测试目标
目标
利用漏洞扫描工具,通过对系统进行非破坏性的模拟黑客攻击。尝试发掘漏洞风险,侵入系统并获取敏感信息。
对象
| 序号 | IP | 时间 | 测试方式 | 备注 |
|---|---|---|---|---|
| 1 | 内网 | 2019/7/24 | 在线 | 多源网站 |
测试过程
非授权测试
信息搜集
nmap探测探测发现ssh服务为默认22port,JBoss server 10服务端口1112,Jserv v1.3服务端口8009,http-proxy服务端口8080
PORT STATE SERVICE VERSION22/tcp open ssh OpenSSH 7.4 (protocol 2.0)| ssh-hostkey:| 2048 cb:13:da:39:0d:ea:8d:9e:80:9e:b9:80:1f:1e:85:1b (RSA)| 256 a9:ba:47:8d:6f:6c:6e:b4:c8:21:27:23:28:f9:4e:35 (ECDSA)|_ 256 3a:91:30:61:bc:6d:27:ad:44:54:3e:50:99:cd:fe:e1 (ED25519)1112/tcp open http JBoss WildFly Application Server 10| http-methods:| Supported Methods: GET HEAD POST PUT DELETE TRACE OPTIONS|_ Potentially risky methods: PUT DELETE TRACE|_http-server-header: WildFly/10|_http-title: Site doesn't have a title (text/html).8009/tcp open ajp13 Apache Jserv (Protocol v1.3)| ajp-methods:| Supported methods: GET,HEAD,OPTIONS| Potentially risky methods: GET,HEAD,OPTIONS|_ See https://nmap.org/nsedoc/scripts/ajp-methods.html8080/tcp open http-proxy| fingerprint-strings:| GetRequest:| HTTP/1.1 200| Last-Modified: Mon, 22 Jul 2019 09:58:06 GMT| Accept-Ranges: bytes| Content-Type: text/html| Content-Length: 2273| Date: Wed, 24 Jul 2019 03:46:37 GMT| Connection: close
用nikto扫描对应port的漏洞
nikto -h 10.15.3.3 -p 1112 8009 8080 -o result.html
扫描报告result.txt
结论
The anti-clickjacking X-Frame-Options header is not present #点击劫持漏洞,篡改页面后通过透明iframe页面重定向客户端访问The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS##加载脚本提示的请求头未定义,容易使客户端遭受XSS攻击The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type##未设置X-Content-Type-Options标头。某些浏览器会启用MIME-sniffing来猜测该资源的类型,解析内容并执行。HTTP method ('Allow' Header): 'PUT' method could allow clients to save files on the web server. #允许客户端通过PUT存放文件到server##允许了所有的http方法,容易造成put,delete请求被利用,对站点进行文件的上传与删除ssh服务为默认的22端口,建议调整为非常用端口jboos server服务版本可被探测,建议添加配置为不可探测
授权测试
Cybot 系统漏扫
扫描报告executive_summary+(1).pdf
结论
| CVE 代码 | 说明 | 建议补救方式 |
|---|---|---|
| CVE-2018-12384 | When handling a SSLv2-compatible ClientHello request, the server doesn’t generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3. | https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-12384 |
参考
jboss CVE
一些安全相关的http请求头链接
https://imququ.com/post/web-security-and-response-header.html
