Penetration Testing: Information Gathering
This document reports the findings of the information gathering phase of a penetration test against two organisations. The first organisation, which is UK based, is the political party currently running the UK government, the Conservative Party or Conservatives. The second organisation, which is based in the USA, is the political party currently controlling the lower chamber and executive of the US government, the Democratic Party or Democrats.
Conservatives.com
Item |
Value(s) |
Comment |
Domain name1 |
conservatives.com |
|
Registered to1 |
Statutory Masking Enabled |
Domain registrant has purchased WHO IS protection and a proxy is listed instead of registrant. |
Registrar1 |
Network Solutions, LLC |
|
Registered on1 |
10/07/1996 |
25 years ago |
Homepage1 |
|
|
Current IPv4 Hosts (A records)2 |
104.18.213.89 |
Since 16/04/2021 (7 months ago) Based in California, USA Registered to Cloudflare, Inc |
104.17.146.63 |
||
Historical IPv4 Hosts (A records)2 |
104.18.122.219 |
14/01/2021 – 16/04/2021 (3 months) and 24/07/2020 – 07/01/2021 (6 months) Registered to Cloudflare, Inc |
104.18.121.219 |
||
76.223.27.102 |
07/01/2021 – 14/01/2021 (7 days) and 21/04/202020 – 24/07/2020 (3 months) Registered to Amazon.com, Inc Hostname: a20b9ee60132ef283.awsglobalaccelerator.com, |
|
13.248.155.104 |
||
185.181.196.117 |
07/08/2018 – 21/04/2020 Registered to UKFAST.NET LIMITED |
|
Current IPv6 Hosts (AAAA records)2 |
2606:4700::6811:923f |
Since 16/04/2021 (7 months ago) Based in California, USA Registered to Cloudflare, Inc |
2606:4700::6812:d559 |
||
Historical IPv6 Hosts (AAAA records)2 |
2606:4700::6812:7adb |
24/07/2020 – 16/04/2021 (9 months) |
2606:4700::6812:79db |
||
2a02:21a8:0:3::2206:37eb |
16/09/2018 – 24/07/2020 (2 years) |
|
2A02:21A8:0:3::2206:37EB |
80/18/2017 – 16/09/2018 (1 year) |
|
Current name servers (NS records)2 |
GERARDO.NS.CLOUDFLARE.COM |
Since 24/07/2020 (1 year ago) Registered to Cloudflare, Inc. |
KATE.NS.CLOUDFLARE.COM |
||
Historical name servers (NS records)2 |
ns0.ukfast.net |
24/05/2017 – 24/07/2020 (3 years) Registered to UKFAST.NET LIMITED |
ns1.ukfast.net |
||
dns11.easydns.com |
23/10/2013 – 24/05/2017 (4 years) Registered to easyDNS Technologies Inc. |
|
dns2.easydns.com |
||
dns3.easydns.com |
||
Current mail servers (MX records)2 |
cluster2.eu.messagelabs.com |
Since 25/09/2009 (12 years ago) Registered to Google LLC Messagelabs Limited |
Historical mail servers (MX records)2 |
cluster2a.eu.messagelabs.com |
01/09/2008 – 25/09/2009 (1 year) Registered to Google LLC Messagelabs Limited |
cluster2.eu.messagelabs.com |
||
Open ports @ 104.18.213.89 and 104.17.146.63 (current IPv4 host)3 |
80 TCP |
Cloudflare HTTP proxy |
443 TCP |
Cloudflare HTTPS proxy |
|
8080 TCP |
Cloudflare HTTP proxy |
|
8443 TCP |
Cloudflare HTTPS proxy |
|
Open ports @ 104.18.121.219 and 104.18.121.219 (most recent historical IPv4 host)3 |
80 TCP |
Cloudflare HTTP proxy |
443 TCP |
Cloudflare HTTPS proxy |
|
8080 TCP |
Cloudflare HTTP proxy |
|
8443 TCP |
Cloudflare HTTPS proxy |
|
Open ports @ 76.223.27.102 and 13.248.155.104 (first historical non-Cloudflare host)3 |
80 TCP |
OpenResty HTTP Web App Server |
8080 TCP |
OpenResty HTTPS Web App Server |
|
Open ports @ 185.181.196.117 (second historical non-Cloudflare host)3 |
80 TCP |
DDOSX HTTP |
8080 TCP |
DDOSX HTTPS |
|
Filtered ports @ 185.181.196.117 (second historical non-Cloudflare host)3 |
30 filtered ports, some running unknown services. Recognised services: 53 (domain), 667 (disclose), 749 (kerberos-adm), 1069 (cognex-insight), 1108 (ratio-adp), 1137 (trim), 1154 (resacommunity), 1183 (llsurfup-http), 1594 (sixtrak), 1971 (netop-school), 3003 (cgms), 3737 (xpanel), 4449 (privatewire), 5801 (nvc-http-1), 7443 (oracleas-https), 8194 (sophos), 9666 (zoomcp), 9998 (distinct32) |
|
Ports @ 2606:4700::6811:923f and 2606:4700::6812:d559 (current IPv6 Host)3 |
No open ports 1000 filtered ports |
Same result for all historical IPv6 hosts. |
Ports @ cluster2.eu.messagelabs.com3 |
25 TCP |
SMTP |
Website Details (https://www.conservatives.com/ ) 4 |
Behind a Cloudflare reverse proxy/CDN |
|
Running Varnish HTTP cache/accelerator |
|
|
Any unsecured HTTP connection rerouted to HTTPS |
Via HTTP 301 and Strict-Transport-Security |
|
HTML5 |
|
|
JQuery |
||
Open Graph Protocol |
||
Noteworthy subdomains2,3,4,5 |
vote.conservatives.com |
Redirect via HTTP 301 to https://www.conservatives.com/. Hosted by AWS. Running OpenResty web server with Varnish proxy. |
res1.info.conservatives.com |
Hosted by AWS. Ports 80 TCP (apache HTTP redirects to HTTPS) and 443 TCP (apache HTTPS) open but stuck in redirect loop. |
|
safepay.conservatives.com |
Legacy payments page. Hostname 774447-Major2.conservativewebsites.org.uk (78.136.5.24). Ports 80 TCP (nginx HTTP redirects to HTTPS) and 443 (nginx HTTPS) open. Runs Drupal CMS. |
|
e.conservatives.com |
Mailjet (www.mailjet.com) utility domain hosted at 35.241.186.140, ports 80/tcp (unknown HTTP) and 443/tcp (unknown HTTPS) open. |
|
url8202.membership.conservatives.com |
Hosted at 167.89.123.124. Ports 80 TCP (nginx HTTP) and 443 (nginx HTTPS) open but returning HTTP 404. o16789123x124.outbound-mail.sendgrid.net also points to this host. |
|
action.conservatives.com |
Host at 3.69.136.55. Redirects to https://action.conservatives.com/vote. Port 80 TCP (http proxy) redirects to HTTP. Port 443 (https-proxy) returns bad gateway. 3 unknown services, suspected to be associated with https://unbounce.com/ |
|
remote.conservatives.com |
Hosted at 109.108.141.86 by UKFAST.NET LIMITED. Running Microsoft IIS/8.5 on Windows Vista Home Premium. Port 443 open but requires authentication. Appears to be a RDWeb portal. |
Democrats.org
Domain name1 |
democrats.org |
|
Registered to1 |
CSC Corporate Domains, Inc. |
Domain registrant has purchased WHO IS protection and a proxy is listed instead of registrant. |
Registrar1 |
CSC Corporate Domains, Inc. |
|
Registered on1 |
26/06/1995 |
26 years old |
Homepage1 |
|
|
Current IPv4 Hosts (A records)2 |
151.101.193.210 |
Since 26/07/2021 (4 months ago) Registered to Fastly Based in California |
151.101.129.210 |
||
151.101.1.210 |
||
151.101.65.210 |
||
Historical IPv4 Hosts (A records)2 |
192.0.66.2 |
26/09/2018 – 26/07/2021 (3 years) Registered to Automattic, Inc |
* |
Between 16/03/2016 and 26/09/2018, A records were cycled through different set of AWS hosts every 1-7 days. |
|
208.69.4.141 |
14/09/2020 – 16/03/2016 (6 years). No longer up. |
|
208.69.4.10 |
01/09/2008 – 14/09/2010 (2 years). No longer up. |
|
Current IPv6 Hosts (AAAA records)2 |
2a04:4e42:400::466 |
Since 26/07/2021 (4 months ago) Registered to Fastly Based in California |
2a04:4e42:600::466 |
||
2a04:4e42::466 |
||
2a04:4e42:200::466 |
||
Current name servers (NS records)2 |
NS-1000.AWSDNS-61.NET |
Since 13/03/2014 (8 years ago) Registered to Amazon, Inc |
NS-1273.AWSDNS-31.ORG |
||
NS-1561.AWSDNS-03.CO.UK |
||
NS-360.AWSDNS-45.COM |
||
Historical name servers (NS records)2 |
ns1.democrats.org |
01/09/2008 – 13/03/2014 (6 years) Registered to Amazon, Inc |
ns2.democrats.org |
||
ns3.democrats.org |
||
ns4.democrats.org |
||
Current mail servers (MX records)2 |
aspmx3.googlemail.com |
Since 24/04/2012 (10 years ago) Registered to Google LLC |
aspmx2.googlemail.com |
||
aspmx.l.google.com |
||
alt2.aspmx.l.google.com |
||
alt1.aspmx.l.google.com |
||
Historical mail servers (MX records)2 |
demmail2.democrats.org |
11/05/2010 – 24/04/2012 (2 years). No longer up |
demmail.democrats.org |
||
demmail.democrats.org |
20/12/2009 – 11/05/2010 (5 months). No longer up |
|
pbmail.democrats.org |
09/04/2009 – 20/12/2009 (9 months) No longer up |
|
mailservices.democrats.org |
||
mail-fallback.democrats.org |
||
pbmail.democrats.org |
01/09/2008 – 09/04/2009 (7 months) No longer up |
|
mailservices.democrats.org |
||
mail-fallback.democrats.org |
||
mail1.democrats.org |
||
Open ports @ 151.101.193.210, 151.101.129.210, 151.101.1.210 and 151.101.65.210 (current IPv4 hosts)3 |
80 TCP |
Fastly HTTP reverse proxy with Varnish cache |
443 TCP |
Fastly HTTPS reverse proxy with Varnish cache |
|
Open ports @ 192.0.66.2 (most recent historical IPv4 hosts)3 |
80 TCP |
Nginx HTTP server returning HTTP 404 |
443 TCP |
Nginx HTTPS server returning HTTP 404 |
|
Open ports @ 54.230.19.62, 54.230.19.182, 54.230.19.174, 54.230.19.110 (most recent AWS hosts)3 |
80 TCP |
Amazon CloudFront HTTP returning “ERROR: The request could not be satisfied” |
443 TCP |
Amazon CloudFront HTTPS returning “ERROR: The request could not be satisfied” |
|
Ports @ 2a04:4e42:400::466, 2a04:4e42:600::466, 2a04:4e42::466 and 2a04:4e42:200::466 (current IPv6 hosts)3 |
1000 filtered ports |
|
Ports @ *.googlemail.com and *.google.com3 |
25 TCP |
Google gsmtp |
Website Details (https://www.conservatives.com/ ) 4 |
Behind Fastly CDN |
|
Running Varnish HTTP cache/accelerator |
|
|
Nginx web server/reverse proxy |
|
|
HTTP redirects to HTTPS |
Via HTTP 301, RedirectLocation header and Strict-Transport-Security header |
|
Wordpress powered |
https://wordpress.com/ |
|
HTML5 |
|
|
JQuery |
||
Open Graph Protocol |
||
Noteworthy subdomains2,3,4 |
my.democrats.org |
Hosted at 104.16.73.40, 104.16.74.40, 2606:4700::6810:4928, 2606:4700::6810:4a28 by Cloudflare, Inc. Ports 80 TCP and 8080 TCP (Cloudflare HTTP proxy), 443 and 8443 (Cloudflare HTTPS proxy) open. HTTP redirects to HTTPS. HTTPS redirects to https://secure.actblue.com/donate/legacy-support-dems-19 |
finance.democrats.org |
Hosted at 104.16.73.40, 104.16.74.40, 2606:4700::6810:4a28, 2606:4700::6810:4928 by Cloudflare, Inc. Ports 80 TCP and 8080 TCP (Cloudflare HTTP proxy), 443 and 8443 (Cloudflare HTTPS proxy) open. HTTP redirects to HTTPS. HTTPS redirects to https://fundraising.democrats.org/onlineactions/7wu3xXimQU2efbX92liE6w2 |
|
store.democrats.org |
Hosted at 23.227.38.74 by Cloudflare, Inc. Ports 80 TCP and 8080 TCP (Cloudflare HTTP proxy), 443 and 8443 (Cloudflare HTTPS proxy) open. HTTP redirects to HTTPS. SSL error on port 8080. Port 8443 shows an “IP address banned” message. Shopify powered website (https://www.shopify.com/) |
|
live.democrats.org |
Hosted at 198.185.159.144, 198.185.159.145, 198.49.23.144, 198.49.23.145 by SquareSpace. Open ports: 80 TCP (HTTP Squarespace), 443 TCP (HTTPS Squarespace). HTTP redirecs to HTTPS. |
|
events.democrats.org |
Hosted at 104.17.31.62, 104.17.30.62, 2606:4700::6811:1e3e, 2606:4700::6811:1f3 by Cloudflare, Inc. Ports 80 TCP and 8080 TCP (Cloudflare HTTP proxy), 443 and 8443 (Cloudflare HTTPS proxy) open. HTTP and port 8080 redirect to HTTPS. Wordpress powered site with OpenGraph and HTML5. Many email addresses could be scraped. |
|
everest.democrats.org |
Hosted at 3.225.212.24, 3.229.105.215 by AWS. Open ports 80 TCP (Nginx HTTP), 443 TCP (Ngninx HTTPS). Both HTTP and HTTPS redirect to https://www.validity.com/everest/250ok/ |
Tools
5 tools were used during this exercise. The superscript number in the item column of the tables indicates which tools were used to discover the information. The five tools, along with their numerical IDs are listed below:
• 1 WHOIS lookup from Domain Tools web application (https://whois.domaintools.com)
• 2 SecurityTrails domain information web application (https://securitytrails.com)
• 3 Nmap Linux tool (https://nmap.org/)
• 4 WhatWeb Linux tool (https://www.whatweb.net/)
• 5 Telnet Linux tool (https://linux.die.net/man/1/telnet)
WHOIS lookup is a tool from Domain Tools the enables users to query a variety of WHOIS databases regarding a domain name. The tool enables users to find information such as when the domain was registered and the legal owner of the domain. There is a premium version that costs $1000 a year and offers more features.
SecurityTrails are a security firm that offer a free domain lookup service. The service is capable of providing the current DNS configuration for the domain, however it’s most useful feature is the ability to view historical DNS configurations (dating all the way back to 2008) and subdomains.
Nmap was originally a command line Linux tool, however it has now been ported to most major operating systems and various GUIs have been developed for it. Nmap can be used to scan hosts for open ports, detect which services are running on a host and guess what operating system is being used. It’s functionality can be extended with various 3rd party scripts.
WhatWeb is cross-platform ruby based website scanner that can be run as a command line utility or as a web application. WhatWeb scans websites and aims to report which technologies they are employing. It can provide information such as server type and version, web frameworks, Content Management Systems (CMS), JavaScript libraries and many more.
Telnet is an archaic Unix tool originally designed to facilitate terminal sessions on remote machines. Today it can be used to interact directly with network protocols at a low level. Telnetting into remote machines indicates if a port is open and can be used to glean clues about what software is running as well as experimenting with various commands.
Full Report: https://www.jbm.fyi/static/info_gathering.pdf