Lenin alevski 🕵️💻<p>Ever thought of tunneling traffic over Azure Blob Storage? 🤔☁️ </p><p>ProxyBlob lets you run a SOCKS5 proxy using Azure Storage as the communication channel. Useful in restrictive networks where only `*.blob.core.windows.net` is accessible. <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Azure</span></a> <a href="https://infosec.exchange/tags/Proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxy</span></a> <a href="https://infosec.exchange/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> </p><p>---</p><p>Why does ProxyBlob need Azure Storage? 💡📦 </p><p>It creates a clever detour: Agents in target networks poll Azure Blob for tasks, while the proxy writes requests there. This avoids direct network connections for environments with strict rules. <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://infosec.exchange/tags/CloudComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudComputing</span></a> </p><p>---</p><p>Missing direct network access but have Azure? Try Azurite! 🖥️🔨 </p><p>ProxyBlob's agent also supports testing with Azurite, an open-source Azure Storage emulator. Use Docker or a VS Code extension to simulate an Azure Blob environment locally. <a href="https://infosec.exchange/tags/DevOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevOps</span></a> <a href="https://infosec.exchange/tags/Testing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Testing</span></a> </p><p>--- </p><p>How do SOCKS proxies over Azure even work? Let's simplify: 🎯 </p><p>1. Proxy writes packets to Blob Storage.<br>2. Agent polls Blob, handles requests, and writes responses back.<br>3. Proxy retrieves responses, keeping the SOCKS5 flow alive. Smart and efficient. <a href="https://infosec.exchange/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Azure</span></a> </p><p>---</p><p>Using ProxyBlob on-prem? Here's an essential setup note: </p><p>Test with `Azurite` before deploying on actual Azure. It emulates storage accounts with default credentials, helping validate configurations without cloud costs or risks. <a href="https://infosec.exchange/tags/CloudTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudTools</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/quarkslab/proxyblob" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/quarkslab/proxyblob</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴☠️</p>