Access Millions of academic & study documents

Screenshot 20211204 132745 drive

Content type
User Generated
School
University of Nairobi
Showing Page:
1/1

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Exhibit 1 Technical Explanation of Hack Prepared by the House of Representatives Committee on Oversight and Government Reform After entering the ACIS environment through the Apache Struts vulnerability, the attackers uploaded the first web shells, which are malicious scripts uploaded to a compromised server to enable remote control of the machine [...]. Web shells can enable file system and database manipulation, facilitate system command execution, and provide file upload/download capability. In essence, a web shell provides a secret backdoor for an attacker to reenter and interact with a compromised system. The ACIS environment was comprised of two web servers and two application servers, with firewalls set up at the perimeter of the web servers. Attackers exploited the Apache Struts vulnerability found on the application servers to bypass these firewalls. Once inside the network, the attackers created web shells on ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4