Muestra las diferencias entre dos versiones de la página.
| Ambos lados, revisión anterior Revisión previa Próxima revisión | Revisión previa | ||
|
china:mfa [2025/02/24 20:35] anonimo |
china:mfa [2025/02/24 22:21] (actual) anonimo |
||
|---|---|---|---|
| Línea 1: | Línea 1: | ||
| + | **Analizando el ministerio de asuntos exteriores de china** | ||
| <code bash> | <code bash> | ||
| nslookup www.mfa.gov.cn | nslookup www.mfa.gov.cn | ||
| Línea 492: | Línea 493: | ||
| </code> | </code> | ||
| + | **Vulnerabilidades encontradas en diversos puertos / servicios**\\ | ||
| + | |||
| + | <code bash> | ||
| + | cat nmap_puertos_vuln_mfa_cn.nmap | sed -n '/VULNERABLE:/{n;p};/CVE:/p' | sort | uniq | ||
| + | | IDs: CVE:CVE-2007-6750 | ||
| + | | Cross-domain and Client Access policies. | ||
| + | | Slowloris DOS attack | ||
| + | </code> | ||
| + | |||
| + | **Había un puerto del troyano netbus y nmap tiene scripts para eso**\\ | ||
| + | |||
| + | <code bash> | ||
| + | ls -1 /usr/share/nmap/scripts/ | grep -i netbus | ||
| + | netbus-auth-bypass.nse | ||
| + | netbus-brute.nse | ||
| + | netbus-info.nse | ||
| + | netbus-version.nse | ||
| + | sudo nmap -sV --version-all -Pn -O -p 12345 --script "netbus-*" www.mfa.gov.cn | ||
| + | Starting Nmap 7.80 ( https://nmap.org ) at 2025-02-24 21:59 CET | ||
| + | Nmap scan report for www.mfa.gov.cn (61.110.222.63) | ||
| + | Host is up (0.061s latency). | ||
| + | Other addresses for www.mfa.gov.cn (not scanned): 138.113.148.176 | ||
| + | |||
| + | PORT STATE SERVICE VERSION | ||
| + | 12345/tcp open http nginx | ||
| + | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port | ||
| + | Device type: general purpose | ||
| + | Running: Linux 2.6.X | ||
| + | OS CPE: cpe:/o:linux:linux_kernel:2.6 | ||
| + | OS details: Linux 2.6.18 - 2.6.22 | ||
| + | Network Distance: 14 hops | ||
| + | |||
| + | OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . | ||
| + | Nmap done: 1 IP address (1 host up) scanned in 80.01 seconds | ||
| + | </code> | ||
| + | |||
| + | No encontramos ninguna vulnerabilidad en ese puerto, pero extraemos que Linux 2.6.18 - 2.6.22 es una versión muy antigua del kernel, 2006-2007\\ | ||
| + | |||
| + | <code bash> | ||
| + | searchsploit Linux | grep -Ei '.*kernel.*2\.6.*remote.*' | ||
| + | Linux Kernel 2.6.17.7 - NFS and EXT3 Combination Remote Denial of Service | linux/dos/28358.txt | ||
| + | Linux Kernel 2.6.20/2.6.24/2.6.27_7-10 (Ubuntu 7.04/8.04/8.10 / Fedora Core 10 / OpenSuse 1 | linux/remote/8556.c | ||
| + | Linux Kernel 2.6.21.1 - IPv6 Jumbo Bug Remote Denial of Service | linux/dos/4893.c | ||
| + | Linux Kernel 2.6.22 - IPv6 Hop-By-Hop Header Remote Denial of Service | linux/dos/30902.c | ||
| + | Linux Kernel 2.6.33.3 - SCTP INIT Remote Denial of Service | linux/dos/14594.py | ||
| + | Linux Kernel 2.6.35 - Network Namespace Remote Denial of Service | linux/dos/36425.txt | ||
| + | Linux Kernel 2.6.36 IGMP - Remote Denial of Service | linux/dos/18378.c | ||
| + | Linux Kernel 2.6.x - IPTables Logging Rules Integer Underflow Remote (PoC) | linux/dos/24696.c | ||
| + | Linux Kernel < 2.6.16.18 - Netfilter NAT SNMP Module Remote Denial of Service | linux/dos/1880.c | ||
| + | Linux Kernel < 2.6.30.5 - 'cfg80211' Remote Denial of Service | linux/dos/9442.c | ||
| + | Linux/MIPS Kernel 2.6.36 - 'NetUSB' Remote Code Execution | ||
| + | </code> | ||
| + | |||
| + | **Basándonos en la versión puede interesar:**\\ | ||
| + | |||
| + | Linux Kernel < 2.6.30.5 - 'cfg80211' Remote Denial of Service\\ | ||
| + | Linux Kernel 2.6.x - IPTables Logging Rules Integer Underflow Remote (PoC)\\ | ||