Skip to content

SecureHats/AzureFish

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

                                                                  _|_|  _|            _|        
          _|_|_|  _|_|_|_|  _|    _|  _|  _|_|    _|_|          _|            _|_|_|  _|_|_|    
        _|    _|      _|    _|    _|  _|_|      _|_|_|_|      _|_|_|_|  _|  _|_|      _|    _|  
        _|    _|    _|      _|    _|  _|        _|              _|      _|      _|_|  _|    _|  
          _|_|_|  _|_|_|_|    _|_|_|  _|          _|_|_|        _|      _|  _|_|_|    _|    _| 

SecureHats Maintenance PRs Welcome
Good First Issues Needs Feedback

Azure Fish

Another Offensive project to harvest credentials using an ARM template deployment with a fancy UI

The initial idea is to lure the user into providing credentials required to deploy resources or a feature to Microsoft Azure
To do this the user needs to provide the credentials of a Service Principal or App Registration with permissions to deploy the resources.

In the background during deployment, the provided credentials are stored in a location of the malicious actor who is trying to lure the user.
Now that the credentials are leaked, these can be abused to hijack the subscription.

Not happy?

If you encounter any issues, or hae suggestions for improvements, feel free to open an Issue

Create Issue

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published