Advertisement
Guest User

Ebuisiness BPO (Cult) Internal Network Specs

a guest
Oct 4th, 2015
330
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.00 KB | None | 0 0
  1. (This Business is a Cult - like No Other:)
  2.  
  3. Ebusinessbpo.com also known as Azspired
  4. Address: 15th Floor Cebu,
  5. I.T. Tower Cebu Business Park,
  6. Mindanao Ave, Cebu City,
  7. Cebu, Philippines 6000
  8. Phone:+1 866-583-2811
  9.  
  10.  
  11. Front End Business:
  12. Call Center BPO
  13. Customer Contact Center
  14. Host Services
  15. BPO Call Center & Consulting
  16. Real Estate Rentals & Sales
  17. 2 Resturants
  18. 4 Hotels
  19.  
  20. Back End Businesses:
  21. Human Trafficking (US,UAE, Philippines, Korea, Japan, Thailand, etc.)
  22. Prostitution
  23. Bribery of Public Officials
  24. Extortion
  25. Drug Smuggling & Trafficking (Marijuana, Meth, Hashese)
  26. Blackmail
  27. Paligamy
  28. Bootlegging Alcohol
  29. Gun Running
  30.  
  31. **********************************************************************************************
  32.  
  33.  
  34. Scott Johnson (American)
  35. President at Beachside Asia Limited.
  36. President EBUSINESS BPO -Cebu
  37. Region VII - Central Visayas, Philippines
  38. scott@ebusinessbpo.com
  39. Personal Cell Phone Number:
  40. +639173015061
  41.  
  42.  
  43. Mark Johnson American-(son of Scott)
  44. Vice President of Ebusiness BPO-Cebu
  45. mark@ebusinessbpo.com
  46. Personal Cell Phone Number:
  47. +639173109568
  48.  
  49. Almira Absin Cebu- Fipina (wife of Scott Johnson)
  50. Chief Operating Officer at Ebusiness EBPO -Cebu
  51. almira@ebusinessbpo.com
  52. Personal Cell Phone Number:
  53. +639173083868
  54.  
  55. YouTube
  56. https://www.youtube.com/watch?v=Vnn_Sc804rw
  57.  
  58.  
  59. **************************************************************************************************
  60.  
  61. Network Notes:
  62.  
  63. Cebu Network is directly connected to Los Angelas, California via 2 MPLS Links. The 2 MPLS Links are in Redundant
  64. Fail-over mode. Both Links are Connected to 2 Cisco ASA on the Cebu, Philippines side. The current Cisco ASA configs has vulnerability issues.
  65. The Cebu Network is only protected by the external Cisco ASA devices.
  66.  
  67. The internal Network is sliced up in multiple flat space networks. (ie: 192.168.7.0/24 Network is all IT Equipment, 192.168.2.0 /24 is Call Center
  68.  
  69. Production, 192.168.8.0 /24 is Credit Card Processing Center, 192.168.4.0/ 24 is Call Center Representatives)
  70.  
  71. Cedit Card Processing is only protected by an open source "PFSense Firewall".
  72. All other flat space networks are only protected by kaspersky endpoint security 8.
  73.  
  74. Nessus Scan Report
  75. Thu, 13 Aug 2015 18:10:45 GMT
  76. Ebuisness EBPO Cisco ASA IOS Vulnerability Issues:
  77. ASA # 1: 103.231.134.5
  78. ASA # 2: 103.231.134.10
  79. ASA Software Version 9.1(2)
  80.  
  81. Object (7) - Crafted ICMP Packet Denial of Service Vulnerability CSCui77398
  82. Threat Level : EXTREME HIGH Current Workaround: None.
  83.  
  84.  
  85.  
  86. SSLv3 Padding Oracle On Downgraded Legacy Encryption in Cisco ASA Software
  87. (cisco-sa-20141015-poodle) (POODLE)
  88. Symptom: The Cisco ASA (Adaptive Security Appliance) includes a version of OpenSSL.
  89. Conditions:The default SSL configuration on all ASA software trains enables SSLv3.
  90. (reference Cisco.com bugs)
  91. https://tools.cisco.com/bugsearch/bug/CSCur23709
  92.  
  93.  
  94.  
  95. Cisco ASA TLS CBC Information Disclosure (CSCus08101)
  96. Symptom: Cisco ASA includes a version of TLS that is affected by the vulnerabilities.
  97. ALL Cisco ASA Software releases running on Cisco ASA 5500 and 5500-X Series are affected.
  98. Conditions: The Cisco ASA Software is affected by this vulnerability if a feature which use TLS is enabled.
  99. The exposure will be confined to that feature only.
  100. https://tools.cisco.com/bugsearch/bug/CSCus08101/?referring_site=bugquickviewredir
  101.  
  102.  
  103. Object (7) - Crafted ICMP Packet Denial of Service Vulnerability CSCui77398
  104. Note: should be changed to "echo" only to prevent a ping travel traversal completion and inspection across the ASA.
  105. "Raj is implementing a a fix via an ASA IOS upgrade to version 9.1
  106.  
  107.  
  108.  
  109. Object (2) - (reference the ASA vunerability matrix below). Vunerablity:
  110. Remote Access VPN Authentication Bypass Vulnerability. Resolution:
  111. Currently Remote Access VPN currently denied for outside interfaces on active and standby ASA.
  112. ASA Software configured for LAN-to-LAN IPsec VPN is not affected
  113.  
  114.  
  115.  
  116. Object (1) - Vulnerability: SQL*Net Inspection Engine Denial of Service Vulnerability.
  117. Resolution: Currently used only for internal LAN-ASDM connection.
  118.  
  119.  
  120. Object (3)  - (reference the ASA vunerability matrix below). Vulnerability: Digital Certificate HTTP Authentication Bypass Vulnerability.
  121. Resolution: Per Cisco documentation, Digital certificate authentication is disabled by default for Cisco ASDM.
  122. Digital certificate authentication for Remote outsite interfaces is disabled on active and standby ASA.
  123.  
  124.  
  125. Object (4) - (reference the ASA vunerability matrix below). Vulnerability: HTTP Deep Packet Inspection Denial of Service Vulnerability. Resolution: HTTP
  126.  
  127. Deep Packet Inspection (DPI) is currently disabled. Cisco ASA Software will not inspect DNS packets over TCP by default. DNS packet inspection not enabled.
  128.  
  129.  
  130.  
  131. Object (5) - (reference the ASA vunerability matrix below).
  132. Vulnerability: AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability.
  133. Resolution: Webvpn currently not enabled on standby and active ASA.
  134.  
  135.  
  136. Object (6) - (reference the ASA vunerability matrix below). Vulnerability: SSL VPN Web Portal Denial of Service Vulnerability.
  137. Resolution: SSL VPN is disabled by default. SSL VPN is disabled on active and standby ASA.
  138.  
  139.  
  140.  
  141. Cisco ASA HTTP Server Information Disclosure (CSCun78551)
  142. The attacker needs to have valid credentials, however any privilege level associated with that credential can cause the issue.
  143. For example privilege 0 or 1. Current Workaround: None.
  144. Known Fixed Software Releases: 9.2(1.100)
  145. https://tools.cisco.com/bugsearch/bug/CSCun78551/?referring_site=ss
  146.  
  147.  
  148. Cisco ASA Software SharePoint RAMFS Integrity and Lua Injection Vulnerabilities (CSCup54208 and CSCup54184)
  149. To exploit this vulnerability, an attacker must authenticate to the targeted device.
  150. This access requirement may reduce the likelihood of a successful exploit.
  151. Upgrade ASA to software version 9.3(2.6) - No other known patches or Fixes to date.
  152. https://tools.cisco.com/bugsearch/bug/CSCup54208/?referring_site=bugquickviewclick
  153.  
  154.  
  155. Cisco ASA SSL VPN Information Disclosure (CSCuq65542)
  156. A vulnerability in the SSL VPN code of Cisco ASA Software could allow an
  157. unauthenticated, remote attacker to obtain information about the Cisco
  158. ASA Software version. Disabled SSL VPN on the ASA system. Current Workaround:
  159. None. https://tools.cisco.com/bugsearch/bug/CSCuq65542/?referring_site=ss
  160.  
  161.  
  162. Cisco ASA SSL VPN Memory Blocks Exhaustion DoS (CSCuq68888)
  163. Symptoms: Crafted HTTP request may cause the 64K Blocks depletion.
  164. Conditions: webvpn needs to be enabled.
  165. https://tools.cisco.com/bugsearch/bug/CSCuq68888/?referring_site=ss
  166.  
  167. SSH Server Type and Version Information
  168. Known Fixed Releases: None Workaround: There are no workarounds.
  169. Threat Level : Low
  170.  
  171.  
  172. Nessus SYN scanner
  173. ASA's currently configured for point to MPLS and Point to VPN operation (ie: Point to Point).
  174. Threat Level : HIGH Current Workaround: None.
  175.  
  176.  
  177.  
  178. IPSEC Internet Key Exchange (IKE) Version 1 Detection
  179. (IKE-VPN) Configured only for one BGP Neighbor Only. Incoming Trafffic Filters are in effect.
  180. Threat Level : HIGH Current Workaround: None.
  181.  
  182.  
  183. Session Initiation Protocol Detection
  184. Incoming Trafffic Filters are in effect. Used only by trusted point to point sources. Threat
  185.  
  186. Level : HIGH Current Workaround: None.
  187.  
  188.  
  189. IPSEC Internet Key Exchange (IKE) Version 2 Detection
  190. (IKE-VPN) Configured only for one BGP Neighbor Only. Incoming Trafffic Filters are in effect.
  191. Level : HIGH Current Workaround: None.
  192.  
  193.  
  194. AS59366
  195. eBusinessBPO Inc.
  196. IP Addresses 256
  197. 103.231.134.0/24
  198. eBusinessBPO, Inc.
  199.  
  200.  
  201.  
  202. aut-num: AS59366
  203. as-name: EBUSINESSBPOINC-AS-AP
  204. descr: eBusinessBPO Inc.
  205. country: PH
  206. admin-c: EIA3-AP
  207. tech-c: EIA3-AP
  208. mnt-by: MAINT-EBUSINESSBPOINC-PH
  209. mnt-irt: IRT-EBUSINESSBPOINC-PH
  210. mnt-routes: MAINT-EBUSINESSBPOINC-PH
  211. changed: it@ebusinessbpo.com 20140520
  212. source: APNIC
  213.  
  214.  
  215. mntner: MAINT-EBUSINESSBPOINC-PH
  216. descr: eBusinessBPO Inc.
  217. country: PH
  218. admin-c: EIA3-AP
  219. upd-to: it@ebusinessbpo.com
  220. mnt-by: MAINT-EBUSINESSBPOINC-PH
  221. referral-by: APNIC-HM
  222. changed: it@ebusinessbpo.com 20140513
  223. source: APNIC
  224.  
  225. 103.231.134.0/24
  226.  
  227. ASN
  228. AS59366
  229. eBusinessBPO Inc.
  230. ID: EBUSINESSBPOINC-PH
  231.  
  232. Description: eBusinessBPO, Inc.
  233. Country Philippines
  234.  
  235. Registry apnic
  236. IP Addresses in this block
  237.  
  238. 103.231.134.1
  239. 103.231.134.2
  240. 103.231.134.3
  241. 103.231.134.4
  242. 103.231.134.5
  243. 103.231.134.6
  244. 103.231.134.7
  245. 103.231.134.8
  246. 103.231.134.9
  247. 103.231.134.10
  248. 103.231.134.11
  249. 103.231.134.12
  250. 103.231.134.13
  251. 103.231.134.14
  252. 103.231.134.15
  253. 103.231.134.16
  254. 103.231.134.17
  255. 103.231.134.18
  256. 103.231.134.19
  257. 103.231.134.20
  258. 103.231.134.21
  259. 103.231.134.22
  260. 103.231.134.23
  261. 103.231.134.24
  262. 103.231.134.25
  263. 103.231.134.26
  264. 103.231.134.27
  265. 103.231.134.28
  266. 103.231.134.29
  267. 103.231.134.30
  268. 103.231.134.31
  269. 103.231.134.32
  270. 103.231.134.33
  271. 103.231.134.34
  272. 103.231.134.35
  273. 103.231.134.36
  274. 103.231.134.37
  275. 103.231.134.38
  276. 103.231.134.39
  277. 103.231.134.40
  278. 103.231.134.41
  279. 103.231.134.42
  280. 103.231.134.43
  281. 103.231.134.44
  282. 103.231.134.45
  283. 103.231.134.46
  284. 103.231.134.47
  285. 103.231.134.48
  286. 103.231.134.49
  287. 103.231.134.50
  288. 103.231.134.51
  289. 103.231.134.52
  290. 103.231.134.53
  291. 103.231.134.54
  292. 103.231.134.55
  293. 103.231.134.56
  294. 103.231.134.57
  295. 103.231.134.58
  296. 103.231.134.59
  297. 103.231.134.60
  298. 103.231.134.61
  299. 103.231.134.62
  300. 103.231.134.63
  301. 103.231.134.64
  302. 103.231.134.65
  303. 103.231.134.66
  304. 103.231.134.67
  305. 103.231.134.68
  306. 103.231.134.69
  307. 103.231.134.70
  308. 103.231.134.71
  309. 103.231.134.72
  310. 103.231.134.73
  311. 103.231.134.74
  312. 103.231.134.75
  313. 103.231.134.76
  314. 103.231.134.77
  315. 103.231.134.78
  316. 103.231.134.79
  317. 103.231.134.80
  318. 103.231.134.81
  319. 103.231.134.82
  320. 103.231.134.83
  321. 103.231.134.84
  322. 103.231.134.85
  323. 103.231.134.86
  324. 103.231.134.87
  325. 103.231.134.88
  326. 103.231.134.89
  327. 103.231.134.90
  328. 103.231.134.91
  329. 103.231.134.92
  330. 103.231.134.93
  331. 103.231.134.94
  332. 103.231.134.95
  333. 103.231.134.96
  334. 103.231.134.97
  335. 103.231.134.98
  336. 103.231.134.99
  337. 103.231.134.100
  338. 103.231.134.101
  339. 103.231.134.102
  340. 103.231.134.103
  341. 103.231.134.104
  342. 103.231.134.105
  343. 103.231.134.106
  344. 103.231.134.107
  345. 103.231.134.108
  346. 103.231.134.109
  347. 103.231.134.110
  348. 103.231.134.111
  349. 103.231.134.112
  350. 103.231.134.113
  351. 103.231.134.114
  352. 103.231.134.115
  353. 103.231.134.116
  354. 103.231.134.117
  355. 103.231.134.118
  356. 103.231.134.119
  357. 103.231.134.120
  358. 103.231.134.121
  359. 103.231.134.122
  360. 103.231.134.123
  361. 103.231.134.124
  362. 103.231.134.125
  363. 103.231.134.126
  364. 103.231.134.127
  365. 103.231.134.128
  366. 103.231.134.129
  367. 103.231.134.130
  368. 103.231.134.131
  369. 103.231.134.132
  370. 103.231.134.133
  371. 103.231.134.134
  372. 103.231.134.135
  373. 103.231.134.136
  374. 103.231.134.137
  375. 103.231.134.138
  376. 103.231.134.139
  377. 103.231.134.140
  378. 103.231.134.141
  379. 103.231.134.142
  380. 103.231.134.143
  381. 103.231.134.144
  382. 103.231.134.145
  383. 103.231.134.146
  384. 103.231.134.147
  385. 103.231.134.148
  386. 103.231.134.149
  387. 103.231.134.150
  388. 103.231.134.151
  389. 103.231.134.152
  390. 103.231.134.153
  391. 103.231.134.154
  392. 103.231.134.155
  393. 103.231.134.156
  394. 103.231.134.157
  395. 103.231.134.158
  396. 103.231.134.159
  397. 103.231.134.160
  398. 103.231.134.161
  399. 103.231.134.162
  400. 103.231.134.163
  401. 103.231.134.164
  402. 103.231.134.165
  403. 103.231.134.166
  404. 103.231.134.167
  405. 103.231.134.168
  406. 103.231.134.169
  407. 103.231.134.170
  408. 103.231.134.171
  409. 103.231.134.172
  410. 103.231.134.173
  411. 103.231.134.174
  412. 103.231.134.175
  413. 103.231.134.176
  414. 103.231.134.177
  415. 103.231.134.178
  416. 103.231.134.179
  417. 103.231.134.180
  418. 103.231.134.181
  419. 103.231.134.182
  420. 103.231.134.183
  421. 103.231.134.184
  422. 103.231.134.185
  423. 103.231.134.186
  424. 103.231.134.187
  425. 103.231.134.188
  426. 103.231.134.189
  427. 103.231.134.190
  428. 103.231.134.191
  429. 103.231.134.192
  430. 103.231.134.193
  431. 103.231.134.194
  432. 103.231.134.195
  433. 103.231.134.196
  434. 103.231.134.197
  435. 103.231.134.198
  436. 103.231.134.199
  437. 103.231.134.200
  438. 103.231.134.201
  439. 103.231.134.202
  440. 103.231.134.203
  441. 103.231.134.204
  442. 103.231.134.205
  443. 103.231.134.206
  444. 103.231.134.207
  445. 103.231.134.208
  446. 103.231.134.209
  447. 103.231.134.210
  448. 103.231.134.211
  449. 103.231.134.212
  450. 103.231.134.213
  451. 103.231.134.214
  452. 103.231.134.215
  453. 103.231.134.216
  454. 103.231.134.217
  455. 103.231.134.218
  456. 103.231.134.219
  457. 103.231.134.220
  458. 103.231.134.221
  459. 103.231.134.222
  460. 103.231.134.223
  461. 103.231.134.224
  462. 103.231.134.225
  463. 103.231.134.226
  464. 103.231.134.227
  465. 103.231.134.228
  466. 103.231.134.229
  467. 103.231.134.230
  468. 103.231.134.231
  469. 103.231.134.232
  470. 103.231.134.233
  471. 103.231.134.234
  472. 103.231.134.235
  473. 103.231.134.236
  474. 103.231.134.237
  475. 103.231.134.238
  476. 103.231.134.239
  477. 103.231.134.240
  478. 103.231.134.241
  479. 103.231.134.242
  480. 103.231.134.243
  481. 103.231.134.244
  482. 103.231.134.245
  483. 103.231.134.246
  484. 103.231.134.247
  485. 103.231.134.248
  486. 103.231.134.249
  487. 103.231.134.250
  488. 103.231.134.251
  489. 103.231.134.252
  490. 103.231.134.253
  491. 103.231.134.254
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement