One Article Review

Accueil - L'article:
Source Blog.webp GB Hacker
Identifiant 8669992
Date de publication 2025-04-30 13:23:50 (vue: 2025-04-30 15:12:47)
Titre Researchers Turned Azure Storage Wildcards into a Stealthy Internal SOCKS5 Backdoor
Texte >Security researchers at Quarkslab have developed a new covert channel technique that exploits Microsoft’s recommended Azure Storage firewall configurations to bypass network restrictions. Their proof-of-concept tool, named “ProxyBlob,” leverages Azure Blob Storage to create a SOCKS5 proxy, allowing attackers to establish persistent backdoor access to restricted networks. This technique demonstrates how Microsoft’s own security recommendations […]
>Security researchers at Quarkslab have developed a new covert channel technique that exploits Microsoft’s recommended Azure Storage firewall configurations to bypass network restrictions. Their proof-of-concept tool, named “ProxyBlob,” leverages Azure Blob Storage to create a SOCKS5 proxy, allowing attackers to establish persistent backdoor access to restricted networks. This technique demonstrates how Microsoft’s own security recommendations […]
Notes ★★★
Envoyé Oui
Condensat “proxyblob >security access allowing attackers azure backdoor blob bypass channel concept configurations covert create demonstrates developed establish exploits firewall have how internal leverages microsoft’s named network networks new own persistent proof proxy quarkslab recommendations recommended researchers restricted restrictions security socks5 stealthy storage technique tool turned wildcards
Tags Tool
Stories
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: