Muestra las diferencias entre dos versiones de la página.
| Ambos lados, revisión anterior Revisión previa Próxima revisión | Revisión previa | ||
|
estados-unidos:mapa [2026/01/07 00:38] truper |
estados-unidos:mapa [2026/01/11 04:29] (actual) truper |
||
|---|---|---|---|
| Línea 1: | Línea 1: | ||
| + | |||
| * **Presidente de EE. UU. (POTUS)** | * **Presidente de EE. UU. (POTUS)** | ||
| * **Secretary of Defense (SecDef)** | * **Secretary of Defense (SecDef)** | ||
| Línea 53: | Línea 54: | ||
| - | recon-ng -r /home/usuario/archivos/commands_usa (tiene que ser ruta completa, no puede ser ruta relativa porque da error) \\ | + | recon-ng -r /home/usuario/commands_usa (tiene que ser ruta completa, no puede ser ruta relativa porque da error) \\ |
| - | + | ||
| - | [recon-ng][usa][hackertarget] > show hosts (no sacamos mucho, sólo las ips)\\ | + | |
| [recon-ng][usa][hackertarget] > spool start /home/usuario/volcado_usa.txt\\ | [recon-ng][usa][hackertarget] > spool start /home/usuario/volcado_usa.txt\\ | ||
| [*] Spooling output to '/home/usuario/volcado_usa.txt'.\\ | [*] Spooling output to '/home/usuario/volcado_usa.txt'.\\ | ||
| + | [recon-ng][usa][hackertarget] > show hosts (no sacamos nada, sólo las ips, no hay subdominios expuestos)\\ | ||
| + | <code> | ||
| + | [recon-ng][usa][hackertarget] > show hosts | ||
| + | |||
| + | +--------------------------------------------------------------------------------------------------------------+ | ||
| + | | rowid | host | ip_address | region | country | latitude | longitude | notes | module | | ||
| + | +--------------------------------------------------------------------------------------------------------------+ | ||
| + | | 1 | discover.dtic.mil | 192.0.66.77 | | | | | | hackertarget | | ||
| + | | 2 | dwp.dmdc.osd.mil | 140.18.73.72 | | | | | | hackertarget | | ||
| + | | 3 | www.af.mil | 184.30.88.10 | | | | | | hackertarget | | ||
| + | | 4 | www.africom.mil | 13.107.213.38 | | | | | | hackertarget | | ||
| + | | 5 | www.army.mil | 23.194.127.183 | | | | | | hackertarget | | ||
| + | | 6 | www.centcom.mil | 23.47.72.9 | | | | | | hackertarget | | ||
| + | | 7 | www.darpa.mil | 13.227.87.86 | | | | | | hackertarget | | ||
| + | | 8 | www.dcaa.mil | 23.215.11.238 | | | | | | hackertarget | | ||
| + | | 9 | www.defense.gov | 184.30.100.12 | | | | | | hackertarget | | ||
| + | | 10 | www.dla.mil | 23.194.127.181 | | | | | | hackertarget | | ||
| + | | 11 | www.eucom.mil | 13.107.213.38 | | | | | | hackertarget | | ||
| + | | 12 | www.jcs.mil | 23.194.127.168 | | | | | | hackertarget | | ||
| + | | 13 | www.marines.mil | 184.30.100.166 | | | | | | hackertarget | | ||
| + | | 14 | www.navy.mil | 184.30.102.56 | | | | | | hackertarget | | ||
| + | | 15 | www.socom.mil | 56.136.74.24 | | | | | | hackertarget | | ||
| + | | 16 | www.spaceforce.mil | 184.30.103.40 | | | | | | hackertarget | | ||
| + | | 17 | www.stratcom.mil | 23.215.11.238 | | | | | | hackertarget | | ||
| + | +--------------------------------------------------------------------------------------------------------------+ | ||
| + | |||
| + | [*] 17 rows returned | ||
| + | </code> | ||
| [recon-ng][usa][hackertarget] > spool stop\\ | [recon-ng][usa][hackertarget] > spool stop\\ | ||
| - | [*] Spooling stopped. Output saved to '/home/usuario/volcado_usa.txt'. | + | [*] Spooling stopped. Output saved to '/home/usuario/volcado_usa.txt'.\\ |
| + | |||
| + | **Probamos a hacer un ataque de fuerza bruta de dns para descubrir subdominios**\\ | ||
| + | |||
| + | <code> | ||
| + | $p1='seclist/SecLists-master/Discovery/DNS/subdomains-top1million-5000.txt' | ||
| + | |||
| + | gobuster -m dns -u www.defense.gov -w $p1 -i | tee defense_eu.txt | ||
| + | </code> | ||
| + | |||
| + | **No obtenemos ningún resultado porque el firewall está preparado para éste ataque**\\ | ||
| + | |||
| + | **Si probamos a hacer fuzzing web ocurre lo mismo, siempre devuelve código 403**\\ | ||
| + | |||
| + | <code> | ||
| + | gobuster -m dir -u www.defense.gov -w $p1 | tee fuzzingdefense_eu.txt | ||
| + | </code> | ||
| + | |||
| + | **Técnicas de evasión**\\ | ||
| + | |||
| + | __**Ffuf**__ | ||
| + | |||
| + | <code> | ||
| + | ffuf -u www.defense.gov -w $p1 -H "X-Forwarded-For: 127.0.0.1" -H "User-Agent: Mozilla/5.0" | ||
| + | </code> | ||
| + | |||
| + | **Si el bloqueo es por rate limiting**\\ | ||
| + | |||
| + | <code> | ||
| + | ffuf -u www.defense.gov -w $p1 -rate 50 -p 0.1 | ||
| + | </code> | ||
| + | |||
| + | **__Feroxbuxter__**\\ | ||
| + | |||
| + | <code> | ||
| + | feroxbuster -u www.defense.gov -a "Mozilla/5.0 (Windows NT 10.0; Win64; x64)" | ||
| + | |||
| + | -H para inyectar múltiples cabeceras de bypass | ||
| + | -C para ignorar los 403 y centrarse en otros resultados | ||
| + | </code> | ||
| + | |||
| + | **__Gobuster__**\\ | ||
| + | |||
| + | **Cabeceras de ip falsa o referer** | ||
| + | <code> | ||
| + | gobuster -m dir -u www.defense.gov -w $p1 -H "Referer: www.defense.gov" | ||
| + | |||
| + | -a para cambiar la cadena de identificacion del navegador | ||
| + | -U y -P si requiere autenticación | ||
| + | </code> | ||
| + | |||
| + | ^Táctica^Flag en ffuf^Flag en Feroxbuster^Flag en Gobuster^ | ||
| + | |Cambiar ip origen|-H "X-Forwarded-For: ..."|-H "X-Forwarded-For: ..."|-H "X-Forwarded-For: ..."| | ||
| + | |Cambiar User-Agent|"User-Agent:..."|-a o --user-agent|-a| | ||
| + | |Cambiar Método|-X POST|-m POST|No soportado nativamente en dir| | ||
| + | |Reducir Velocidad|-p o -rate|--rate-limit|-t (reducir hilos)| | ||
| + | |||
| + | **Si no funcionan éstas técnicas probar ésto**\\ | ||
| + | |||
| + | |||
| + | 403bypasser o NoMore403, [[https://crt.sh/|https://crt.sh]]\\ | ||
| + | |||
| + | <code> | ||
| + | curl 'https://crt.sh/?q=www.defense.gov' | grep -Eio '([a-z]+\.){2,4}(mil|gov)' | sort | uniq > defense_subdominios.txt | ||
| + | </code> | ||
| + | |||
| + | **Haciendo ésto mismo con todos obtenemos**\\ | ||
| + | <code> | ||
| + | com.dla.mil | ||
| + | dev.www.darpa.mil | ||
| + | discover.dtic.mil | ||
| + | dwp.dmdc.osd.mil | ||
| + | outreach.navy.mil | ||
| + | soldierforlife.army.mil | ||
| + | staging.www.darpa.mil | ||
| + | static.defense.gov | ||
| + | stats.defense.gov | ||
| + | www.af.mil | ||
| + | www.africom.mil | ||
| + | www.army.mil | ||
| + | www.centcom.mil | ||
| + | www.darpa.mil | ||
| + | www.dcaa.mil | ||
| + | www.defense.gov | ||
| + | www.discover.dtic.mil | ||
| + | www.dla.mil | ||
| + | www.dma.mil | ||
| + | www.eucom.mil | ||
| + | www.marines.mil | ||
| + | www.navsea.navy.mil | ||
| + | www.navy.mil | ||
| + | www.pentagon.mil | ||
| + | www.socom.mil | ||
| + | www.spaceforce.mil | ||
| + | www.stratcom.mil | ||
| + | </code> | ||