Azurite – An Azure AD Enumeration Tool

What is Azurite?

This one’s a doozy folks. With the rapid growth of cloud infrastructure technologies it is more important than ever to assess the security of cloud resources. Azurite is one tool that is fit for the job, this tool is  great for enumeration of Azure public cloud deployments as it passively collects verbose information of main components within those deployments.

The tool was created by FSecureLABS and consists of 2 helper scripts called AzuriteExplorer.ps1 and AzuriteVisualizer.py, and they assist in providing a quick way to identify insecure security groups on VMs.

How to Install Azurite

Azurite has a few pre-requisites before installing. Prior to cloning the GitHub repository you must first have python2.7 installed as well as Firefox web browser. Another prerequisite is the installation of Azure PS cmdlets. Installation information can be found on the Microsoft Docs website here.

Once you have all the required installations you can proceed to clone the GitHub repository here. After cloning you need to get the sub module for the NetJSON NetworkGraph tool. Use the following commands to install them:

git submodule init
git submodule update

The Azurite Visualizer Graph is based on the netjsongraph.js and currently supports only the Firefox browser.

Development of Azurite is ongoing, and this first release provides support for mainstream Azure components, including:

  • Virtual Networks (VNets)
  • Subnets
  • Virtual Network Gateways
  • Microsoft Azure SQL Servers
  • Azure SQL Databases
  • MicrosoftAzure Websites
  • Azure Key Vaults

Let’s talk about Usage

Azurite Explorer

Once installed and started the Azurite Explorer retrieves the configuration of an Azure-hosted deployment and exports the output to a JSON object for offline review.  Firstly, navigate to the cloned repository, then import the Azure Resource Manager via PowerShell by following these steps:

# PS> Import-Module AzureRM

Next you need to import the Azurite Explorer module from the cloned repository and get the information from the Azure Subscription:

# PS> Import-Module AzuriteExplorer.ps1
# PS> Review-AzureRmSubscription

Once you have entered credentials for the Azure subscription, you need to know the user’s owner, contributor, or reader role as well as the subscription ID. Explorer will then save the output to a list of JSON files for the Azurite Visualizer to use.

Azurite Visualizer

When Explorer has finished exporting the data, Azurite Visualizer will allow you to collect certain types of information for each resource and it can highlight weak NSGs (Network Security Groups) associated with VMs and Subnets. In order to view the network graph you need to run the command below and then open the AzuriteVisualizer.html file from the cloned repository in Firefox.

# python AzuriteVisualizer.py azure-subscription_<subscription-id>_<user-email>.json

Conclusion

This tool is perfect for someone who is in DevOps or SecDevOps and can prove useful to cloud developers. Due to its robust toolset and easy setup I’m rating this one a 4/5 bunnies

Want to learn more about ethical hacking?

We have a  networking hacking course that is of a similar level to OSCP, get an exclusive discount here

Help support LHN by buying a T-shirt or a mug?

Check out our selection here

Do you know of another GitHub related hacking tool?

Get in touch with us via the contact form if you would like us to look at any other GitHub ethical hacking tools.

Related posts

BruteDum- A network attack bruteforce tool

MHDDoS – A DDoS Attack Script With Over 50 Different Methods

A Review of DNS Enumeration Tool: DNSEnum