官术网_书友最值得收藏!

 Gathering cloud service information

We next want to discover whether the target is using any cloud-based services. Based on the IP addresses we have found we can see if there are multiple different domain and host information associated with an individual IP Address which would indicate some form of cloud based service.

Cloud services come in several different forms and offerings. Cloud services originally started the as a service trend with Software as a Service (SaaS), such as Office 365 and Exchange 365 and a Platform as a Service (PaaS) like AWS and Azure. Today, many organizations rely on cloud-based systems. Sometimes, these systems are controlled, managed, and monitored as part of the data center infrastructure. At other times, this use is regarded as Shadow IT. Shadow IT refers to the services that are brought up outside the corporate IT environment and control. They are often used for development purposes or to actually get around restricts or delays based on standard corporate IT policies. These environments can be rich with information; in fact, some of the more recent breaches of Personally Identifiable Information (PIIhave been from either unsecured or badly secured test applications, where they used real data in the databases. 

主站蜘蛛池模板: 锡林浩特市| 新平| 舞钢市| 大港区| 台南市| 嫩江县| 焦作市| 奈曼旗| 民勤县| 常德市| 瑞昌市| 刚察县| 安吉县| 铜梁县| 岢岚县| 溆浦县| 泾阳县| 塔城市| 滦南县| 上虞市| 宿松县| 偏关县| 涟源市| 天全县| 临夏市| 怀仁县| 漠河县| 呼伦贝尔市| 龙山县| 孟州市| 南陵县| 临澧县| 兖州市| 莱西市| 宜丰县| 页游| 大方县| 青岛市| 昭苏县| 泸州市| 民县|