Azure Application Security: Beginner's Edition [Jan 2023]
Master application security in Azure. Learn how Azure apps are attacked, and how to secure them with appropriate security controls. Practice attacker techniques in a lab environment simulating a real-world enterprise. Earn the CAWASP (Certified Azure Web Application Security Professional) certification.

Enrollment ends in:
Build Your Cybersecurity Credentials
Live Session Schedule
Prerequisites
1. A basic understanding of Application security and Azure is desired but not mandatory
2. System with 4 GB RAM and ability to install OpenVPN client and RDP to Windows boxes
3. Privileges to disable/change any antivirus or firewall
2. System with 4 GB RAM and ability to install OpenVPN client and RDP to Windows boxes
3. Privileges to disable/change any antivirus or firewall
The course is split in four modules across four weeks:
Module I:
-
Introduction to Azure Cloud
-
Recon, Discovery and Enumeration
-
Azure RBAC Roles and ABAC
-
Rest APIs in Azure
-
Authentication & Authorization
-
Deep dive into OAuth
-
Authentication methods supported by Azure
Module II:
-
Tokens in Azure and their use in attacks
-
About App Registrations
-
About Enterprise Apps (Supported credentials, App roles and claims etc.)
-
Attacking App Registrations and Enterprise Apps
-
OAuth Permissions and their abuse (Privilege Escalation, Persistence and Lateral Movement)
-
Consents and Permissions in Azure
-
Illicit Consent Grant Attack (OAuth Phishing)
-
Microsoft Graph API and its abuse
Module III:
-
Abuse Azure services for Extracting secrets, Priv Esc, Persistence and Lateral Movement
-
About App Services (Deployment, Configuration, SCM etc.)
-
Attacking App Services by abusing app vulnerabilities and interoperability with other Azure services
-
About Function Apps (Durable Function Apps, Triggers, Deployment etc.)
-
Attacking Function Apps (Abusing integration with other Azure services)
-
Understanding and Attacking Key Vaults (Access Policies, Retention Policies etc.)
-
Understanding and Attacking Storage Accounts (Management plane to Data plane, SAS tokens, Connection Strings, Shared key, Information gathering from Metadata)
Module IV:
-
Understanding and abusing Databases Services in Azure (Cosmos DB, SQL Server etc.)
-
Understanding Application Proxy
-
Azure API Management and API Security
-
Defending Applications in Azure (Web Application Firewall, Microsoft Defender for Cloud Apps and Microsoft Defender for Cloud)
-
Bypassing Defenses
Meet the instructor
Chirag Savla
Chirag Savla is an information security professional whose areas of interest include penetration testing, red teaming, azure, active directory security, and post-exploitation research.
He has over 7+ years of experience in information security. Chirag likes to research new attack methodologies and create open-source tools that can be used during the red team assessments. He has worked extensively on Azure, Active Directory attacks, defense, and bypassing detection mechanisms.
He is the author of multiple Open Source tools such as Process Injection, Callidus, etc. He has spoken in multiple conferences and local meetups.
He has over 7+ years of experience in information security. Chirag likes to research new attack methodologies and create open-source tools that can be used during the red team assessments. He has worked extensively on Azure, Active Directory attacks, defense, and bypassing detection mechanisms.
He is the author of multiple Open Source tools such as Process Injection, Callidus, etc. He has spoken in multiple conferences and local meetups.
Chirag Savla - Principal Instructor
Can't attend this bootcamp? Get informed about future bootcamps!
Thank you!