Scope: Passive reconnaissance on 8 Ecuadorian government domains handling financial data, tax records, social security, and customs declarations. Method: HTTP probing via WebFetch -- homepage analysis, sensitive path enumeration, WordPress REST API discovery, user enumeration, Liferay service enumeration.
| # | Domain | Finding | Impact |
|---|---|---|---|
| 1 | sri.gob.ec | Liferay JSONWS API catalog publicly exposed at /api/jsonws -- lists hundreds of backend service methods including User, Organization, Document Library, Permission, Password Policy, and Export/Import services |
Full API surface map for Ecuador's tax authority. Methods require auth but attackers have a complete catalog to target credential-stuffing, token reuse, or session hijacking against specific endpoints handling citizen tax PII |
| 2 | aduana.gob.ec | WordPress REST API user enumeration at /wp-json/wp/v2/users -- returns 8 users including oraculo (ID 1, admin account), plus full names and slugs for 7 staff members |
Enables targeted brute-force against known usernames. The oraculo admin account is a shared vendor/service account (see cross-domain pattern below) |
| 3 | seps.gob.ec | WordPress REST API user enumeration returns 3 users: admins3ps2021, simbiontec, inhuman_ec -- admin account name contains year "2021" suggesting password rotation may follow similar patterns |
Admin username leaks year-based naming convention. simbiontec and inhuman_ec appear to be external contractor accounts |
| # | Domain | Finding | Impact |
|---|---|---|---|
| 4 | superbancos.gob.ec | Apache Tomcat default page exposed on CAS authentication server at cas.superbancos.gob.ec:8443 -- confirms Tomcat installation with default config, manager webapp references |
The Banking Superintendency's central authentication server exposes its technology stack. Default Tomcat pages indicate incomplete hardening of a security-critical system |
| 5 | sri.gob.ec | Liferay portal configuration leak via Liferay.ThemeDisplay -- exposes Company ID (20101), Group IDs (20128, 34937), User ID (20105), control panel paths, session timeout (900s) |
Internal portal structure mapped. IDs can be used to craft targeted API calls against the JSONWS endpoints |
| 6 | iess.gob.ec | WordPress 5.7 detected (via emoji script version) -- this version is from March 2021, nearly 5 years old | Social Security Institute handling PII for all Ecuadorian workers runs severely outdated WordPress with hundreds of known CVEs |
| 7 | seps.gob.ec | WordPress 6.9.1 with LayerSlider 6.11.8 and multiple plugins exposed -- extensive plugin surface (Contact Form 7, Ninja Tables, Popup Builder, FluentForm, FileBird, FingerprintJS) | Large attack surface through plugin diversity. LayerSlider has had critical vulnerabilities historically |
| 8 | finanzas.gob.ec | Internal financial system hostnames exposed: esigef.finanzas.gob.ec, esigef2.finanzas.gob.ec, esipren.finanzas.gob.ec, spryn.finanzas.gob.ec, spryn2.finanzas.gob.ec, ebye.finanzas.gob.ec, nomina.finanzas.gob.ec |
Complete map of internal financial management and payroll systems. eSIGEF confirmed running ASP.NET. Dual instances (esigef/esigef2, spryn/spryn2) suggest load-balanced or failover architecture |
| 9 | aduana.gob.ec | Full WordPress REST API exposed with Disqus, wp-site-health namespaces. Media endpoint leaks internal document filenames (SENAE contract numbers, BID loan references) | Government procurement documents and contract IDs exposed via media API. Document naming reveals internal numbering schemes |
| 10 | superbancos.gob.ec | Internal login portal at /bancos/ingresosb with LoginPress plugin, simple math CAPTCHA (trivially bypassable), links to CAS system |
Banking regulator intranet login uses weak CAPTCHA protection |
| # | Domain | Finding | Impact |
|---|---|---|---|
| 11 | bce.fin.ec | WordPress with Elementor 3.27.2, exposed WP REST API with 12+ namespaces (Wordfence, Yoast, Elementor-AI, NPS-Survey, WPForms) -- no authentication methods advertised in API root | Central Bank's extensive plugin footprint increases attack surface. Empty authentication array in API root is concerning |
| 12 | bce.fin.ec | reCAPTCHA site key exposed: 6LdDYVogAAAAAPaQHupFjJEfqNwW0QN7MNptdkg_ |
Can be used to test for bypass or misconfiguration |
| 13 | finanzas.gob.ec | Wordfence WAF detected but wp-json/ fully accessible -- Wordfence and Filebird namespaces exposed. "autodiscover" page exists (ID 10976, created 2019) |
WAF present but REST API not locked down. The autodiscover page is an anomaly (typically email config) |
| 14 | seps.gob.ec | Facebook Pixel 436848186041416 and dual Analytics (GA4: G-47SH65ZV9H, Legacy: UA-35721055-1) tracking on government financial regulator site |
Government tracking citizen browsing behavior on financial regulatory pages. Cross-site tracking via Facebook Pixel raises privacy concerns |
| 15 | aduana.gob.ec | Overly restrictive robots.txt blocks CSS/JS/images but does nothing to protect API endpoints | Security theater -- blocks crawlers from harmless static assets while REST API is wide open |
| 16 | superbancos.gob.ec | OCI (Oracle Cloud Infrastructure) referenced in appweb portal -- "Server web 2 OCI" with link to "Server web 1 OCI" | Cloud infrastructure provider identified. Dual-server architecture exposed |
| 17 | All WordPress sites | No HSTS, CSP, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, or Permissions-Policy headers detected on any probed domain | All 7 WordPress/Liferay sites lack modern security headers. Vulnerable to clickjacking, MIME sniffing, and protocol downgrade attacks |
| 18 | seps.gob.ec | XML-RPC returns 405 (Method Not Allowed) rather than 403/404 -- endpoint exists but only blocks GET requests | XML-RPC may accept POST requests, enabling brute-force amplification attacks |
UA-17155653-2| Subdomain | Purpose |
|---|---|
srienlinea.sri.gob.ec |
Online tax services portal (SPA with hash routing) |
facturadorsri.sri.gob.ec |
Electronic invoicing system |
declaraciones.sri.gob.ec |
Tax declarations portal |
| Path | Result |
|---|---|
/.env |
404 |
/.git/config |
Blocked (WAF: "URL was rejected") |
/robots.txt |
Permissive -- Disallow: (empty, allows everything) |
/api/jsonws |
EXPOSED -- Full Liferay JSONWS API catalog |
/api/axis |
403 (blocked) |
/c/portal/json_service |
403 (blocked) |
/graphql |
404 |
/swagger |
404 |
The endpoint https://www.sri.gob.ec/api/jsonws returns a complete catalog of all available JSON Web Services including:
Individual method calls return 403 (require authentication), but the complete service catalog is publicly browsable. This gives attackers a precise roadmap of the entire backend.
Liferay.ThemeDisplay object in page source exposes:
2010120128 (company), 34937 (site scope)20105/group/intersri/~/control_panel/manageNone detected (no HSTS, CSP, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy).
Present -- blocks .git/config access with "URL was rejected" message. Does NOT block /api/jsonws.
None detected.
| Subdomain | Purpose |
|---|---|
app.iess.gob.ec |
Application portal (redirects to main site) |
appsrviess.iess.gob.ec |
External service applications |
facturacion.iess.gob.ec |
Electronic billing |
denuncias.iess.gob.ec |
Whistleblower/complaint channel |
app.iess.gob.ec/iess-gestion-agendamiento-citas-medicas-web/app.iess.gob.ec/iess-gestion-solicitud-afiliado-web/app.iess.gob.ec/gestion-portal-validador-qr-web//public/formulariosContacto.jsf (JSF -- Java Server Faces)| Path | Result |
|---|---|
/.env |
404 |
/.git/config |
404 |
/wp-json/ |
403 (blocked) |
/wp-json/wp/v2/users |
403 (blocked) |
/xmlrpc.php |
403 (blocked) |
/robots.txt |
Standard WP (blocks /wp-admin/, allows admin-ajax.php) |
G-3QMR5L6D9Y6LdDYVogAAAAAPaQHupFjJEfqNwW0QN7MNptdkg_| Subdomain | Purpose |
|---|---|
mail.bce.fin.ec |
Webmail portal |
facturacion.bce.fin.ec |
Electronic invoicing (JSF login) |
museodelamoneda.bce.fin.ec |
Money museum |
biblioteca.bce.ec |
Economic library |
www.eci.bce.ec |
Electronic certification |
| Path | Result |
|---|---|
/.env |
Blocked by security policy (ticket number returned) |
/.git/config |
Blocked by security policy |
/wp-json/ |
EXPOSED -- Full API root with 12+ namespaces |
/wp-json/wp/v2/users |
404 (user route disabled/removed) |
/xmlrpc.php |
Returns homepage (soft redirect, not blocked) |
/robots.txt |
Permissive -- empty Disallow, 3 sitemaps exposed |
Publicly accessible namespaces include:
wordfence/v1 -- Security scanningyoast/v1 -- SEO toolselementor/v1 and elementor-pro/v1 -- Page builder with form submissions endpointelementor-ai/v1 -- AI content toolsnps-survey/v1 -- User feedback collectionwpforms/v1 -- Form builderredirection/v1 -- URL redirect managementimage-optimizer/v1metaslider/v1hfe/v1 -- Header/Footer editorelementor/v1/form-submissions) returns 401 (auth required, good)G-7R2ZYSV7DY| Subdomain | Purpose |
|---|---|
ecuapass.aduana.gob.ec |
Customs declaration system (returned JS error on probe) |
servicios.aduana.gob.ec |
Services portal |
mesadeservicios.aduana.gob.ec |
Service desk |
ventanillaunica.aduana.gob.ec |
Single window for international commerce |
adjudicacion.aduana.gob.ec |
Auctions |
portal.aduana.gob.ec |
Customs portal |
| Path | Result |
|---|---|
/.env |
Returns homepage content (soft fail, not blocked) |
/.git/config |
500 Internal Server Error |
/wp-json/ |
EXPOSED -- Full API root |
/wp-json/wp/v2/users |
EXPOSED -- Full user enumeration |
/xmlrpc.php |
403 (blocked) |
/robots.txt |
Blocks wp-admin, uploads, plugins, themes, PHP/JS/CSS files |
/wp-json/wp/v2/users returns 8 WordPress accounts:
| ID | Username | Full Name | Notes |
|---|---|---|---|
| 1 | oraculo | oraculo | Admin account -- vendor/service account |
| 2 | cargonza | Carlos Gonzalez | Staff |
| 3 | jcortez | Jackson Cortez | Staff |
| 4 | dizamora | Didimo Zamora | Staff |
| 5 | gicordo | Giovanny Cordova | Staff (primary author, most posts) |
| 6 | garellano | Galo Arellano | Staff |
| 8 | mquiroga | Miguel Quiroga | Staff |
| 23 | rasanchez | Ronald Sanchez | Staff |
The oraculo account (ID 1) is the original WordPress admin/superuser. This same "oraculo" pattern has been observed on other Ecuadorian government WordPress sites, suggesting a shared vendor/contractor that deploys and manages these sites.
disqus/v1 -- Comments integration with sync/webhook endpointswp-site-health/v1 -- Site health monitoring (returns 401)wp-block-editor/v1wp/v2 with full CRUD on posts, pages, media/wp-json/wp/v2/media exposes internal document filenames:
SENAE-MEE-2-2-052-V1.pdfSENAE-SENAE-2026-0012-RE-2.pdfActa_entrega_recepcion_definitiva_-EC-L1253-P00052_signed.pdfAnexo_7_Contrato_SENAE-BID-2025-006-signed.pdf (Inter-American Development Bank contract)The server returns a 500 Internal Server Error for /.git/config rather than 404, which may indicate the path is being processed before failing -- potentially a .git directory exists but is not properly served.
None detected.
| Subdomain | Purpose |
|---|---|
appweb.superbancos.gob.ec |
Internal application portal (OCI -- Oracle Cloud) |
cas.superbancos.gob.ec:8443 |
CAS authentication server |
catastrocompanias.superbancos.gob.ec |
Company registry |
educacionfinanciera.superbancos.gob.ec |
Financial education |
estadisticas.superbancos.gob.ec |
Statistics portal |
| Path | Result |
|---|---|
/.env |
404 |
/.git/config |
Not probed (root domain inaccessible) |
/bancos/wp-json/ |
EXPOSED -- 21 API namespaces |
/bancos/wp-json/wp/v2/users |
403 (blocked) |
/robots.txt |
404 |
https://cas.superbancos.gob.ec:8443 returns the Apache Tomcat default welcome page instead of a CAS login screen. This reveals:
$CATALINA_HOME/webapps/ROOT/index.htmlThis is the Central Authentication Service for Ecuador's banking regulator. A default Tomcat page on a CAS server indicates incomplete deployment or misconfiguration.
/bancos/ingresosb exposes an intranet login with:
21 namespaces including:
loginpress/v1 -- Login page configurationtemplately/v1 -- Template management with cloud storagedownload-monitor/v1 -- Download tracking and analyticswp-rollback/v1 -- Plugin/theme version managementelementskit/v1 -- Dynamic content and widgetswp-mail-smtp/v1 -- Email configurationea11y/v1 -- Accessibility featuresG-47SH65ZV9HUA-35721055-1436848186041416| Subdomain | Purpose |
|---|---|
servicios.seps.gob.ec |
Portal services |
sistemas.seps.gob.ec |
Technical systems |
estadisticas.seps.gob.ec |
Statistics portal |
data.seps.gob.ec |
Data portal (DataSEPS) |
mail.seps.gob.ec |
Webmail |
intranet.seps.gob.ec |
Internal network |
centroserviciosacopio.seps.gob.ec |
Information center |
| Path | Result |
|---|---|
/.env |
404 |
/.git/config |
404 |
/wp-json/ |
EXPOSED -- Full API root |
/wp-json/wp/v2/users |
EXPOSED -- 3 users enumerated |
/xmlrpc.php |
405 Method Not Allowed (exists, blocks GET) |
/robots.txt |
Blocks wp-admin, documents, internal pages, service portal |
/wp-json/wp/v2/users returns 3 accounts:
| ID | Username | Full Name | Notes |
|---|---|---|---|
| 1 | admins3ps2021 | Alejandro | Admin account with year "2021" in name |
| 3 | inhuman_ec | Roque Proano | Likely external contractor |
| 5 | simbiontec | Alejandro Lozano | Likely external contractor (Simbiontec is an Ecuadorian web agency) |
The admin username admins3ps2021 is concerning:
Returns 405 (Method Not Allowed) for GET requests. This means the endpoint EXISTS and may accept POST requests, which would enable:
None detected.
| System | URL | Technology | Purpose |
|---|---|---|---|
| eSIGEF | |||
| aduana.gob.ec | G-7R2ZYSV7DY |
-- | |
| seps.gob.ec | G-47SH65ZV9H, UA-35721055-1 |
Facebook Pixel 436848186041416, FingerprintJS |
|
| iess.gob.ec | None | -- | |
| superbancos.gob.ec | None | -- | |
| finanzas.gob.ec | None | -- |