Created
January 24, 2021 03:52
-
-
Save PlagueHO/071546891c5cd2636226ef94df2230c6 to your computer and use it in GitHub Desktop.
Example Azure DevOps Multi-Stage YAML Pipeline triggered off malicious branch
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
trigger: | |
branches: | |
include: | |
- 'main' | |
- 'malicious-change' | |
pr: none | |
stages: | |
- stage: Build | |
jobs: | |
- job: Malicious_Activities | |
pool: | |
vmImage: 'Ubuntu-16.04' | |
continueOnError: true | |
variables: | |
- group: 'PRODUCTION Secrets' | |
steps: | |
- script: echo 'Send $(SQLAdministratorLoginUsername) to Pastebin or some external location' | |
- task: AzurePowerShell@5 | |
displayName: 'Run malicious code in Azure Production envrionment' | |
inputs: | |
azureSubscription: 'Azure PRODUCTION' | |
ScriptType: InlineScript | |
Inline: '# Run some malicious code with access to Azure Production' | |
azurePowerShellVersion: latestVersion |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment