Tarea #1 – Unidad 1 #moocHackingMU – Hacking Ético

Primera parte:

Ping: Utiliza la herramienta ping desde la terminal de tu ordenador para comprobar si están disponibles los siguientes hosts:
http://www.google.es (O cualquier otra dirección conocida).
http://www.euskalert.net
O bien puedes optar por un servidor web de internet de tu elección.

Solución:

  • Ping critica.com.pa

Ping critica.com.pa

Segunda parte:

Whois: Comprueba si esta herramienta está disponible para tu Sistema Operativo. Si es así descárgala y si no usa su versión online (http://ping.eu/ns-whois/). A continuación busca información sobre el dominio que estás investigando. Encuentra la persona que figura como contacto técnico y como contacto administrativo. Esta información puede servir a un hacker para contactar directamente con las personas adecuadas dentro de la empresa (nota: Kevin Mitnick era un experto en colarse en las empresas vestido con un uniforme de asistencia técnica y preguntando por las personas adecuadas).

Solución

Informacion IP

Tercera Parte

Nmap: Descarga la herramienta Nmap y analiza alguna de las anteriores direcciones. A continuación explica qué puertos están abiertos y cuál puede ser la razón. Nmap también intenta identificar los sistemas operativos y las aplicaciones que están corriendo en el servidor que estás investigando. Identifica alguna aplicación en el servidor y consulta en la página de la Base de Datos de Vulnerabilidades Nacional de Estados Unidos (NVD) a cuántas vulnerabilidades está expuesto.

Solución

Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-09-25 14:53 Hora est.
Pacífico, Sudamérica
NSE: Loaded 122 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:53
Completed NSE at 14:53, 0.01s elapsed
Initiating NSE at 14:53
Completed NSE at 14:53, 0.00s elapsed
Initiating Ping Scan at 14:53
Scanning critica.com.pa (190.93.255.107) [4 ports]
Completed Ping Scan at 14:53, 1.04s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 14:53
Completed Parallel DNS resolution of 1 host. at 14:53, 0.13s elapsed
Initiating SYN Stealth Scan at 14:53
Scanning critica.com.pa (190.93.255.107) [1000 ports]
Discovered open port 8080/tcp on 190.93.255.107
Discovered open port 443/tcp on 190.93.255.107
Discovered open port 80/tcp on 190.93.255.107
Discovered open port 8443/tcp on 190.93.255.107
Completed SYN Stealth Scan at 14:53, 28.09s elapsed (1000 total ports)
Initiating Service scan at 14:53
Scanning 4 services on critica.com.pa (190.93.255.107)
Completed Service scan at 14:54, 13.04s elapsed (4 services on 1 host)
Initiating OS detection (try #1) against critica.com.pa (190.93.255.107)
Initiating Traceroute at 14:54
Completed Traceroute at 14:54, 3.09s elapsed
Initiating Parallel DNS resolution of 10 hosts. at 14:54
Completed Parallel DNS resolution of 10 hosts. at 14:54, 5.57s elapsed
NSE: Script scanning 190.93.255.107.
Initiating NSE at 14:54
Completed NSE at 14:54, 9.69s elapsed
Initiating NSE at 14:54
Completed NSE at 14:54, 0.00s elapsed
Nmap scan report for critica.com.pa (190.93.255.107)
Host is up (0.092s latency).
Other addresses for critica.com.pa (not scanned): 190.93.254.107
2400:cb00:2048:1::be5d:ff6b 2400:cb00:2048:1::be5d:fe6b
Not shown: 996 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Cloudflare nginx
|_http-favicon: Unknown favicon MD5: BBEBD33C3EB3649E248B301B5750236C
|_http-generator: Drupal 7 (http://drupal.org)
|_http-methods: No Allow or Public header in OPTIONS response (status code 301)
| http-robots.txt: 44 disallowed entries (15 shown)
| /includes/ /misc/ /modules/ /profiles/ /scripts/
| /themes/ /CHANGELOG.txt /cron.php /INSTALL.mysql.txt
| /INSTALL.pgsql.txt /INSTALL.sqlite.txt /install.php /INSTALL.txt
|_/LICENSE.txt /MAINTAINERS.txt
|_http-server-header: cloudflare-nginx
| http-title: Critica | Noticias y Novedades de Panam\xC3\xA1 y el Mundo
|_Requested resource was http://www.critica.com.pa/
443/tcp open ssl/http Cloudflare nginx
| http-cisco-anyconnect:
|_ ERROR: Not a Cisco ASA or unsupported version
|_http-methods: No Allow or Public header in OPTIONS response (status code 400)
|_http-server-header: cloudflare-nginx
|_http-title: Did not follow redirect to http://www.critica.com.pa/
| ssl-cert: Subject: commonName=ssl84427.cloudflare.com/organizationName=CloudFlare,
Inc./stateOrProvinceName=California/countryName=US
| Issuer: commonName=GlobalSign Organization Validation CA –
G2/organizationName=GlobalSign nv-sa/countryName=BE
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha1WithRSAEncryption
| Not valid before: 2015-08-28T16:01:27
| Not valid after: 2015-11-28T22:59:18
| MD5: a89a b314 a1fb 6a86 8d71 4493 f4a9 703c
|_SHA-1: 7f84 ed05 f7a8 3358 76ac a2c0 755c a90a 01a6 df12
|_ssl-date: TLS randomness does not represent time
| tls-nextprotoneg:
| spdy/3.1
|_ http/1.1
8080/tcp open http Cloudflare nginx
|_http-methods: No Allow or Public header in OPTIONS response (status code 301)
|_http-server-header: cloudflare-nginx
|_http-title: Did not follow redirect to http://www.critica.com.pa/
8443/tcp open ssl/http Cloudflare nginx
| http-cisco-anyconnect:
|_ ERROR: Not a Cisco ASA or unsupported version
|_http-methods: No Allow or Public header in OPTIONS response (status code 521)
|_http-server-header: cloudflare-nginx
|_http-title: critica.com.pa | 521: Web server is down
| ssl-cert: Subject: commonName=ssl84427.cloudflare.com/organizationName=CloudFlare,
Inc./stateOrProvinceName=California/countryName=US
| Issuer: commonName=GlobalSign Organization Validation CA –
G2/organizationName=GlobalSign nv-sa/countryName=BE
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha1WithRSAEncryption
| Not valid before: 2015-08-28T16:01:27
| Not valid after: 2015-11-28T22:59:18
| MD5: a89a b314 a1fb 6a86 8d71 4493 f4a9 703c
|_SHA-1: 7f84 ed05 f7a8 3358 76ac a2c0 755c a90a 01a6 df12
|_ssl-date: TLS randomness does not represent time
| tls-nextprotoneg:
| spdy/3.1
|_ http/1.1
Warning: OSScan results may be unreliable because we could not find at least 1 open
and 1 closed port
Device type: general purpose
Running: Linux 3.X
OS CPE: cpe:/o:linux:linux_kernel:3
OS details: Linux 3.12
Network Distance: 11 hops
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 8080/tcp)
HOP RTT ADDRESS
1 0.00 ms 192.168.1.1
2 …
3 20.00 ms 10.48.41.57
4 20.00 ms 10.48.42.9
5 20.00 ms 10.48.40.94
6 20.00 ms 10.10.11.2
7 20.00 ms 10.48.40.98
8 20.00 ms 10.48.41.237
9 70.00 ms 63.245.3.97
10 100.00 ms 198.32.125.60
11 60.00 ms 190.93.255.107
NSE: Script Post-scanning.
Initiating NSE at 14:54
Completed NSE at 14:54, 0.00s elapsed
Initiating NSE at 14:54
Completed NSE at 14:54, 0.00s elapsed
Read data files from: C:\Program Files\Nmap
OS and Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 73.66 seconds
Raw packets sent: 2071 (92.906KB) | Rcvd: 86 (4.226KB)

Puertos abiertos:

  • Discovered open port 8080/tcp on 190.93.255.107
    • HTTP HTTP-ALT ver puerto 80. Tomcat lo usa como puerto por defecto.
  • Discovered open port 443/tcp on 190.93.255.107
    • HTTPS/SSL usado para la transferencia segura de páginas web
  • Discovered open port 80/tcp on 190.93.255.107
    • HTTP HyperText Transfer Protocol (Protocolo de Transferencia de HiperTexto) (WWW)
  • Discovered open port 8443/tcp on 190.93.255.107
    • Garantiza la entrega de paquetes de datos en la misma orden, en que fueron mandados.

Sistema operativo y Gestor de contenidos

  • OS details: Linux 3.12
  • Gestor de Contenidos: Dupral

Tiene su sitio web asegurado con la plataforma de «Cloudflare nginx» por lo que la búsqueda de «nginx» en la NVD arrojó los siguientes resultados:

NVD Results

Deja un comentario