Skimming Credentials with Azure's Front Door WAF #220
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
The post shows a practical credential-skimming technique that abuses Azure Front Door (AFD) WAF Custom Rules plus Log Analytics to capture cleartext credentials passing through a protected login. This is not a product CVE; it is a misuse of legitimate features available to anyone with the ability to modify the WAF policy and read its logs.
How AFD WAF and logging behave (basis for the attack):
- AFD WAF Custom Rules can match on request elements including IPs, ...
🔧 Technical Details
AFD WAF log-only custom rule for credential skimming: Add an early-priority Front Door WAF Custom Rule that matches POST parameters used by login forms (e.g.,
username,password) with Operator=Anyand Action=Log traffic only. StreamFrontDoor WebApplicationFirewallLogdiagnostics to Log Analytics, then query theAzureDiagnosticstable filtering byCategory == "FrontDoorWebApplicationFirewallLog"and yourruleName_s. The cleartext values appear indetails_matches_s.Stealth via evaluation semantics: On AFD WAF, a Custom Rule with Action=Log does not short-circuit evaluation; later rules still run and t...
🤖 Agent Actions
I analyzed the blog and HackTricks repository, found the correct location, and updated the Azure Front Door page with the credential-skimming technique via WAF Custom Rules and Log Analytics.
What I did:
Changes made:
No new files were created; the existing Front Door page is the most appropriate place for this content.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).
🗑️ File Cleanup