Trabajo Practico Final

download Trabajo Practico Final

If you can't read please download the document

Transcript of Trabajo Practico Final

  • PONTIFICIA UNIVERSIDAD CATLICA DEL ECUADOR SEDE

    SANTO DOMINGO

    ESCUELA DE SISTEMAS Y COMPUTACIN

    EVALUACIN DE SISTEMAS

    TRABAJO FINAL DE FUNDAMENTOS Y FASES DE UN ATAQUE HACKING

    AUTORES:

    ANDRS ARTURO SANDOVAL MONTOYA

    CARLOS EDUARDO PALLO CABALLERO

    DOCENTE:

    ING. MARCO POLO SILVA SEGOVIA

    PORTADA DE IDENTIFICACIN

    Santo Domingo-Ecuador

    Enero, 2014

  • 2

    CONTENIDO PORTADA DE IDENTIFICACIN ............................................................................................................ 1

    CONTENIDO ......................................................................................................................................... 2

    SESIN 2 FOOTPRINTING .................................................................................................................... 4

    TALLER 1: SAMSPADE ...................................................................................................................... 4

    Obteniendo el DNS o direccin IP a travs de la URL de la PUCESE ........................................... 4

    Haciendo ping a la URL ................................................................................................................ 4

    Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su emisin

    hasta llegar a su computadora, con el botn TRACE. ................................................................. 5

    TALLER 2: DATA WEB EXTRACTOR .................................................................................................. 5

    Extrayendo las URL relacionadas ................................................................................................ 5

    Obteniendo e-mail ...................................................................................................................... 6

    Extrayendo contactos telefnicos ............................................................................................... 6

    TALLER 3: GEO SPAIDER .................................................................................................................. 6

    Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su emisin

    hasta llegar a su computadora, con el botn TRACE. ................................................................. 6

    Haciendo Ping a la IP 186.42.182.13 ........................................................................................... 7

    Mapeo de las rutas de los servidores recorridos por los datos .................................................. 8

    Obteniendo informacin ............................................................................................................. 8

    TALLER 4: NEOTRACE PRO ............................................................................................................... 9

    Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su emisin

    hasta llegar a su computadora, con el botn TRACE. ................................................................. 9

    Vista de los nodos recorridos de la informacin ....................................................................... 10

    TALLER 5: WHEREISIP .................................................................................................................... 10

    Informacin obtenida de los correos electrnicos y contactos del personal de la PUCESE ..... 11

    SESIN 3 SCANNING .......................................................................................................................... 13

    TALLER 1: ANGRYIP........................................................................................................................ 13

    Proceso de instalacin ............................................................................................................... 13

    Iniciar fase de anlisis ................................................................................................................ 15

    TALLER 2: NMAP ............................................................................................................................ 17

  • 3

    Proceso de instalacin ............................................................................................................... 17

    Iniciar NMAP en Windows......................................................................................................... 19

    Iniciar fase de anlisis ................................................................................................................ 19

    TALLER 3: NETSCANTOOLS PRO .................................................................................................... 21

    Proceso de instalacin ............................................................................................................... 21

    Iniciar fase de analsis................................................................................................................. 25

    TALLER 4: SUPERSCAN 4 ................................................................................................................ 26

    Proceso de intalacion ................................................................................................................ 26

    Iniciar fase de analisis ................................................................................................................ 28

    Consultar la nformacion requerida del sitio.............................................................................. 28

    Iniciar el escaneo ....................................................................................................................... 28

    Anlisis de resultados ................................................................................................................ 29

    TALLER 5 : ESCANEO BSICO CON NMAP ..................................................................................... 29

    SESIN 4 ANONIMATO ...................................................................................................................... 43

    TALLER 1: ANONIMATO NIVEL BSICO ......................................................................................... 43

    Descargar la versin de Firefox de internet .............................................................................. 44

    Buscar los plugins o firecats: ..................................................................................................... 46

    Instalar los componentes al navegador .................................................................................... 46

    Utilizar un servicio para obtener listas de proxys annimos y configurar dichos proxys en el

    Foxyproxy .................................................................................................................................. 46

    Realizar pruebas con diferentes proxys, mnimo 5 proxys de diferentes pases, verificando

    conectividad y rapidez en el servicio......................................................................................... 48

    Utilizar el servicio de email annimo y enviar un correo el resultado de las pruebas realizadas

    con los proxys antes configurados. ........................................................................................... 50

    Descargar la ltima versin de Tor (proyecto Tor) y realizar la instalacin en una memoria

    usb, para tener un proxy live usb. ............................................................................................. 50

  • 4

    SESIN 2 FOOTPRINTING

    TALLER 1: SAMSPADE Instale la herramienta samspade contenidos en las herramientas de la plataforma y utilice la

    aplicacin para inspeccionar el portal o URL de la PUCESE (http://www.pucese.edu.ec/)

    Obteniendo el DNS o direccin IP a travs de la URL de la PUCESE

    Haciendo ping a la URL

    http://www.pucese.edu.ec/
  • 5

    Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su

    emisin hasta llegar a su computadora, con el botn TRACE.

    TALLER 2: DATA WEB EXTRACTOR Instale la herramienta Data Web Extractor, y utilizando una URL http://www.pucese.edu.ec/ y

    extracte o recolecte de dicha URL (Los Email, telfonos y Nmeros de FAX del Portal).

    Extrayendo las URL relacionadas

    http://www.pucese.edu.ec/
  • 6

    Obteniendo e-mail

    Extrayendo contactos telefnicos

    TALLER 3: GEO SPAIDER Instale GEO SPIDER, en el campo URL coloque la URL que usted va a estudiar y navegue varias

    caractersticas de la herramienta para su configuracin buscando identificar Ips, Trazo de rutas

    etc.

    Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su

    emisin hasta llegar a su computadora, con el botn TRACE.

  • 7

    Haciendo Ping a la IP 186.42.182.13

  • 8

    Mapeo de las rutas de los servidores recorridos por los datos

    Obteniendo informacin

  • 9

    TALLER 4: NEOTRACE PRO Instale la herramienta NEOTRACE PRO contenidos en las herramientas de la plataforma, siga los

    siguientes pasos.

    Explore varias opciones del programa reuniendo informacin de pings, trazas entre otras.

    Documente la informacin.

    Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su

    emisin hasta llegar a su computadora, con el botn TRACE.

  • 10

    Vista de los nodos recorridos de la informacin

    TALLER 5: WHEREISIP Instale la herramienta WhereIsIp y explore varias opciones de la herramienta y recolecte la mayor

    cantidad de informacin posible de nombres de servidores, conexiones correos electrnicos y

    dems datos encontrados.

  • 11

    Informacin obtenida de los correos electrnicos y contactos del personal de la

    PUCESE

    E-mail: [email protected]

    Telfonos:2726613 / 2721459

    Fax:2726509 ext. 114

    CARGO NOMBRE EXT. E-MAIL

    Pro-Rector Lic. Aitor Urbina 102 [email protected]

    [email protected]

    Director Acadmico Dr. Walter

    Mosquera 224 [email protected]

    [email protected]

    Directora de Bienestar

    Estudiantil y Pastoral

    Universitaria

    Lic. Lilian Vera 140 [email protected]

    Director del Centro de

    Investigacin

    Blgo. Eduardo

    Rebolledo 111 [email protected]

    [email protected]

    Secretaria General Ing. Maritza

    Demera 116 [email protected]

    Bibliotecario Soc. Carlos

    Olaya 115 [email protected]

    [email protected]

    Directora

    Administrativa y de

    Recursos Humanos

    Ing. Marjorie

    Segovia 220 [email protected]

    [email protected]

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]
  • 12

    Directora Financiera Lic. Mara Elena

    Vlez 106 [email protected]

    [email protected]

    Tesorera Lic. Ana Hidalgo 104 [email protected]

    Jefa de Relaciones

    Pblicas

    Ing. Erika

    Quintero 107 [email protected]

    [email protected]

    Directora de la Escuela

    de Educacin Inicial

    Lic. Lliris

    Bernab 222

    [email protected]

    [email protected]

    Directora de la Escuela

    de Hotelera y Turismo

    Ing. Katia

    Limones 120 [email protected]

    Director de la Escuela

    de Contabilidad y

    Auditora

    Ing. Orlin lava 124

    [email protected]

    [email protected]

    Director de la Escuela

    de Comercio Exterior

    Ing. David

    Granados 122 [email protected]

    [email protected]

    Directora de la Escuela

    de Pymes

    Eco. Roxana

    Bentes 143 [email protected]

    Directora de la Escuela

    de Diseo Grfico

    Lic. Cristina

    Marmolejo 137 [email protected]

    [email protected]

    Directora de la Escuela

    de Administracin de

    Empresas

    Eco. Roxana

    Bentes 143 [email protected]

    Directora de la Escuela

    de Administracin de

    Empresas

    Director de la Escuela

    de Gestin Ambiental

    Eco. Roxana

    Bentes

    Blgo. Pedro

    Jimnez

    143

    310

    [email protected]

    [email protected]

    Directora de la Escuela

    de Enfermera

    Lic. Mara

    Teresa Torres 226 [email protected]

    Directora de la Escuela

    de Bioanlisis

    Lic. Aracely

    Chiln 110 [email protected]

    Directora de la Escuela

    de Bioanlisis

    Director de la Escuela

    de Lingstica

    Aplicada Mencin

    Enseanza en Ingls

    Lic. Aracely

    Chiln

    Lic. Eduardo

    Calahorrano

    110

    222

    [email protected]

    [email protected]

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]
  • 13

    Director de Posgrados Ing. Marco Polo

    Silva 148 [email protected]

    [email protected]

    Jefe de Sistemas Lic. Kleber

    Posligua 133 [email protected]

    Jefe de Sistemas

    Responsable de

    CECAMECON

    Lic. Kleber

    Posligua

    Ing. Cristina

    Mendoza

    133

    134

    [email protected]

    [email protected]

    Responsable de

    CECAMECON

    Responsable de la

    Incubadora de

    Empresas

    Ing. Cristina

    Mendoza

    Dr. Antonio

    Pliz

    134

    135

    [email protected]

    [email protected]

    Presidenta de la

    Asociacin de

    Profesores

    Ing. Cecilia

    Velasco 127 [email protected]

    Presidenta de la

    Federacin de

    Estudiantes

    Srta. Karina

    Coronel 128 [email protected]

    Presidenta de la

    Asociacin de

    Trabajadores

    Ing. Nardy

    Orejuela 105 [email protected]

    Presidenta de la

    Asociacin de

    Trabajadores

    Departamento Mdico

    Ing. Nardy

    Orejuela

    Dra. Maribel

    Guerrn

    105

    131

    [email protected]

    [email protected]

    [email protected]

    Orientadora Lic. Gnova

    Zambrano 138

    [email protected]

    [email protected]

    SESIN 3 SCANNING

    TALLER 1: ANGRYIP

    Proceso de instalacin

    Ejecutar el instalador de ANGRYIP de la seccin de herramientas del paquete de estudio:

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]
  • 14

    Aceptar los trminos de la licencia y clic en SIGUIENTE:

  • 15

    Iniciar fase de anlisis

    Establecer el rango de direcciones IP a escanear (186.42.182.13)

    Iniciar el proceso de escaneo

    Observar los resultados del escaneo

    Observar los puertos abiertos y cerrados de los equipos en la red:

  • 16

    Exportamos los resultados del escner

    Resumen del escner

    Computers count=1

    Computer number: 1

    Name: no information

    IP address: 186.42.182.13

    Ports ( 67 scanned, 3 opened, 64 closed )

    Port 21 - open

    Port 25 - open

    Port 110 - open

  • 17

    TALLER 2: NMAP

    Proceso de instalacin

  • 18

  • 19

    Iniciar NMAP en Windows

    Ingresar a la consola de Windows

    Ir a la ubicacin de la instalacin de NMAP

    Ejecutar NMAP

    Iniciar fase de anlisis

    Ingresar el comando NMAP v A www.pucese.edu.ec

  • 20

    Anlisis de los resultados obtenidos de NMAP

    Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 15:02 Hora est. del Pacco de SA

    Initiating Ping Scan at 15:03

    Scanning www.pucese .edu.ec (186.42.182.13) [4 ports ]

    Completed Ping Scan at 15:03, 0.08s elapsed (1 total hosts)

    Initiating Parallel DNS resolution of 1 host. at 15:03

    Completed Parallel DNS resolution of 1 host. at 15:03, 3.00s elapsed

    Initiating SYN Stealth Scan at 15:03

    Scanning www.pucese .edu.ec (186.42.182.13) [1000 ports ]

    Discovered open port 995/tcp on 186.42.182.13

    Discovered open port 443/tcp on 186.42.182.13

    Discovered open port 25/tcp on 186.42.182.13

    Discovered open port 80/tcp on 186.42.182.13

    Discovered open port 22/tcp on 186.42.182.13

    Discovered open port 993/tcp on 186.42.182.13

    Discovered open port 143/tcp on 186.42.182.13

    Discovered open port 587/tcp on 186.42.182.13

    Discovered open port 110/tcp on 186.42.182.13

    Discovered open port 465/tcp on 186.42.182.13

    Discovered open port 10000/tcp on 186.42.182.13

    Discovered open port 563/tcp on 186.42.182.13

    Completed SYN Stealth Scan at 15:03, 7.22s elapsed (1000 total ports)

    Nmap scan report for www.pucese .edu.ec (186.42.182.13)

    Host is up (0.011s latency).

    Not shown: 988 filtered ports

  • 21

    PORT STATE SERVICE

    22/tcp open ssh

    25/tcp open smtp

    80/tcp open http

    110/tcp open pop3

    143/tcp open imap

    443/tcp open https

    465/tcp open smtps

    563/tcp open snews

    587/tcp open submission

    993/tcp open imaps

    995/tcp open pop3s

    10000/tcp open snet-sensor-mgmt

    Read data files from: C:\Archivos de programa\WinPcap

    Nmap done: 1 IP address (1 host up) scanned in 22.19 seconds

    Raw packets sent: 1995 (87.744KB) | Rcvd: 302 (13.276KB)

    TALLER 3: NETSCANTOOLS PRO

    Proceso de instalacin

  • 22

  • 23

  • 24

  • 25

    Iniciar fase de analsis

    Escoger la opcin PORT SCANNER para iniciar el anlisis

    Obtendremos la IP de la PUCESE ha travs de la consola de Windows

  • 26

    TALLER 4: SUPERSCAN 4

    Proceso de intalacion

  • 27

  • 28

    Iniciar fase de analisis

    Introducir la IP del sitio www.pucese.edu.ec

    Obtendremos la IP de la PUCESE ha travs de la consola de Windows

    Consultar la nformacion requerida del sitio

    Iniciar el escaneo

  • 29

    Anlisis de resultados

    TALLER 5 : ESCANEO BSICO CON NMAP Haremos un escaneo TCP tipos conect () que es un bsico no muy discreto ya que se logra con este

    una conexin efectiva con el objetivo, lo realizaremos para determinar los puertos abiertos del

    objetivo y los servicio

    NMAP -sT 186.42.182.13 (Esta es la IP de la PUCESE):

    Resultados

  • 30

    C:\Archivos de programa\WinPcap>nmap.exe -sT 186.42.182.13

    Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 16:26 Hora est. del Pacic

    o de SA

    Stats: 0:00:46 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan

    Connect Scan Timing: About 75.15% done; ETC: 16:27 (0:00:14 remaining)

    Stats: 0:00:50 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan

    Connect Scan Timing: About 84.55% done; ETC: 16:27 (0:00:09 remaining)

    Stats: 0:00:57 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan

    Connect Scan Timing: About 99.15% done; ETC: 16:26 (0:00:00 remaining)

    Nmap scan report for 186.42.182.13

    Host is up (0.030s latency).

    Not shown: 986 filtered ports

    PORT STATE SERVICE

    21/tcp open ftp

    22/tcp open ssh

    25/tcp open smtp

    80/tcp open http

    110/tcp open pop3

    119/tcp open nntp

    143/tcp open imap

    443/tcp open https

    465/tcp open smtps

    563/tcp open snews

    587/tcp open submission

    993/tcp open imaps

    995/tcp open pop3s

    10000/tcp open snet-sensor-mgmt

    Nmap done: 1 IP address (1 host up) scanned in 59.14 seconds

  • 31

    Luego haremos un barrido en la red para conocer que otras mquinas tenemos al alcance,

    tambin con nmap nuestra tool del momento.

    Nmap sP 186.42.182.0/25 Teniendo en cuenta que la red es de tipo B tomaremos un bit ms de

    la mscara para ver que maquinas tenemos en la red activas y en escucha con sus puertos.

    Resultado:

    Nmap scan report for 186.42.182.54

    Host is up (0.015s latency).

    All 1000 scanned ports on 186.42.182.54 are filtered

    Nmap scan report for 186.42.182.55

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.55 are filtered

    Nmap scan report for 186.42.182.56

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.56 are filtered

    Nmap scan report for 186.42.182.57

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.57 are filtered

  • 32

    Nmap scan report for 186.42.182.58

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.58 are filtered

    Nmap scan report for 186.42.182.59

    Host is up (0.015s latency).

    All 1000 scanned ports on 186.42.182.59 are filtered

    Nmap scan report for 186.42.182.60

    Host is up (0.015s latency).

    All 1000 scanned ports on 186.42.182.60 are filtered

    Nmap scan report for 186.42.182.61

    Host is up (0.015s latency).

    All 1000 scanned ports on 186.42.182.61 are filtered

    Nmap scan report for 186.42.182.62

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.62 are filtered

    Nmap scan report for 186.42.182.63

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.63 are filtered

    Nmap scan report for 186.42.182.64

    Host is up (0.015s latency).

    All 1000 scanned ports on 186.42.182.64 are filtered

    Nmap scan report for 186.42.182.65

    Host is up (0.063s latency).

  • 33

    All 1000 scanned ports on 186.42.182.65 are filtered

    Nmap scan report for 186.42.182.66

    Host is up (0.063s latency).

    All 1000 scanned ports on 186.42.182.66 are filtered

    Nmap scan report for 186.42.182.67

    Host is up (0.015s latency).

    All 1000 scanned ports on 186.42.182.67 are filtered

    Nmap scan report for 186.42.182.68

    Host is up (0.062s latency).

    All 1000 scanned ports on 186.42.182.68 are filtered

    Nmap scan report for 186.42.182.69

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.69 are filtered

    Nmap scan report for 186.42.182.70

    Host is up (0.015s latency).

    All 1000 scanned ports on 186.42.182.70 are filtered

    Nmap scan report for 186.42.182.71

    Host is up (0.015s latency).

    All 1000 scanned ports on 186.42.182.71 are filtered

    Nmap scan report for 186.42.182.72

    Host is up (0.015s latency).

    All 1000 scanned ports on 186.42.182.72 are filtered

  • 34

    Nmap scan report for 186.42.182.73

    Host is up (0.015s latency).

    All 1000 scanned ports on 186.42.182.73 are filtered

    Nmap scan report for 186.42.182.74

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.74 are filtered

    Nmap scan report for 186.42.182.75

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.75 are filtered

    Nmap scan report for 186.42.182.76

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.76 are filtered

    Nmap scan report for 186.42.182.77

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.77 are filtered

    Nmap scan report for 186.42.182.78

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.78 are filtered

    Nmap scan report for 186.42.182.79

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.79 are filtered

    Nmap scan report for 186.42.182.80

    Host is up (0.00s latency).

  • 35

    All 1000 scanned ports on 186.42.182.80 are filtered

    Nmap scan report for 186.42.182.81

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.81 are filtered

    Nmap scan report for 186.42.182.82

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.82 are filtered

    Nmap scan report for 186.42.182.83

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.83 are filtered

    Nmap scan report for 186.42.182.84

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.84 are filtered

    Nmap scan report for 186.42.182.85

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.85 are filtered

    Nmap scan report for 186.42.182.86

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.86 are filtered

    Nmap scan report for 186.42.182.87

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.87 are filtered

  • 36

    Nmap scan report for 186.42.182.88

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.88 are filtered

    Nmap scan report for 186.42.182.89

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.89 are filtered

    Nmap scan report for 186.42.182.90

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.90 are filtered

    Nmap scan report for 186.42.182.91

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.91 are filtered

    Nmap scan report for 186.42.182.92

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.92 are filtered

    Nmap scan report for 186.42.182.93

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.93 are filtered

    Nmap scan report for 186.42.182.94

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.94 are filtered

    Nmap scan report for 186.42.182.95

    Host is up (0.00s latency).

  • 37

    All 1000 scanned ports on 186.42.182.95 are filtered

    Nmap scan report for 186.42.182.96

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.96 are filtered

    Nmap scan report for 186.42.182.97

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.97 are filtered

    Nmap scan report for 186.42.182.98

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.98 are filtered

    Nmap scan report for 186.42.182.99

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.99 are filtered

    Nmap scan report for 186.42.182.100

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.100 are filtered

    Nmap scan report for 186.42.182.101

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.101 are filtered

    Nmap scan report for 186.42.182.102

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.102 are filtered

  • 38

    Nmap scan report for 186.42.182.103

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.103 are filtered

    Nmap scan report for 186.42.182.104

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.104 are filtered

    Nmap scan report for 186.42.182.105

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.105 are filtered

    Nmap scan report for 186.42.182.106

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.106 are filtered

    Nmap scan report for 186.42.182.107

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.107 are filtered

    Nmap scan report for 186.42.182.108

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.108 are filtered

    Nmap scan report for 186.42.182.109

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.109 are filtered

    Nmap scan report for 186.42.182.110

    Host is up (0.00s latency).

  • 39

    All 1000 scanned ports on 186.42.182.110 are filtered

    Nmap scan report for 186.42.182.111

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.111 are filtered

    Nmap scan report for 186.42.182.112

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.112 are filtered

    Nmap scan report for 186.42.182.113

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.113 are filtered

    Nmap scan report for 186.42.182.114

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.114 are filtered

    Nmap scan report for 186.42.182.115

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.115 are filtered

    Nmap scan report for 186.42.182.116

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.116 are filtered

    Nmap scan report for 186.42.182.117

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.117 are filtered

  • 40

    Nmap scan report for 186.42.182.118

    Host is up (0.016s latency).

    All 1000 scanned ports on 186.42.182.118 are filtered

    Nmap scan report for 186.42.182.119

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.119 are filtered

    Nmap scan report for 186.42.182.120

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.120 are filtered

    Nmap scan report for 186.42.182.121

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.121 are filtered

    Nmap scan report for 186.42.182.122

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.122 are filtered

    Nmap scan report for 186.42.182.123

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.123 are filtered

    Nmap scan report for 186.42.182.124

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.124 are filtered

    Nmap scan report for 186.42.182.125

    Host is up (0.00s latency).

  • 41

    All 1000 scanned ports on 186.42.182.125 are filtered

    Nmap scan report for 186.42.182.126

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.126 are filtered

    Nmap scan report for 186.42.182.127

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.127 are filtered

    Nmap done: 128 IP addresses (128 hosts up) scanned in 205.50 seconds

    Ahora que hemos determinado nuestro objetivo necesitamos conocer que sistema operativo tiene

    para poder llegar al servidor y no de pronto a un cliente por que el objetivo es la informacin del

    sistema central. NMAP nos contina ayudando en este trabajo as:

    NMAP O 186.42.182.13 escner nivel de TCP

    Adems de conocer a nivel de TCP que puertos estn en escucha, recordemos que tambin

    podremos realizar ataque de tipo DoS sobre la capa de transporte en el protocolo UDP, para esto

    debemos conocer que puertos estn a la escucha en el objetivo, as:

    NMAP sU 186.42.182.13

  • 42

    Resultado:

    C:\Archivos de programa\WinPcap>nmap.exe -sU 186.42.182.13

    Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 16:46 Hora est. del Pacic

    o de SA

    Nmap scan report for 186.42.182.13

    Host is up (0.00s latency).

    All 1000 scanned ports on 186.42.182.13 are open|filtered

    Nmap done: 1 IP address (1 host up) scanned in 7.49 seconds

    Si ya contamos con los puertos, las direcciones MAC, los servicios, el sistema operativo que

    funciona y sus datos, otro aspecto importante es las versiones de los servicios, con estas

    podremos determinar ms adelante que posibles exploit o tolos tendremos que usar y que tipo de

    tcnica de penetracin usar para lograr al momento del acceso estar dentro de la maquina

    objetivo. Seguimos usando NMAP para nuestras tareas.

    Nmap sV 186.42.182.13 nos permitir verificar servicios y sus versiones.

    Resultado:

  • 43

    C:\Archivos de programa\WinPcap>nmap.exe -sV 186.42.182.13

    Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 16:49 Hora est. del Pacic

    o de SA

    Stats: 0:00:18 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan

    NSE Timing: About 0.00% done

    Stats: 0:00:21 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan

    NSE Timing: About 0.00% done

    Stats: 0:00:22 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan

    NSE Timing: About 0.00% done

    Stats: 0:00:23 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan

    NSE Timing: About 0.00% done

    Nmap scan report for 186.42.182.13

    Host is up (0.013s latency).

    Not shown: 987 filtered ports

    PORT STATE SERVICE VERSION

    22/tcp open ssh?

    25/tcp open smtp?

    80/tcp open http?

    110/tcp open pop3?

    119/tcp open nntp?

    143/tcp open imap?

    443/tcp open https?

    465/tcp open smtps?

    563/tcp open snews?

    587/tcp open submission?

    993/tcp open imaps?

    995/tcp open pop3s?

    10000/tcp open snet-sensor-mgmt?

    Service detection performed. Please report any incorrect results at http://nmap.

    org/submit/ .

    Nmap done: 1 IP address (1 host up) scanned in 37.94 seconds

    C:\Archivos de programa\WinPcap>

    SESIN 4 ANONIMATO

    TALLER 1: ANONIMATO NIVEL BSICO

    Se har uso de Firefox para esta actividad

  • 44

    Descargar la versin de Firefox de internet

    Proceso de descarga

  • 45

    Proceso de instalacin

  • 46

    Buscar los plugins o firecats:

    Show IP

    Foxyproxy

    Instalar los componentes al navegador

    Utilizar un servicio para obtener listas de proxys annimos y configurar dichos proxys

    en el Foxyproxy

  • 47

  • 48

    Realizar pruebas con diferentes proxys, mnimo 5 proxys de diferentes pases,

    verificando conectividad y rapidez en el servicio

  • 49

  • 50

    Utilizar el servicio de email annimo y enviar un correo el resultado de las pruebas

    realizadas con los proxys antes configurados.

    El cdigo fuente y la informacin del mensaje denotan que el servidor proxy funciono como se

    esperaba.

    Descargar la ltima versin de Tor (proyecto Tor) y realizar la instalacin en una

    memoria usb, para tener un proxy live usb.

  • 51

    Iniciar Tor Browser