1º Recolección de urls del gobierno mediante gob site:.ir en google\\
2º en la configuración de vim (.vimrc) crear el siguiente alias a éste comando:\\
command! LimpiarUrls %s/^\(http[s]\{0,1\}:\/\/\)\(\www\.\)\{0,1\}// | %s/\/$//
3º Ahora con hacer en vim Esc : LimpiarUrls las dejará listas para usarlas en los escáneres\\
{{ :iran:urls_gobierno_ir.txt.gz |}}
gunzip -c urls_gobierno_ir.txt.gz
my.gov.ir
sso.my.gov.ir
tax.gov.ir
op.salamat.gov.ir
behdasht.gov.ir
irc.fda.gov.ir
mimt.gov.ir
csp.ihio.gov.ir
women.gov.ir
smttk.gov.ir
naciportal.inso.gov.ir
mfa.gov.ir
evisa.mfa.ir
fata.gov.ir
mcls.gov.ir
epl.irica.gov.ir
mikhak.mfa.gov.ir
hamrah.msy.gov.ir
president.ir
ticketing.ito.gov.ir
caa.gov.ir
tehran.farhang.gov.ir
farhang.gov.ir
{{ :iran:urls_ips_ir_recon_ng.tar.gz |}}\\
**Mismo procedimiento que con [[israel:urls-recon-ng|Israel]] para obtener subdominios a partir de las urls del gobierno obtenidas con google mediante búsqueda con gov site:.ir**\\
**Ips y subdominios obtenidos mediante recon-ng a partir del fichero urls_gobierno_ir.txt**\\
cat url_ip_ir.txt | wc -l
730
**Muchos, primeros 10, así se ven:**\\
cat url_ip_ir.txt | sed -n '1,10p'
cp.mfa.gov.ir 109.201.11.102
mail.mfa.gov.ir 109.201.11.102
office.behdasht.gov.ir 172.21.60.201
sibservice95361.behdasht.gov.ir 172.21.66.145
sibservice95362.behdasht.gov.ir 172.21.66.145
hop.behdasht.gov.ir 172.21.66.183
eo.behdasht.gov.ir 172.21.67.127
eoffice.behdasht.gov.ir 172.21.67.127
maternaldeath.behdasht.gov.ir 172.21.67.192
educationportal.behdasht.gov.ir 185.123.208.106
**nmap a los puertos más comunes y vulnerables**\\
nmap -Pn -p 20-23,69,139,137,445,53,443,80,8080,8443 -sV --script vuln $(tar -xOzf urls_ips_ir_recon_ng.tar.gz url_ip_ir.txt | awk '{print $2}' | sort | uniq) -oN nmap_vuln_ir_pvarios.txt
**servicios abiertos**\\
cat nmap_vuln_ir_pvarios.txt | grep -Ex '^[0-9]+\/.*open.*' | sed -E 's/ {2,}/ /g' | sort | uniq
443/tcp open ssl/https
443/tcp open ssl/https ArvanCloud
443/tcp open ssl/https LiteSpeed
443/tcp open ssl/tcpwrapped
443/tcp open tcpwrapped
53/tcp open tcpwrapped
8080/tcp open http-proxy ArvanCloud
80/tcp open http LiteSpeed
80/tcp open http Microsoft IIS httpd 10.0
80/tcp open http nginx (reverse proxy)
80/tcp open tcpwrapped
8443/tcp open https-alt
8443/tcp open ssl/https-alt ArvanCloud
**servicios cerrados**\\
cat nmap_vuln_ir_pvarios.txt | grep -Ex '^[0-9]+\/.*closed.*' | sed -E 's/ {2,}/ /g' | sort | uniq
20/tcp closed ftp-data
21/tcp closed ftp
22/tcp closed ssh
23/tcp closed telnet
445/tcp closed microsoft-ds
53/tcp closed domain
69/tcp closed tftp
8080/tcp closed http-proxy
80/tcp closed http
8443/tcp closed https-alt
**vulnerabilidades encontradas**\\
cat nmap_vuln_ir_pvarios.txt | sed -nE '/VULNERABLE:/{n;p}' | sort | uniq
| Authentication bypass by HTTP verb tampering
| Diffie-Hellman Key Exchange Insufficient Group Strength
| phpMyAdmin grab_globals.lib.php subform Parameter Traversal Local File Inclusion
| Slowloris DOS attack
Estado de cada una:
cat nmap_vuln_ir_pvarios.txt | sed -nE '/VULNERABLE:/{n;n;p}' | sort | uniq
| State: LIKELY VULNERABLE
| State: UNKNOWN (unable to test)
| State: VULNERABLE
| State: VULNERABLE (Exploitable)