Question: Part 2 ) CentOS 8 based web server running an API for credit card processing and has a database to store transactional data named C
Part CentOS based web server running an API for credit card processing and has a database to
store transactional data named CCredit
Windows file server named WFile This server also provided file storage for backups
from other servers.
Various printers, laptops, desktops, etc.
Summary of Security Breach
The hack attempted to gain access to the web server by logging into the WordPress
administrative console using a dictionary attack. They got lucky and scored the "Admin"
password.
After logging in they tried logging in via FTP with the same credentials and got into the
Apache root folder. The company doesn't even need FTP as no one ever uses it
In FTP they found the information on the database server from WordPress's wpconfig.php
file.
In WordPress, they found the plugin info about how it connects to the credit card processing
system.
Due to the lack of any meaningful firewall, they were able to connect to the database server
and download the entire WordPress database.
They tried using ssh into the Apache server with the admin credentials which worked. From
there, they were able to ssh into the credit card processing server and find the MySQL server
installed for the credit card system. However, they did not even need to hack the system as
there was a backup directory that had the sql dump from the night before. They copied the
file over ssh
After getting the major databases, they left. They sold the data on the web for about $ per
record and are now vacationing in a country without extradition.
Since then the admin password has been changed to something that no one can type due to
its length so they copy and paste it from a word doc that is shared on the file server.
Things your boss wants you to know about the project:
Although we have a substantial budget, money is a concern. When you are looking at
solutions, you should be able to justify why a specific solution is needed and compare it to
the next lower priced solution. If pricing is not easily accessible, make your best educated
guess.
We fully expect that the router, switches and WiFi needs replacing. We want managed
devices to create the vlans to segment the network.
We fully expect that we probably need a few more servers. Instead of physical servers, we
are going to buy big beefy servers and virtualize everything. For now, your assignment is to
determine the virtual servers and not be concerned with the physical servers.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
