Skip to content

Details

Abusing Azure Function App Misconfigurations: From Anonymous Access to Full Compromise.

How attackers chain information leaks, key theft, and Managed Identity abuse to escalate from a single misconfigured function to a complete cloud takeover.

What You Will Learn

Understand how misconfigured Azure Functions expose your environment, from anonymous access to sensitive information leaks. Learn techniques attackers use to steal keys, abuse Managed Identities, and escalate privileges.

Who is for?

This event is for cloud security engineers, red teamers, security researchers, and anyone responsible for securing Azure environments.

Lecturer

Eli Guy
Security Researcher at XM Cyber

Notes

  • Level: Practical, technical (200-300)
  • Language: Hebrew
  • Format: Online, interactive

Community Channels

Related topics

Cloud Security
Cybersecurity
Microsoft Azure
Information Security
Researchers

You may also like