Skip to content

Commit ce30a61

Browse files
authored
Update az-storage.md
1 parent c86885e commit ce30a61

1 file changed

Lines changed: 0 additions & 7 deletions

File tree

src/pentesting-cloud/azure-security/az-services/az-storage.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -82,13 +82,6 @@ az storage blob list --container-name '$web' --account-name <acc-name> --auth-mo
8282
az storage blob download -c '$web' --name iac/terraform.tfvars --file /dev/stdout --account-name <acc-name> --auth-mode login
8383
```
8484

85-
- Inspect downloaded files for leaked **SAS tokens** or credentials. SAS params show scope and risk: `sv` (API version), `ss` (services like blob `b`), `srt` (resource types `s`/`c`/`o`), `sp` (permissions such as `r`/`l`/`a`/`c`/`w`/`d`/`x`), `se` (expiry), and `sig` (signature). A wide `sp` set plus far-future `se` indicates a long-lived bearer credential that enables read/list/write/delete until revoked.
86-
- Abuse a recovered SAS immediately, for example:
87-
88-
```bash
89-
az storage blob list --account-name <acc-name> --container-name <target-container> --sas-token "<sv=...&ss=...&srt=...&sp=...&se=...&sig=...>"
90-
```
91-
9285
### Connect to Storage
9386

9487
If you find any **storage** you can connect to you could use the tool [**Microsoft Azure Storage Explorer**](https://azure.microsoft.com/es-es/products/storage/storage-explorer/) to do so.

0 commit comments

Comments
 (0)