Vajra is a UI based tool with multiple techniques for attacking and enumerating in target's Azure environment.
The term Vajra refers to the Weapon of God Indra in Indian mythology (God of Thunder & Storms). Its connection to the cloud makes it a perfect name for the tool.
Vajra currently supports Azure Cloud environments and plans to support AWS cloud environments and some OSINT in the future.
Following features are available at the moment:
- Azure
- Attacking
- OAuth Based Phishing (Illicit Consent Grant Attack)
- Exfiltrate Data
- Enumerate Environment
- Deploy Backdoors
- Send mails/Create Rules
- Password Spray
- Password Brute Force
- OAuth Based Phishing (Illicit Consent Grant Attack)
- Enumeration
- Users
- Subdomain
- Azure Ad
- Azure Services
- Specific Service
- Storage Accounts
- Attacking
- AWS
- Attacking(In progress)
- Under Development
- Enumeration
- IAM Enumeration
- S3 Scanner
- Under Development
- Misconfiguration
- Attacking(In progress)
Note: This tool have been tested in a environment which had around 3 Lakh principals like users, groups, enterprise application, etc.
It features an intuitive web-based user interface built with the Python Flask module for a better user experience.
Raunak Parmar works as a senior security engineer. Web/Cloud security, source code review, scripting, and development are some of his interests. Also, familiar with PHP, NodeJs, Python, Ruby, and Java. He is OSWE certified and the author of Vajra and 365-Stealer.
- Twitter: https://twitter.com/trouble1_raunak
- YouTube: https://www.youtube.com/channel/UCkJ_sEF8iUDXPCI3UL0DAcg
- Linkedin: https://www.linkedin.com/in/trouble1raunak/
- GitHub: https://github.com/TROUBLE-1/
Install postgres database with credential postgres/postgres and create a database name vajra. If postgres is not installed then by default sqlite will be used.
Run the following command to install all the modules.
pip install -r requirements.txt
Once installed run the following to start the application.
python app.py
Whenever I come across during Cloud Security assessment or some Cloud Red Team projects, there is a need to run a lot of tools to enumerate stuff from nothing to something. Where some requires lots of automation like brute-forcing or finding a particular privileged service or policies from thousands of resources.
Initially, I wrote a tool 365-Stealer which had capabilities to perform Illicit Consent Grant Attack but I was not satisfied with the code structure and its web interface which made me rewrite the whole tool again and add it as a module in Vajra. The most interesting part of this module is it uses refresh tokens stolen from the victims which can be used for a minimum of 3 months and a max 1 year or no limit. Will explain how to use this module and in what circumstances it should be used.
Note: No future release or update will be done in 365-Stealer as I have abandoned this tool.
Vajra will have more modules in future which will help in simulate tha attacks while performing Cloud security assessment.
Let me take you through all the modules that the current tool has and will guide you on how we can setup up and also when to use what.
The First tool that anyone would like to perform is for user enumeration. During a black box, you might perform some OSINT techniques to gather email id's for the targeted company let's say company XYZ Ltd. You could try to enumerate all over google with matching regex.
^[\w.+\-]+@XYZ\.com$
Or maybe using some secret technique you got dozens of email id's. Now it is important to validate those id's before our further attacks.
Once you are ready with your list you just need to paste it in the text field or upload a file then click save and click attack as shown below.
Results are saved on the same page which can even be download.
By making the POST request to "https://login.microsoftonline.com/common/GetCredentialType" with a JSON body containing the email id its possible to analyze the valid email id. If the "IfExistsResult" key value is 0 it means the user exists.
Following is the sample code for the same.
import requests
body = '{"Username":"random.name@XYZ.com"}'
response = requests.post("https://login.microsoftonline.com/common/GetCredentialType", data=body).json()
if response["IfExistsResult"] == 0:
print("Valid User")
The second module will help you perform phishing attacks over the valid victims you got from the first module. The type of phishing we going to perform is called the Illicit consent Grant attack.
In an illicit consent grant attack, the attacker creates an Azure-registered application that requests access to data such as contact information, email, or documents. The attacker then tricks an end-user into granting consent to the application so that the attacker can gain access to the data that the target user has access to. After the application has been granted consent, it has user account-level access to the data without the need for an organizational account.
In simple words when the victim clicks on that beautiful blue button of "Accept", Azure AD sends a token to the third party site which belongs to an attacker where the attacker will use the token to perform actions on behalf of the victims like accessing all the Files, Read Mails, Send Mails, etc.
To further comprehend the Illicit Consent Grant attack, consider the following scenario: two hypothetical corporations, "ECorp" and "PentestCorp". PentestCorp has won a contract from ECorp to mimic a phishing assault to gain information about the users and extract sensitive information from the users' email, OneDrive, OneNote, and other accounts.PentestCorp chose to conduct an Illicit Consent Grant attack, in which they simply lure and convince their victims to click a link that brings them to the official Microsoft third-party app consent page which allowed them to steal all the data from the victim's accounts.
PentestCorp launched this attack by registering a domain called "safedomainlogin.com" and creating a subdomain called "ecorp.safedomainlogin.com" where they hosted the application that captured the authorization code and subsequently requested the access tokens.PentestCorp then created a Multi-Tenant Application in their Azure AD Tenant and titled it "ECorp," as well as adding a Redirect URL that refers to "ecorp.safedomainlogin.com," which hosts an application to collect the authorization code.PentestCorp also included a new client secret and a few API permissions such as Mail.Read, Notes.Read.All, Files.ReadWrite.All, User.ReadBasic.All, User.Read in the application, read. As a result, after the user authorizes permission to the program, PentestCorp can harvest sensitive information on the user's behalf.
PentestCorp then generates a link with the respected client id and redirect URL of the malicious program and distributes it to the targeted users in order to get their approval.PentestCorp obtains the authorization code for the users who consented to the third-party application called ECorp. PentestCorp then utilized an authorization code to obtain an access token and refresh token, where access tokens were used to retrieve all of the information using GraphAPI.
To lessen the overhead of manually extracting data, we may utilize the Phishing module of Vajra.
Follow the procedures outlined in the section below to configure the phishing module for executing Illicit Consent Grant Attack.
To register an application on Azure, follow the procedures outlined below.
- Login to https://portal.azure.com
- Navigate to Azure Active Directory
- Click on App registrations
- Click New registration
- Enter the Name for our application (The same name will be displayed to the victim while granting consent)
- Under support account types select "Accounts in any organizational directory (Any Azure AD directory - Multitenant)"
- Enter the Redirect URL. This URL should be pointed towards our Vajra phishing application that we will host for hosting our phishing page. eg, http://localhost:8080/azure/getcode/[--UUID--]
- Click Register
After registering the application we will be redirected to the app's overview tab. Take a note of the Application (client) ID
Let's start by generating a new Client Secret for our app.
- Select "Certificates & Secrets" from the drop-down menu.
- Select New Client Secret from the drop-down menu, then add a description and click Add.
- Store the value of the secret in a secure location.
Let's now provide our application permissions.
-
Select API rights from the drop-down menu.
-
Select Add a Permission from the drop-down menu.
-
Select Microsoft Graph from the drop-down menu.
-
Select Delegated Permissions from the drop-down menu.
-
Find and choose the permissions listed below, then click Add permission (This depends upon what permissions you want from the victim)
- Contacts.Read
- Mail.Read
- Mail.Send
- Notes.Read.All
- Mailboxsettings.ReadWrite
- Files.ReadWrite.All
- User.ReadBasic.All
Provide all the details and click save. Once done you should get your phishing URL as shown below
Click on Start Phishing and click on Browse.
A new tab will be open with a sample phishing Page which can be used to phish the user by making them believe it's one of the legitimate sites of Microsoft.
Once you click anywhere like "Read More", "Take The Exam" you will be redirected to the Microsoft official approval page shown below.
But first, let's understand when to use this and the question is will you be able to grant all the permission from any user?
This question may have come to your mind if you have ever seen or come across as shown below.
So the answer is no you can't get all those permission from your vuctms except some admin users, you could have gotten before 2020 but not after the Microsoft new updates. So let's understand what will be our approach for it.
Note: If you have a user on the target tenant and create an app registration from it only then a normal user can provide all the permissions as the app belongs to the victim's tenant.
You can get those high privileges consent only from Admin users like Global, Application, and Cloud Administrator. But still, there are some permissions available that can be granted from a normal user as well, which are:
- Calendars.Read
- Tasks.Read
- User.ReadBasic.All
From these, the best permission for us is the 3rd one User.ReadBasic.All
. This will let us list all the names of the users available in the victim's tenant. You can find a list of all the users in Office365 section under victims tab.
Now you have more valid emails than you had previously, let's say you have around 100 users or even maybe more than that. The more the email Id's the better chance of getting a successful password spray attack. With this let's jump to the next module.
Password spraying is a sort of brute force attack where an attacker will utilize a list of users and default passwords on the application to brute force logins. To prevent account lockouts that would typically occur while brute forcing a single account with several passwords, an attacker may use one password say "Secure@123" against many other accounts on the application.
This technique is frequent when an application or administrator creates a default password for new users.
In our Spraying Module, you can upload your custom list containing emails or just provide a password click save, and start the Attack, this will perform only on the victims we got while performing phishing attacks.
This module is similar to what we do in Spraying the only difference is that instead of providing 1 password you can provide multiple passwords. By default, Microsoft allows 10 attempts so you can try up to 9 passwords. You can just provide your passwords and users list click save and start the attack.
Once you gain access to the target's tenant you can now grant all those high privileged permissions from any user you want. So this time you can create new App registration in the victim's tenant and configure it with all permission like Files.ReadWrite.All, etc. Once Phished all the data will be displayed in the Vajra as shown below.
You may replace any file in OneDrive, which means you can inject macros in .docx and .xlsx files by changing the filename to .doc or .xlx, respectively.
If you desire to grant an access token to your phished victims in order to conduct your custom API request, simply click Get Token and you will receive one. And also you wished to again steal its data then simply click on Steal Again and customize your stealing, for example, to steal only mails just configure it in the phishing module.
You have 2 different ways for extracting data from Azure ad.
- Provide credentials along with client Id
- Provide Access Token of
https://graph.microsoft.com
Option 2 is fairly easy just need to provide a token so will talk about the option 1. For using credentials will need to provide client Id of App Registration with the following Application permission.
- Directory.AccessAsUser.All
Or you can just log into az cli and get a token with the below command.
az account get-access-token --resource=https://graph.microsoft.com
You have 2 different ways for extracting resources Azure.
- Provide credentials along with client Id
- Provide Access Token of
https://management.azure.com
Option 2 is fairly easy just need to provide a token so will talk about the option 1. For using credentials will need to provide client Id of App Registration with the following Application permission.
- user_impersonation
Or you can just log into az cli and get a token with the below command.
az account get-access-token --resource=https://management.azure.com
First of all, you need to make sure that your users should not be able to provide any consent to any untrusted apps. For which navigate to Active directory -> Enterprise Application -> Consent and permissions and select "Do not allow user consent" and "Do not allow group owner consent".
This will disallow any user to provide consent to any apps. Or you can even let users provide consent to only the verified Apps as well.
IAM Enumeration module gives provides a lot more detailed information from an IAM credentials. For example, suppose you discovered SSRF and got credentials from EC2 instances and now want to see what role, policies, or services can be used for further exploitation. Currently, this module searches for the following services:
- IAM
- Users
- Groups
- Roles
- Policies
- Compute Services
- Ec2
- Lambda
- BeanStalk
- ecr
- eks
- ecs
- Storages
- S3 Buckets
- EC2 SnapShots
- Cloud Front
- Storage Gateway
- EFS
- Network
- Security Groups
- VPCs
- Route53
S3 Scanner works just like other tool where you provide a common word and permutaion list which scans for valid bucket nothing fancy here.
Please raise an issue if you encounter a bug or have a feature request.
If you want to contribute to a project and make it better, your help is very welcome.