Trabajo Practico Final
-
Upload
marco-silva-segovia -
Category
Documents
-
view
35 -
download
0
Transcript of Trabajo Practico Final
-
PONTIFICIA UNIVERSIDAD CATLICA DEL ECUADOR SEDE
SANTO DOMINGO
ESCUELA DE SISTEMAS Y COMPUTACIN
EVALUACIN DE SISTEMAS
TRABAJO FINAL DE FUNDAMENTOS Y FASES DE UN ATAQUE HACKING
AUTORES:
ANDRS ARTURO SANDOVAL MONTOYA
CARLOS EDUARDO PALLO CABALLERO
DOCENTE:
ING. MARCO POLO SILVA SEGOVIA
PORTADA DE IDENTIFICACIN
Santo Domingo-Ecuador
Enero, 2014
-
2
CONTENIDO PORTADA DE IDENTIFICACIN ............................................................................................................ 1
CONTENIDO ......................................................................................................................................... 2
SESIN 2 FOOTPRINTING .................................................................................................................... 4
TALLER 1: SAMSPADE ...................................................................................................................... 4
Obteniendo el DNS o direccin IP a travs de la URL de la PUCESE ........................................... 4
Haciendo ping a la URL ................................................................................................................ 4
Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su emisin
hasta llegar a su computadora, con el botn TRACE. ................................................................. 5
TALLER 2: DATA WEB EXTRACTOR .................................................................................................. 5
Extrayendo las URL relacionadas ................................................................................................ 5
Obteniendo e-mail ...................................................................................................................... 6
Extrayendo contactos telefnicos ............................................................................................... 6
TALLER 3: GEO SPAIDER .................................................................................................................. 6
Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su emisin
hasta llegar a su computadora, con el botn TRACE. ................................................................. 6
Haciendo Ping a la IP 186.42.182.13 ........................................................................................... 7
Mapeo de las rutas de los servidores recorridos por los datos .................................................. 8
Obteniendo informacin ............................................................................................................. 8
TALLER 4: NEOTRACE PRO ............................................................................................................... 9
Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su emisin
hasta llegar a su computadora, con el botn TRACE. ................................................................. 9
Vista de los nodos recorridos de la informacin ....................................................................... 10
TALLER 5: WHEREISIP .................................................................................................................... 10
Informacin obtenida de los correos electrnicos y contactos del personal de la PUCESE ..... 11
SESIN 3 SCANNING .......................................................................................................................... 13
TALLER 1: ANGRYIP........................................................................................................................ 13
Proceso de instalacin ............................................................................................................... 13
Iniciar fase de anlisis ................................................................................................................ 15
TALLER 2: NMAP ............................................................................................................................ 17
-
3
Proceso de instalacin ............................................................................................................... 17
Iniciar NMAP en Windows......................................................................................................... 19
Iniciar fase de anlisis ................................................................................................................ 19
TALLER 3: NETSCANTOOLS PRO .................................................................................................... 21
Proceso de instalacin ............................................................................................................... 21
Iniciar fase de analsis................................................................................................................. 25
TALLER 4: SUPERSCAN 4 ................................................................................................................ 26
Proceso de intalacion ................................................................................................................ 26
Iniciar fase de analisis ................................................................................................................ 28
Consultar la nformacion requerida del sitio.............................................................................. 28
Iniciar el escaneo ....................................................................................................................... 28
Anlisis de resultados ................................................................................................................ 29
TALLER 5 : ESCANEO BSICO CON NMAP ..................................................................................... 29
SESIN 4 ANONIMATO ...................................................................................................................... 43
TALLER 1: ANONIMATO NIVEL BSICO ......................................................................................... 43
Descargar la versin de Firefox de internet .............................................................................. 44
Buscar los plugins o firecats: ..................................................................................................... 46
Instalar los componentes al navegador .................................................................................... 46
Utilizar un servicio para obtener listas de proxys annimos y configurar dichos proxys en el
Foxyproxy .................................................................................................................................. 46
Realizar pruebas con diferentes proxys, mnimo 5 proxys de diferentes pases, verificando
conectividad y rapidez en el servicio......................................................................................... 48
Utilizar el servicio de email annimo y enviar un correo el resultado de las pruebas realizadas
con los proxys antes configurados. ........................................................................................... 50
Descargar la ltima versin de Tor (proyecto Tor) y realizar la instalacin en una memoria
usb, para tener un proxy live usb. ............................................................................................. 50
-
4
SESIN 2 FOOTPRINTING
TALLER 1: SAMSPADE Instale la herramienta samspade contenidos en las herramientas de la plataforma y utilice la
aplicacin para inspeccionar el portal o URL de la PUCESE (http://www.pucese.edu.ec/)
Obteniendo el DNS o direccin IP a travs de la URL de la PUCESE
Haciendo ping a la URL
http://www.pucese.edu.ec/ -
5
Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su
emisin hasta llegar a su computadora, con el botn TRACE.
TALLER 2: DATA WEB EXTRACTOR Instale la herramienta Data Web Extractor, y utilizando una URL http://www.pucese.edu.ec/ y
extracte o recolecte de dicha URL (Los Email, telfonos y Nmeros de FAX del Portal).
Extrayendo las URL relacionadas
http://www.pucese.edu.ec/ -
6
Obteniendo e-mail
Extrayendo contactos telefnicos
TALLER 3: GEO SPAIDER Instale GEO SPIDER, en el campo URL coloque la URL que usted va a estudiar y navegue varias
caractersticas de la herramienta para su configuracin buscando identificar Ips, Trazo de rutas
etc.
Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su
emisin hasta llegar a su computadora, con el botn TRACE.
-
7
Haciendo Ping a la IP 186.42.182.13
-
8
Mapeo de las rutas de los servidores recorridos por los datos
Obteniendo informacin
-
9
TALLER 4: NEOTRACE PRO Instale la herramienta NEOTRACE PRO contenidos en las herramientas de la plataforma, siga los
siguientes pasos.
Explore varias opciones del programa reuniendo informacin de pings, trazas entre otras.
Documente la informacin.
Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su
emisin hasta llegar a su computadora, con el botn TRACE.
-
10
Vista de los nodos recorridos de la informacin
TALLER 5: WHEREISIP Instale la herramienta WhereIsIp y explore varias opciones de la herramienta y recolecte la mayor
cantidad de informacin posible de nombres de servidores, conexiones correos electrnicos y
dems datos encontrados.
-
11
Informacin obtenida de los correos electrnicos y contactos del personal de la
PUCESE
E-mail: [email protected]
Telfonos:2726613 / 2721459
Fax:2726509 ext. 114
CARGO NOMBRE EXT. E-MAIL
Pro-Rector Lic. Aitor Urbina 102 [email protected]
Director Acadmico Dr. Walter
Mosquera 224 [email protected]
Directora de Bienestar
Estudiantil y Pastoral
Universitaria
Lic. Lilian Vera 140 [email protected]
Director del Centro de
Investigacin
Blgo. Eduardo
Rebolledo 111 [email protected]
Secretaria General Ing. Maritza
Demera 116 [email protected]
Bibliotecario Soc. Carlos
Olaya 115 [email protected]
Directora
Administrativa y de
Recursos Humanos
Ing. Marjorie
Segovia 220 [email protected]
mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected] -
12
Directora Financiera Lic. Mara Elena
Vlez 106 [email protected]
Tesorera Lic. Ana Hidalgo 104 [email protected]
Jefa de Relaciones
Pblicas
Ing. Erika
Quintero 107 [email protected]
Directora de la Escuela
de Educacin Inicial
Lic. Lliris
Bernab 222
Directora de la Escuela
de Hotelera y Turismo
Ing. Katia
Limones 120 [email protected]
Director de la Escuela
de Contabilidad y
Auditora
Ing. Orlin lava 124
Director de la Escuela
de Comercio Exterior
Ing. David
Granados 122 [email protected]
Directora de la Escuela
de Pymes
Eco. Roxana
Bentes 143 [email protected]
Directora de la Escuela
de Diseo Grfico
Lic. Cristina
Marmolejo 137 [email protected]
Directora de la Escuela
de Administracin de
Empresas
Eco. Roxana
Bentes 143 [email protected]
Directora de la Escuela
de Administracin de
Empresas
Director de la Escuela
de Gestin Ambiental
Eco. Roxana
Bentes
Blgo. Pedro
Jimnez
143
310
Directora de la Escuela
de Enfermera
Lic. Mara
Teresa Torres 226 [email protected]
Directora de la Escuela
de Bioanlisis
Lic. Aracely
Chiln 110 [email protected]
Directora de la Escuela
de Bioanlisis
Director de la Escuela
de Lingstica
Aplicada Mencin
Enseanza en Ingls
Lic. Aracely
Chiln
Lic. Eduardo
Calahorrano
110
222
mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected] -
13
Director de Posgrados Ing. Marco Polo
Silva 148 [email protected]
Jefe de Sistemas Lic. Kleber
Posligua 133 [email protected]
Jefe de Sistemas
Responsable de
CECAMECON
Lic. Kleber
Posligua
Ing. Cristina
Mendoza
133
134
Responsable de
CECAMECON
Responsable de la
Incubadora de
Empresas
Ing. Cristina
Mendoza
Dr. Antonio
Pliz
134
135
Presidenta de la
Asociacin de
Profesores
Ing. Cecilia
Velasco 127 [email protected]
Presidenta de la
Federacin de
Estudiantes
Srta. Karina
Coronel 128 [email protected]
Presidenta de la
Asociacin de
Trabajadores
Ing. Nardy
Orejuela 105 [email protected]
Presidenta de la
Asociacin de
Trabajadores
Departamento Mdico
Ing. Nardy
Orejuela
Dra. Maribel
Guerrn
105
131
Orientadora Lic. Gnova
Zambrano 138
SESIN 3 SCANNING
TALLER 1: ANGRYIP
Proceso de instalacin
Ejecutar el instalador de ANGRYIP de la seccin de herramientas del paquete de estudio:
mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected] -
14
Aceptar los trminos de la licencia y clic en SIGUIENTE:
-
15
Iniciar fase de anlisis
Establecer el rango de direcciones IP a escanear (186.42.182.13)
Iniciar el proceso de escaneo
Observar los resultados del escaneo
Observar los puertos abiertos y cerrados de los equipos en la red:
-
16
Exportamos los resultados del escner
Resumen del escner
Computers count=1
Computer number: 1
Name: no information
IP address: 186.42.182.13
Ports ( 67 scanned, 3 opened, 64 closed )
Port 21 - open
Port 25 - open
Port 110 - open
-
17
TALLER 2: NMAP
Proceso de instalacin
-
18
-
19
Iniciar NMAP en Windows
Ingresar a la consola de Windows
Ir a la ubicacin de la instalacin de NMAP
Ejecutar NMAP
Iniciar fase de anlisis
Ingresar el comando NMAP v A www.pucese.edu.ec
-
20
Anlisis de los resultados obtenidos de NMAP
Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 15:02 Hora est. del Pacco de SA
Initiating Ping Scan at 15:03
Scanning www.pucese .edu.ec (186.42.182.13) [4 ports ]
Completed Ping Scan at 15:03, 0.08s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 15:03
Completed Parallel DNS resolution of 1 host. at 15:03, 3.00s elapsed
Initiating SYN Stealth Scan at 15:03
Scanning www.pucese .edu.ec (186.42.182.13) [1000 ports ]
Discovered open port 995/tcp on 186.42.182.13
Discovered open port 443/tcp on 186.42.182.13
Discovered open port 25/tcp on 186.42.182.13
Discovered open port 80/tcp on 186.42.182.13
Discovered open port 22/tcp on 186.42.182.13
Discovered open port 993/tcp on 186.42.182.13
Discovered open port 143/tcp on 186.42.182.13
Discovered open port 587/tcp on 186.42.182.13
Discovered open port 110/tcp on 186.42.182.13
Discovered open port 465/tcp on 186.42.182.13
Discovered open port 10000/tcp on 186.42.182.13
Discovered open port 563/tcp on 186.42.182.13
Completed SYN Stealth Scan at 15:03, 7.22s elapsed (1000 total ports)
Nmap scan report for www.pucese .edu.ec (186.42.182.13)
Host is up (0.011s latency).
Not shown: 988 filtered ports
-
21
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
80/tcp open http
110/tcp open pop3
143/tcp open imap
443/tcp open https
465/tcp open smtps
563/tcp open snews
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
10000/tcp open snet-sensor-mgmt
Read data files from: C:\Archivos de programa\WinPcap
Nmap done: 1 IP address (1 host up) scanned in 22.19 seconds
Raw packets sent: 1995 (87.744KB) | Rcvd: 302 (13.276KB)
TALLER 3: NETSCANTOOLS PRO
Proceso de instalacin
-
22
-
23
-
24
-
25
Iniciar fase de analsis
Escoger la opcin PORT SCANNER para iniciar el anlisis
Obtendremos la IP de la PUCESE ha travs de la consola de Windows
-
26
TALLER 4: SUPERSCAN 4
Proceso de intalacion
-
27
-
28
Iniciar fase de analisis
Introducir la IP del sitio www.pucese.edu.ec
Obtendremos la IP de la PUCESE ha travs de la consola de Windows
Consultar la nformacion requerida del sitio
Iniciar el escaneo
-
29
Anlisis de resultados
TALLER 5 : ESCANEO BSICO CON NMAP Haremos un escaneo TCP tipos conect () que es un bsico no muy discreto ya que se logra con este
una conexin efectiva con el objetivo, lo realizaremos para determinar los puertos abiertos del
objetivo y los servicio
NMAP -sT 186.42.182.13 (Esta es la IP de la PUCESE):
Resultados
-
30
C:\Archivos de programa\WinPcap>nmap.exe -sT 186.42.182.13
Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 16:26 Hora est. del Pacic
o de SA
Stats: 0:00:46 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 75.15% done; ETC: 16:27 (0:00:14 remaining)
Stats: 0:00:50 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 84.55% done; ETC: 16:27 (0:00:09 remaining)
Stats: 0:00:57 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 99.15% done; ETC: 16:26 (0:00:00 remaining)
Nmap scan report for 186.42.182.13
Host is up (0.030s latency).
Not shown: 986 filtered ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
80/tcp open http
110/tcp open pop3
119/tcp open nntp
143/tcp open imap
443/tcp open https
465/tcp open smtps
563/tcp open snews
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
10000/tcp open snet-sensor-mgmt
Nmap done: 1 IP address (1 host up) scanned in 59.14 seconds
-
31
Luego haremos un barrido en la red para conocer que otras mquinas tenemos al alcance,
tambin con nmap nuestra tool del momento.
Nmap sP 186.42.182.0/25 Teniendo en cuenta que la red es de tipo B tomaremos un bit ms de
la mscara para ver que maquinas tenemos en la red activas y en escucha con sus puertos.
Resultado:
Nmap scan report for 186.42.182.54
Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.54 are filtered
Nmap scan report for 186.42.182.55
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.55 are filtered
Nmap scan report for 186.42.182.56
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.56 are filtered
Nmap scan report for 186.42.182.57
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.57 are filtered
-
32
Nmap scan report for 186.42.182.58
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.58 are filtered
Nmap scan report for 186.42.182.59
Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.59 are filtered
Nmap scan report for 186.42.182.60
Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.60 are filtered
Nmap scan report for 186.42.182.61
Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.61 are filtered
Nmap scan report for 186.42.182.62
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.62 are filtered
Nmap scan report for 186.42.182.63
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.63 are filtered
Nmap scan report for 186.42.182.64
Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.64 are filtered
Nmap scan report for 186.42.182.65
Host is up (0.063s latency).
-
33
All 1000 scanned ports on 186.42.182.65 are filtered
Nmap scan report for 186.42.182.66
Host is up (0.063s latency).
All 1000 scanned ports on 186.42.182.66 are filtered
Nmap scan report for 186.42.182.67
Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.67 are filtered
Nmap scan report for 186.42.182.68
Host is up (0.062s latency).
All 1000 scanned ports on 186.42.182.68 are filtered
Nmap scan report for 186.42.182.69
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.69 are filtered
Nmap scan report for 186.42.182.70
Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.70 are filtered
Nmap scan report for 186.42.182.71
Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.71 are filtered
Nmap scan report for 186.42.182.72
Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.72 are filtered
-
34
Nmap scan report for 186.42.182.73
Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.73 are filtered
Nmap scan report for 186.42.182.74
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.74 are filtered
Nmap scan report for 186.42.182.75
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.75 are filtered
Nmap scan report for 186.42.182.76
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.76 are filtered
Nmap scan report for 186.42.182.77
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.77 are filtered
Nmap scan report for 186.42.182.78
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.78 are filtered
Nmap scan report for 186.42.182.79
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.79 are filtered
Nmap scan report for 186.42.182.80
Host is up (0.00s latency).
-
35
All 1000 scanned ports on 186.42.182.80 are filtered
Nmap scan report for 186.42.182.81
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.81 are filtered
Nmap scan report for 186.42.182.82
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.82 are filtered
Nmap scan report for 186.42.182.83
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.83 are filtered
Nmap scan report for 186.42.182.84
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.84 are filtered
Nmap scan report for 186.42.182.85
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.85 are filtered
Nmap scan report for 186.42.182.86
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.86 are filtered
Nmap scan report for 186.42.182.87
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.87 are filtered
-
36
Nmap scan report for 186.42.182.88
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.88 are filtered
Nmap scan report for 186.42.182.89
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.89 are filtered
Nmap scan report for 186.42.182.90
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.90 are filtered
Nmap scan report for 186.42.182.91
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.91 are filtered
Nmap scan report for 186.42.182.92
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.92 are filtered
Nmap scan report for 186.42.182.93
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.93 are filtered
Nmap scan report for 186.42.182.94
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.94 are filtered
Nmap scan report for 186.42.182.95
Host is up (0.00s latency).
-
37
All 1000 scanned ports on 186.42.182.95 are filtered
Nmap scan report for 186.42.182.96
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.96 are filtered
Nmap scan report for 186.42.182.97
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.97 are filtered
Nmap scan report for 186.42.182.98
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.98 are filtered
Nmap scan report for 186.42.182.99
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.99 are filtered
Nmap scan report for 186.42.182.100
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.100 are filtered
Nmap scan report for 186.42.182.101
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.101 are filtered
Nmap scan report for 186.42.182.102
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.102 are filtered
-
38
Nmap scan report for 186.42.182.103
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.103 are filtered
Nmap scan report for 186.42.182.104
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.104 are filtered
Nmap scan report for 186.42.182.105
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.105 are filtered
Nmap scan report for 186.42.182.106
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.106 are filtered
Nmap scan report for 186.42.182.107
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.107 are filtered
Nmap scan report for 186.42.182.108
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.108 are filtered
Nmap scan report for 186.42.182.109
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.109 are filtered
Nmap scan report for 186.42.182.110
Host is up (0.00s latency).
-
39
All 1000 scanned ports on 186.42.182.110 are filtered
Nmap scan report for 186.42.182.111
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.111 are filtered
Nmap scan report for 186.42.182.112
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.112 are filtered
Nmap scan report for 186.42.182.113
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.113 are filtered
Nmap scan report for 186.42.182.114
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.114 are filtered
Nmap scan report for 186.42.182.115
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.115 are filtered
Nmap scan report for 186.42.182.116
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.116 are filtered
Nmap scan report for 186.42.182.117
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.117 are filtered
-
40
Nmap scan report for 186.42.182.118
Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.118 are filtered
Nmap scan report for 186.42.182.119
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.119 are filtered
Nmap scan report for 186.42.182.120
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.120 are filtered
Nmap scan report for 186.42.182.121
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.121 are filtered
Nmap scan report for 186.42.182.122
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.122 are filtered
Nmap scan report for 186.42.182.123
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.123 are filtered
Nmap scan report for 186.42.182.124
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.124 are filtered
Nmap scan report for 186.42.182.125
Host is up (0.00s latency).
-
41
All 1000 scanned ports on 186.42.182.125 are filtered
Nmap scan report for 186.42.182.126
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.126 are filtered
Nmap scan report for 186.42.182.127
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.127 are filtered
Nmap done: 128 IP addresses (128 hosts up) scanned in 205.50 seconds
Ahora que hemos determinado nuestro objetivo necesitamos conocer que sistema operativo tiene
para poder llegar al servidor y no de pronto a un cliente por que el objetivo es la informacin del
sistema central. NMAP nos contina ayudando en este trabajo as:
NMAP O 186.42.182.13 escner nivel de TCP
Adems de conocer a nivel de TCP que puertos estn en escucha, recordemos que tambin
podremos realizar ataque de tipo DoS sobre la capa de transporte en el protocolo UDP, para esto
debemos conocer que puertos estn a la escucha en el objetivo, as:
NMAP sU 186.42.182.13
-
42
Resultado:
C:\Archivos de programa\WinPcap>nmap.exe -sU 186.42.182.13
Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 16:46 Hora est. del Pacic
o de SA
Nmap scan report for 186.42.182.13
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.13 are open|filtered
Nmap done: 1 IP address (1 host up) scanned in 7.49 seconds
Si ya contamos con los puertos, las direcciones MAC, los servicios, el sistema operativo que
funciona y sus datos, otro aspecto importante es las versiones de los servicios, con estas
podremos determinar ms adelante que posibles exploit o tolos tendremos que usar y que tipo de
tcnica de penetracin usar para lograr al momento del acceso estar dentro de la maquina
objetivo. Seguimos usando NMAP para nuestras tareas.
Nmap sV 186.42.182.13 nos permitir verificar servicios y sus versiones.
Resultado:
-
43
C:\Archivos de programa\WinPcap>nmap.exe -sV 186.42.182.13
Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 16:49 Hora est. del Pacic
o de SA
Stats: 0:00:18 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 0.00% done
Stats: 0:00:21 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 0.00% done
Stats: 0:00:22 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 0.00% done
Stats: 0:00:23 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 0.00% done
Nmap scan report for 186.42.182.13
Host is up (0.013s latency).
Not shown: 987 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh?
25/tcp open smtp?
80/tcp open http?
110/tcp open pop3?
119/tcp open nntp?
143/tcp open imap?
443/tcp open https?
465/tcp open smtps?
563/tcp open snews?
587/tcp open submission?
993/tcp open imaps?
995/tcp open pop3s?
10000/tcp open snet-sensor-mgmt?
Service detection performed. Please report any incorrect results at http://nmap.
org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 37.94 seconds
C:\Archivos de programa\WinPcap>
SESIN 4 ANONIMATO
TALLER 1: ANONIMATO NIVEL BSICO
Se har uso de Firefox para esta actividad
-
44
Descargar la versin de Firefox de internet
Proceso de descarga
-
45
Proceso de instalacin
-
46
Buscar los plugins o firecats:
Show IP
Foxyproxy
Instalar los componentes al navegador
Utilizar un servicio para obtener listas de proxys annimos y configurar dichos proxys
en el Foxyproxy
-
47
-
48
Realizar pruebas con diferentes proxys, mnimo 5 proxys de diferentes pases,
verificando conectividad y rapidez en el servicio
-
49
-
50
Utilizar el servicio de email annimo y enviar un correo el resultado de las pruebas
realizadas con los proxys antes configurados.
El cdigo fuente y la informacin del mensaje denotan que el servidor proxy funciono como se
esperaba.
Descargar la ltima versin de Tor (proyecto Tor) y realizar la instalacin en una
memoria usb, para tener un proxy live usb.
-
51
Iniciar Tor Browser