Buy used:
$18.87
FREE delivery May 21 - 29. Details
Or fastest delivery May 22 - 23. Details
Used: Acceptable | Details
Sold by Books Unplugged
Condition: Used: Acceptable
Comment: Independent family-run bookstore for over 50 years! Buy with confidence! Book is in acceptable condition with wear to the pages, binding, and some marks within
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Something went wrong. Please try your request again later.

Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

4.7 4.7 out of 5 stars 61 ratings

A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small.

You'll learn how to:
-Find security issues related to multi-factor authentication and management certificates
-Make sense of Azure's services by using PowerShell commands to find IP addresses, administrative users, and firewall rules
-Discover security configuration errors that could lead to exploits against Azure storage and keys
-Uncover weaknesses in virtual machine settings that enable you to and acquire passwords, binaries, code, and settings files
-Penetrate networks by enumerating firewall rules
-Investigate specialized services like Azure Key Vault and Azure Websites
-Know when you might be caught by viewing logs and security events

Packed with real-world examples from the author's experience as a corporate penetration tester, sample scripts from pen-tests and "Defenders Tips" that explain how companies can reduce risk,
Pentesting Azure Applications provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible.
Read more Read less

Amazon First Reads | Editors' picks at exclusive prices

Editorial Reviews

Review

"This is the perfect resource for Microsoft Azure users who need to secure their applications."
—Daniel Hein, Solutions Review

From the Back Cover

Packed with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations.

Product details

  • Publisher ‏ : ‎ No Starch Press (July 23, 2018)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 216 pages
  • ISBN-10 ‏ : ‎ 1593278632
  • ISBN-13 ‏ : ‎ 978-1593278632
  • Item Weight ‏ : ‎ 15.2 ounces
  • Dimensions ‏ : ‎ 6.94 x 0.54 x 9.25 inches
  • Customer Reviews:
    4.7 4.7 out of 5 stars 61 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Matt Burrough
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Matt Burrough manages a corporate red team at a large software company where he leads assessments of the security of cloud computing services and internal systems. He frequently attends hacker and information security conferences. Burrough holds a Bachelor's degree in Networking, Security and System Administration from Rochester Institute of Technology and a Master's in Computer Science from the University of Illinois at Urbana–Champaign.

Customer reviews

4.7 out of 5 stars
4.7 out of 5
61 global ratings

Top reviews from the United States

Reviewed in the United States on August 8, 2018
I read this book because I wanted to expand my pentesting skills to better meet the needs of my customers who use the Azure cloud. And the book delivered.

Each chapter follows a clear structure, covering almost everything there is to cover today, although I had hoped to read a bit more about Azure Active Directory. But that's by no means a dealbreaker: it's the nature of the beast to keep evolving, and the book isn't a crystal ball. Yet just devouring this book fundamentally improved my understanding of Azure, because it speaks my language as a test engineer. I'm pretty sure that with this newfound understanding it'll be much easier to tackle any upcoming changes in Azure. Sure, I could fight my way through technet/msdn, but this book is much more coherent and puts everything in context of prevalent real-world security issues. The book will probably remain relevant for quite a while, and I will keep it close for reference.

I also really value the little notes for defenders which can be found throughout the book: they'll help me improve my reports with more meaningful suggestions.

If you're a dev/ops person, this book might help you better understand how attackers look at your work ;-)
7 people found this helpful
Report
Reviewed in the United States on September 25, 2018
Bought this book as a network/security engineering professional looking at expand my knowledge on azure security.

This book has something for everyone. Process for the manager, tips for the defender, and detailed outline for the pen tester.

Well writen and organized easy to read through or reference.

This books is more than just theory. Author walks you though the methods and details.
One person found this helpful
Report
Reviewed in the United States on November 22, 2018
This book is fantastic resource for anyone doing pentesting or defending cloud applications.
One person found this helpful
Report
Reviewed in the United States on October 29, 2018
In this book review, I looked at the topic of pentesting cloud-based applications, specifically Microsoft’s Azure. While the focus of the book was for Azure, a lot of the information will be beneficial no matter the cloud environment. Even thought Cloud hosting has been around for several years, it is still a new technology and many senior security professionals are learning the do and don’ts of how to secure the infrastructure.

Matt Burrough

I found “Pentesting Azure Applications” to be informative and Matt does a great job of sharing links to additional information on topics that can help secure your Azure deployment(s). In this aspect, while this book is meant to be used for pentesting Azure, it is also a great resource in securing and locking down your subscription. Just by looking at and using the “Defender’s Tips” that Matt includes, you will definitely make your network and systems more secure.

The text consists of 8 chapters, each chapter stands by itself and there is no need to read chapters 1 thru 7, if you are looking to understand logging and alerting in chapter 8. Below is a breakdown of each chapter and what can be found in each. Since the book can be used for all levels of security testers, you may find that some chapters are more useful than others. A lot of large pentesting firms have a team that handles the preparation and legal aspects for multiple teams, and you may want to jump straight to reconnaissance or network investigations chapters.

Chapter 1 – Preparation

In this chapter, Matt Burrough covers what to me is the most important part of any type of pentesting, the scope and legal issues. Scope is an essential part of setting up the engagement rules, identifying the assets to be targeted and what, if anything, is out of bounds. When compared to normal assessments, it is even more important to firmly define the scope in any cloud environment. Matt makes sure to point out that assessments of this type involve three parties, the testing company, the tested organization and Microsoft, in the case of Azure. All legal aspects should be reviewed by the pentesting companies’ lawyers to ensure compliance with all local and national regulations. As with most endeavors, preparation is the framework for a successful, safe and legal penetration exercise.

Chapter 2 – Access Methods

Matt starts out by describing the two basic deployment models Azure Service Management (ASM - Legacy) and Azure Resource Manager (newer role-based system). He spends time going over the advantages and disadvantages of both models as well as defining the weaknesses that can be targeted. He details how certificate-based authentication works with in ASM and the difficulties of managing certificates. He points out that the limit of certificate and owner tracking can be a problem, as well as name reuse, certificate revocation lists, storage, and nonrepudiation. Matt recommends, as good security practice in Azure, that any legacy ASM model deployed should be migrated to ARM.

Matt details several tools that can be used at each phase, listing where to find them and how to use them to get the most out of each. Even though I have used Mimikatz in the past, I found that I picked up a new trick or two that I will definitely be using in the future. He covers some basic information gathering techniques, like looking for credentials in unencrypted documents or saved tokens. Additionally, he covers what to do if you run into systems that are using 2 Factor Authentication.

Chapter 3 – Reconnaissance

If you have done any work as pentester or defender, you will be familiar with the reconnaissance phase of pentesting, the knocks on the doors and the taps on the windows. Most are familiar with basic port scanning looking for open ports and services, but with cloud environments such as Azure you have additional web services that are now susceptible to reconnaissance and attack. As in chapter 2, Matt goes over several tools that will help in evaluating what services and networks are available for exploitation.

As with other Microsoft products, PowerShell is a key tool in managing your Azure deployment and as such is also a tool that can be used to perform reconnaissance. Keeping with providing Defender’s tips, Matt provides some great information on securing PowerShell. The step by step directions that are provided are really good to be able to just jump in and start mapping out the services.

Matt provides numerous basic commands that will get you started, including gathering information that will be essential as you move on from the reconnaissance phase. One key aspect that he points out about VM pricing tiers that can help in identifying what might be running on that system. Other information that can be found during this portion of the assessment, such as, IP addresses, Firewall rules, possible services will be of great benefit when you get to chapter 5.

Matt has links to a couple very useful PowerShell scripts, one for each access model that automates the manual command line processes that he discusses. This allows you to quickly gather the information and then review it at a later time.

Chapter 4 – Examining Storage

Here Matt describes Azure cloud storage and how there are two keys that grant full control to the data contained within the storage. He starts off with some best practices, which also, if not implemented, points to some weaknesses that can be targeted. There are three types of access to storage accounts, account keys, user credentials and Share Access Signature (SAS) tokens. He goes into each of these types and details how they work and where they can be used. Next, he spends some time discussing where to find these keys, such as built in to source code, configuration files and storage utilities. If these methods don’t bare fruit, he covers several tools that can aid in getting access. Once you have access to a storage account, Matt lists the steps of identifying the storage types and provides a script that can automate the process.

Chapter 5 –Targeting Virtual Machines

Here the author spends a great deal of time explaining various techniques and methods that are used in generic pentesting activities of more traditional infrastructures. If you are able to obtain storage access as identified in chapter 4, Matt shows you how to take a snapshot of running VMs and then download them to work on them on your own hardware. Another useful tool, autopsy, a disk forensic tool, is discussed and shown how it can have advantages over other tools used to explore the virtual hard drive (VHD). Matt includes directions and several screenshots that allow even a novice to quickly start exploring the disk image. A review of how best to start working with a Windows or Linux system, including various ways to crack password for both. I have to admit it brought back some old memories when he was discussing Cain & Abel for password cracking.

Chapter 6 – Investigating Networks

This chapter starts with the available network options offered by Azure. On top of basic network configurations, there are system level firewalls that are included by Azure for their SQL servers and application services. Additionally, for web applications there is a paid Web Application Firewall (WAF) offering. Azure does also allow Next-Generation firewalls as a service to be offered to their clients, which can add another level of difficulty in your pentesting attempts. By understanding what is offered by Azure, a pentester can know what to expect and have the right tools and methods will work best.

Matt points out that there are several VPN connection options available for connecting corporate network to cloud networks. He provides a PowerShell scripts to export the details of VPN connections that are discovered, including ExpressRoute. ExpressRoute is a custom Microsoft offering that offers dedicated connections between your local and cloud networks.

Next, Matt covers the Service Bus, and how to gain details and how to look at messages for sensitive PII, code executions or SQL interactions. Lastly in this chapter, Matt discusses two ways of connecting non-Azure services to Azure.

Chapter 7 – Other Azure Services

In previous chapters, the focus was on Azure core offerings, in chapter 7, some of the newer or lesser known services are discussed. Matt takes a look at Azure Key Vault, Web Apps, and Automation and discusses the functionality, capabilities and vulnerable aspects of each. He points out that like most tools, these services if configured incorrectly can be both the issue and the solution.

Chapter 8 –Monitoring, Logs and Alerts

In the final chapter, Matt detours from the attacking nature of pentesting and shift his focus to how Azure can be useful in monitoring your cloud environment. Here he shows how system events and logs can be used to generated alerts that could help defect or at least detect the things he was teaching in chapters 2-7.

He covers the Azure Security Center (ASC), the Operations Management Suite (OMS) and the Secure DevOps Kit. ASC (paid subscription) has both detection and prevention components, it can alert on potentially malicious activity and also look at service configurations and make suggestions on increasing security of those services. In chapter 2, Matt discussed using the tool MimiKatz, well here in chapter 8 he shows how just using that program can generate an alert for that activity. If you don’t have a robust logging and monitoring platform, such as Splunk, the OMS offering can provide the same services for cloud and on-premise systems.

Lastly, Matt covers the Secure DevOps Kit, a collection of scripts, that when used will review your Azure subscription and test for numerous configuration issues and produce a report with results.

Conclusion

While this book serves those interested in pentesting Azure, it is also a good guide for pentesting in general and additionally offers a lot of information on securing your infrastructure. Being more of a defender, myself, I found useful advice throughout the book, but was particularly interested in chapter 8. The book is available online and can be purchased at the No Starch Press website here, as well as a link to scripts that were discussed in the book.
2 people found this helpful
Report
Reviewed in the United States on May 7, 2019
Excellent
Reviewed in the United States on May 1, 2019
We had lot of experiences and procedures for Amazon Cloud Penetration Testing. However, our some of applications are on Azure. We need some kind of text books to start Azure Penetration Testing. This is the right book to start all of Azure Application Penetration Testing. 6. Investigating networks are very unique/useful. There are useful information for Azure SQL Firewalls and Web Application Firewalls. And, 7. Displaying Keys and some of web deployment methods are very helpful to proceed further. Thank you!
One person found this helpful
Report
Reviewed in the United States on February 23, 2020
No more, no less than a review of Azure technologies and basic powershell interactions with the tenant resources.
I am working on building use cases for threat detection in Azure and I was hopping to understand more about how an attacker might bypass different defenses available in Azure.
I got almost nothing out of this book.
4 people found this helpful
Report
Reviewed in the United States on May 29, 2023
I read this book in May to June 2023 and it was published in July 2018. As readers may know, over time technical books' content tend to more and more outdated. Some become outdated faster than others depending on the technology. I'm writing to let folks know that this book is in need of a version update. There are some dead links throughout the book and the author writes a sizable amount of content regarding a key Azure functionality that Microsoft appears to be retiring in September 2023 based on what I found. There is some useful information here though, which is why I gave it three stars instead of one star.

If you are attempting to learn more about how to properly perform penetration testing on an Azure environment in 2023, you should consider other books and information sources until the author provides an updated version of this text, as much appears to have changed since 2018.
2 people found this helpful
Report