Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

open http guide #666

Open
wants to merge 4 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,7 @@ This repository is an extension of CloudSploit's [open-source scanning engine](h
* [Open Telnet](en/aws/ec2/open-telnet.md)
* [Open VNC Client](en/aws/ec2/open-vnc-client.md)
* [Open VNC Server](en/aws/ec2/open-vnc-server.md)
* [Open HTTP](en/aws/ec2/open-http.md)
* [Overlapping Security Groups](en/aws/ec2/overlapping-security-groups.md)
* [Public AMI](en/aws/ec2/public-ami.md)
* [Subnet IP Availability](en/aws/ec2/subnet-ip-availability.md)
Expand Down
30 changes: 30 additions & 0 deletions en/aws/ec2/open-http.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com)

# AWS / EC2 / Open HTTP

## Quick Info

| | |
|-|-|
| **Plugin Title** | Open HTTP |
| **Cloud** | AWS |
| **Category** | EC2 |
| **Description** | Determine if TCP port 80 for HTTPS is open to the public |
| **More Info** | Network security groups should be periodically evaluated for port misconfigurations. Where certain ports and protocols may be exposed to the Internet, they should be evaluated for necessity and restricted wherever they are not explicitly required and narrowly configured. |
| **AWS Link** | http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/authorizing-access-to-an-instance.html |
| **Recommended Action** | Restrict TCP port 80 to known IP addresses. |

## Detailed Remediation Steps
1. Log in to the AWS Management Console.
2. Select the "Services" option and search for EC2. </br> <img src="/resources/aws/ec2/open-http/step2.png"/>
3. Scroll down the left navigation panel and choose "Security Group" under "Network & Security".</br> <img src="/resources/aws/ec2/open-http/step3.png"/>
4. Select the "EC2 Security Group" that needs to be verified. </br> <img src="/resources/aws/ec2/open-http/step4.png"/>
5. Scroll down the bottom panel and choose "Inbound rules". Verify the value for "Source" column for "HTTP" under "Type" for port "80" if the rule have value set to "0.0.0.0/0" or "::/0 " then the selected "Security Group" has "TCP" port for "HTTP" open to the public.</br> <img src="/resources/aws/ec2/open-http/step5.png"/>
6. Repeat step number 2 - 5 to verify other "Security Groups" in the selected AWS region.</br>
7. Navigate to "Security Groups" under "Network & Security" and select the "Security Group" that needs to be modified to restrict the access of "TCP" port "80" for "HTTP" to specific IP address. </br> <img src="/resources/aws/ec2/open-http/step7.png"/>
8. Scroll down the page and select the "Inbound rules" and click on the "Edit inbound rules" button to the right. </br> <img src="/resources/aws/ec2/open-http/step8.png"/>
9. In the "Edit inbound rules" tab select either the "MyIP" or "Custom" from the "Source" column.</br> <img src="/resources/aws/ec2/open-http/step9.png"/>
10. In the "Edit inbound rules" tab select the "MyIP" or any CIDR Block from the "Source" column to allow "HTTP" inbound traffic only from your IP address.</br> <img src="/resources/aws/ec2/open-http/step10.png"/>
11. Click on the "Save rules" button to make the necessary changes. </br> <img src="/resources/aws/ec2/open-http/step11.png"/>
12. Repeat step number 7 - 12 to restrict TCP port "80" for "HTTP".</br>

1 change: 1 addition & 0 deletions resources/aws/ec2/open-http/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@

Binary file added resources/aws/ec2/open-http/step10.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added resources/aws/ec2/open-http/step11.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added resources/aws/ec2/open-http/step2.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added resources/aws/ec2/open-http/step3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added resources/aws/ec2/open-http/step4.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added resources/aws/ec2/open-http/step5.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added resources/aws/ec2/open-http/step7.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added resources/aws/ec2/open-http/step8.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added resources/aws/ec2/open-http/step9.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.