SANS Workshop – Building an Azure Pentest Lab for Red Teams

The increased importance of the cloud and identity is not lost on attackers. To simulate adversary tradecraft, Red teams must be able to evolve offensive techniques against cloud identity systems. Cloud defenders must adapt quickly to understand these same attacks and instrument defenses.

In this SANS Workshop, you will learn how to use Infrastructure as Code and open-source tools to automatically create an Azure Active Directory security lab which can be used for your own security simulations and use cases. After automatically creating Azure AD users, Applications, and RBAC role assignments, participants will have hands-on exercises to perform reconnaissance and a specific attack pathway that abuses mis-configured roles and permissions. These labs take a closer look at Azure Applications, complimenting the new SANS SEC588 Cloud Penetration Testing course labs on Azure.


Prior to the workshop:

  1. Download the Building an Azure Pentest Lab for Red Teams virtual machine. Double-click on the OVA file to import the VM with VMware. Boot the VM after import, then login with the username sec588 and the password slingshot.
    2. Password: VjPwuBaTc2Yr
  2. Launch Firefox browser and navigate to home (it should auto-launch).
  3. Follow the lab 0 instructions to ensure that you have an Azure account and active subscription.

Please note – we will not be able to troubleshoot or support local VM issues or Azure account subscription issues. It is highly encouraged that you download and verify login to the VM before the workshop and that you follow all steps in lab 0 for Azure account and subscription setup.

System Requirements:

  • VMware to launch a customized Slingshot Linux distribution (VMware Workstation Pro, VMware Workstation Player, or VMware Fusion for macOS; trial versions of all three are available, and VMware Workstation Player is available for free for non-commercial use.
  • 30 GB free hard drive space
  • At least 8 GB RAM