A Security Engineer discovered a vulnerability in an application running on Amazon ECS. The vulnerability allowed attackers to install malicious code. Analysis of the code shows it exfiltrates data on port 5353 in batches at random time intervals.
While the code of the containers is being patched, how can Engineers quickly identify all compromised hosts and stop the egress of data on port 5353?
awssecuritynewbie
Highly Voted 3 years, 7 months agoPatrykMilewski
Highly Voted 3 years, 7 months agoRaphaello
Most Recent 1 year, 2 months agoITGURU51
2 years, 1 month ago[Removed]
2 years, 5 months agosapien45
2 years, 8 months agoRja148393
2 years, 9 months agolotfi50
3 years, 2 months agoRadhaghosh
3 years, 3 months agoHariru
3 years, 5 months agokiev
3 years, 6 months agoMelymel
3 years, 7 months agoGhostbusters
3 years, 6 months agocross
3 years, 6 months agogfhbox0083
3 years, 7 months agoxaccan
3 years, 7 months agoRaySmith
3 years, 7 months ago