{"id":13794,"date":"2024-02-13T07:37:04","date_gmt":"2024-02-13T07:37:04","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/"},"modified":"2024-07-27T09:11:23","modified_gmt":"2024-07-27T09:11:23","slug":"abusing-securing-azure-services-bkk2024","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/","title":{"rendered":"Abusing &amp; Securing Azure Services"},"content":{"rendered":"<h4><strong><span style=\"color: #993300\">ATTEND IN-PERSON<\/span><\/strong><strong><span style=\"color: #993300\">: <\/span><\/strong><strong>Onsite in Bangkok, Thailand<\/strong><\/h4>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"page\" title=\"Page 3\">\n<h4><strong>DATE: 26-28 August 2024<\/strong><\/h4>\n<\/div>\n<h4><strong>TIME: 09:00 to 17:00 ICT\/GMT+7<\/strong><\/h4>\n<table style=\"height: 146px\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>26 Aug<\/td>\n<td>Monday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>27 Aug<\/td>\n<td>Tuesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>28 Aug<\/td>\n<td>Wednesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<\/div>\n<\/div>\n<h5>Based on real life breaches and APT TTPs. You will attack a live Azure environment and replicate APTs to breach, persist and escalate your way to fully compromise the environment. In parallel, you will work on detecting, securing, and auditing the environment.<\/h5>\n<p>Recent surveys showed that Azure adoption has sneaked past AWS. Yet, expertise in assessing, securing and managing Azure still suffers from a big shortage. Making experts in the domain sought after and well paid.<\/p>\n<p>With over 200 services on offer, Microsoft Azure presents a challenge for both teams on the offensive side and defensive side. While both teams trying to keep up with the ever-evolving services and features, misconfigurations are introduced in abundance allowing for ethical hacker and threat actors alike to take advantage of them.<\/p>\n<p>In this course we introduce some of the most common Azure services used, how they are often misconfigured, abused and how they could be better secured.<\/p>\n<p>The course covers two angles, the threat actor perspective, methods, and techniques. And how to monitor, detect and defend.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Beginner Friendly<\/strong><\/h5>\n<p>This training is designed to be beginner friendly. Although it helps, you do not need prior experience in Azure. The training is built for cloud administrators, architects, penetration testers and defenders to help you understand the most used Microsoft Azure services, how they are misconfigured and abused and how you can monitor and secure them.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Attack &amp; Secure a Live Environment<\/strong><\/h5>\n<p>Keeping a balance between theory and practice, you will quickly get your hands dirty both with Azure services and multiple attack tools and techniques while targeting our live lab environment.<\/p>\n<p>Designed to replicate real-life misconfigurations, you will gain a solid understanding of a typical setup, the most used Microsoft Azure services, how they are misconfigured and abused. In parallel, you will also work on setting up proper monitoring and logging in addition to securely configuring these services.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Breaches In the News<\/strong><\/h5>\n<p>You will explore multiple attack techniques that are being used by APTs to target Azure. Many of which resulted in breaches you heard of and read about in the news.<\/p>\n<p>You will follow different attacks paths and multiple ways for initial access, persistence, and privilege escalation. You will also work on auditing, monitoring and secure these services.<\/p>\n<p>Some of the topics covered will include:<\/p>\n<ul>\n<li>Recon and enumeration<\/li>\n<li>Multiple ways for initial access<\/li>\n<li>Bypassing defenses like Conditional Access and MFA<\/li>\n<li>Abusing &amp; Securing IAM<\/li>\n<li>Abusing &amp; Securing Storage<\/li>\n<li>Abusing &amp; Securing Automation Accounts<\/li>\n<li>Abusing &amp; Securing Network Services<\/li>\n<li>Abusing &amp; Securing Key Vaults<\/li>\n<li>Abusing &amp; Securing Apps<\/li>\n<li>Abusing &amp; Securing Azure Container Registries<\/li>\n<li>Abusing &amp; Securing Azure VMs<\/li>\n<li>And a lot more!<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Key Learning Objectives<\/strong><\/h5>\n<ul>\n<li>Practical hands-on training that allows for exploiting real-world Azure misconfigurations and deep understanding threat actor TTPs.<\/li>\n<li>Penesters and red teamers will get a solid understanding of the different attack paths and methodologies.<\/li>\n<li>Blue teamers and system admins will get a solid understanding of the root cause of the abusable misconfigurations and how to monitor, audit and defend.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>What Students Will Be Provided With<\/strong><\/h5>\n<ul>\n<li>Course material<\/li>\n<li>Cloud labs will be available for each student for 90 hours usage (within 15 days from the start of the training)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<h6>The course requires no prior knowledge in Azure and builds your knowledge from the ground up.<\/h6>\n<h6>In this 3-day training you will gain a solid understanding of the day to day operations and resulting misconfigurations, different attacks path and multiple ways for initial access, persistence and privilege escalation.<\/h6>\n","protected":false},"featured_media":13793,"template":"","meta":{"_acf_changed":false},"product_cat":[61,84,57],"product_tag":[],"class_list":{"0":"post-13794","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-3-day-training","7":"product_cat-bkk-2024","8":"product_cat-in-person","10":"first","11":"outofstock","12":"featured","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Abusing &amp; Securing Azure Services - HITBSecConf2024 - Bangkok<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Abusing &amp; Securing Azure Services - HITBSecConf2024 - Bangkok\" \/>\n<meta property=\"og:description\" content=\"The course requires no prior knowledge in Azure and builds your knowledge from the ground up. In this 3-day training you will gain a solid understanding of the day to day operations and resulting misconfigurations, different attacks path and multiple ways for initial access, persistence and privilege escalation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2024 - Bangkok\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-27T09:11:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/Tarek-1-BH-Vegas-22-cropped-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1320\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/\",\"name\":\"Abusing &amp; Securing Azure Services - HITBSecConf2024 - Bangkok\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/Tarek-1-BH-Vegas-22-cropped-scaled-1.jpg\",\"datePublished\":\"2024-02-13T07:37:04+00:00\",\"dateModified\":\"2024-07-27T09:11:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/Tarek-1-BH-Vegas-22-cropped-scaled-1.jpg\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/Tarek-1-BH-Vegas-22-cropped-scaled-1.jpg\",\"width\":2560,\"height\":1320},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Abusing &amp; Securing Azure Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/\",\"name\":\"HITBSecConf2024 - Bangkok\",\"description\":\"August 26 - 30 @ InterContinental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Abusing &amp; Securing Azure Services - HITBSecConf2024 - Bangkok","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/","og_locale":"en_US","og_type":"article","og_title":"Abusing &amp; Securing Azure Services - HITBSecConf2024 - Bangkok","og_description":"The course requires no prior knowledge in Azure and builds your knowledge from the ground up. In this 3-day training you will gain a solid understanding of the day to day operations and resulting misconfigurations, different attacks path and multiple ways for initial access, persistence and privilege escalation.","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/","og_site_name":"HITBSecConf2024 - Bangkok","article_modified_time":"2024-07-27T09:11:23+00:00","og_image":[{"width":2560,"height":1320,"url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/Tarek-1-BH-Vegas-22-cropped-scaled-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/","name":"Abusing &amp; Securing Azure Services - HITBSecConf2024 - Bangkok","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/Tarek-1-BH-Vegas-22-cropped-scaled-1.jpg","datePublished":"2024-02-13T07:37:04+00:00","dateModified":"2024-07-27T09:11:23+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/Tarek-1-BH-Vegas-22-cropped-scaled-1.jpg","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/Tarek-1-BH-Vegas-22-cropped-scaled-1.jpg","width":2560,"height":1320},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/abusing-securing-azure-services-bkk2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/shop\/"},{"@type":"ListItem","position":3,"name":"Abusing &amp; Securing Azure Services"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/","name":"HITBSecConf2024 - Bangkok","description":"August 26 - 30 @ InterContinental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/product\/13794"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/media\/13793"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/media?parent=13794"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/product_cat?post=13794"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/product_tag?post=13794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}