Source |
GB Hacker |
Identifiant |
8669992 |
Date de publication |
2025-04-30 13:23:50 (vue: 2025-04-30 15:12:47) |
Titre |
Researchers Turned Azure Storage Wildcards into a Stealthy Internal SOCKS5 Backdoor |
Texte |
>Security researchers at Quarkslab have developed a new covert channel technique that exploits Microsoft’s recommended Azure Storage firewall configurations to bypass network restrictions. Their proof-of-concept tool, named “ProxyBlob,” leverages Azure Blob Storage to create a SOCKS5 proxy, allowing attackers to establish persistent backdoor access to restricted networks. This technique demonstrates how Microsoft’s own security recommendations […]
>Security researchers at Quarkslab have developed a new covert channel technique that exploits Microsoft’s recommended Azure Storage firewall configurations to bypass network restrictions. Their proof-of-concept tool, named “ProxyBlob,” leverages Azure Blob Storage to create a SOCKS5 proxy, allowing attackers to establish persistent backdoor access to restricted networks. This technique demonstrates how Microsoft’s own security recommendations […]
|
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
“proxyblob >security access allowing attackers azure backdoor blob bypass channel concept configurations covert create demonstrates developed establish exploits firewall have how internal leverages microsoft’s named network networks new own persistent proof proxy quarkslab recommendations recommended researchers restricted restrictions security socks5 stealthy storage technique tool turned wildcards |
Tags |
Tool
|
Stories |
|
Move |
|