Cool music IDC backend leakage can obtain detailed network topology information (typical case of poor division of network boundaries)
A typical case where detailed information about all network assets of the company is disclosed due to poor division of network boundaries
Leaked information includes but is not limited to the following:
Machine temperature!
Device Model
Device Type
Fixed Asset No.
Device serial number
IDC
Rack
Device specification
Memory
CPU
Hard Disk
Nic 1
Nic 2
Nic 3
...
MAC 1
MAC 2
MAC 3
...
Switch Port 1
Vswitch Port 2
Vswitch Port 3
...
User
Corresponding business
...
01 # leakage Source
Http: // 60.28.201.5: 2000/idc/
02 # sensitive information
Open the Tanggu century internet data center and find that a visual chart is made based on the rack of the data center. This type of data center has been in, indeed, very similar.
Click in to view the detailed information of each machine.
Http: // 60.28.201.5: 2000/device/550/
Http: // 60.28.201.5: 2000/admin/the backend fails to go in. However, you can see that the http: // 60.28.201.5: 2000/idc/9/Data Center in the Beijing area is located, crowne Plaza Hotel office building, Zhichun Road, Haidian District, Beijing, has time to pass by and then visit the Intranet.
01 # leakage Source
Http: // 60.28.201.5: 2000/idc/
02 # sensitive information
Open the Tanggu century internet data center and find that a visual chart is made based on the rack of the data center. This type of data center has been in, indeed, very similar.
Click in to view the detailed information of each machine.
Http: // 60.28.201.5: 2000/device/550/
Http: // 60.28.201.5: 2000/admin/the backend fails to go in. However, you can see that the http: // 60.28.201.5: 2000/idc/9/Data Center in the Beijing area is located, crowne Plaza Hotel office building, Zhichun Road, Haidian District, Beijing, has time to pass by and then visit the Intranet.
Divide network boundaries and control ACL access.