CSC/ECE 517 Spring 2014/security audit: Difference between revisions
Jump to navigation
Jump to search
(Added nslookup results) |
(Added basic nmap scans, better formatting) |
||
Line 7: | Line 7: | ||
== Basic server info == | == Basic server info == | ||
<pre> | |||
[~]$ nslookup http://expertiza.ncsu.edu | [~]$ nslookup http://expertiza.ncsu.edu | ||
Server: 209.18.47.61 | Server: 209.18.47.61 | ||
Line 16: | Line 17: | ||
Name: http://expertiza.ncsu.edu | Name: http://expertiza.ncsu.edu | ||
Address: 66.152.109.110 | Address: 66.152.109.110 | ||
</pre> | |||
== Nmap scans == | |||
<pre> | |||
[~]$ nmap -Pn 66.152.109.110 3:18:22 | |||
Starting Nmap 6.40 ( http://nmap.org ) at 2014-04-21 03:18 EDT | |||
Nmap scan report for 66-152-109-110.tvc-ip.com (66.152.109.110) | |||
Host is up (0.038s latency). | |||
Not shown: 998 filtered ports | |||
PORT STATE SERVICE | |||
80/tcp open http | |||
443/tcp closed https | |||
Nmap done: 1 IP address (1 host up) scanned in 7.26 seconds | |||
[~]$ nmap -Pn 198.105.251.210 3:18:43 | |||
Starting Nmap 6.40 ( http://nmap.org ) at 2014-04-21 03:18 EDT | |||
Nmap scan report for 198.105.251.210 | |||
Host is up (0.058s latency). | |||
Not shown: 998 filtered ports | |||
PORT STATE SERVICE | |||
80/tcp open http | |||
443/tcp closed https | |||
Nmap done: 1 IP address (1 host up) scanned in 6.36 seconds | |||
</pre> | |||
== Metasploit wmap == | == Metasploit wmap == |
Revision as of 07:20, 21 April 2014
Overview
This page will document a security audit of Expertiza.
Scans
Basic server info
[~]$ nslookup http://expertiza.ncsu.edu Server: 209.18.47.61 Address: 209.18.47.61#53 Non-authoritative answer: Name: http://expertiza.ncsu.edu Address: 198.105.251.210 Name: http://expertiza.ncsu.edu Address: 66.152.109.110
Nmap scans
[~]$ nmap -Pn 66.152.109.110 3:18:22 Starting Nmap 6.40 ( http://nmap.org ) at 2014-04-21 03:18 EDT Nmap scan report for 66-152-109-110.tvc-ip.com (66.152.109.110) Host is up (0.038s latency). Not shown: 998 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp closed https Nmap done: 1 IP address (1 host up) scanned in 7.26 seconds [~]$ nmap -Pn 198.105.251.210 3:18:43 Starting Nmap 6.40 ( http://nmap.org ) at 2014-04-21 03:18 EDT Nmap scan report for 198.105.251.210 Host is up (0.058s latency). Not shown: 998 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp closed https Nmap done: 1 IP address (1 host up) scanned in 6.36 seconds
Metasploit wmap
[~]$ msfconsole =[ metasploit v4.9.2-2014040906 [core:4.9 api:1.0] ] + -- --=[ 1299 exploits - 791 auxiliary - 217 post ] + -- --=[ 334 payloads - 35 encoders - 8 nops ] msf > load wmap .-.-.-..-.-.-..---..---. | | | || | | || | || |-' `-----'`-'-'-'`-^-'`-' [WMAP 1.5.1] === et [ ] metasploit.com 2012 [*] Successfully loaded plugin: wmap msf > wmap_sites -a http://expertiza.ncsu.edu/ [*] Site created. msf > wmap_sites -l [*] Available sites =============== Id Host Vhost Port Proto # Pages # Forms -- ---- ----- ---- ----- ------- ------- 0 152.14.105.146 152.14.105.146 80 http 0 0 msf > wmap_targets -t http://152.14.105.146/home.html msf > wmap_targets -t http://152.14.105.146/home msf > wmap_targets -l [*] Defined targets =============== Id Vhost Host Port SSL Path -- ----- ---- ---- --- ---- 0 152.14.105.146 152.14.105.146 80 false /home.html 1 152.14.105.146 152.14.105.146 80 false /home msf > wmap_run -t [*] Testing target: [*] Site: 152.14.105.146 (152.14.105.146) [*] Port: 80 SSL: false ============================================================ [*] Testing started. 2014-04-21 02:33:20 -0400 [*] Loading wmap modules... msf > wmap_run [*] 39 wmap enabled modules loaded. <snip> [*] Done. msf > wmap_vulns -l msf > # No vuls discovered