Skip to content

0tieno/Azure-Security-CTF

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 

Repository files navigation

Azure-cloud_Security-CTF_hackathon 🚀🔐

Welcome to the Azure cloud Security Capture The Flag (CTF) challenges at Hackfest 2.0, a 7-day hackathon organized by cyberEyes & CSK. This event is designed to test and improve your Azure cloud security skills through real-world security misconfigurations and threats.

Structure the Azure Security CTF

Each challenge will be designed as a flag-based security challenge where participants need to complete a task and retrieve a "flag" (a hidden code or phrase). Flags will be stored in secure locations that participants can only access after properly securing or exploiting the system.

Scoring System

Each challenge is assigned a difficulty level:

  • 🟢 Beginner (100 points)
  • 🔵 Intermediate (200 points)
  • 🔴 Advanced (300+ points)

The first team to submit a correct flag earns extra bonus points (+50). The leaderboard updates in real-time based on completed challenges.

🔥 Challenges Overview

The challenges are based on real-world scenarios and cover a wide range of Azure security topics, including:

Storage Security – Misconfigured storage accounts, public access, and SAS token exploitation.
Identity & Access Management (IAM) – Azure AD misconfigurations, role assignments, and privilege escalation.
Network Security – Exposed virtual machines, firewall bypass, and NSG misconfigurations.
CI/CD Security – Secure DevOps pipelines, misconfigured secrets, and container security.
Logging & Monitoring – Defender for Cloud, Azure Monitor logs, and security alerts.


📌 CTF Challenges

🚀 Challenge 1: Exposed Storage - Retrieve the Secret (100 Points)

🔹 A misconfigured Azure Storage Account exposes sensitive information.
🔹 Find the publicly accessible file and extract the hidden flag from metadata.
🔹 Secure the storage account to prevent unauthorized access.

🔐 Challenge 2: Privilege Escalation in Azure AD (200 Points)

🔹 Identify overprivileged Azure AD roles that allow privilege escalation.
🔹 Exploit a misconfigured service principal to gain elevated access.
🔹 Secure the identity permissions to prevent further exploitation.

🌐 Challenge 3: Breaking Azure Network Security (250 Points)

🔹 Bypass weak Network Security Group (NSG) rules to access a restricted VM.
🔹 Identify an exposed RDP/SSH service and gain access.
🔹 Implement firewall rules to harden the network.

⚙️ Challenge 4: CI/CD Pipeline Secrets Leak (300 Points)

🔹 Discover hardcoded secrets in a DevOps pipeline.
🔹 Exploit weak security configurations in Azure DevOps/GitHub Actions.
🔹 Secure the pipeline by implementing secrets management best practices.

📊 Challenge 5: Threat Detection & Incident Response (350 Points)

🔹 Analyze Azure Monitor Logs and Defender for Cloud alerts.
🔹 Investigate a simulated attack and find the attacker’s origin.
🔹 Implement detection rules to prevent similar incidents.


📖 Prerequisites

Before attempting the challenge, you should be familiar with:

📝 Submissions

To complete these challenges, follow instructions for each challenge and submit:
✅ The correct flag (CTF{...}).
Screenshots/logs/files of steps documented to the applied security fixes.
(Bonuses) on the additional instructions.

🤝 Contribution

Want to add your own challenge? Feel free to fork this repo and create a pull request with your challenge idea!

📢 Stay Updated

Follow us on LinkedIn-cyber eyes and join the LinkedIn-CSK community for updates, discussions, and security tips!

🔹 Happy Hacking! 🔹 🔹 Cloud security! 🔹

  • prepared by $!rronn3y courtesy of @cyberEyes @CSK

About

azure-cloud-security-hackathon-ctf challenges

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published