SlideShare a Scribd company logo
1 of 86
Download to read offline
Unmasking the Subnet:
Lookalike IP Ranges in Cloud
Environments
Asaf Aprozper
June, 2023
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
● Leading the SecOps team at Moon Active
● Securing Gaming cloud infrastructures with a
global network of DevOps teams
● Previously spoken at CodeBlue Japan, BSides
Cyprus and Black Hat USA Arsenal
Asaf Aprozper
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
23%
Misconfiguration is the number one reason
of cloud security incidents in 2022
Check Point, 2022 Cloud Security Report
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
2022 Cloud Security Incidents
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Takeaways
01
Private IP addresses
Implementation in
today’s cloud
RFC 1918 Standart
02
Common misconfigurations
Proactive hunting flow
New cloud misconfiguration
Misconfigurations
03 Identify the exact issue
Evaluate it using
different resources
Assessing scope of
security issue
05 Splunk & Sigma hunting
rules;IP Unmasker;SG
Unmasker
Open source tools
04 Getting a proxy
configure it using open
source tools
Proxying like a pro
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Issue - Allowing unrestricted inbound access to some or all ports
using the IP range 0.0.0.0/0
Security Risks - Enabling external security attacks such as port
scans, log4shell payloads, and other exploitations attempts
Recommendation - Restrict inbound access to specific required IP
addressesVPN range and by port, even within internal networks
The Common MistakeMisconfiguration
0.0.0.0/0
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
AWS Suggestion - Easy to Get Misconfigured
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Discovering a
New Cloud
Misconfiguration!
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Lookalike Private
IP Ranges
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Proactive
Threat Hunting
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
● Actively searching for undetected cyber threats that
have bypassed initial security defenses within a
network
● Not waiting for alerts, taking initiative
● Game-changer in the defense strategy of organizations
Proactive Threat Hunting
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Proactive Threat Hunting Flow
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Proactive Hunting After
Cloud Misconfigurations
That Can Lead for
Threats
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Proactively Hunting Using Splunk
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Detecting Unusual IPs over Security Groups
Aws
Region eventName
Recipient
AccountId
Source IP
Range
Security
Group Desc org asn country
us-east-2
Authorize
SecurityGroup
Ingress
123456789101 178.62.238.39/32 Site24x7 DIGITALOCEAN-ASN AS14061 Netherlands
us-east-2 123456789101 188.166.3.204/32 Site24x7 DIGITALOCEAN-ASN AS14061 Netherlands
us-east-2 123456789101 104.24.0.0/14 WAF CLOUDFLARE-NET AS13335 Canada
us-east-2 123456789101 172.64.0.0/13 WAF CLOUDFLARE-NET AS13335 Germany
us-east-2 123456789101 77.125.230.136/32 Home Lab
Partner Communications
Ltd. AS12400 Israel
us-east-2 123456789101 172.16.0.0/12 Private IP Range
us-east-2 123456789101 172.32.0.0/11 Private IP Range T-MOBILE AS21928 United States
us-east-1 123456789101 172.0.0.0/8 Private IP Range ATT-INTERNET AS7018 United States
Data Enrichment
CloudTrail Log
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Source IP Range Security Group Desc org asn country
172.32.0.0/11 Private IP Range T-MOBILE-AS21928 AS21928
United
States
172.0.0.0/8 Private IP Range ATT-INTERNET4 AS7018
United
States
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
New Cloud Misconfiguration!
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Is it possible to get a
lookalike IP address
of my own?
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Let’s go back
to the start…
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
● Established by the Internet Engineering Task Force in 1996 due to
the rapid growth of the Internet and shortage of IPv4 addresses
● Enabled private organizations to use specific IP addresses
internally, separate from the public Internet
● Created a division between public and private hosts, with private
hosts not directly accessible from the Internet
RFC 1918 Standard
RFC 1918 Private Addresses
Class CIDR block Private Address Range
A 10.0.0.0/8 10.0.0.0 - 10.255.255.255
B 172.16.0.0/12 172.16.0.0 - 172.31.255.255
C 192.168.0.0/16 192.168.0.0 - 192.168.255.255
Asaf Aprozper | fwd:cloudsec 2023 https://github.com/3pun0x/Unmasking-The-Subnet
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
RFC 1918 in
The Cloud
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
What is Virtual Private Cloud (VPC)?
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
IPv4 VPC CIDR blocks
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Public/Private
Subnet
Architecture
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Where is The
LookAlike
Misconfiguration?
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Creating a VPC
with LookAlike
IPv4 CIDR?
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
AT&T IP
Ranges
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
IP Addressing for Your Vpcs and Subnets
https://docs.aws.amazon.com/vpc/latest/userguide/vpc-ip-addressing.html
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Security
Groups?
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Security Group - LookAlike Inbound Rule
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Security Group - LookAlike Inbound Rule
LookAlike IP Range Total
172.0.0.1 172.255.255.254 16,777,216
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Implemented
over
Infrastructure
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Public Subnet
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Getting a
LookAlike Private
IP Address
$4.99
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Generic Website Selling Mobile Proxy
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
1 - Choose The
Proxy Package
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
2 - Select the Desired
LookAlike IP Range
(Carrier)
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
3 - Pay by
Credit
Card/Crypto
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
60 Seconds
Later
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
��
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Proxy Information
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Using Mobile Proxy to bypass restrictions
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Now What?
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
● Misconfiguration identified
● LookAlike IP address
● Attacker & Victim
● Scope of security risk
Where We Stand Now
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Attacker
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Attacker’s Toolset
Kali Linux
LookAlike Proxy
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Victim
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Nginx EC2 in a Public Subnet
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Attached to a Security Group with a lookalike
Private IP Range
CIDR LookAlike IP Range Total IPs
172.0.0.0/8 172.0.0.1 - 172.255.255.254 16,777,216
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
PoC Demo
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Misconfiguration
Scope
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
GitHub
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
GitHub -
Search
after
lookalike
ranges
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
GitHub -
Hashicorp
● AS7018 - AT&T
Services, Inc.
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
GitHub - AWS ELB Listen Rule Example
Misconfigured
CIDR LookAlike IP Range Total IPs
172.0.0.0/8 172.0.0.1 172.255.255.254 16,777,216
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Scanning the
Internet after
Misconfiguration
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Proxy IP Unmasker
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
AWS EC2s IP
Ranges as
Ready-To-Scan
Targets
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Reviewing The Findings
● Dev environments
● Sensitive internal companies
web platforms
● Apache directory listing of
internal files
● More…
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Leveraging ProxyChains
with Nmap to scan a
Misconfigured Asset After
Exposed Services
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
ProxyChains
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
ProxyChains
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
ProxyChains + Nmap
CMDline:
proxychains nmap -Pn -n -sT --top-ports 10 --open target_ip_address
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Detecting the
creation/modification of
security groups with lookalike
misconfigurations
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Splunk Query: CreationModify of Security
Group with LookAlike Private IP Address
index="aws" (eventName="AuthorizeSecurityGroupIngress" OR eventName="ModifySecurityGroupRules") AND
errorCode=success
| rename requestParameters.ipPermissions.items{}.ipRanges.items{}.cidrIp as cidrIpAuthoriz
| rename requestParameters.ModifySecurityGroupRulesRequest.SecurityGroupRule.SecurityGroupRule.CidrIpv4
as cidrIpModify
| eval cidrIp = coalesce(cidrIpAuthoriz,cidrIpModify) #Combine different event types and grabbed the cidrIp
| mvexpand cidrIp #Handling multi-value CIDRs
| eval single_ip = mvindex(split(cidrIp, "/"), 0) #Split CIDR to single IP
| where cidrmatch("172.1.0.0/22", single_ip) OR cidrmatch("172.32.0.0/11", single_ip) #Search for single IP in
AT&T and T-Mobile lookalike private IP ranges
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Preventing the
creation of lookalike
security groups
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
● AWS Config Rule
● GCP Organization Policy
● Raise Awareness for Cloud Users
○ Share this Talk with Your DevOps Teams
○ Use My Informative Stickers
○ Subnet Calculator Websites for Easy Checking
How to prevent?
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
The Shared
Responsibility Model
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
● Ensuring security by properly configuring and managing
security settings according to their needs
● Monitoring their cloud resources for unusual or
unauthorized activities
● Ensuring that the teams responsible for managing and
using cloud resources are well trained and aware of
security risks
Customer's Responsibility
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Cloud Service Provider's Responsibility
● Can provide tools, best practices, guidelines to
assist in properly secure cloud
● UI Message alerts
● GuardDuty alerts for public exposure
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
New
Instance =
Public
Exposure
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
No alert when
creating a
public security
group
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
After Capital One
Data Hack, AWS Will
Scan for
Misconfigurations
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Recommendation for the cloud service
provider - Check button for public exposure
over Security Groups as for S3 buckets
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
● As a cloud defender you must think ahead of the users, not only the
attackers
● The impact can be very high, I only scanned a small amount of AWS
EC2 ranges in only specific region and only under the HTTP service
● Think about what a bad actor could do - they could increase their
scan to GCP, Azure, more AWS ranges, and do more once found a
misconfigured asset - they can brute force directories too
● Can we leverage that issue to find lookalike over S3 buckets as
well?
Closing Words
Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
Thank You
Asaf Aprozper
@3pun0x
GitHub Repository

More Related Content

Similar to Unmasking the Subnet - Lookalike IP Ranges in Cloud Environments

Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaWardner Maia
 
Common Infrastructure Exploits in AWS/GCP/Azure Servers and Containers
Common Infrastructure Exploits in AWS/GCP/Azure Servers and ContainersCommon Infrastructure Exploits in AWS/GCP/Azure Servers and Containers
Common Infrastructure Exploits in AWS/GCP/Azure Servers and ContainersPriyanka Aash
 
BRKDCT-2445 Agile OpenStack Networking with Cisco Solutions-Cisco Live! US 20...
BRKDCT-2445 Agile OpenStack Networking with Cisco Solutions-Cisco Live! US 20...BRKDCT-2445 Agile OpenStack Networking with Cisco Solutions-Cisco Live! US 20...
BRKDCT-2445 Agile OpenStack Networking with Cisco Solutions-Cisco Live! US 20...Rohit Agarwalla
 
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerDEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerFelipe Prado
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data DATA SECURITY SOLUTIONS
 
Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4newbie2019
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
big data fest building modern data streaming apps
big data fest building modern data streaming appsbig data fest building modern data streaming apps
big data fest building modern data streaming appsTimothy Spann
 
BigDataFest_ Building Modern Data Streaming Apps
BigDataFest_  Building Modern Data Streaming AppsBigDataFest_  Building Modern Data Streaming Apps
BigDataFest_ Building Modern Data Streaming Appsssuser73434e
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Canada
 
OpenStack Havana over IPv6
OpenStack Havana over IPv6OpenStack Havana over IPv6
OpenStack Havana over IPv6Shixiong Shang
 
CloudStack IPv6 in production
CloudStack IPv6 in productionCloudStack IPv6 in production
CloudStack IPv6 in productionShapeBlue
 
AusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NATAusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NATMark Smith
 
Discover the Power of ThousandEyes on Your Meraki MX
Discover the Power of ThousandEyes on Your Meraki MXDiscover the Power of ThousandEyes on Your Meraki MX
Discover the Power of ThousandEyes on Your Meraki MXThousandEyes
 
Conf42Python -Using Apache NiFi, Apache Kafka, RisingWave, and Apache Iceberg...
Conf42Python -Using Apache NiFi, Apache Kafka, RisingWave, and Apache Iceberg...Conf42Python -Using Apache NiFi, Apache Kafka, RisingWave, and Apache Iceberg...
Conf42Python -Using Apache NiFi, Apache Kafka, RisingWave, and Apache Iceberg...Timothy Spann
 
Spoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized InternetSpoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized InternetAPNIC
 
DDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internetDDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internetTom Paseka
 

Similar to Unmasking the Subnet - Lookalike IP Ranges in Cloud Environments (20)

Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
 
Common Infrastructure Exploits in AWS/GCP/Azure Servers and Containers
Common Infrastructure Exploits in AWS/GCP/Azure Servers and ContainersCommon Infrastructure Exploits in AWS/GCP/Azure Servers and Containers
Common Infrastructure Exploits in AWS/GCP/Azure Servers and Containers
 
BRKDCT-2445 Agile OpenStack Networking with Cisco Solutions-Cisco Live! US 20...
BRKDCT-2445 Agile OpenStack Networking with Cisco Solutions-Cisco Live! US 20...BRKDCT-2445 Agile OpenStack Networking with Cisco Solutions-Cisco Live! US 20...
BRKDCT-2445 Agile OpenStack Networking with Cisco Solutions-Cisco Live! US 20...
 
ACI Hands-on Lab
ACI Hands-on LabACI Hands-on Lab
ACI Hands-on Lab
 
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerDEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
 
IBOSEC-3000-2.pdf
IBOSEC-3000-2.pdfIBOSEC-3000-2.pdf
IBOSEC-3000-2.pdf
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data
 
Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
big data fest building modern data streaming apps
big data fest building modern data streaming appsbig data fest building modern data streaming apps
big data fest building modern data streaming apps
 
BigDataFest_ Building Modern Data Streaming Apps
BigDataFest_  Building Modern Data Streaming AppsBigDataFest_  Building Modern Data Streaming Apps
BigDataFest_ Building Modern Data Streaming Apps
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFV
 
OpenStack Havana over IPv6
OpenStack Havana over IPv6OpenStack Havana over IPv6
OpenStack Havana over IPv6
 
CloudStack IPv6 in production
CloudStack IPv6 in productionCloudStack IPv6 in production
CloudStack IPv6 in production
 
AusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NATAusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NAT
 
Discover the Power of ThousandEyes on Your Meraki MX
Discover the Power of ThousandEyes on Your Meraki MXDiscover the Power of ThousandEyes on Your Meraki MX
Discover the Power of ThousandEyes on Your Meraki MX
 
Conf42Python -Using Apache NiFi, Apache Kafka, RisingWave, and Apache Iceberg...
Conf42Python -Using Apache NiFi, Apache Kafka, RisingWave, and Apache Iceberg...Conf42Python -Using Apache NiFi, Apache Kafka, RisingWave, and Apache Iceberg...
Conf42Python -Using Apache NiFi, Apache Kafka, RisingWave, and Apache Iceberg...
 
Spoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized InternetSpoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized Internet
 
DDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internetDDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internet
 

Recently uploaded

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 

Recently uploaded (20)

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

Unmasking the Subnet - Lookalike IP Ranges in Cloud Environments

  • 1. Unmasking the Subnet: Lookalike IP Ranges in Cloud Environments Asaf Aprozper June, 2023
  • 2. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 ● Leading the SecOps team at Moon Active ● Securing Gaming cloud infrastructures with a global network of DevOps teams ● Previously spoken at CodeBlue Japan, BSides Cyprus and Black Hat USA Arsenal Asaf Aprozper
  • 3. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 23% Misconfiguration is the number one reason of cloud security incidents in 2022 Check Point, 2022 Cloud Security Report
  • 4. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 2022 Cloud Security Incidents
  • 5. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Takeaways 01 Private IP addresses Implementation in today’s cloud RFC 1918 Standart 02 Common misconfigurations Proactive hunting flow New cloud misconfiguration Misconfigurations 03 Identify the exact issue Evaluate it using different resources Assessing scope of security issue 05 Splunk & Sigma hunting rules;IP Unmasker;SG Unmasker Open source tools 04 Getting a proxy configure it using open source tools Proxying like a pro
  • 6. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Issue - Allowing unrestricted inbound access to some or all ports using the IP range 0.0.0.0/0 Security Risks - Enabling external security attacks such as port scans, log4shell payloads, and other exploitations attempts Recommendation - Restrict inbound access to specific required IP addressesVPN range and by port, even within internal networks The Common MistakeMisconfiguration 0.0.0.0/0
  • 7. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 AWS Suggestion - Easy to Get Misconfigured
  • 8. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Discovering a New Cloud Misconfiguration!
  • 9. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Lookalike Private IP Ranges Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
  • 10. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Proactive Threat Hunting
  • 11. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 ● Actively searching for undetected cyber threats that have bypassed initial security defenses within a network ● Not waiting for alerts, taking initiative ● Game-changer in the defense strategy of organizations Proactive Threat Hunting
  • 12. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Proactive Threat Hunting Flow
  • 13. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Proactive Hunting After Cloud Misconfigurations That Can Lead for Threats
  • 14. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Proactively Hunting Using Splunk
  • 15. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Detecting Unusual IPs over Security Groups Aws Region eventName Recipient AccountId Source IP Range Security Group Desc org asn country us-east-2 Authorize SecurityGroup Ingress 123456789101 178.62.238.39/32 Site24x7 DIGITALOCEAN-ASN AS14061 Netherlands us-east-2 123456789101 188.166.3.204/32 Site24x7 DIGITALOCEAN-ASN AS14061 Netherlands us-east-2 123456789101 104.24.0.0/14 WAF CLOUDFLARE-NET AS13335 Canada us-east-2 123456789101 172.64.0.0/13 WAF CLOUDFLARE-NET AS13335 Germany us-east-2 123456789101 77.125.230.136/32 Home Lab Partner Communications Ltd. AS12400 Israel us-east-2 123456789101 172.16.0.0/12 Private IP Range us-east-2 123456789101 172.32.0.0/11 Private IP Range T-MOBILE AS21928 United States us-east-1 123456789101 172.0.0.0/8 Private IP Range ATT-INTERNET AS7018 United States Data Enrichment CloudTrail Log
  • 16. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Source IP Range Security Group Desc org asn country 172.32.0.0/11 Private IP Range T-MOBILE-AS21928 AS21928 United States 172.0.0.0/8 Private IP Range ATT-INTERNET4 AS7018 United States
  • 17. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
  • 18. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
  • 19. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 New Cloud Misconfiguration!
  • 20. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Is it possible to get a lookalike IP address of my own?
  • 21. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Let’s go back to the start…
  • 22. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 ● Established by the Internet Engineering Task Force in 1996 due to the rapid growth of the Internet and shortage of IPv4 addresses ● Enabled private organizations to use specific IP addresses internally, separate from the public Internet ● Created a division between public and private hosts, with private hosts not directly accessible from the Internet RFC 1918 Standard
  • 23. RFC 1918 Private Addresses Class CIDR block Private Address Range A 10.0.0.0/8 10.0.0.0 - 10.255.255.255 B 172.16.0.0/12 172.16.0.0 - 172.31.255.255 C 192.168.0.0/16 192.168.0.0 - 192.168.255.255 Asaf Aprozper | fwd:cloudsec 2023 https://github.com/3pun0x/Unmasking-The-Subnet
  • 24. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 RFC 1918 in The Cloud
  • 25. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 What is Virtual Private Cloud (VPC)?
  • 26. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 IPv4 VPC CIDR blocks
  • 27. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Public/Private Subnet Architecture
  • 28. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Where is The LookAlike Misconfiguration?
  • 29. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Creating a VPC with LookAlike IPv4 CIDR?
  • 30. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 AT&T IP Ranges
  • 31. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
  • 32. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 IP Addressing for Your Vpcs and Subnets https://docs.aws.amazon.com/vpc/latest/userguide/vpc-ip-addressing.html
  • 33. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Security Groups?
  • 34. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Security Group - LookAlike Inbound Rule
  • 35. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Security Group - LookAlike Inbound Rule LookAlike IP Range Total 172.0.0.1 172.255.255.254 16,777,216
  • 36. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Implemented over Infrastructure
  • 37. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Public Subnet
  • 38. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Getting a LookAlike Private IP Address $4.99
  • 39. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Generic Website Selling Mobile Proxy
  • 40. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 1 - Choose The Proxy Package
  • 41. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 2 - Select the Desired LookAlike IP Range (Carrier)
  • 42. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 3 - Pay by Credit Card/Crypto
  • 43. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 60 Seconds Later
  • 44. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 ��
  • 45. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Proxy Information
  • 46. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
  • 47. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Using Mobile Proxy to bypass restrictions
  • 48. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Now What?
  • 49. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 ● Misconfiguration identified ● LookAlike IP address ● Attacker & Victim ● Scope of security risk Where We Stand Now
  • 50. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Attacker
  • 51. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Attacker’s Toolset Kali Linux LookAlike Proxy
  • 52. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Victim
  • 53. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Nginx EC2 in a Public Subnet
  • 54. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Attached to a Security Group with a lookalike Private IP Range CIDR LookAlike IP Range Total IPs 172.0.0.0/8 172.0.0.1 - 172.255.255.254 16,777,216
  • 55. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 PoC Demo
  • 56. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
  • 57. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Misconfiguration Scope
  • 58. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 GitHub
  • 59. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 GitHub - Search after lookalike ranges
  • 60. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 GitHub - Hashicorp ● AS7018 - AT&T Services, Inc.
  • 61. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 GitHub - AWS ELB Listen Rule Example Misconfigured CIDR LookAlike IP Range Total IPs 172.0.0.0/8 172.0.0.1 172.255.255.254 16,777,216
  • 62. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Scanning the Internet after Misconfiguration
  • 63. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Proxy IP Unmasker
  • 64. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 AWS EC2s IP Ranges as Ready-To-Scan Targets
  • 65. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
  • 66. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Reviewing The Findings ● Dev environments ● Sensitive internal companies web platforms ● Apache directory listing of internal files ● More…
  • 67. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
  • 68. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Leveraging ProxyChains with Nmap to scan a Misconfigured Asset After Exposed Services
  • 69. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 ProxyChains
  • 70. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 ProxyChains
  • 71. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 ProxyChains + Nmap CMDline: proxychains nmap -Pn -n -sT --top-ports 10 --open target_ip_address
  • 72. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023
  • 73. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Detecting the creation/modification of security groups with lookalike misconfigurations
  • 74. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Splunk Query: CreationModify of Security Group with LookAlike Private IP Address index="aws" (eventName="AuthorizeSecurityGroupIngress" OR eventName="ModifySecurityGroupRules") AND errorCode=success | rename requestParameters.ipPermissions.items{}.ipRanges.items{}.cidrIp as cidrIpAuthoriz | rename requestParameters.ModifySecurityGroupRulesRequest.SecurityGroupRule.SecurityGroupRule.CidrIpv4 as cidrIpModify | eval cidrIp = coalesce(cidrIpAuthoriz,cidrIpModify) #Combine different event types and grabbed the cidrIp | mvexpand cidrIp #Handling multi-value CIDRs | eval single_ip = mvindex(split(cidrIp, "/"), 0) #Split CIDR to single IP | where cidrmatch("172.1.0.0/22", single_ip) OR cidrmatch("172.32.0.0/11", single_ip) #Search for single IP in AT&T and T-Mobile lookalike private IP ranges
  • 75. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Preventing the creation of lookalike security groups
  • 76. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 ● AWS Config Rule ● GCP Organization Policy ● Raise Awareness for Cloud Users ○ Share this Talk with Your DevOps Teams ○ Use My Informative Stickers ○ Subnet Calculator Websites for Easy Checking How to prevent?
  • 77. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 The Shared Responsibility Model
  • 78. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 ● Ensuring security by properly configuring and managing security settings according to their needs ● Monitoring their cloud resources for unusual or unauthorized activities ● Ensuring that the teams responsible for managing and using cloud resources are well trained and aware of security risks Customer's Responsibility
  • 79. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Cloud Service Provider's Responsibility ● Can provide tools, best practices, guidelines to assist in properly secure cloud ● UI Message alerts ● GuardDuty alerts for public exposure
  • 80. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 New Instance = Public Exposure
  • 81. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 No alert when creating a public security group
  • 82. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 After Capital One Data Hack, AWS Will Scan for Misconfigurations
  • 83. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 Recommendation for the cloud service provider - Check button for public exposure over Security Groups as for S3 buckets
  • 84. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023 ● As a cloud defender you must think ahead of the users, not only the attackers ● The impact can be very high, I only scanned a small amount of AWS EC2 ranges in only specific region and only under the HTTP service ● Think about what a bad actor could do - they could increase their scan to GCP, Azure, more AWS ranges, and do more once found a misconfigured asset - they can brute force directories too ● Can we leverage that issue to find lookalike over S3 buckets as well? Closing Words
  • 85. Asaf Aprozper | @3pun0x | fwd:cloudsec 2023