Logo MitraScan

Informe de Auditoría Web Automatizada

Generado por MitraScan

Auditoría realizada por: Valentina Mendoza
Identificador único del reporte:
23b1a3248d3addccb4dd278f426c64c5d3942014c4e1df6debfe68385093fb3c

Resumen Ejecutivo

Fecha del informe: 2025-12-04 18:52

Total hallazgos: 4

Nivel de riesgo global: 75.0%

Descripción Técnica del Escaneo

Descripción Técnica del Escaneo

El análisis utiliza Nmap, Nikto y Nuclei para identificar vulnerabilidades relacionadas con configuración, exposición de archivos, cabeceras de seguridad y servicios accesibles. Los hallazgos se presentan en una tabla consolidada para facilitar una lectura ejecutiva y clara.

Severidad Vulnerabilidad Recomendación
Alta .git exposed Eliminar carpeta .git del servidor público.
Media x-frame-options Configurar X-Frame-Options o Frame-Ancestors.
Media x-content-type-options Habilitar X-Content-Type-Options: nosniff.
Media directory indexing Deshabilitar listado de directorios.
Baja No se identificaron hallazgos en esta categoría.

Resumen Gráfico

Distribución de Riesgos

0%

Clasificación Normativa

Vulnerabilidad MITRE ISO 27001 ISO 27002 OWASP Ley 21.459
.git exposed T1530 – Exfiltration A.8.9 – Protección de código 8.12 – Desarrollo seguro A04:2021 – Insecure Design Art. 4 – Datos sensibles
x-frame-options T1189 – Drive-by Compromise A.8.8 – Gestión de vulnerabilidades técnicas 8.28 – Pruebas de seguridad regulares A05:2021 – Security Misconfiguration Art. 2 – Prevención y gestión de incidentes
x-content-type-options T1059 – Command Script Execution A.8.8 – Gestión de vulnerabilidades 8.28 – Pruebas de seguridad A03:2021 – Injection Art. 3 – Seguridad de información
directory indexing T1083 – File Discovery A.5.12 – Clasificación de información 8.32 – Exposición de información A05:2021 – Misconfiguration Art. 4 – Resguardo de datos

Resultados Detallados

Starting Nmap 7.95 ( https://nmap.org ) at 2025-12-04 18:51 -03
Nmap scan report for localhost (127.0.0.1)
Host is up (0.0000060s latency).
Other addresses for localhost (not scanned): ::1
Not shown: 65533 closed tcp ports (reset)
PORT      STATE SERVICE VERSION
80/tcp    open  http    Apache httpd 2.4.65 ((Debian))
36865/tcp open  http    Golang net/http server
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port36865-TCP:V=7.95%I=7%D=12/4%Time=6932024D%P=x86_64-pc-linux-gnu%r(G
SF:enericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20
SF:text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\
SF:x20Request")%r(GetRequest,8F,"HTTP/1\.0\x20404\x20Not\x20Found\r\nDate:
SF:\x20Thu,\x2004\x20Dec\x202025\x2021:51:09\x20GMT\r\nContent-Length:\x20
SF:19\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\n\r\n404:\x20Page
SF:\x20Not\x20Found")%r(HTTPOptions,8F,"HTTP/1\.0\x20404\x20Not\x20Found\r
SF:\nDate:\x20Thu,\x2004\x20Dec\x202025\x2021:51:09\x20GMT\r\nContent-Leng
SF:th:\x2019\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\n\r\n404:\
SF:x20Page\x20Not\x20Found")%r(RTSPRequest,67,"HTTP/1\.1\x20400\x20Bad\x20
SF:Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:
SF:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"HTTP/1\.1\x20400\x2
SF:0Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nCon
SF:nection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(SSLSessionReq,67,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20cha
SF:rset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Fou
SF:rOhFourRequest,8F,"HTTP/1\.0\x20404\x20Not\x20Found\r\nDate:\x20Thu,\x2
SF:004\x20Dec\x202025\x2021:51:24\x20GMT\r\nContent-Length:\x2019\r\nConte
SF:nt-Type:\x20text/plain;\x20charset=utf-8\r\n\r\n404:\x20Page\x20Not\x20
SF:Found")%r(LPDString,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-T
SF:ype:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400
SF:\x20Bad\x20Request")%r(SIPOptions,67,"HTTP/1\.1\x20400\x20Bad\x20Reques
SF:t\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20cl
SF:ose\r\n\r\n400\x20Bad\x20Request")%r(Socks5,67,"HTTP/1\.1\x20400\x20Bad
SF:\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnect
SF:ion:\x20close\r\n\r\n400\x20Bad\x20Request")%r(OfficeScan,A3,"HTTP/1\.1
SF:\x20400\x20Bad\x20Request:\x20missing\x20required\x20Host\x20header\r\n
SF:Content-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r
SF:\n\r\n400\x20Bad\x20Request:\x20missing\x20required\x20Host\x20header");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 27.64 seconds
- Nikto v2.5.0
---------------------------------------------------------------------------
+ Target IP:          127.0.0.1
+ Target Hostname:    localhost
+ Target Port:        80
+ Target Path:        /DVWA
+ Start Time:         2025-12-04 18:51:30 (GMT-3)
---------------------------------------------------------------------------
+ Server: Apache/2.4.65 (Debian)
+ /DVWA/: Cookie security created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /DVWA/: Cookie PHPSESSID created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /DVWA/: The anti-clickjacking X-Frame-Options header is not present. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
+ /DVWA/: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ Root page /DVWA redirects to: login.php
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ OPTIONS: Allowed HTTP Methods: GET, POST, OPTIONS, HEAD .
+ /DVWA/config/: Directory indexing found.
+ /DVWA/config/: Configuration information may be available remotely.
+ /DVWA/tests/: Directory indexing found.
+ /DVWA/tests/: This might be interesting.
+ /DVWA/database/: Directory indexing found.
+ /DVWA/database/: Database directory found.
+ /DVWA/docs/: Directory indexing found.
+ /DVWA/.git/index: Git Index file may contain directory listing information.
+ /DVWA/.git/HEAD: Git HEAD file found. Full repo details may be present.
+ /DVWA/.git/config: Git config file found. Infos about repo details may be present.
+ /DVWA/.gitignore: .gitignore file found. It is possible to grasp the directory structure.
+ /DVWA/.dockerignore: .dockerignore file found. It may be possible to grasp the directory structure and learn more about the site.
+ 7850 requests: 0 error(s) and 17 item(s) reported on remote host
+ End Time:           2025-12-04 18:51:45 (GMT-3) (15 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested


      *********************************************************************
      Portions of the server's headers (Apache/2.4.65) are not in
      the Nikto 2.5.0 database or are newer than the known string. Would you like
      to submit this information (*no server specific data*) to CIRT.net
      for a Nikto update (or you may email to sullo@cirt.net) (y/n)? 
┌───────┬───────┬──────────┬─────────┐
│ TOTAL │ ADDED │ MODIFIED │ REMOVED │
├───────┼───────┼──────────┼─────────┤
│ 3613  │ 68    │ 3545     │ 0       │
└───────┴───────┴──────────┴─────────┘
[WRN] Loading 7 unsigned templates for scan. Use with caution.
[waf-detect:apachegeneric] [http] [info] http://localhost/DVWA
[external-service-interaction] [http] [info] http://localhost/DVWA