Herramientas de usuario

Herramientas del sitio


eritrea:nmap

Diferencias

Muestra las diferencias entre dos versiones de la página.

Enlace a la vista de comparación

Ambos lados, revisión anterior Revisión previa
Próxima revisión
Revisión previa
eritrea:nmap [2025/03/23 17:33]
anonimo
eritrea:nmap [2025/03/24 03:40] (actual)
anonimo
Línea 1: Línea 1:
-**Servicios abiertos**\\ ​+**El gobierno de ésta nación tiene a su población oprimida, se deduce de cajón, al igual que en Corea del Norte viendo el rango de ips asignadas a todo el país, por ello haré un escaner a toda su red a ver si encuentro vulnerabilidades y es posible atacar a su gobierno, no dispongo de medios ni de recursos para ir presencialmente y eliminar a sus opresores, así que, aunque sea poco pondré mi grano de arena. Hay quien dice que porqué lo hago si no me ha hecho nada, ésto no es más que una frase hecha, no tiene ningún sentido no hacer absolutamente nada contra un matón por el simple hecho de que el azar no te haya puesto enfrente de él**\\  
 + 
 + 
 +**Si buscamos en google mediante gov site:.er encontraremos sólo 2 enlaces, por lo que hacemos el escaner a todas las ips asignadas al país ([[https://​www.ipdeny.com/​ipblocks/​data/​aggregated/​er-aggregated.zone|ipdeny]]),​ que son 4096 (que sale de 2^(32-20))**\\  
 + 
 +**El tar.gz para que trastees con el -->** {{ :​eritrea:​nmap_er_vuln.tar.gz |}}  
 +<code bash> 
 +sudo nmap -A -Pn -v 196.200.96.0/​20 -oN eritrea 
 +</​code>​ 
 +**Volvemos un poco más legible el fichero**\\  
 +<code bash> 
 +cat eritrea | sed -n '/​.*scan report for.*/,/​^$/​p'​ > nmap_er.txt 
 +</​code>​ 
 +**Creamos otro fichero con todas las ips**\\  
 +<code bash> 
 +cat nmap_er.txt | grep -Eo '​([0-9]{1,​3}\.){3}[0-9]{1,​3}'​ > ips_up_er.txt 
 +</​code>​ 
 +**Servicios abiertos, detectados en toda la red**\\ 
 <code bash> <code bash>
 cat nmap_er.txt | grep -Ex '​^[0-9]+\/​.*open.*'​ | sed -E 's/ {2,}/ /g' | sort | uniq cat nmap_er.txt | grep -Ex '​^[0-9]+\/​.*open.*'​ | sed -E 's/ {2,}/ /g' | sort | uniq
Línea 69: Línea 86:
 <code bash> <code bash>
 cat nmap_er.txt | grep -Ex '.*are filtered.*'​ | grep -Eo '​([0-9]{1,​3}\.){3}[0-9]{1,​3}'​ > hosts_up_er_ports_filtered.txt cat nmap_er.txt | grep -Ex '.*are filtered.*'​ | grep -Eo '​([0-9]{1,​3}\.){3}[0-9]{1,​3}'​ > hosts_up_er_ports_filtered.txt
 +</​code>​
 +
 +**Hosts que no tienen todos los puertos filtrados (restamos las diferencias entre un fichero y otro)**
 +<code bash>
 +grep -v -F -f hosts_up_er_ports_filtered.txt ips_up_er.txt | sed '​N;​N;​N;​N;​s/​\n/​ /g'
 +196.200.96.0 196.200.96.1 196.200.96.2 196.200.96.3 196.200.96.4
 +196.200.96.4 196.200.96.6 31.4.242.184 196.200.96.7 2.6.18.8
 +2.6.18.8 2.6.20.6 196.200.96.8 2.6.18.8 2.6.18.8
 +2.6.20.6 196.200.96.9 196.200.96.10 196.200.96.11 196.200.96.12
 +196.200.96.13 196.200.96.16 196.200.96.17 196.200.96.18 196.200.96.19
 +196.200.96.20 196.200.96.21 196.200.96.22 196.200.96.23 196.200.96.24
 +196.200.96.25 2.6.18.8 2.6.18.8 2.6.20.6 196.200.96.26
 +196.200.96.27 196.200.96.28 196.200.96.29 196.200.96.30 196.200.96.31
 +196.200.96.32 196.200.96.33 196.200.96.34 196.200.96.36 196.200.96.37
 +196.200.96.38 196.200.96.38 192.168.90.1 192.168.90.2 192.168.91.1
 +192.168.90.1 192.168.90.2 192.168.91.1 196.200.96.39 196.200.96.40
 +196.200.96.41 196.200.96.41 196.200.96.42 196.200.96.42 196.200.96.43
 +196.200.96.45 196.200.96.46 6.1.2.0 192.168.168.168 192.168.168.168
 +196.200.96.136
 +196.200.96.137
 +</​code>​
 +<code bash>
 +grep -v -F -f hosts_up_er_ports_filtered.txt ips_up_er.txt > hosts_up_er_no_all_ports_filtered.txt
 +</​code>​
 +
 +**Escaneo de vulnerabilidades (lo hacemos a la lista de hosts que no tienen todos los puertos filtrados)**\\ ​
 +
 +<code bash>
 +nmap -Pn -n --script "​vuln"​ -iL hosts_up_er_no_all_ports_filtered.txt -oN nmap_vuln_er_hosts_no_all_ports_filtered.txt
 +</​code>​
 +
 +**Hosts con vulnerabilidades**\\ ​
 +
 +<code bash>
 +cat nmap_vuln_er_hosts_no_all_ports_filtered.txt | sed -n '/​.*scan report for.*/,/​^$/​p'​ | sed -n '/​./​{H;​d};​ x; /​VULNERABLE/​!d;​ p'
 +
 +Nmap scan report for 196.200.96.6
 +Host is up (0.53s latency).
 +Not shown: 983 closed ports
 +PORT     ​STATE ​   SERVICE
 +21/​tcp ​  ​open ​    ftp
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +| ssl-dh-params: ​
 +|   ​VULNERABLE:​
 +|   ​Anonymous Diffie-Hellman Key Exchange MitM Vulnerability
 +|     ​State:​ VULNERABLE
 +|       ​Transport Layer Security (TLS) services that use anonymous
 +|       ​Diffie-Hellman key exchange only provide protection against passive
 +|       ​eavesdropping,​ and are vulnerable to active man-in-the-middle attacks
 +|       which could completely compromise the confidentiality and integrity
 +|       of any data exchanged over the resulting session.
 +|     Check results:
 +|       ​ANONYMOUS DH GROUP 1
 +|             ​Cipher Suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384
 +|             ​Modulus Type: Non-safe prime
 +|             ​Modulus Source: RFC5114/​2048-bit DSA group with 256-bit prime order subgroup
 +|             ​Modulus Length: 2048
 +|             ​Generator Length: 2048
 +|             ​Public Key Length: 2048
 +|     ​References:​
 +|_      https://​www.ietf.org/​rfc/​rfc2246.txt
 +|_sslv2-drown: ​
 +22/​tcp ​  ​open ​    ssh
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +25/​tcp ​  ​open ​    smtp
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_sslv2-drown: ​
 +53/​tcp ​  ​filtered domain
 +80/​tcp ​  ​open ​    http
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +110/​tcp ​ open     pop3
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_ssl-poodle:​ ERROR: Script execution failed (use -d to debug)
 +|_sslv2-drown:​ ERROR: Script execution failed (use -d to debug)
 +111/​tcp ​ open     ​rpcbind
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +139/​tcp ​ filtered netbios-ssn
 +143/​tcp ​ open     imap
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_ssl-dh-params:​ ERROR: Script execution failed (use -d to debug)
 +|_sslv2-drown: ​
 +259/​tcp ​ filtered esro-gen
 +443/​tcp ​ open     https
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-aspnet-debug:​ ERROR: Script execution failed (use -d to debug)
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-passwd:​ ERROR: Script execution failed (use -d to debug)
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_sslv2-drown: ​
 +465/​tcp ​ open     smtps
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +| smtp-vuln-cve2010-4344: ​
 +|_  The SMTP server is not Exim: NOT VULNERABLE
 +|_sslv2-drown: ​
 +587/​tcp ​ open     ​submission
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +| smtp-vuln-cve2010-4344: ​
 +|_  The SMTP server is not Exim: NOT VULNERABLE
 +|_sslv2-drown: ​
 +646/​tcp ​ filtered ldp
 +993/​tcp ​ open     imaps
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_sslv2-drown: ​
 +995/​tcp ​ open     pop3s
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_sslv2-drown: ​
 +3306/tcp open     mysql
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_mysql-vuln-cve2012-2122:​ ERROR: Script execution failed (use -d to debug)
 +
 +Nmap scan report for 196.200.96.11
 +Host is up (0.33s latency).
 +Not shown: 995 filtered ports
 +PORT    STATE  SERVICE
 +21/​tcp ​ open   ftp
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +| ssl-dh-params: ​
 +|   ​VULNERABLE:​
 +|   ​Anonymous Diffie-Hellman Key Exchange MitM Vulnerability
 +|     ​State:​ VULNERABLE
 +|       ​Transport Layer Security (TLS) services that use anonymous
 +|       ​Diffie-Hellman key exchange only provide protection against passive
 +|       ​eavesdropping,​ and are vulnerable to active man-in-the-middle attacks
 +|       which could completely compromise the confidentiality and integrity
 +|       of any data exchanged over the resulting session.
 +|     Check results:
 +|       ​ANONYMOUS DH GROUP 1
 +|             ​Cipher Suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384
 +|             ​Modulus Type: Non-safe prime
 +|             ​Modulus Source: RFC5114/​2048-bit DSA group with 256-bit prime order subgroup
 +|             ​Modulus Length: 2048
 +|             ​Generator Length: 2048
 +|             ​Public Key Length: 2048
 +|     ​References:​
 +|_      https://​www.ietf.org/​rfc/​rfc2246.txt
 +|_sslv2-drown: ​
 +25/​tcp ​ open   smtp
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_sslv2-drown: ​
 +49/​tcp ​ closed tacacs
 +80/​tcp ​ open   http
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-aspnet-debug:​ ERROR: Script execution failed (use -d to debug)
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +443/tcp open   https
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-aspnet-debug:​ ERROR: Script execution failed (use -d to debug)
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +|_sslv2-drown: ​
 +
 +Nmap scan report for 196.200.96.18
 +Host is up (0.33s latency).
 +Not shown: 994 filtered ports
 +PORT    STATE  SERVICE
 +21/​tcp ​ open   ftp
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +| ssl-dh-params: ​
 +|   ​VULNERABLE:​
 +|   ​Anonymous Diffie-Hellman Key Exchange MitM Vulnerability
 +|     ​State:​ VULNERABLE
 +|       ​Transport Layer Security (TLS) services that use anonymous
 +|       ​Diffie-Hellman key exchange only provide protection against passive
 +|       ​eavesdropping,​ and are vulnerable to active man-in-the-middle attacks
 +|       which could completely compromise the confidentiality and integrity
 +|       of any data exchanged over the resulting session.
 +|     Check results:
 +|       ​ANONYMOUS DH GROUP 1
 +|             ​Cipher Suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384
 +|             ​Modulus Type: Non-safe prime
 +|             ​Modulus Source: RFC5114/​2048-bit DSA group with 256-bit prime order subgroup
 +|             ​Modulus Length: 2048
 +|             ​Generator Length: 2048
 +|             ​Public Key Length: 2048
 +|     ​References:​
 +|_      https://​www.ietf.org/​rfc/​rfc2246.txt
 +|_sslv2-drown: ​
 +25/​tcp ​ open   smtp
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_sslv2-drown: ​
 +49/​tcp ​ closed tacacs
 +80/​tcp ​ open   http
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +179/tcp closed bgp
 +443/tcp open   https
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-aspnet-debug:​ ERROR: Script execution failed (use -d to debug)
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +| http-slowloris-check: ​
 +|   ​VULNERABLE:​
 +|   ​Slowloris DOS attack
 +|     ​State:​ LIKELY VULNERABLE
 +|     ​IDs: ​ CVE:​CVE-2007-6750
 +|       ​Slowloris tries to keep many connections to the target web server open and hold
 +|       them open as long as possible. ​ It accomplishes this by opening connections to
 +|       the target web server and sending a partial request. By doing so, it starves
 +|       the http server'​s resources causing Denial Of Service.
 +|       
 +|     ​Disclosure date: 2009-09-17
 +|     ​References:​
 +|       ​http://​ha.ckers.org/​slowloris/​
 +|_      https://​cve.mitre.org/​cgi-bin/​cvename.cgi?​name=CVE-2007-6750
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +|_sslv2-drown: ​
 +
 +Nmap scan report for 196.200.96.29
 +Host is up (0.33s latency).
 +Not shown: 995 filtered ports
 +PORT     ​STATE ​ SERVICE
 +49/​tcp ​  ​closed tacacs
 +80/​tcp ​  ​open ​  http
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +|_http-vuln-wnr1000-creds:​ ERROR: Script execution failed (use -d to debug)
 +179/​tcp ​ closed bgp
 +443/​tcp ​ open   https
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-aspnet-debug:​ ERROR: Script execution failed (use -d to debug)
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +| http-slowloris-check: ​
 +|   ​VULNERABLE:​
 +|   ​Slowloris DOS attack
 +|     ​State:​ LIKELY VULNERABLE
 +|     ​IDs: ​ CVE:​CVE-2007-6750
 +|       ​Slowloris tries to keep many connections to the target web server open and hold
 +|       them open as long as possible. ​ It accomplishes this by opening connections to
 +|       the target web server and sending a partial request. By doing so, it starves
 +|       the http server'​s resources causing Denial Of Service.
 +|       
 +|     ​Disclosure date: 2009-09-17
 +|     ​References:​
 +|       ​http://​ha.ckers.org/​slowloris/​
 +|_      https://​cve.mitre.org/​cgi-bin/​cvename.cgi?​name=CVE-2007-6750
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_sslv2-drown: ​
 +6789/tcp closed ibm-db2-admin
 +
 +Nmap scan report for 196.200.96.38
 +Host is up (0.34s latency).
 +Not shown: 994 filtered ports
 +PORT      STATE  SERVICE
 +80/​tcp ​   open   http
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +443/​tcp ​  ​open ​  https
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-aspnet-debug:​ ERROR: Script execution failed (use -d to debug)
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-majordomo2-dir-traversal:​ ERROR: Script execution failed (use -d to debug)
 +|_http-majordomo2-dir-traversal:​ ERROR: Script execution failed (use -d to debug)
 +|_http-passwd:​ ERROR: Script execution failed (use -d to debug)
 +|_http-passwd:​ ERROR: Script execution failed (use -d to debug)
 +| http-phpmyadmin-dir-traversal: ​
 +|   ​VULNERABLE:​
 +|   ​phpMyAdmin grab_globals.lib.php subform Parameter Traversal Local File Inclusion
 +|     ​State:​ UNKNOWN (unable to test)
 +|     ​IDs: ​ CVE:​CVE-2005-3299
 +|       PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array.
 +|       
 +|     ​Disclosure date: 2005-10-nil
 +|     Extra information:​
 +|       ​../​../​../​../​../​etc/​passwd :
 +|   <​!doctype html>
 +|   <​html lang="​en">​
 +|       <​head>​
 +|           <​meta http-equiv="​Content-type"​ content="​text/​html;​ charset=utf-8"/>​
 +|           <​title>​Tesla Energy Powerpack</​title>​
 +|           <​meta name="​description"​ content="">​
 +|           <​meta name="​author"​ content="">​
 +|           <​meta name="​viewport"​ content="​width=device-width,​ initial-scale=1.0,​ maximum-scale=1.0,​ user-scalable=no">​
 +|           <​base href="/">​
 +|       <​link rel="​shortcut icon" href="​favicon.ico"></​head>​
 +|       <​body>​
 +|           <​div id="​root"​ />
 +|       <​script type="​text/​javascript"​ src="​app.js"></​script></​body>​
 +|   </​html>​
 +|   
 +|     ​References:​
 +|       ​http://​www.exploit-db.com/​exploits/​1244/​
 +|_      https://​cve.mitre.org/​cgi-bin/​cvename.cgi?​name=CVE-2005-3299
 +| http-phpmyadmin-dir-traversal: ​
 +|   ​VULNERABLE:​
 +|   ​phpMyAdmin grab_globals.lib.php subform Parameter Traversal Local File Inclusion
 +|     ​State:​ UNKNOWN (unable to test)
 +|     ​IDs: ​ CVE:​CVE-2005-3299
 +|       PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array.
 +|       
 +|     ​Disclosure date: 2005-10-nil
 +|     Extra information:​
 +|       ​../​../​../​../​../​etc/​passwd :
 +|   <​!doctype html>
 +|   <​html lang="​en">​
 +|       <​head>​
 +|           <​meta http-equiv="​Content-type"​ content="​text/​html;​ charset=utf-8"/>​
 +|           <​title>​Tesla Energy Powerpack</​title>​
 +|           <​meta name="​description"​ content="">​
 +|           <​meta name="​author"​ content="">​
 +|           <​meta name="​viewport"​ content="​width=device-width,​ initial-scale=1.0,​ maximum-scale=1.0,​ user-scalable=no">​
 +|           <​base href="/">​
 +|       <​link rel="​shortcut icon" href="​favicon.ico"></​head>​
 +|       <​body>​
 +|           <​div id="​root"​ />
 +|       <​script type="​text/​javascript"​ src="​app.js"></​script></​body>​
 +|   </​html>​
 +|   
 +|     ​References:​
 +|       ​http://​www.exploit-db.com/​exploits/​1244/​
 +|_      https://​cve.mitre.org/​cgi-bin/​cvename.cgi?​name=CVE-2005-3299
 +| http-slowloris-check: ​
 +|   ​VULNERABLE:​
 +|   ​Slowloris DOS attack
 +|     ​State:​ LIKELY VULNERABLE
 +|     ​IDs: ​ CVE:​CVE-2007-6750
 +|       ​Slowloris tries to keep many connections to the target web server open and hold
 +|       them open as long as possible. ​ It accomplishes this by opening connections to
 +|       the target web server and sending a partial request. By doing so, it starves
 +|       the http server'​s resources causing Denial Of Service.
 +|       
 +|     ​Disclosure date: 2009-09-17
 +|     ​References:​
 +|       ​http://​ha.ckers.org/​slowloris/​
 +|_      https://​cve.mitre.org/​cgi-bin/​cvename.cgi?​name=CVE-2007-6750
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +| http-vuln-cve2010-0738: ​
 +|_  /​jmx-console/:​ Authentication was not required
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +|_http-vuln-cve2017-1001000:​ ERROR: Script execution failed (use -d to debug)
 +| ssl-cert-intaddr: ​
 +|   ​X509v3 Subject Alternative Name: 
 +|     ​192.168.90.1
 +|     ​192.168.90.2
 +|_    192.168.91.1
 +| ssl-cert-intaddr: ​
 +|   ​X509v3 Subject Alternative Name: 
 +|     ​192.168.90.1
 +|     ​192.168.90.2
 +|_    192.168.91.1
 +|_sslv2-drown: ​
 +|_sslv2-drown: ​
 +1111/​tcp ​ open   ​lmsocialserver
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +| ssl-cert-intaddr: ​
 +|   ​X509v3 Subject Alternative Name: 
 +|     ​192.168.90.1
 +|     ​192.168.90.2
 +|_    192.168.91.1
 +| ssl-cert-intaddr: ​
 +|   ​X509v3 Subject Alternative Name: 
 +|     ​192.168.90.1
 +|     ​192.168.90.2
 +|_    192.168.91.1
 +|_sslv2-drown: ​
 +|_sslv2-drown: ​
 +1114/​tcp ​ open   ​mini-sql
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +| ssl-cert-intaddr: ​
 +|   ​X509v3 Subject Alternative Name: 
 +|     ​192.168.90.1
 +|     ​192.168.90.2
 +|_    192.168.91.1
 +| ssl-cert-intaddr: ​
 +|   ​X509v3 Subject Alternative Name: 
 +|     ​192.168.90.1
 +|     ​192.168.90.2
 +|_    192.168.91.1
 +|_sslv2-drown: ​
 +|_sslv2-drown: ​
 +3389/​tcp ​ open   ​ms-wbt-server
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_ssl-ccs-injection:​ No reply from server (TIMEOUT)
 +|_ssl-ccs-injection:​ No reply from server (TIMEOUT)
 +|_sslv2-drown: ​
 +|_sslv2-drown: ​
 +20000/tcp closed dnp
 +
 +Nmap scan report for 196.200.96.41
 +Host is up (0.56s latency).
 +Not shown: 992 closed ports
 +PORT     ​STATE ​   SERVICE
 +21/​tcp ​  ​open ​    ftp
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_ftp-libopie:​ ERROR: Script execution failed (use -d to debug)
 +|_sslv2-drown: ​
 +|_sslv2-drown: ​
 +22/​tcp ​  ​open ​    ssh
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +23/​tcp ​  ​open ​    ​telnet
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +25/​tcp ​  ​filtered smtp
 +80/​tcp ​  ​open ​    http
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-csrf:​ Couldn'​t find any CSRF vulnerabilities.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-dombased-xss:​ Couldn'​t find any DOM based XSS.
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_http-stored-xss:​ Couldn'​t find any stored XSS vulnerabilities.
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +139/​tcp ​ filtered netbios-ssn
 +646/​tcp ​ filtered ldp
 +8443/tcp open     ​https-alt
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_clamav-exec:​ ERROR: Script execution failed (use -d to debug)
 +|_http-aspnet-debug:​ ERROR: Script execution failed (use -d to debug)
 +| http-slowloris-check: ​
 +|   ​VULNERABLE:​
 +|   ​Slowloris DOS attack
 +|     ​State:​ LIKELY VULNERABLE
 +|     ​IDs: ​ CVE:​CVE-2007-6750
 +|       ​Slowloris tries to keep many connections to the target web server open and hold
 +|       them open as long as possible. ​ It accomplishes this by opening connections to
 +|       the target web server and sending a partial request. By doing so, it starves
 +|       the http server'​s resources causing Denial Of Service.
 +|       
 +|     ​Disclosure date: 2009-09-17
 +|     ​References:​
 +|       ​http://​ha.ckers.org/​slowloris/​
 +|_      https://​cve.mitre.org/​cgi-bin/​cvename.cgi?​name=CVE-2007-6750
 +| http-vuln-cve2011-3368: ​
 +|   ​VULNERABLE:​
 +|   ​Apache mod_proxy Reverse Proxy Security Bypass
 +|     ​State:​ VULNERABLE
 +|     ​IDs: ​ CVE:​CVE-2011-3368 ​ BID:49957
 +|       An exposure was reported affecting the use of Apache HTTP Server in
 +|       ​reverse proxy mode. The exposure could inadvertently expose internal
 +|       ​servers to remote users who send carefully crafted requests.
 +|     ​Disclosure date: 2011-10-05
 +|     ​References:​
 +|       ​https://​www.securityfocus.com/​bid/​49957
 +|_      https://​cve.mitre.org/​cgi-bin/​cvename.cgi?​name=CVE-2011-3368
 +| http-vuln-cve2011-3368: ​
 +|   ​VULNERABLE:​
 +|   ​Apache mod_proxy Reverse Proxy Security Bypass
 +|     ​State:​ VULNERABLE
 +|     ​IDs: ​ CVE:​CVE-2011-3368 ​ BID:49957
 +|       An exposure was reported affecting the use of Apache HTTP Server in
 +|       ​reverse proxy mode. The exposure could inadvertently expose internal
 +|       ​servers to remote users who send carefully crafted requests.
 +|     ​Disclosure date: 2011-10-05
 +|     ​References:​
 +|       ​https://​www.securityfocus.com/​bid/​49957
 +|_      https://​cve.mitre.org/​cgi-bin/​cvename.cgi?​name=CVE-2011-3368
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +|_http-vuln-cve2014-3704:​ ERROR: Script execution failed (use -d to debug)
 +|_ssl-ccs-injection:​ No reply from server (TIMEOUT)
 +|_sslv2-drown: ​
 +|_sslv2-drown: ​
 </​code>​ </​code>​
eritrea/nmap.1742747611.txt.gz · Última modificación: 2025/03/23 17:33 por anonimo