Skip to content

Commit ac6725e

Browse files
committed
a
1 parent 79b5e47 commit ac6725e

2 files changed

Lines changed: 17 additions & 0 deletions

File tree

src/SUMMARY.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -425,6 +425,7 @@
425425
- [Az - Key Vault](pentesting-cloud/azure-security/az-services/az-keyvault.md)
426426
- [Az - Logic Apps](pentesting-cloud/azure-security/az-services/az-logic-apps.md)
427427
- [Az - Management Groups, Subscriptions & Resource Groups](pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.md)
428+
- [Az - Misc](pentesting-cloud/azure-security/az-services/az-misc.md)
428429
- [Az - Monitoring](pentesting-cloud/azure-security/az-services/az-monitoring.md)
429430
- [Az - MySQL](pentesting-cloud/azure-security/az-services/az-mysql.md)
430431
- [Az - PostgreSQL](pentesting-cloud/azure-security/az-services/az-postgresql.md)
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# Az - Management Groups, Subscriptions & Resource Groups
2+
3+
{{#include ../../../banners/hacktricks-training.md}}
4+
5+
## Power Apps
6+
7+
Power Apps can connect to on-premises SQL servers, and even if initially unexpected, there is a way to make this conection execute arbitrary SQL queries that could allow attackers to compromise on-prem SQL servers.
8+
9+
This is the recap from the post [https://www.ibm.com/think/x-force/abusing-power-apps-compromise-on-prem-servers](https://www.ibm.com/think/x-force/abusing-power-apps-compromise-on-prem-servers) where you can find a detailed explanation of how to abuse Power Apps to compromise on-prem SQL servers:
10+
11+
- A user creates an application that uses an **on-prem SQL connection and shares it with everyone**, either on purpose or inadvertently.
12+
- An attacker creates a new flow and adds a **“Transform data with Power Query” action using the existing SQL connection**.
13+
- If the connected user is a SQL admin or has impersonation privileges, or there are any privileged SQL links or cleartext credentials in databases, or you’ve obtained other privileged cleartext credentials, you can now pivot to an on-premises SQL server.
14+
15+
16+
{{#include ../../../banners/hacktricks-training.md}}

0 commit comments

Comments
 (0)