Resource enumeration detected

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.


Detect attempts by an attacker to exfiltrate sensitive information using a Resource Enumeration attack.

The attack is based on finding endpoints that return a resource when given an ID, and whose security relies on the ID being only known to authorized users. When such endpoints are found, the attacker can iterate over all possible ID values until finding valid ones and then leak sensitive information.

Such vulnerable endpoints are common since authentication is sometimes cumbersome to implement and the large range of possible IDs appear secure enough. Billing systems are a common example.


Monitor APM traces from REST endpoints expecting an ID. Traces coming from local IPs are discarded in order to passlist internal microservices traffic.

Traces left are aggregated in small groups sharing the same targeted service, source IP and endpoint. Status codes are then compared. If over 100 requests with 4xx status code are found and at least one request with a 200 code is also detected, the endpoint is deemed under attack by the IP. We interpret the 4xx requests as the unsuccessful scanning and the 200 request as a correctly guessed ID.

A Low signal is then generated.

Triage and response

  1. Investigate the expected usage profile of the endpoint under attack.
    • If the endpoint is expecting this kind of traffic or requests are coming from an internal IP, create a suppression query.
  2. Consider blocking the attacking IPs temporarily to prevent them from continuing their attack.
  3. Investigate how to add authentication to the endpoint with your engineering team.