Anda di halaman 1dari 51

PONTIFICIA UNIVERSIDAD CATLICA DEL ECUADOR SEDE

SANTO DOMINGO
ESCUELA DE SISTEMAS Y COMPUTACIN

EVALUACIN DE SISTEMAS

TRABAJO FINAL DE FUNDAMENTOS Y FASES DE UN ATAQUE HACKING

AUTORES:
ANDRS ARTURO SANDOVAL MONTOYA
CARLOS EDUARDO PALLO CABALLERO

DOCENTE:
ING. MARCO POLO SILVA SEGOVIA

PORTADA DE IDENTIFICACIN
Santo Domingo-Ecuador
Enero, 2014

CONTENIDO
PORTADA DE IDENTIFICACIN ............................................................................................................ 1
CONTENIDO ......................................................................................................................................... 2
SESIN 2 FOOTPRINTING .................................................................................................................... 4
TALLER 1: SAMSPADE ...................................................................................................................... 4
Obteniendo el DNS o direccin IP a travs de la URL de la PUCESE ........................................... 4
Haciendo ping a la URL ................................................................................................................ 4
Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su emisin
hasta llegar a su computadora, con el botn TRACE. ................................................................. 5
TALLER 2: DATA WEB EXTRACTOR .................................................................................................. 5
Extrayendo las URL relacionadas ................................................................................................ 5
Obteniendo e-mail ...................................................................................................................... 6
Extrayendo contactos telefnicos ............................................................................................... 6
TALLER 3: GEO SPAIDER .................................................................................................................. 6
Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su emisin
hasta llegar a su computadora, con el botn TRACE. ................................................................. 6
Haciendo Ping a la IP 186.42.182.13 ........................................................................................... 7
Mapeo de las rutas de los servidores recorridos por los datos .................................................. 8
Obteniendo informacin ............................................................................................................. 8
TALLER 4: NEOTRACE PRO ............................................................................................................... 9
Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su emisin
hasta llegar a su computadora, con el botn TRACE. ................................................................. 9
Vista de los nodos recorridos de la informacin ....................................................................... 10
TALLER 5: WHEREISIP .................................................................................................................... 10
Informacin obtenida de los correos electrnicos y contactos del personal de la PUCESE ..... 11
SESIN 3 SCANNING.......................................................................................................................... 13
TALLER 1: ANGRYIP........................................................................................................................ 13
Proceso de instalacin............................................................................................................... 13
Iniciar fase de anlisis................................................................................................................ 15
TALLER 2: NMAP ............................................................................................................................ 17
2

Proceso de instalacin............................................................................................................... 17
Iniciar NMAP en Windows......................................................................................................... 19
Iniciar fase de anlisis................................................................................................................ 19
TALLER 3: NETSCANTOOLS PRO .................................................................................................... 21
Proceso de instalacin............................................................................................................... 21
Iniciar fase de analsis................................................................................................................. 25
TALLER 4: SUPERSCAN 4 ................................................................................................................ 26
Proceso de intalacion ................................................................................................................ 26
Iniciar fase de analisis................................................................................................................ 28
Consultar la nformacion requerida del sitio.............................................................................. 28
Iniciar el escaneo ....................................................................................................................... 28
Anlisis de resultados ................................................................................................................ 29
TALLER 5 : ESCANEO BSICO CON NMAP ..................................................................................... 29
SESIN 4 ANONIMATO...................................................................................................................... 43
TALLER 1: ANONIMATO NIVEL BSICO ......................................................................................... 43
Descargar la versin de Firefox de internet .............................................................................. 44
Buscar los plugins o firecats: ..................................................................................................... 46
Instalar los componentes al navegador .................................................................................... 46
Utilizar un servicio para obtener listas de proxys annimos y configurar dichos proxys en el
Foxyproxy .................................................................................................................................. 46
Realizar pruebas con diferentes proxys, mnimo 5 proxys de diferentes pases, verificando
conectividad y rapidez en el servicio......................................................................................... 48
Utilizar el servicio de email annimo y enviar un correo el resultado de las pruebas realizadas
con los proxys antes configurados. ........................................................................................... 50
Descargar la ltima versin de Tor (proyecto Tor) y realizar la instalacin en una memoria
usb, para tener un proxy live usb. ............................................................................................. 50

SESIN 2 FOOTPRINTING
TALLER 1: SAMSPADE
Instale la herramienta samspade contenidos en las herramientas de la plataforma y utilice la
aplicacin para inspeccionar el portal o URL de la PUCESE (http://www.pucese.edu.ec/)

Obteniendo el DNS o direccin IP a travs de la URL de la PUCESE

Haciendo ping a la URL

Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su
emisin hasta llegar a su computadora, con el botn TRACE.

TALLER 2: DATA WEB EXTRACTOR


Instale la herramienta Data Web Extractor, y utilizando una URL http://www.pucese.edu.ec/ y
extracte o recolecte de dicha URL (Los Email, telfonos y Nmeros de FAX del Portal).

Extrayendo las URL relacionadas

Obteniendo e-mail

Extrayendo contactos telefnicos

TALLER 3: GEO SPAIDER


Instale GEO SPIDER, en el campo URL coloque la URL que usted va a estudiar y navegue varias
caractersticas de la herramienta para su configuracin buscando identificar Ips, Trazo de rutas
etc.

Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su
emisin hasta llegar a su computadora, con el botn TRACE.

Haciendo Ping a la IP 186.42.182.13

Mapeo de las rutas de los servidores recorridos por los datos

Obteniendo informacin

TALLER 4: NEOTRACE PRO


Instale la herramienta NEOTRACE PRO contenidos en las herramientas de la plataforma, siga los
siguientes pasos.
Explore varias opciones del programa reuniendo informacin de pings, trazas entre otras.
Documente la informacin.

Obteniendo un grfico con la ruta de servidores recorridos por los datos, desde su
emisin hasta llegar a su computadora, con el botn TRACE.

Vista de los nodos recorridos de la informacin

TALLER 5: WHEREISIP
Instale la herramienta WhereIsIp y explore varias opciones de la herramienta y recolecte la mayor
cantidad de informacin posible de nombres de servidores, conexiones correos electrnicos y
dems datos encontrados.

10

Informacin obtenida de los correos electrnicos y contactos del personal de la


PUCESE
E-mail: pucese@pucese.net
Telfonos:2726613 / 2721459
Fax:2726509 ext. 114
CARGO
NOMBRE
EXT. E-MAIL
prorector@pucese.edu.ec
Pro-Rector
Lic. Aitor Urbina 102
prorector@pucese.net
Director Acadmico

Dr.
Walter
224
Mosquera

Directora de Bienestar
Estudiantil y Pastoral Lic. Lilian Vera
Universitaria

140

Director del Centro de Blgo. Eduardo


111
Investigacin
Rebolledo

diracademico@pucese.edu.ec
walter@pucese.net
lilian@pucese.net
dircid@pucese.edu.ec
erebolledo@pucese.net

Secretaria General

Ing.
Maritza
116
Demera

maritza@pucese.net

Bibliotecario

Soc.
Olaya

biblioteca@pucese.edu.ec
eolaya@pucese.net

Carlos

115

Directora
Ing.
Marjorie
Administrativa y de
220
Segovia
Recursos Humanos

diradministrativa@pucese.edu.ec
marjorie@pucese.net
11

Directora Financiera

Lic. Mara Elena


106
Vlez

dirfinanciero@pucese.edu.ec
elena@pucese.net

Tesorera

Lic. Ana Hidalgo 104

ana@pucese.net

Jefa de
Pblicas

Relaciones Ing.
Quintero

Directora de la Escuela
de Educacin Inicial
Directora de la Escuela
de Hotelera y Turismo

Lic.
Bernab
Ing.
Limones

Erika
Lliris

107

relpublicas@pucese.edu.ec
erika@pucese.net

222

diresceducacion@pucese.edu.ec
lbernabe@pucese.net

Katia 120

Director de la Escuela
de Contabilidad
y Ing. Orlin lava
Auditora

direscconta@pucese.edu.ec
124

Director de la Escuela Ing.


David
122
de Comercio Exterior Granados
Directora de la Escuela Eco.
de Pymes
Bentes

Roxana

143

Directora de la Escuela Lic.


Cristina
137
de Diseo Grfico
Marmolejo
Directora de la Escuela
Eco.
de Administracin de
Bentes
Empresas
Directora de la Escuela
de Administracin de
Empresas
Director de la Escuela
de Gestin Ambiental
Directora de la Escuela
de Enfermera
Directora de la Escuela
de Bioanlisis
Directora de la Escuela
de Bioanlisis
Director de la Escuela
de
Lingstica
Aplicada
Mencin
Enseanza en Ingls

Roxana

direschoteleria@pucese.edu.ec

143

Eco.
Roxana
143
Bentes
Blgo.
Pedro 310
Jimnez
Lic.
Mara 226
Teresa Torres
Lic.
Aracely 110
Chiln
Lic.
Aracely
Chiln
110
Lic.
Eduardo 222
Calahorrano

oalava@pucese.net
diresccomex@pucese.edu.ec
dgranados@pucese.net
dirpymes@pucese.net
dirdiseniog@pucese.edu.ec
cmarmolejo@pucese.net
direscadm@pucese.edu.ec
diradministracion@pucese.net
direscambiental@pucese.edu.ec
direscenfermeria@pucese.edu.ec
direscbioanalisis@pucese.edu.ec
achilan@pucese.net

ecalahorrano@pucese.net

12

Director de Posgrados
Jefe de Sistemas
Jefe de Sistemas
Responsable
CECAMECON
Responsable
CECAMECON
Responsable de
Incubadora
Empresas
Presidenta
de
Asociacin
Profesores
Presidenta
de
Federacin
Estudiantes
Presidenta
de
Asociacin
Trabajadores

Ing. Marco Polo 148


Silva

Lic.
Kleber
133
Posligua
Lic.
Kleber
Posligua
133
de
Ing.
Cristina 134
Mendoza
de
Ing.
Cristina
Mendoza
134
la
Dr.
Antonio 135
de
Pliz

dirpostgrado@pucese.edu.ec
msilva@pucese.net
dirsistemas@pucese.edu.ec
kleber@pucese.net
cecamecon@pucese.edu.ec
crismendozam@hotmail.com
apaliz@pucese.net

la
Ing.
Cecilia
de
127
Velasco

cvelasco@pucese.net

la
Srta.
de
Coronel

Karina

128

ana.coronel@pucese.edu.ec

la
Ing.
de
Orejuela

Nardy

105

activosfijos@pucese.edu.ec

Presidenta
de
la
Asociacin
de
Trabajadores
Departamento Mdico

Ing.
Nardy
Orejuela
105
Dra.
Maribel 131
Guerrn

nardy@pucese.net

Orientadora

Lic.
Gnova
138
Zambrano

gzambrano@pucese.edu.ec
gzambrano@pucese.net

medico@pucese.edu.ec
rguerron@pucese.net

SESIN 3 SCANNING
TALLER 1: ANGRYIP
Proceso de instalacin
Ejecutar el instalador de ANGRYIP de la seccin de herramientas del paquete de estudio:

13

Aceptar los trminos de la licencia y clic en SIGUIENTE:

14

Iniciar fase de anlisis


Establecer el rango de direcciones IP a escanear (186.42.182.13)

Iniciar el proceso de escaneo

Observar los resultados del escaneo

Observar los puertos abiertos y cerrados de los equipos en la red:

15

Exportamos los resultados del escner

Resumen del escner


Computers count=1
Computer number: 1
Name: no information
IP address: 186.42.182.13
Ports ( 67 scanned, 3 opened, 64 closed )
Port 21 - open
Port 25 - open
Port 110 - open

16

TALLER 2: NMAP
Proceso de instalacin

17

18

Iniciar NMAP en Windows


Ingresar a la consola de Windows

Ir a la ubicacin de la instalacin de NMAP

Ejecutar NMAP

Iniciar fase de anlisis


Ingresar el comando NMAP v A www.pucese.edu.ec

19

Anlisis de los resultados obtenidos de NMAP

Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 15:02 Hora est. del Pacco de SA
Initiating Ping Scan at 15:03
Scanning www.pucese.edu.ec (186.42.182.13) [4 ports]
Completed Ping Scan at 15:03, 0.08s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 15:03
Completed Parallel DNS resolution of 1 host. at 15:03, 3.00s elapsed
Initiating SYN Stealth Scan at 15:03
Scanning www.pucese.edu.ec (186.42.182.13) [1000 ports]
Discovered open port 995/tcp on 186.42.182.13
Discovered open port 443/tcp on 186.42.182.13
Discovered open port 25/tcp on 186.42.182.13
Discovered open port 80/tcp on 186.42.182.13
Discovered open port 22/tcp on 186.42.182.13
Discovered open port 993/tcp on 186.42.182.13
Discovered open port 143/tcp on 186.42.182.13
Discovered open port 587/tcp on 186.42.182.13
Discovered open port 110/tcp on 186.42.182.13
Discovered open port 465/tcp on 186.42.182.13
Discovered open port 10000/tcp on 186.42.182.13
Discovered open port 563/tcp on 186.42.182.13
Completed SYN Stealth Scan at 15:03, 7.22s elapsed (1000 total ports)
Nmap scan report for www.pucese.edu.ec (186.42.182.13)
Host is up (0.011s latency).
Not shown: 988 filtered ports

20

PORT

STATE SERVICE

22/tcp

open ssh

25/tcp

open smtp

80/tcp

open http

110/tcp open pop3


143/tcp

open imap

443/tcp open https


465/tcp open smtps
563/tcp open snews
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
10000/tcp open snet-sensor-mgmt

Read data files from: C:\Archivos de programa\WinPcap


Nmap done: 1 IP address (1 host up) scanned in 22.19 seconds
Raw packets sent: 1995 (87.744KB) | Rcvd: 302 (13.276KB)

TALLER 3: NETSCANTOOLS PRO


Proceso de instalacin

21

22

23

24

Iniciar fase de analsis


Escoger la opcin PORT SCANNER para iniciar el anlisis
Obtendremos la IP de la PUCESE ha travs de la consola de Windows

25

TALLER 4: SUPERSCAN 4
Proceso de intalacion

26

27

Iniciar fase de analisis


Introducir la IP del sitio www.pucese.edu.ec
Obtendremos la IP de la PUCESE ha travs de la consola de Windows

Consultar la nformacion requerida del sitio

Iniciar el escaneo

28

Anlisis de resultados

TALLER 5 : ESCANEO BSICO CON NMAP


Haremos un escaneo TCP tipos conect () que es un bsico no muy discreto ya que se logra con este
una conexin efectiva con el objetivo, lo realizaremos para determinar los puertos abiertos del
objetivo y los servicio
NMAP -sT 186.42.182.13 (Esta es la IP de la PUCESE):

Resultados

29

C:\Archivos de programa\WinPcap>nmap.exe -sT 186.42.182.13

Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 16:26 Hora est. del Pacic
o de SA
Stats: 0:00:46 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 75.15% done; ETC: 16:27 (0:00:14 remaining)
Stats: 0:00:50 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 84.55% done; ETC: 16:27 (0:00:09 remaining)
Stats: 0:00:57 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 99.15% done; ETC: 16:26 (0:00:00 remaining)
Nmap scan report for 186.42.182.13
Host is up (0.030s latency).
Not shown: 986 filtered ports
PORT

STATE SERVICE

21/tcp

open ftp

22/tcp

open ssh

25/tcp

open smtp

80/tcp

open http

110/tcp open pop3


119/tcp open nntp
143/tcp open imap
443/tcp open https
465/tcp open smtps
563/tcp open snews
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
10000/tcp open snet-sensor-mgmt

Nmap done: 1 IP address (1 host up) scanned in 59.14 seconds

30

Luego haremos un barrido en la red para conocer que otras mquinas tenemos al alcance,
tambin con nmap nuestra tool del momento.

Nmap sP 186.42.182.0/25 Teniendo en cuenta que la red es de tipo B tomaremos un bit ms de


la mscara para ver que maquinas tenemos en la red activas y en escucha con sus puertos.

Resultado:
Nmap scan report for 186.42.182.54
Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.54 are filtered
Nmap scan report for 186.42.182.55
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.55 are filtered

Nmap scan report for 186.42.182.56


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.56 are filtered

Nmap scan report for 186.42.182.57


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.57 are filtered

31

Nmap scan report for 186.42.182.58


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.58 are filtered

Nmap scan report for 186.42.182.59


Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.59 are filtered

Nmap scan report for 186.42.182.60


Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.60 are filtered

Nmap scan report for 186.42.182.61


Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.61 are filtered

Nmap scan report for 186.42.182.62


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.62 are filtered

Nmap scan report for 186.42.182.63


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.63 are filtered

Nmap scan report for 186.42.182.64


Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.64 are filtered

Nmap scan report for 186.42.182.65


Host is up (0.063s latency).

32

All 1000 scanned ports on 186.42.182.65 are filtered

Nmap scan report for 186.42.182.66


Host is up (0.063s latency).
All 1000 scanned ports on 186.42.182.66 are filtered

Nmap scan report for 186.42.182.67


Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.67 are filtered

Nmap scan report for 186.42.182.68


Host is up (0.062s latency).
All 1000 scanned ports on 186.42.182.68 are filtered

Nmap scan report for 186.42.182.69


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.69 are filtered

Nmap scan report for 186.42.182.70


Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.70 are filtered

Nmap scan report for 186.42.182.71


Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.71 are filtered

Nmap scan report for 186.42.182.72


Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.72 are filtered

33

Nmap scan report for 186.42.182.73


Host is up (0.015s latency).
All 1000 scanned ports on 186.42.182.73 are filtered

Nmap scan report for 186.42.182.74


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.74 are filtered

Nmap scan report for 186.42.182.75


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.75 are filtered

Nmap scan report for 186.42.182.76


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.76 are filtered

Nmap scan report for 186.42.182.77


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.77 are filtered

Nmap scan report for 186.42.182.78


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.78 are filtered

Nmap scan report for 186.42.182.79


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.79 are filtered

Nmap scan report for 186.42.182.80


Host is up (0.00s latency).

34

All 1000 scanned ports on 186.42.182.80 are filtered

Nmap scan report for 186.42.182.81


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.81 are filtered

Nmap scan report for 186.42.182.82


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.82 are filtered

Nmap scan report for 186.42.182.83


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.83 are filtered

Nmap scan report for 186.42.182.84


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.84 are filtered

Nmap scan report for 186.42.182.85


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.85 are filtered

Nmap scan report for 186.42.182.86


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.86 are filtered

Nmap scan report for 186.42.182.87


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.87 are filtered

35

Nmap scan report for 186.42.182.88


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.88 are filtered

Nmap scan report for 186.42.182.89


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.89 are filtered

Nmap scan report for 186.42.182.90


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.90 are filtered

Nmap scan report for 186.42.182.91


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.91 are filtered

Nmap scan report for 186.42.182.92


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.92 are filtered

Nmap scan report for 186.42.182.93


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.93 are filtered

Nmap scan report for 186.42.182.94


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.94 are filtered

Nmap scan report for 186.42.182.95


Host is up (0.00s latency).

36

All 1000 scanned ports on 186.42.182.95 are filtered

Nmap scan report for 186.42.182.96


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.96 are filtered

Nmap scan report for 186.42.182.97


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.97 are filtered

Nmap scan report for 186.42.182.98


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.98 are filtered

Nmap scan report for 186.42.182.99


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.99 are filtered

Nmap scan report for 186.42.182.100


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.100 are filtered

Nmap scan report for 186.42.182.101


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.101 are filtered

Nmap scan report for 186.42.182.102


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.102 are filtered

37

Nmap scan report for 186.42.182.103


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.103 are filtered

Nmap scan report for 186.42.182.104


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.104 are filtered

Nmap scan report for 186.42.182.105


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.105 are filtered

Nmap scan report for 186.42.182.106


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.106 are filtered

Nmap scan report for 186.42.182.107


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.107 are filtered

Nmap scan report for 186.42.182.108


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.108 are filtered

Nmap scan report for 186.42.182.109


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.109 are filtered

Nmap scan report for 186.42.182.110


Host is up (0.00s latency).

38

All 1000 scanned ports on 186.42.182.110 are filtered

Nmap scan report for 186.42.182.111


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.111 are filtered

Nmap scan report for 186.42.182.112


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.112 are filtered

Nmap scan report for 186.42.182.113


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.113 are filtered

Nmap scan report for 186.42.182.114


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.114 are filtered

Nmap scan report for 186.42.182.115


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.115 are filtered

Nmap scan report for 186.42.182.116


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.116 are filtered

Nmap scan report for 186.42.182.117


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.117 are filtered

39

Nmap scan report for 186.42.182.118


Host is up (0.016s latency).
All 1000 scanned ports on 186.42.182.118 are filtered

Nmap scan report for 186.42.182.119


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.119 are filtered

Nmap scan report for 186.42.182.120


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.120 are filtered

Nmap scan report for 186.42.182.121


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.121 are filtered

Nmap scan report for 186.42.182.122


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.122 are filtered

Nmap scan report for 186.42.182.123


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.123 are filtered

Nmap scan report for 186.42.182.124


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.124 are filtered

Nmap scan report for 186.42.182.125


Host is up (0.00s latency).

40

All 1000 scanned ports on 186.42.182.125 are filtered

Nmap scan report for 186.42.182.126


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.126 are filtered

Nmap scan report for 186.42.182.127


Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.127 are filtered

Nmap done: 128 IP addresses (128 hosts up) scanned in 205.50 seconds

Ahora que hemos determinado nuestro objetivo necesitamos conocer que sistema operativo tiene
para poder llegar al servidor y no de pronto a un cliente por que el objetivo es la informacin del
sistema central. NMAP nos contina ayudando en este trabajo as:
NMAP O 186.42.182.13 escner nivel de TCP

Adems de conocer a nivel de TCP que puertos estn en escucha, recordemos que tambin
podremos realizar ataque de tipo DoS sobre la capa de transporte en el protocolo UDP, para esto
debemos conocer que puertos estn a la escucha en el objetivo, as:
NMAP sU 186.42.182.13

41

Resultado:
C:\Archivos de programa\WinPcap>nmap.exe -sU 186.42.182.13
Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 16:46 Hora est. del Pacic
o de SA
Nmap scan report for 186.42.182.13
Host is up (0.00s latency).
All 1000 scanned ports on 186.42.182.13 are open|filtered
Nmap done: 1 IP address (1 host up) scanned in 7.49 seconds

Si ya contamos con los puertos, las direcciones MAC, los servicios, el sistema operativo que
funciona y sus datos, otro aspecto importante es las versiones de los servicios, con estas
podremos determinar ms adelante que posibles exploit o tolos tendremos que usar y que tipo de
tcnica de penetracin usar para lograr al momento del acceso estar dentro de la maquina
objetivo. Seguimos usando NMAP para nuestras tareas.

Nmap sV 186.42.182.13 nos permitir verificar servicios y sus versiones.

Resultado:

42

C:\Archivos de programa\WinPcap>nmap.exe -sV 186.42.182.13


Starting Nmap 5.21 ( http://nmap.org ) at 2014-01-23 16:49 Hora est. del Pacic
o de SA
Stats: 0:00:18 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 0.00% done
Stats: 0:00:21 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 0.00% done
Stats: 0:00:22 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 0.00% done
Stats: 0:00:23 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 0.00% done
Nmap scan report for 186.42.182.13
Host is up (0.013s latency).
Not shown: 987 filtered ports
PORT
STATE SERVICE
VERSION
22/tcp open ssh?
25/tcp open smtp?
80/tcp open http?
110/tcp open pop3?
119/tcp open nntp?
143/tcp open imap?
443/tcp open https?
465/tcp open smtps?
563/tcp open snews?
587/tcp open submission?
993/tcp open imaps?
995/tcp open pop3s?
10000/tcp open snet-sensor-mgmt?
Service detection performed. Please report any incorrect results at http://nmap.
org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 37.94 seconds
C:\Archivos de programa\WinPcap>

SESIN 4 ANONIMATO
TALLER 1: ANONIMATO NIVEL BSICO
Se har uso de Firefox para esta actividad

43

Descargar la versin de Firefox de internet


Proceso de descarga

44

Proceso de instalacin

45

Buscar los plugins o firecats:


Show IP

Foxyproxy

Instalar los componentes al navegador

Utilizar un servicio para obtener listas de proxys annimos y configurar dichos proxys
en el Foxyproxy

46

47

Realizar pruebas con diferentes proxys, mnimo 5 proxys de diferentes pases,


verificando conectividad y rapidez en el servicio

48

49

Utilizar el servicio de email annimo y enviar un correo el resultado de las pruebas


realizadas con los proxys antes configurados.

El cdigo fuente y la informacin del mensaje denotan que el servidor proxy funciono como se
esperaba.

Descargar la ltima versin de Tor (proyecto Tor) y realizar la instalacin en una


memoria usb, para tener un proxy live usb.

50

Iniciar Tor Browser

51

Anda mungkin juga menyukai