives: e.g. when matching IOCs you might have a hash (md5) but the tool only supports sha1,sha256 and then it would not return a match.

As incident responder never do anything without a guiding question.

Documentation

Documentation keeps control of the case: you can brief the customer at any point in time.

“spreadsheet of DOM” contains:

Working with a flat file could be convenient in no internet situations (e.g. flights or air gapped systems)

Tool. Aurora IR

The timeline should show if something is missing (false negatives).

On resource management and analyst not working at night: customer needs to see progress, it does not matter when progress was made.

A Common Bypass Pattern to Exploit Modern Web Apps

Speaker. Simon Scannell @scannell_simon

Core idea of the talk delivered via four vulnerabilities is: don’t stop looking when input is sanitized, continue to see if the sanitized input is then modified.

On a high level input is:

Easy example to remember: file uploads checks file extension however DB truncates the file name. Provide AAAA...AAA.php.xml

Hook, Line and Sinker - Pillaging API Webhooks

Speaker. Abhay Bhargav

A webhook is a user generated callback.

Provider: e.g. stripe, mailchimp, CI/CD Consumer: developer app

The core idea of the talk is to attack the provider via SSRF upon a webhook call.

The provider sends a POST request to the consumer upon webhook. The (malicious) consumer replies with HTTP 303 “follow redirect” to e.g. https://169.254.169.254/metadata. The response is then displayed on the provider page or in the source code.

Main mitigation: disable default follow redirect in clients.