测试目标
目标
利用漏洞扫描工具,通过对系统进行非破坏性的模拟黑客攻击。尝试发掘漏洞风险,侵入系统并获取敏感信息。
对象
序号 | IP | 时间 | 测试方式 | 备注 |
---|---|---|---|---|
1 | 内网 | 2019/7/24 | 在线 | 多源网站 |
测试过程
非授权测试
信息搜集
nmap探测探测发现ssh服务为默认22port,JBoss server 10服务端口1112,Jserv v1.3服务端口8009,http-proxy服务端口8080
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey:
| 2048 cb:13:da:39:0d:ea:8d:9e:80:9e:b9:80:1f:1e:85:1b (RSA)
| 256 a9:ba:47:8d:6f:6c:6e:b4:c8:21:27:23:28:f9:4e:35 (ECDSA)
|_ 256 3a:91:30:61:bc:6d:27:ad:44:54:3e:50:99:cd:fe:e1 (ED25519)
1112/tcp open http JBoss WildFly Application Server 10
| http-methods:
| Supported Methods: GET HEAD POST PUT DELETE TRACE OPTIONS
|_ Potentially risky methods: PUT DELETE TRACE
|_http-server-header: WildFly/10
|_http-title: Site doesn't have a title (text/html).
8009/tcp open ajp13 Apache Jserv (Protocol v1.3)
| ajp-methods:
| Supported methods: GET,HEAD,OPTIONS
| Potentially risky methods: GET,HEAD,OPTIONS
|_ See https://nmap.org/nsedoc/scripts/ajp-methods.html
8080/tcp open http-proxy
| fingerprint-strings:
| GetRequest:
| HTTP/1.1 200
| Last-Modified: Mon, 22 Jul 2019 09:58:06 GMT
| Accept-Ranges: bytes
| Content-Type: text/html
| Content-Length: 2273
| Date: Wed, 24 Jul 2019 03:46:37 GMT
| Connection: close
用nikto扫描对应port的漏洞
nikto -h 10.15.3.3 -p 1112 8009 8080 -o result.html
扫描报告result.txt
结论
The anti-clickjacking X-Frame-Options header is not present #点击劫持漏洞,篡改页面后通过透明iframe页面重定向客户端访问
The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
##加载脚本提示的请求头未定义,容易使客户端遭受XSS攻击
The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
##未设置X-Content-Type-Options标头。某些浏览器会启用MIME-sniffing来猜测该资源的类型,解析内容并执行。
HTTP method ('Allow' Header): 'PUT' method could allow clients to save files on the web server. #允许客户端通过PUT存放文件到server
##允许了所有的http方法,容易造成put,delete请求被利用,对站点进行文件的上传与删除
ssh服务为默认的22端口,建议调整为非常用端口
jboos server服务版本可被探测,建议添加配置为不可探测
授权测试
Cybot 系统漏扫
扫描报告executive_summary+(1).pdf
结论
CVE 代码 | 说明 | 建议补救方式 |
---|---|---|
CVE-2018-12384 | When handling a SSLv2-compatible ClientHello request, the server doesn’t generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3. | https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-12384 |
参考
jboss CVE
一些安全相关的http请求头链接
https://imququ.com/post/web-security-and-response-header.html