You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**Static websites** are served from the special `$web` container over a region-specific endpoint such as `https://<account>.z13.web.core.windows.net/`.
71
+
- The `$web` container may report `publicAccess: null` via the blob API, but files are still reachable through the static site endpoint, so dropping config/IaC artifacts there can leak secrets.
72
+
- Quick audit workflow:
73
+
74
+
```bash
75
+
# Identify storage accounts with static website hosting enabled
76
+
az storage blob service-properties show --account-name <acc-name> --auth-mode login
77
+
# Enumerate containers (including $web) and their public flags
78
+
az storage container list --account-name <acc-name> --auth-mode login
79
+
# List files served by the static site even when publicAccess is null
80
+
az storage blob list --container-name '$web' --account-name <acc-name> --auth-mode login
- Inspect downloaded files for leaked **SAS tokens** or credentials. SAS params show scope and risk: `sv` (API version), `ss` (services like blob `b`), `srt` (resource types `s`/`c`/`o`), `sp` (permissions such as `r`/`l`/`a`/`c`/`w`/`d`/`x`), `se` (expiry), and `sig` (signature). A wide `sp` set plus far-future `se` indicates a long-lived bearer credential that enables read/list/write/delete until revoked.
86
+
- Abuse a recovered SAS immediately, for example:
87
+
88
+
```bash
89
+
az storage blob list --account-name <acc-name> --container-name <target-container> --sas-token "<sv=...&ss=...&srt=...&sp=...&se=...&sig=...>"
90
+
```
91
+
68
92
### Connect to Storage
69
93
70
94
If you find any **storage** you can connect to you could use the tool [**Microsoft Azure Storage Explorer**](https://azure.microsoft.com/es-es/products/storage/storage-explorer/) to do so.
0 commit comments