Kernellix Profile
Kernellix Profile
January 2024
Solutions and Services
24/7 cyber fusion center, operating from 2,000 sqft office in Security Operations
Detect, respond, and remediate cyber incidents using state-of-
MICT Park, Yangon, Myanmar. the-art technology and a well-established incident response
process
Managed Security
IT ISMS
Detection & Operations
Operations Frameworks
Response Center
Networking Detection & Response EPP, EDR, XDR, SIEM, SOAR ISO/IEC 27001:2022
System Administration Incident Response Security Engineering NIST CSF
Applications Threat Hunting CIS Security Controls
ITSM Digital Forensics Security Assessment (VAPT)
Adversary Simulation
Managed Service Provider Managed Detection and Response Computer Security Incident Readiness
ISMS, Compliance
(MSP) (MDR) Team (CERT, CISRT)
TLP:GREEN Kernellix Co., Ltd. | Unclassified 3
Client Highlight
Multiple industries, various sizes and diverse technology platform
Enterprise Assets
Foreign/Global Threats Domestic Threats
Applications
• Community Benchmarks
Cloud Platform • Vendor Best Practices
• WAF
Applications
• Application Penetration Testing
Elastic Security
VULNERABILITY ASSESSMENT
Identify and prioritize security vulnerabilities in the environment to
evaluate information security posture and remediate.
PENETRATION TESTING
Simulate a controlled cyber attack to evaluate the risk and adverse
impact of malicious actors targeting the organization
VULNERABILITY SCANNING
Conduct active, continuous and semi-automated scanning to track
vulnerabilities in the environment
Android/ iOS
Database
Identify Known/Published Security Flaws
Digital Services
• Customer Info
• Transaction Info
Programming Language
• Membership Points
• Payment API
• Authentication Info Framework
Internet
Application Services
Linux
IaaS
Digital Platform
TLP:GREEN Kernellix Co., Ltd. | Unclassified 13
Security Assessment
Application Security
• Top 10 Web
• Top 10 Mobile
• Testing Guide
• Cheat sheet
CWE 25 2020
Enterprise Assets
3. Credentials Dumping/Sniffing
3 DMZ Servers Firewalls Public IPs
2 1 4. Lateral Movement
• Network Segregation
Digital Services
VULNERABILITY DESCRIPTION
• The application does not neutralize or incorrectly neutralize user input before forwarding to backend database servers for execution. A threat
actor can inject SQL commands to be executed by the backend database server.
IMPLICATION
• A threat actor can exploit the vulnerability to manipulate SQL commands and queries to extract or modify confidential information from the
back-end database.
• In addition, the application connects to the database using high privilege credentials, such as a database administrator. Thus, leading to an entire
databases compromises on the database server.
2. Enter userid admin and inject the value or 1=1# in the pwd request parameter value.
3. The application allow a threat actor to login with out the valid password.
4. A threat can further exploit the vulnerability to extract data from backend database and execute operating system (OS) commands and
subsequently obtain administrative access on the backend database server.
RECOMMENDATION
• Validate or sanitize input to for special characters for database such as semi colon, quotes, etc.
• Disable execution of system commands on the database if there is not business/technical requirements.
• Parameterized Queries
VULNERABILITY DESCRIPTION
• The customer profile API endpoint returns customer Personally Identifiable Information (PII). The application does restrict a threat actor from
fuzzing the customer ID and does not restrict the number of API calls. A threat actor can abuse the API endpoint to enumerate the significant list
of customer PII from the system.
IMPLICATION
• The customer ID is incremented in predictable pattern. A threat actor can formulate the customer ID increment pattern via the programming
scripts.
• Per our assessment via the Internet, a threat actor can enumerate 1,000,000 customer PII including name, phone number, address, nation id,
and income group in 3 minutes by exploiting the vulnerability.
• Define High Level • Identify Test environment • Test environment • Conduct Assessment • Discuss findings • Retest reported findings • Archive assessment notes
Requirements information readiness • Produce status update • Discuss remediation • Archive assessment
• Estimate Scope of work • Identify Technology Stack • Confirm Assessment • Produce preliminary report actions reports
• Define Tentative Schedule • Set up communication schedule
platform
• Discuss Rules of
Engagement
Additional Discovery
Reporting
NETWORK SECURITY
Implement Firewalls, WAF, IDS/IPS, SIEM/SOAR to deter attacks,
identify intrusions, enhance response capabilities, isolate incidents, and
minimize adverse impacts
VULNERABILITY MANAGEMENT
Implement tools and processes to actively identify, classify, track and
remediate vulnerabilities in the environment in timely manner
IDS/IPS/WAF Rules
Server Hardening
SIEM/SOAR Alerts
2. Host Security
• EPP
• EDR
Alert and Log Ship Integration
3. Vulnerability Management
EDR, Vulnerability Management, Alerting, Identify Management, SIEM/SOAR
4. Privileged Access Management
SCAP Configuration
Network Devices
Scanner
Enterprise Assets
End Point Protection & MDM
Patch Management
Reporting System
Enterprise Assets
SECURITY MONITORING
Analyze traffic, threats and anomalies to detect cyber attacks and
incidents for relevant and timely response
INCIDENT MANAGEMENT
Detect, respond and resolve security incidents per sound and
comprehensive cyber security incident response plan
THREAT INTELLIGENCE
An actionable cyber threat information to recognize and proactively
respond to advance threats
Root Compromise
User Compromise
DoS
Malicious Code
Attempted
Activity
Non Compliance
Scanning
Investigation
Explained
Anomaly
Exercises
0 5 10 15
NIST CSF
An IG1 organization is small to medium-sized with limited IT and cybersecurity expertise to dedicate toward
protecting IT assets and personnel.
The principal concern of these organizations is to keep the business operational as they have a limited tolerance
for downtime.
An IG2 organization employs individuals responsible for managing and protecting IT infrastructure.
A major concern is loss of public confidence if a breach occurs. Some Sub-Controls will depend on enterprise-
grade technology and specialized expertise to properly install and configure.
An IG3 organization employs security experts that specialize in the different facets of cybersecurity.
A IG3 organization must address availability of services and the confidentiality and integrity of sensitive data.
Successful attacks can cause significant harm to the public welfare.
TLP:GREEN Kernellix Co., Ltd. | Unclassified 38
Quick Wins
Multifactor Authentication
SOC Platform
• Email, Server, Workstations
• 3-6 months log retention