è¦åºããã¯ãªãã¯ããã¨ä¸¦ã³æ¿ããè¡ãã¾ãã å½/å°ååãã¯ãªãã¯ããã¨IPã¢ãã¬ã¹ã®ä¸è¦§ã表示ãã¾ãã ï¼ãªã³ã¯å ãã¼ã¸ã§ã¢ã¯ã»ã¹å¶å¾¡ç¨ã®ã²ãªå½¢ãåå¾ã§ãã¾ãï¼
åæ© ãã©ã¤ãã¼ãã¢ãã¬ã¹(RFC1918)ã®ç¯å²ã§ã¯ãªãCIDRãç¥ãããã£ãã AWS ã®ã»ãã¥ãªãã£ã°ã«ã¼ãã§æå®ã§ããã®ãCIDRãªã®ã§è¨ç®ããªãã¦ã¯ãªããªãã£ãã è¦ä»¶ IPv4 ã®ã¢ãã¬ã¹ç¯å²ï¼0.0.0.0 - 255.255.255.255ï¼ã®ãã¡ã ãã©ã¤ãã¼ãã¢ãã¬ã¹ï¼ã¯ã©ã¹Aï¼10.0.0.0/8ãã¯ã©ã¹Bï¼172.16.0.0/12ãã¯ã©ã¹Cï¼192.168.0.0/16ï¼ãé¤ãããã®ã ã¤ã¾ãã - 0.0.0.0 - 9.255.255.255 - 11.0.0.0 - 172.15.255.255 - 172.32.0.0 - 192.167.255.255 - 192.169.0.0 - 255.255.255.255ï¼ã¯ã©ã¹E[240.0.0.0 - 255.255.255.255]ãå«ãã¦ã¾ãï¼ ããæ¹ ipcalc ã³ãã³ããå©ç¨ããã $ ipcal
My journey on finding and reporting databases with sensitive data about Fortune-500 companies, Hospitals, Crypto platforms, Startups during due diligence, and more. Table Of Contents OverviewBackgroundMy HypothesisScanningBI & Automation: From thousands to hundredsExamples of data I foundConclusionOverviewIt is easy to find misconfigured assets on cloud services, by scanning the CIDR blocks (IP ra
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}