Unconfigured Ad Widget

Collapse

Anúncio

Collapse
No announcement yet.

Login Admin

Collapse
X
 
  • Filter
  • Tempo
  • Show
Clear All
new posts

  • Font Size
    #1

    Login Admin

    Olha eu estou tentando invadir um site para aprendizado só que, tentei por strings nao deu certo,
    ai achei a pagina admin, só que estou precisando do login, dei uma procurada uma vez no Registro Br WhoIs. e encontrei algumas informações:

    domínio: xxxxxxxxxxxxxxxxx
    entidade: Fulano Oliveira.
    documento: 123.625.983-39
    país: BR
    ID entidade: Fulano57
    ID admin: Fulano57
    ID técnico: Fulano57
    ID cobrança: Fulano57
    servidor DNS: ns1.maxihost.com.br
    status DNS: 26/04/2011 AA
    último AA: 26/04/2011
    servidor DNS: ns2.maxihost.com.br
    status DNS: 26/04/2011 AA
    último AA: 26/04/2011
    criado: 16/06/2009 #5670729
    expiração: 16/06/2011
    alterado: 23/04/2010
    provedor: UOLHOST (22)
    status: publicado



    Ai fiquei confuso... esse id admin no qual corresponde a fulano... seria o login?
    Após conseguir o login seria bom usar brute force?

    Sou meio novo na área entao, nao liguem pras nubices...

    Desde já grato.

  • Font Size
    #2
    Olá, você encontrou alguma vulnerabilidade no site em questão para poder explorar e assim obter o login e senha?
    Last edited by John; 28-04-2011, 22:02.

    Comment


    • Font Size
      #3
      Olha cara como eu sou novo, nao entendo muito disso, vou postar aqui o que eu encontrei com o acunetix.

      Server banner Apache
      Operating system Unknown
      Web server Apache
      Technologies PHP
      Open ports 21/ftp, 25/smtp, 53/domain, 80/http, 110/pop3, 143/imap, 443/https, 465/smtps, 587/submission, 993/imaps, 995/pop3s, 3306/mysql, 5432/postgres, 8009/ajp13, 8080/http-proxy, 9102/jetdirect
      Acunetix Threat Level 3
      One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these vulnerabilities and compromise the backend database and/or deface your website.

      Alerts Found
      Total alerts found 153
      High 22
      Medium 0
      Low 120
      Informational 11
      Foi encontrado 3 tipos de alerta do tipo High

      SSL 2.0 deprecated protocol
      SSL certificate invalid date
      POP3 weak password

      Vou postar o que dizia em 2 deles:

      SSL 2.0 deprecated protocol

      Vulnerability description
      The remote service encrypts traffic using an old deprecated protocol with known weaknesses.
      This vulnerability affects Server.
      The impact of this vulnerability
      An attacker may be able to exploit these issues to conduct man-in-the-middle attacks or decrypt communications between the affected service and clients.

      Attack details

      The SSL server (port: 443) encrypts traffic using an old deprecated protocol (SSL 2.0) with known weaknesses.
      O que mais me chamou atenção foi esse POP3 weak password, foi achado 20 dele mas só vou postar 1 porque tudo fala a mesma coisa...

      POP3 weak password
      Vulnerability description
      The POP3 server is using a weak password. Acunetix WVS was able to guess the credentials required to access this resource.
      A weak password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common variations on these themes.
      This vulnerability affects Server.
      The impact of this vulnerability
      An attacker may access the contents of the password-protected resource.

      Attack details
      Username: root, Password: toor

      How to fix this vulnerability
      Enforce a strong password policy. Don't permit weak passwords or passwords based on dictionary words.

      Teve alguns também de nivel Low

      User credentials are sent in clear text
      Vulnerability description
      User credentials are not encrypted when they are transmitted

      The impact of this vulnerability
      A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection.

      How to fix this vulnerability
      Because user credentials usually are considered sensitive information, it is recommended to be sent to the server over an encrypted connection.
      E mais isso daqui que achei interessante, como sou iniciante tava lendo um livro e vi sobre Get or Post, deu isso tbm no acunetix com uma lista de sites embaixo.

      List of files with inputs
      Description
      These files have at least one input (GET or POST).
      Por fim + essa nao sei se é importante mais ta ae.

      List of client scripts
      Description
      These files contain Javascript code referenced from the website.

      Obrigado por se disponibilizar a me ajudar.

      Comment


      • Font Size
        #4
        Olha cara como eu sou novo, nao entendo muito disso, vou postar aqui o que eu encontrei com o acunetix.

        Server banner Apache
        Operating system Unknown
        Web server Apache
        Technologies PHP
        Open ports 21/ftp, 25/smtp, 53/domain, 80/http, 110/pop3, 143/imap, 443/https, 465/smtps, 587/submission, 993/imaps, 995/pop3s, 3306/mysql, 5432/postgres, 8009/ajp13, 8080/http-proxy, 9102/jetdirect
        Acunetix Threat Level 3
        One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these vulnerabilities and compromise the backend database and/or deface your website.

        Alerts Found
        Total alerts found 153
        High 22
        Medium 0
        Low 120
        Informational 11
        Foi encontrado 3 tipos de alerta do tipo High

        SSL 2.0 deprecated protocol
        SSL certificate invalid date
        POP3 weak password

        Vou postar o que dizia em 2 deles:

        SSL 2.0 deprecated protocol

        Vulnerability description
        The remote service encrypts traffic using an old deprecated protocol with known weaknesses.
        This vulnerability affects Server.
        The impact of this vulnerability
        An attacker may be able to exploit these issues to conduct man-in-the-middle attacks or decrypt communications between the affected service and clients.

        Attack details

        The SSL server (port: 443) encrypts traffic using an old deprecated protocol (SSL 2.0) with known weaknesses.
        O que mais me chamou atenção foi esse POP3 weak password, foi achado 20 dele mas só vou postar 1 porque tudo fala a mesma coisa...

        POP3 weak password
        Vulnerability description
        The POP3 server is using a weak password. Acunetix WVS was able to guess the credentials required to access this resource.
        A weak password is short, common, a system default, or something that could be rapidly guessed by executing a brute force attack using a subset of all possible passwords, such as words in the dictionary, proper names, words based on the user name or common variations on these themes.
        This vulnerability affects Server.
        The impact of this vulnerability
        An attacker may access the contents of the password-protected resource.

        Attack details
        Username: root, Password: toor

        How to fix this vulnerability
        Enforce a strong password policy. Don't permit weak passwords or passwords based on dictionary words.

        Teve alguns também de nivel Low

        User credentials are sent in clear text
        Vulnerability description
        User credentials are not encrypted when they are transmitted

        The impact of this vulnerability
        A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection.

        How to fix this vulnerability
        Because user credentials usually are considered sensitive information, it is recommended to be sent to the server over an encrypted connection.
        E mais isso daqui que achei interessante, como sou iniciante tava lendo um livro e vi sobre Get or Post, deu isso tbm no acunetix com uma lista de sites embaixo.

        List of files with inputs
        Description
        These files have at least one input (GET or POST).
        Por fim + essa nao sei se é importante mais ta ae.

        List of client scripts
        Description
        These files contain Javascript code referenced from the website.

        Comment

        X
        Working...
        X