# Практика №2. Сканирование корпоративной инфраструктуры ### Выпонил: Кудряшов Даниил БСБО-07-20 ## Задание к практической работе №2 **1) Подготовить стенд для выполнения практической работы:** - Установлена Kali Linux не старше 2021 года - Установлены сетевые сканеры Nmap и Nessus - Установлены сетевые утилиты для OSINT [Подготовка стенда](https://www.notion.so/b1cc42ab789c408eac298ca8194839d2) **2) Провести поиск по открытым источникам - [Mirea.tech](https://www.Mirea.tech); [Ptlab.ru](https://www.Ptlab.ru). В отчет включить:** - Сотрудников организации, их должность, email адреса, телефоны (в том числе рабочие и личные), социальные сети. - Сайты организаций, IP адреса, доменные имена, поддомены, DNS записи - Результаты сканирования всех IP адресов организации, в том числе с использованием Nessus [Nmap - manuals](https://www.notion.so/Nmap-manuals-e187b8a0be564ded884c1df002851ea8) [Установка Nessus](https://www.notion.so/Nessus-4d24a96049a84c98b5f7d18e58dcdf1b) - Возможную организационную структуру организации и лиц принимающих решение - Оборудование, которое используется в организации ## Выполнение работы Данная работа предусматривает разведку, посредством открытых источников. Для это мы будем использовать виртальную машину с OC Kali Linux так как это предусматривает задание к практической работе а также В силу удобства данной ОС для подобных задач. ![](https://i.imgur.com/eJCPNyW.png) Далее установим необхдимые обновления. ``` sudo apt update -y && sudo apt upgrade -y ``` Команда "sudo apt update" обновляет список пакетов, доступных для установки, а команда "sudo apt upgrade" обновляет установленные пакеты до последней доступной версии. ### Установка Nessus Для установки Nessus перейдём на оффициальный сайт и после регистрации получим доступ к скачиванию ПО. ``` curl --request GET \ --url 'https://www.tenable.com/downloads/api/v2/pages/nessus/files/Nessus-10.5.1-debian10_amd64.deb' \ --output 'Nessus-10.5.1-debian10_amd64.deb' ``` ``` sudo dpkg -i Nessus-10.1.1-debian6_amd64.deb ``` Скачаем и установим Nessus Далее произведём запуск ПО ``` /bin/systemctl start nessusd.service ``` После регистрации, загрузки необходимых компонентов и их компиляции программа будет готова к работе. ### Mirea.tech WHOIS - это протокол сетевого уровня, используемый для получения информации о зарегистрированных доменных именах, IP-адресах и других ресурсах в сети Интернет. При запросе WHOIS, клиент отправляет запрос на WHOIS-сервер, который содержит информацию о доменном имени или IP-адресе. Эта информация может включать владельца домена, контактные данные, дату регистрации и определенные технические параметры. Воспользуемся им. ``` ┌──(kali㉿kali)-[~] └─$ whois mirea.tech Domain Name: MIREA.TECH Registry Domain ID: D211589418-CNIC Registrar WHOIS Server: whois.reg.ru Registrar URL: https://www.reg.ru/ Updated Date: 2022-11-12T06:27:03.0Z Creation Date: 2020-11-30T20:53:37.0Z Registry Expiry Date: 2023-11-30T23:59:59.0Z Registrar: Registrar of Domain Names REG.RU, LLC Registrar IANA ID: 1606 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Registrant Organization: Registrant State/Province: BASHKORTOSTAN Registrant Country: RU Registrant Phone: +7.9174141521 Registrant Email: sadykovildar@mail.ru Admin Phone: +7.9174141521 Admin Email: sadykovildar@mail.ru Tech Phone: +7.9174141521 Tech Email: sadykovildar@mail.ru Name Server: NS1.REG.RU Name Server: NS2.REG.RU DNSSEC: unsigned Billing Phone: +7.9174141521 Billing Email: sadykovildar@mail.ru Registrar Abuse Contact Email: abuse@reg.ru Registrar Abuse Contact Phone: +7.4955801111 ``` ![](https://i.imgur.com/urvEzx7.png) ![](https://i.imgur.com/5nvWZym.png) ![](https://i.imgur.com/LMRF7Bk.png) Закрываем глаза на огромное кол-во общих друзей, и пытаемся получить информацию из закрытого профиля. https://www.researchgate.net/profile/Ildar-Sadykov-2 ![](https://i.imgur.com/XKIRz5s.png) По итогу, имеем совпадение с изначальным доменом. ![](https://i.imgur.com/ULrjkGv.png) [А также фотографии на сайте, где указана должность "Старший преподаватель КБ-4 ИКБСП РТУ МИРЭА" - Mirea](https://www.tadviser.ru/index.php/%D0%9F%D0%B5%D1%80%D1%81%D0%BE%D0%BD%D0%B0:%D0%A1%D0%B0%D0%B4%D1%8B%D0%BA%D0%BE%D0%B2_%D0%98%D0%BB%D1%8C%D0%B4%D0%B0%D1%80) ![](https://i.imgur.com/He5Ar0G.png) Далее, начнём изучение саб-доменов. ![](https://i.imgur.com/LWtPZuX.png) ![](https://i.imgur.com/u6U5mAf.png) ``` ┌──(kali㉿kali)-[~/Documents] └─$ whois 85.142.160.226 % This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See http://www.ripe.net/db/support/db-terms-conditions.pdf % Note: this output has been filtered. % To receive output for a database update, use the "-B" flag. % Information related to '85.142.160.0 - 85.142.161.255' % Abuse contact for '85.142.160.0 - 85.142.161.255' is 'noc@mirea.ru' inetnum: 85.142.160.0 - 85.142.161.255 netname: MIREA-2-NET descr: Moscow State Institute for RadioEngeeniring, Electronics and descr: Moscow, Russia descr: pr-t Vernadskogo, 78 country: RU org: ORG-MIRE1-RIPE admin-c: DM9397-RIPE tech-c: MMSI2-RIPE status: ASSIGNED PA mnt-by: INFR-MNT created: 2018-08-08T10:15:00Z last-modified: 2022-11-14T09:42:40Z source: RIPE # Filtered organisation: ORG-MIRE1-RIPE org-name: State Educational Institution of Higher Professional Education "Moscow State Institute of a Radio engineering, Electronics and Automatics" (MIREA) country: RU org-type: OTHER address: MIREA address: Vernadskogo 78 address: 119454 address: Moscow address: Russian Federation phone: +7 499 7399505 phone: +7 495 9874717 admin-c: DM9397-RIPE tech-c: MMSI2-RIPE abuse-c: MMSI2-RIPE mnt-ref: INFR-MNT mnt-ref: MIREA-MNT mnt-by: INFR-MNT mnt-by: MIREA-MNT created: 2018-08-08T10:10:07Z last-modified: 2022-12-01T16:37:18Z source: RIPE # Filtered role: MIREA NOC org: ORG-MIRE1-RIPE address: RTU MIREA address: Vernadskogo, 78 address: 119454 address: Moscow address: Russian Federation phone: +7 499 7399505 phone: +7 495 9874717 admin-c: DM9397-RIPE tech-c: FL8858 nic-hdl: MMSI2-RIPE abuse-mailbox: noc@mirea.ru mnt-by: MIREA-MNT created: 2014-05-07T11:09:25Z last-modified: 2023-02-13T08:22:20Z source: RIPE # Filtered person: Dmitry Myakoshin address: 78, Vernadskogo prosp. address: 119454 Moscow address: Russia phone: +7 499 6008228 nic-hdl: DM9397-RIPE mnt-by: MSU-MNT mnt-by: MIREA-MNT created: 2011-06-23T12:13:31Z last-modified: 2022-11-02T11:52:45Z source: RIPE # Filtered % Information related to '85.142.160.0/23AS28800' route: 85.142.160.0/23 descr: Moscow State Institute for RadioEngeeniring, Electronics and descr: Moscow, Russia descr: pr-t Vernadskogo, 78 origin: AS28800 mnt-by: INFR-MNT created: 2018-08-08T17:10:38Z last-modified: 2018-08-08T17:10:38Z source: RIPE # Filtered % This query was served by the RIPE Database Query Service version 1.106 (BUSA) ``` #### Посмотрим, что интересное даст Nmap ``` ┌──(kali㉿kali)-[~/Documents] └─$ nmap 85.142.160.0/23 --open Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-14 21:29 EDT Nmap scan report for 85.142.160.98 Host is up (0.0037s latency). Not shown: 998 filtered tcp ports (no-response), 1 filtered tcp ports (host-unreach) Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE 443/tcp open https Nmap scan report for 85.142.160.226 Host is up (0.0039s latency). Not shown: 992 filtered tcp ports (no-response), 6 filtered tcp ports (host-unreach) Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE 80/tcp open http 443/tcp open https ``` Используем флаг -sn (-sn: Ping Scan - disable port scan) ``` ┌──(kali㉿kali)-[~/Documents] └─$ nmap 85.142.160.0/23 -sn Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-14 22:13 EDT Nmap scan report for test.mirea.ru (85.142.160.1) Host is up (0.0039s latency). Nmap scan report for 85.142.160.98 Host is up (0.0060s latency). Nmap scan report for 85.142.160.106 Host is up (0.0043s latency). Nmap scan report for 85.142.160.226 Host is up (0.0041s latency). Nmap done: 512 IP addresses (4 hosts up) scanned in 44.94 seconds ``` Попробуем получить больше информации 85.142.160.1 ``` ┌──(kali㉿kali)-[~/Documents] └─$ sudo nmap -A -O -sV -sC --traceroute 85.142.160.1 [sudo] password for kali: Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-14 22:23 EDT Nmap scan report for test.mirea.ru (85.142.160.1) Host is up (0.069s latency). Not shown: 998 closed tcp ports (reset) PORT STATE SERVICE VERSION 443/tcp open ssl/http nginx |_http-title: Site doesn't have a title (text/html). | ssl-cert: Subject: commonName=IOS-Self-Signed-Certificate-3508525419 | Not valid before: 2019-06-27T03:55:44 |_Not valid after: 2020-01-01T00:00:00 |_ssl-date: TLS randomness does not represent time | tls-nextprotoneg: |_ http/1.1 514/tcp filtered shell Aggressive OS guesses: Actiontec MI424WR-GEN3I WAP (98%), DD-WRT v24-sp2 (Linux 2.4.37) (97%), Linux 3.2 (97%), Linux 4.4 (96%), Microsoft Windows XP SP3 or Windows 7 or Windows Server 2012 (95%), Microsoft Windows XP SP3 (95%), BlueArc Titan 2100 NAS device (91%), VMware Player virtual NAT device (89%) No exact OS matches for host (test conditions non-ideal). Network Distance: 2 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.05 ms 192.168.198.2 2 0.07 ms test.mirea.ru (85.142.160.1) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 140.20 seconds ``` 85.142.160.98 ``` ┌──(kali㉿kali)-[~/Documents] └─$ sudo nmap -A -O -sV -sC --traceroute 85.142.160.98 Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-14 22:38 EDT Nmap scan report for 85.142.160.98 Host is up (0.00040s latency). All 1000 scanned ports on 85.142.160.98 are in ignored states. Not shown: 1000 filtered tcp ports (no-response) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: WAP|general purpose Running: Actiontec embedded, Linux 2.4.X|3.X OS CPE: cpe:/h:actiontec:mi424wr-gen3i cpe:/o:linux:linux_kernel cpe:/o:linux:linux_kernel:2.4.37 cpe:/o:linux:linux_kernel:3.2 cpe:/o:linux:linux_kernel:4.4 OS details: Actiontec MI424WR-GEN3I WAP, DD-WRT v24-sp2 (Linux 2.4.37), Linux 3.2, Linux 4.4 Network Distance: 2 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.11 ms 192.168.198.2 2 0.04 ms 85.142.160.98 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 91.56 seconds ``` 85.142.160.106 ``` ┌──(kali㉿kali)-[~] └─$ sudo nmap -A -O -sV -sC --traceroute 85.142.160.106 Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-14 22:36 EDT Nmap scan report for 85.142.160.106 Host is up (0.00013s latency). All 1000 scanned ports on 85.142.160.106 are in ignored states. Not shown: 1000 filtered tcp ports (no-response) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS details: Actiontec MI424WR-GEN3I WAP, DD-WRT v24-sp2 (Linux 2.4.37), Linux 3.2, Linux 4.4, Microsoft Windows XP SP3, Microsoft Windows XP SP3 or Windows 7 or Windows Server 2012, VMware Player virtual NAT device Network Distance: 2 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.07 ms 192.168.198.2 2 0.09 ms 85.142.160.106 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 70.88 seconds ``` 85.142.160.226 ``` ┌──(kali㉿kali)-[~] └─$ sudo nmap -A -O -sV -sC --traceroute 85.142.160.226 Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-14 22:38 EDT Nmap scan report for 85.142.160.226 Host is up (0.0044s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http nginx 1.14.2 |_http-title: Did not follow redirect to https://85.142.160.226/ |_http-server-header: nginx/1.14.2 443/tcp open ssl/http nginx 1.14.2 |_http-title: 502 Bad Gateway |_ssl-date: TLS randomness does not represent time |_http-server-header: nginx/1.14.2 | tls-alpn: | h2 |_ http/1.1 | ssl-cert: Subject: commonName=*.kb4-lab.ru | Subject Alternative Name: DNS:*.kb4-lab.ru | Not valid before: 2022-03-27T20:42:43 |_Not valid after: 2022-06-25T20:42:42 | tls-nextprotoneg: | h2 |_ http/1.1 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: WAP|general purpose Running: Actiontec embedded, Linux, Microsoft Windows XP|7|2012 OS CPE: cpe:/h:actiontec:mi424wr-gen3i cpe:/o:linux:linux_kernel cpe:/o:microsoft:windows_xp::sp3 cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_server_2012 OS details: Actiontec MI424WR-GEN3I WAP, Microsoft Windows XP SP3, Microsoft Windows XP SP3 or Windows 7 or Windows Server 2012 Network Distance: 2 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.17 ms 192.168.198.2 2 0.06 ms 85.142.160.226 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 100.50 seconds ``` Т.к. За довольно короткий промежуток времени, не которые появлялись и исчезали из поля зрения, решено было прдолжить сканирование. ![](https://i.imgur.com/3Mqs9Ih.png) После получения стабильных результатов, осталось закончить исследование. Оставшиеся IP 85.142.160.99 85.142.160.104 85.142.160.105 Что получилось достать по 85.142.160.105 ``` ┌──(kali㉿kali)-[~] └─$ sudo nmap -A -O -sV -sC --traceroute 85.142.160.105 Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-14 22:51 EDT Nmap scan report for 85.142.160.105 Host is up (0.00034s latency). All 1000 scanned ports on 85.142.160.105 are in ignored states. Not shown: 1000 filtered tcp ports (no-response) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS details: Actiontec MI424WR-GEN3I WAP, DD-WRT v24-sp2 (Linux 2.4.37), Linux 3.2, Linux 4.4, Microsoft Windows XP SP3, Microsoft Windows XP SP3 or Windows 7 or Windows Server 2012, VMware Player virtual NAT device Network Distance: 2 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.60 ms 192.168.198.2 2 0.20 ms 85.142.160.105 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 183.36 seconds ``` 85.142.160.104 ``` ┌──(kali㉿kali)-[~/Documents] └─$ sudo nmap -A -O -sV -sC --traceroute 85.142.160.104 Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-14 22:51 EDT Nmap scan report for 85.142.160.104 Host is up (0.00051s latency). Not shown: 999 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 443/tcp open tcpwrapped Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Brother MFC-7820N printer (94%), Digi Connect ME serial-to-Ethernet bridge (94%), Netgear SC101 Storage Central NAS device (91%), Aastra 480i IP Phone or Sun Remote System Control (RSC) (91%), Aastra 6731i VoIP phone or Apple AirPort Express WAP (91%), GoPro HERO3 camera (91%), Konica Minolta bizhub 250 printer (91%), OUYA game console (91%), Crestron MPC-M5 AV controller or Wago Kontakttechnik 750-852 PLC (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 2 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.15 ms 192.168.198.2 2 0.17 ms 85.142.160.104 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 258.56 seconds ``` #### Nessus Рассмотрим Nessus ![](https://i.imgur.com/9ZHGBN4.png) После скана получаем подобный результат. ![](https://i.imgur.com/EaF9ku4.png) И индивидуальные отчёты об уязвимостях. Например такой. ``` Information about this scan : Nessus version : 10.5.1 Nessus build : 20008 Plugin feed version : 202304141614 Scanner edition used : Nessus Home Scanner OS : LINUX Scanner distribution : debian10-x86-64 Scan type : Normal Scan name : Mirea.tech Scan policy used : Host Discovery Scanner IP : 192.168.198.130 WARNING : No port scanner was enabled during the scan. This may lead to incomplete results. Port range : default Ping RTT : 34.550 ms Thorough tests : no Experimental tests : no Plugin debugging enabled : no Paranoia level : 1 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None Display superseded patches : yes (supersedence plugin launched) CGI scanning : disabled Web application tests : disabled Max hosts : 256 Max checks : 5 Recv timeout : 5 Backports : None Allow post-scan editing : Yes Scan Start Date : 2023/4/14 23:07 EDT Scan duration : 36 sec ``` #### Попробуем найти что-то интересное посредствам веб-сервисов. ##### dnsdumpster ![](https://i.imgur.com/nagyOeA.png) ![](https://i.imgur.com/GTAPJ6K.png) ![](https://i.imgur.com/pnkbeIH.png) ##### shodan ![](https://i.imgur.com/qZa25Oy.png) ##### Сканирование SSL сертификатов поосредсвтом crt.sh ![](https://i.imgur.com/sr51szX.png) ### Ptlab.ru ``` ┌──(kali㉿kali)-[~] └─$ whois ptlab.ru % TCI Whois Service. Terms of use: % https://tcinet.ru/documents/whois_ru_rf.pdf (in Russian) % https://tcinet.ru/documents/whois_su.pdf (in Russian) domain: PTLAB.RU nserver: ns1.reg.ru. nserver: ns2.reg.ru. state: REGISTERED, DELEGATED, UNVERIFIED person: Private Person registrar: REGRU-RU admin-contact: http://www.reg.ru/whois/admin_contact created: 2021-03-16T15:17:11Z paid-till: 2024-03-16T15:17:11Z free-date: 2024-04-16 source: TCI Last updated on 2023-04-15T01:31:31Z ``` Через PING вдим тот же IP (85.142.160.226) ![](https://i.imgur.com/g8jTh06.png) ![](https://i.imgur.com/DiXT0j2.png) Через сабфайндер также нет ничего интересного. ![](https://i.imgur.com/sQXXT2S.png) #### Попробуем найти что-то интересное посредствам веб-сервисов. ##### dnsdumpster ![](https://i.imgur.com/N0y74ju.png) ![](https://i.imgur.com/L1lx4Lk.png) ![](https://i.imgur.com/drOn2lb.png) ![](https://i.imgur.com/iAVhoTx.png) ##### shodan Поиск по ptlab не удоволетворяющих результатов ![](https://i.imgur.com/31NiWmv.png) ##### Сканирование SSL сертификатов поосредсвтом crt.sh ![](https://i.imgur.com/l5nMaFn.png) ## Заключение Была создана виртуальная машина с Kali Linux в VMWare для OSINT-разведки и анализа сетевого периметра компании. С помощью различных методов и инструментов удалось собрать информацию о сотрудниках компании, их контактных данных, профилях в соцсетях, сайтах, IP-адресах, доменах и DNS-записях. Проведенный анализ с помощью сетевых сканеров Nmap и Nessus выявил уязвимости в сетевой инфраструктуре компании. Все это поможет укрепить безопасность компании. Также, был сделан вывод о размещении Ptlab.ru и Mirea.tech на общей инфраструктуре.