HTTP ATTACK
#41
Aku scan2 webistenya kok cuma keluar kayak gini ya hasilnya :

Code:
nc -vv target.com 80
DNS fwd/rev mismatch: target.com != iix2-1.ssol.com
smantiara.sch.id [103.247.8.5] 80 (http) open
sent 0, rcvd 0

#42
(09-13-2013, 02:37 PM)Doel Wrote: Aku scan2 webistenya kok cuma keluar kayak gini ya hasilnya :

Code:
nc -vv target.com 80
DNS fwd/rev mismatch: target.com != iix2-1.ssol.com
smantiara.sch.id [103.247.8.5] 80 (http) open
sent 0, rcvd 0

bisa jadi cuman port 80 aja yang dibuka bro. Big Grin nc emang kurang efektif buat port scanning. nc hanya menggunakan metode connection established saat connect. coba pake nmap aja.

(08-19-2013, 07:08 PM)M1+5C Wrote: thx udah share om, udah ane coba, jadinya gini

Code:
root@m1+5c:~# nc -vv xxx.xxx.xxx.xxx 80
xxx.xxx.xxx.xxx: inverse host lookup failed: Unknown server error : Connection timed out
(UNKNOWN) [xxx.xxx.xxx.xxx] 80 (www) open
OPTIONS / HTTP/1.1
Host: xxx.xxx.xxx.xxx

HTTP/1.1 200 OK
Date: Mon, 19 Aug 2013 10:41:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
MS-Author-Via: DAV
Content-Length: 0
Accept-Ranges: none
DASL: <DAV:sql>
DAV: 1, 2
Public: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH
Allow: OPTIONS, TRACE, GET, HEAD, COPY, PROPFIND, SEARCH, LOCK, UNLOCK
Cache-Control: private

trus ane coba PUT, gini hasilnya nya
Code:
root@m1+5c:~# nc -vv xxx.xxx.xxx.xxx 80
xxx.xxx.xxx.xxx: inverse host lookup failed: Unknown server error : Connection timed out
(UNKNOWN) [xxx.xxx.xxx.xxx] 80 (www) open
PUT /test.txt HTTP/1.1
Host: xxx.xxx.xxx.xxx
Content-Length: 10
xxxxxxxxxx  
HTTP/1.1 400 Bad Request
Content-Type: text/html
Date: Mon, 19 Aug 2013 11:00:38 GMT
Connection: close
Content-Length: 42

<h1>Bad Request (Invalid Header Name)</h1> sent 74, rcvd 171

itu, apanya yang salah om?trus, gimana caranya kita mengetahui direktory tersebut permission 777 atau tidak?

bisa jadi metode PUT di-disable oleh webserver Big Grin

(07-03-2013, 12:03 PM)afrihhilal Wrote: om... ane mau tanya nih..
kan ane abis scan target pake nmap..
lah ntu ada keluaranya kek gini..
Code:
nmap -Pn --script=vuln -T3 xxx.xxx.xxx.xxx

Starting Nmap 6.25 (  ) at 2013-07-01 23:10 WIT
Nmap scan report for xxx.xxx.xxx.xxx
Host is up (1.4s latency).
Not shown: 935 filtered ports, 59 closed ports
PORT     STATE SERVICE
21/tcp   open  ftp
80/tcp   open  http
|_http-frontpage-login: false
222/tcp  open  rsh-spx
8000/tcp open  http-alt
|_http-frontpage-login: false
|_http-git: 0
|_http-huawei-hg5xx-vuln: false
| http-litespeed-sourcecode-download:
| Litespeed Web Server Source Code Disclosure (CVE-2010-2333)
| /index.php source code:
| <HTML><HEAD><TITLE>SHOUTcast Server</TITLE></HEAD><BODY><H3>Invalid resource</H3>
|_</BODY></HTML>
|_http-majordomo2-dir-traversal: ERROR: Script execution failed (use -d to debug)
[color=#FFD700]| http-method-tamper:
|   VULNERABLE:
|   Authentication bypass by HTTP verb tampering
|     State: VULNERABLE (Exploitable)
|     Description:
|       This web server contains password protected resources vulnerable to authentication bypass
|       vulnerabilities via HTTP verb tampering. This is often found in web servers that only limit access to the
|        common HTTP methods and in misconfigured .htaccess files.
|              
|     Extra information:
|      
|   URIs suspected to be vulnerable to HTTP verb tampering:
|     /admin.cgi [HEAD]
|  
|     References:
|       https://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008%29
|       /resources/glossary/http_verb_tampering.html
|       /data/definitions/274.html
|_      /labs/htexploit/[/color]
[color=#FFD700]| http-slowloris-check:
|   VULNERABLE:
|   Slowloris DOS attack
|     State: VULNERABLE
|     Description:
|       Slowloris tries to keep many connections to the target web server open and hold them open as long as possible.
|       It accomplishes this by opening connections to the target web server and sending a partial request. By doing
|       so, it starves the http server's resources causing Denial Of Service.
|               
|     Disclosure date: 2009-09-17
|     References:
|_      /slowloris/[/color]
|_http-vuln-cve2010-0738: false
8001/tcp open  vcom-tunnel
8080/tcp open  http-proxy
| http-enum:
|_  /phpmyadmin/: phpMyAdmin
|_http-frontpage-login: false
| http-vuln-cve2011-3192:
|   VULNERABLE:
|   Apache byterange filter DoS
|     State: VULNERABLE
|     IDs:  CVE:CVE-2011-3192  OSVDB:74721
|     Description:
|       The Apache web server is vulnerable to a denial of service attack when numerous
|       overlapping byte ranges are requested.
|     Disclosure date: 2011-08-19
|     References:
|       /cgi-bin/cvename.cgi?name=CVE-2011-3192
|       /74721
|       /plugins/index.php?view=single&id=55976
|_      /fulldisclosure/2011/Aug/175
| http-vuln-cve2011-3368:
|_  ERROR: Got no answers from pipelined queries

Host script results:
|_firewall-bypass: false
nah ntu exploitnya gimana om?? kan ada yang vulnerable tuh...
bantuin dong om... :-bd

kemungkinan webserver masih vulverable dengan serangan tamper data (mengubah request) kita ke webserver dengan abritary request Big Grin

#43
(09-13-2013, 03:37 PM)alkaaf Wrote:
(08-19-2013, 07:08 PM)M1+5C Wrote: thx udah share om, udah ane coba, jadinya gini

Code:
root@m1+5c:~# nc -vv xxx.xxx.xxx.xxx 80
xxx.xxx.xxx.xxx: inverse host lookup failed: Unknown server error : Connection timed out
(UNKNOWN) [xxx.xxx.xxx.xxx] 80 (www) open
OPTIONS / HTTP/1.1
Host: xxx.xxx.xxx.xxx

HTTP/1.1 200 OK
Date: Mon, 19 Aug 2013 10:41:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
MS-Author-Via: DAV
Content-Length: 0
Accept-Ranges: none
DASL: <DAV:sql>
DAV: 1, 2
Public: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH
Allow: OPTIONS, TRACE, GET, HEAD, COPY, PROPFIND, SEARCH, LOCK, UNLOCK
Cache-Control: private

trus ane coba PUT, gini hasilnya nya
Code:
root@m1+5c:~# nc -vv xxx.xxx.xxx.xxx 80
xxx.xxx.xxx.xxx: inverse host lookup failed: Unknown server error : Connection timed out
(UNKNOWN) [xxx.xxx.xxx.xxx] 80 (www) open
PUT /test.txt HTTP/1.1
Host: xxx.xxx.xxx.xxx
Content-Length: 10
xxxxxxxxxx  
HTTP/1.1 400 Bad Request
Content-Type: text/html
Date: Mon, 19 Aug 2013 11:00:38 GMT
Connection: close
Content-Length: 42

<h1>Bad Request (Invalid Header Name)</h1> sent 74, rcvd 171

itu, apanya yang salah om?trus, gimana caranya kita mengetahui direktory tersebut permission 777 atau tidak?

bisa jadi metode PUT di-disable oleh webserver Big Grin


ternyata 411 method PUT nya, dan ane ngak tau arti 411 =))
Code:
nmap --script=http-methods.nse --script-args http-methods.retest=1 xxx.xxx.xxx

Starting Nmap 6.25 ( http://nmap.org ) at 2013-10-06 23:02 WIT
Nmap scan report for xxx.xxx.xxx
Host is up (0.090s latency).
Not shown: 997 filtered ports
PORT     STATE SERVICE
21/tcp   open  ftp
80/tcp   open  http
| http-methods: OPTIONS TRACE GET HEAD COPY PROPFIND SEARCH LOCK UNLOCK DELETE PUT POST MOVE MKCOL PROPPATCH
| Potentially risky methods: TRACE COPY PROPFIND SEARCH LOCK UNLOCK DELETE PUT MOVE MKCOL PROPPATCH
| See http://nmap.org/nsedoc/scripts/http-methods.html
| OPTIONS / -> HTTP/1.1 200 OK
|
| TRACE / -> HTTP/1.1 501 Not Implemented
|
| GET / -> HTTP/1.1 200 OK
|
| HEAD / -> HTTP/1.1 200 OK
|
| COPY / -> HTTP/1.1 400 Bad Request
|
| PROPFIND / -> HTTP/1.1 411 Length Required
|
| SEARCH / -> HTTP/1.1 411 Length Required
|
| LOCK / -> HTTP/1.1 403 Forbidden
|
| UNLOCK / -> HTTP/1.1 400 Bad Request
|
| DELETE / -> HTTP/1.1 403 Forbidden
|
| PUT / -> HTTP/1.1 411 Length Required
|
| POST / -> HTTP/1.1 405 Method Not Allowed
|
| MOVE / -> HTTP/1.1 403 Forbidden
|
| MKCOL / -> HTTP/1.1 403 Forbidden
|
|_PROPPATCH / -> HTTP/1.1 403 Forbidden
3389/tcp open  ms-wbt-server

Nmap done: 1 IP address (1 host up) scanned in 17.83 seconds

Confused:- Confused:-






Users browsing this thread: 1 Guest(s)