LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-26-2021, 09:28 PM   #1
needinfo
LQ Newbie
 
Registered: Mar 2021
Posts: 4

Rep: Reputation: Disabled
ould anyone please tell me how to use the info gathered on a website vulnerability in order to hack in? Thank you


Newbie here ...Could anyone please tell me how to use the info gathered on a website vulnerability in order to hack in without any damage to get documents in the server?

I need at least a nudge in the directions of what Kali tools to use, and what vulnerabilities to use to access the database of the webserver thank you for any insights

Here is what nikto found

Server: Apache/2.2.15 (Unix)
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ Server banner has changed from 'Apache/2.2.15 (Unix)' to 'Apache/2.4.43 (Unix) OpenSSL/1.1.1g' which may suggest a WAF, load balancer or proxy is in place
+ Retrieved x-powered-by header: PHP/5.2.13
+ Apache/2.2.15 appears to be outdated (current is at least Apache/2.4.37). Apache 2.2.34 is the EOL for the 2.x branch.
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
+ Uncommon header 'server-error' found, with contents: true
+ OSVDB-3092: /manual/: Web server manual found.
+ OSVDB-3268: /icons/: Directory indexing found.
+ OSVDB-3268: /manual/images/: Directory indexing found.
+ Server may leak inodes via ETags, header found with file /icons/README, inode: 2763612, size: 5108, mtime: Tue Aug 28 10:48:10 2007
+ OSVDB-3233: /icons/README: Apache default file found.
+ Cookie JSESSIONID created without the httponly flag
+ /flex2gateway/http: Adobe BlazeDS identified.
+ ERROR: Error limit (20) reached for host, giving up. Last error:
+ Scan terminated: 9 error(s) and 14 item(s) reported on remote host

Server: Apache/2.4.43 (Unix) OpenSSL/1.1.1g
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Server banner has changed from 'Apache/2.4.43 (Unix) OpenSSL/1.1.1g' to 'Apache/2.2.15 (Unix)' which may suggest a WAF, load balancer or proxy is in place
+ Retrieved x-powered-by header: PHP/5.2.13
+ ERROR: Error limit (20) reached for host, giving up. Last error:
+ Scan terminated: 9 error(s) and 4 item(s) reported on remote host
 
Old 03-28-2021, 04:57 PM   #2
teckk
LQ Guru
 
Registered: Oct 2004
Distribution: Arch
Posts: 5,146
Blog Entries: 6

Rep: Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834
Quote:
Could anyone please tell me how to use the info gathered on a website vulnerability in order to hack in without any damage to get documents in the server?
No. A mod is about to come along and tell you that talking about hacking is a violation of LQ's TOSS.

Quote:
I need at least a nudge in the directions of what Kali tools to use
Kali is for experienced users, not beginners. If you need to ask, then stop trying to use it. A distro like Ubuntu or Mint may work better for you. Nothing in kali that almost every other distos repo doesn't have.

All web servers keep logs, your IP address, time, sometimes browser and OS metrics. If you are going through a proxy using https, the original packet header is still there, with the originating IP.

Quote:
to get documents in the server
Are these documents made available on the page by hyperlinks, or are they rendered with server side scripts? How do you know that there are documents there?
 
Old 03-28-2021, 07:02 PM   #3
needinfo
LQ Newbie
 
Registered: Mar 2021
Posts: 4

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by teckk View Post
No. A mod is about to come along and tell you that talking about hacking is a violation of LQ's TOSS.


Kali is for experienced users, not beginners. If you need to ask, then stop trying to use it. A distro like Ubuntu or Mint may work better for you. Nothing in kali that almost every other distos repo doesn't have.

All web servers keep logs, your IP address, time, sometimes browser and OS metrics. If you are going through a proxy using https, the original packet header is still there, with the originating IP.


Are these documents made available on the page by hyperlinks, or are they rendered with server side scripts? How do you know that there are documents there?

Sorry I didn't know it was a violation of the rules

I used VPNs an TOR to try

Well, I know there are restricted areas with https authentication and I know that at least a few documents I need are in one of the restricted sections. I'm not trying to get in to do damage or anything by the way, just very hard to get info on a subject I am interested in
 
Old 03-29-2021, 01:38 AM   #4
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,976

Rep: Reputation: 7336Reputation: 7336Reputation: 7336Reputation: 7336Reputation: 7336Reputation: 7336Reputation: 7336Reputation: 7336Reputation: 7336Reputation: 7336Reputation: 7336
Quote:
Originally Posted by needinfo View Post
Sorry I didn't know it was a violation of the rules
In that case I can only suggest you to read the rules of this forum.
https://www.linuxquestions.org/linux/rules.html
Quote:
Originally Posted by needinfo View Post
I used VPNs an TOR to try

Well, I know there are restricted areas with https authentication and I know that at least a few documents I need are in one of the restricted sections. I'm not trying to get in to do damage or anything by the way, just very hard to get info on a subject I am interested in
I do not really understand what do you need (interested), but I'm sure you need to learn a lot. There is no tool which will work for you if you have no enough knowledge about that software.
 
Old 03-30-2021, 11:09 AM   #5
RickDeckard
Member
 
Registered: Jan 2014
Location: Canton, Georgia, USA
Distribution: Debian 12
Posts: 205

Rep: Reputation: Disabled
If you're performing a penetration test, you should be capable enough to find what you desire without asking us. If not, well... That's STILL your problem, but somehow differently.
 
Old 03-30-2021, 12:02 PM   #6
astrogeek
Moderator
 
Registered: Oct 2008
Distribution: Slackware [64]-X.{0|1|2|37|-current} ::12<=X<=15, FreeBSD_12{.0|.1}
Posts: 6,269
Blog Entries: 24

Rep: Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206
Quote:
Originally Posted by needinfo View Post
Well, I know there are restricted areas with https authentication and I know that at least a few documents I need are in one of the restricted sections. I'm not trying to get in to do damage or anything by the way, just very hard to get info on a subject I am interested in
Bypassing their security measure is damage itself.

Why do you think that your intentions are important to the situation?

The owner of the website has clearly indicated that they do not want you to access those areas by putting "locks" on the door. Have you considered simply respecting their wishes instead of trying to pick the locks?

Think of it this way: My neighbor keeps his doors locked, but he has a few things in his house that I want make use of. I don't intend to damage his house in any way. Will you help me pick his locks?

Does that sound like a reasonable request?
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Thank you, thank you, thank you. Hatman KZN Linux - Newbie 5 04-02-2016 07:51 AM
ould not create external command file '/usr/local/nagios/var/rw/nagios.cmd gerard.zapata Linux - Newbie 2 09-14-2012 01:57 PM
Slackware 10 Developement Team - Thank You! Thank You! and Thank you! perry Slackware 5 07-21-2004 11:21 AM
Thank You Thank You Thank You ETC... Frank_Drebin LinuxQuestions.org Member Intro 7 02-24-2004 04:21 PM
Thank You Thank You Thank You Atrocity General 15 11-18-2002 04:11 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:43 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration