全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

MyCloudBills Pen Test and Network Security Assessment 

DOI: 10.4236/oalib.1113973, PP. 1-16

Subject Areas: Computer and Network Security

Keywords: Vulnerability, Attack Vector, Log4j, Phishing, Security Controls

Full-Text   Cite this paper   Add to My Lib

Abstract

This research paper describes two of the most common attack vectors that an attacker could use to access MyCloudBills’ network, a fictitious SaaS company. The research about the Network topology and the analysis of the mitigating solution can be used as a reference for both Pen Testers and Blue Teams to develop attack and defense techniques, respectively.

Cite this paper

D’Angelone, M. (2025). MyCloudBills Pen Test and Network Security Assessment . Open Access Library Journal, 12, e13973. doi: http://dx.doi.org/10.4236/oalib.1113973.

References

[1]  Verizon (2021) 2021 Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/dbir/
[2]  Mordor Intelligence (2021) Hybrid Cloud Market, In-dustry Share, Size, Growth Mordor Intelligence.
[3]  Casey, K. (2020) Hybrid Cloud by the Numbers, 2020: 10 Stats to See. https://enterprisersproject.com/article/2020/7/hybrid-cloud-10-statistics
[4]  Firewall, C.X. (2021) Configuring Site to Site IPSec VPN Tunnel between Cisco Routers. https://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers /867-cisco-router-site-to-site-ipsec-vpn.html
[5]  Cisco Networking Academy (2014) Hierarchical Network Design Overview (1.1)>Cisco Networking Academy Connecting Net-works Companion Guide: Hierarchical Network De-sign.https://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4
[6]  Dell Technologies (2021) PowerEdge FX Series—Enterprise Servers. https://www.delltechnologies.com/en-us/servers/modular- infrastructure/poweredge-fx/index.htm
[7]  Dignan, L. (2021) Top Cloud Providers in 2021: AWS, Microsoft Azure, and Google Cloud, Hybrid, SaaS Players. https://www.zdnet.com/article/the-top-cloud-providers-of-2021-aws-microsoft-azure-google-cloud-hybrid-saas/
[8]  AWS (2017) AWS Identity & Access Management. Amazon Web Services, Inc. https://aws.amazon.com/iam/
[9]  AWS (2017) AWS Transit Gateway—Amazon Web Services. Amazon Web Services, Inc. https://aws.amazon.com/transit-gateway/
[10]  AWS (2018) Amazon CloudWatch—Application and Infrastructure Moni-toring. Amazon Web Services, Inc. https://aws.amazon.com/cloudwatch/
[11]  Robinson, T. (2021) Apache Log4j Threat-ens, Well, Everything. Security Boulevard. https://securityboulevard.com/2021/12/apache-log4j-threatens-well-everything/
[12]  Mcwhirt, M. and Hultquist, J. (2021) Log4Shell Initial Exploitation and Mitigation Recommendations. Mandiant. https://www.mandiant.com/resources/log4shell-recommendations
[13]  Yan, T., et al. (2021) Apache Log4j Vulnerability CVE-2021-44228: Analysis and Mitigations. Unit42, 10-Dec-2021. https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/
[14]  Cisco Systems (2021) Cisco Secu-rity Advisory: Vulnerabilities in Apache Log4j Library Affecting Cisco Products: December 2021. Cisco, 10-Dec-2021. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEb
[15]  YfryTchsGD (2022) Log4jAttackSurface. https://github.com/YfryTchsGD/Log4jAttackSurface
[16]  MITRE (2021) CVE-CVE-2021-44228. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
[17]  NIST (2021) NVD-CVE-2021-44228. https://nvd.nist.gov/vuln/detail/CVE-2021-44228
[18]  NIST (2021) NVD-CVE-2021-45046. https://nvd.nist.gov/vuln/detail/CVE-2021-45046
[19]  Leonjza (2021) Apache Log4j2 2.14.1—Information Disclosure. Exploit Database, 14-Dec-2021. https://www.exploit-db.com/exploits/50590
[20]  Mandiant (2021) Report—Mandiant Advantage. https://advantage.mandiant.com/reports/21-00026146
[21]  APWG (2021) Phishing Activity Trend Report APWG ORG 2021. https://docs.apwg.org/reports/apwg_trends_report_q2_2021.pdf
[22]  Uehara, K., Mukaiyama, K., Fu-jita, M., Nishikawa, H., Yamamoto, T., Kawauchi, K., et al. (2020) Basic Study on Targeted E-Mail Attack Method Using OSINT. In: Advances in Intelligent Systems and Computing, Springer, 1329-1341. https://doi.org/10.1007/978-3-030-15032-7_111
[23]  Microsoft (2021) Widespread Credential Phishing Campaign Abuses Open Redirector Links. Microsoft Security Blog, 26-Aug-2021. https://www.microsoft.com/security/blog/2021/08/26/widespread- credential-phishing-campaign-abuses-open-redirector-links/
[24]  Terranova Security (2021) 2020 Phishing Benchmark Global Report. https://terranovasecurity.com/wp-content/uploads/2021/01/GPT-2020-Report-EN-1.pdf
[25]  Proofpoint (2021) 2021 State of the Phish, an In-Depth Look at User Awareness, Vulnerability and Resilience.
[26]  Ponemon Institute (2021) The 2021 Cost of Phishing Study. https://www.proofpoint.com/sites/default/files/analyst-reports/pfpt-us-ar-ponemon-2021-cost-of-phishing-study.pdf
[27]  Center for Internet Security (2021) CIS Critical Security Controls® v8 CIS Critical Security Controls. CIS, May 2021.
[28]  Wortley, F., Thompson, C. and Allison, F. (2021) Guide: How to Detect and Mitigate the Log4Shell Vulnerability (CVE-2021-44228 & CVE-2021-45046). https://www.lunasec.io/docs/blog/log4j-zero-day-mitigation-guide/
[29]  Fox-It (2021) Log4j-Finder. GitHub. https://github.com/fox-it/log4j-finder
[30]  Gabor, G. and Bluehs, A. (2021) CVE-2021-44228—Log4j RCE 0-Day Mitigation. The Cloudflare Blog. http://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/
[31]  Market Screener (2021) Cisco: Protecting against Log4j with Secure Firewall & Secure IPS. Market Screener. https://www.marketscreener.com/quote/stock/CISCO-SYSTEMS-INC-4862/news /Cisco-Protecting-against-Log4j-with-Secure-Firewall-Secure-IPS-37309859/
[32]  Manraj, B. (2021) Exploiting Log4j. Apache Solr, Cyber Secure. https://www.manrajbansal.com/post/exploiting-log4j-apache-solr
[33]  Tracy, M., Jansen, W., Scarfone, K. and Butterfield, J. (2007) Guidelines on Electronic Mail Security. Information Technology Laboratory Computer Security Resource Cen-ter.

Full-Text


Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133