ODINT

Summary

Scope: Passive reconnaissance on 8 Ecuadorian government domains handling financial data, tax records, social security, and customs declarations. Method: HTTP probing via WebFetch -- homepage analysis, sensitive path enumeration, WordPress REST API discovery, user enumeration, Liferay service enumeration.

CROSS-DOMAIN FINDINGS SUMMARY (Ranked by Severity)

CRITICAL

# Domain Finding Impact
1 sri.gob.ec Liferay JSONWS API catalog publicly exposed at /api/jsonws -- lists hundreds of backend service methods including User, Organization, Document Library, Permission, Password Policy, and Export/Import services Full API surface map for Ecuador's tax authority. Methods require auth but attackers have a complete catalog to target credential-stuffing, token reuse, or session hijacking against specific endpoints handling citizen tax PII
2 aduana.gob.ec WordPress REST API user enumeration at /wp-json/wp/v2/users -- returns 8 users including oraculo (ID 1, admin account), plus full names and slugs for 7 staff members Enables targeted brute-force against known usernames. The oraculo admin account is a shared vendor/service account (see cross-domain pattern below)
3 seps.gob.ec WordPress REST API user enumeration returns 3 users: admins3ps2021, simbiontec, inhuman_ec -- admin account name contains year "2021" suggesting password rotation may follow similar patterns Admin username leaks year-based naming convention. simbiontec and inhuman_ec appear to be external contractor accounts

HIGH

# Domain Finding Impact
4 superbancos.gob.ec Apache Tomcat default page exposed on CAS authentication server at cas.superbancos.gob.ec:8443 -- confirms Tomcat installation with default config, manager webapp references The Banking Superintendency's central authentication server exposes its technology stack. Default Tomcat pages indicate incomplete hardening of a security-critical system
5 sri.gob.ec Liferay portal configuration leak via Liferay.ThemeDisplay -- exposes Company ID (20101), Group IDs (20128, 34937), User ID (20105), control panel paths, session timeout (900s) Internal portal structure mapped. IDs can be used to craft targeted API calls against the JSONWS endpoints
6 iess.gob.ec WordPress 5.7 detected (via emoji script version) -- this version is from March 2021, nearly 5 years old Social Security Institute handling PII for all Ecuadorian workers runs severely outdated WordPress with hundreds of known CVEs
7 seps.gob.ec WordPress 6.9.1 with LayerSlider 6.11.8 and multiple plugins exposed -- extensive plugin surface (Contact Form 7, Ninja Tables, Popup Builder, FluentForm, FileBird, FingerprintJS) Large attack surface through plugin diversity. LayerSlider has had critical vulnerabilities historically
8 finanzas.gob.ec Internal financial system hostnames exposed: esigef.finanzas.gob.ec, esigef2.finanzas.gob.ec, esipren.finanzas.gob.ec, spryn.finanzas.gob.ec, spryn2.finanzas.gob.ec, ebye.finanzas.gob.ec, nomina.finanzas.gob.ec Complete map of internal financial management and payroll systems. eSIGEF confirmed running ASP.NET. Dual instances (esigef/esigef2, spryn/spryn2) suggest load-balanced or failover architecture
9 aduana.gob.ec Full WordPress REST API exposed with Disqus, wp-site-health namespaces. Media endpoint leaks internal document filenames (SENAE contract numbers, BID loan references) Government procurement documents and contract IDs exposed via media API. Document naming reveals internal numbering schemes
10 superbancos.gob.ec Internal login portal at /bancos/ingresosb with LoginPress plugin, simple math CAPTCHA (trivially bypassable), links to CAS system Banking regulator intranet login uses weak CAPTCHA protection

MEDIUM

# Domain Finding Impact
11 bce.fin.ec WordPress with Elementor 3.27.2, exposed WP REST API with 12+ namespaces (Wordfence, Yoast, Elementor-AI, NPS-Survey, WPForms) -- no authentication methods advertised in API root Central Bank's extensive plugin footprint increases attack surface. Empty authentication array in API root is concerning
12 bce.fin.ec reCAPTCHA site key exposed: 6LdDYVogAAAAAPaQHupFjJEfqNwW0QN7MNptdkg_ Can be used to test for bypass or misconfiguration
13 finanzas.gob.ec Wordfence WAF detected but wp-json/ fully accessible -- Wordfence and Filebird namespaces exposed. "autodiscover" page exists (ID 10976, created 2019) WAF present but REST API not locked down. The autodiscover page is an anomaly (typically email config)
14 seps.gob.ec Facebook Pixel 436848186041416 and dual Analytics (GA4: G-47SH65ZV9H, Legacy: UA-35721055-1) tracking on government financial regulator site Government tracking citizen browsing behavior on financial regulatory pages. Cross-site tracking via Facebook Pixel raises privacy concerns
15 aduana.gob.ec Overly restrictive robots.txt blocks CSS/JS/images but does nothing to protect API endpoints Security theater -- blocks crawlers from harmless static assets while REST API is wide open
16 superbancos.gob.ec OCI (Oracle Cloud Infrastructure) referenced in appweb portal -- "Server web 2 OCI" with link to "Server web 1 OCI" Cloud infrastructure provider identified. Dual-server architecture exposed
17 All WordPress sites No HSTS, CSP, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, or Permissions-Policy headers detected on any probed domain All 7 WordPress/Liferay sites lack modern security headers. Vulnerable to clickjacking, MIME sniffing, and protocol downgrade attacks
18 seps.gob.ec XML-RPC returns 405 (Method Not Allowed) rather than 403/404 -- endpoint exists but only blocks GET requests XML-RPC may accept POST requests, enabling brute-force amplification attacks

DETAILED FINDINGS BY DOMAIN


1. sri.gob.ec -- SRI (Servicio de Rentas Internas / Tax Authority)

Technology Stack

Analytics

Subdomains Discovered

Subdomain Purpose
srienlinea.sri.gob.ec Online tax services portal (SPA with hash routing)
facturadorsri.sri.gob.ec Electronic invoicing system
declaraciones.sri.gob.ec Tax declarations portal

Sensitive Path Results

Path Result
/.env 404
/.git/config Blocked (WAF: "URL was rejected")
/robots.txt Permissive -- Disallow: (empty, allows everything)
/api/jsonws EXPOSED -- Full Liferay JSONWS API catalog
/api/axis 403 (blocked)
/c/portal/json_service 403 (blocked)
/graphql 404
/swagger 404

CRITICAL: Liferay JSONWS API Exposure

The endpoint https://www.sri.gob.ec/api/jsonws returns a complete catalog of all available JSON Web Services including:

Individual method calls return 403 (require authentication), but the complete service catalog is publicly browsable. This gives attackers a precise roadmap of the entire backend.

Portal Configuration Leak

Liferay.ThemeDisplay object in page source exposes:

Security Headers

None detected (no HSTS, CSP, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy).

WAF

Present -- blocks .git/config access with "URL was rejected" message. Does NOT block /api/jsonws.


2. iess.gob.ec -- IESS (Instituto Ecuatoriano de Seguridad Social)

Technology Stack

Analytics

None detected.

Subdomains Discovered

Subdomain Purpose
app.iess.gob.ec Application portal (redirects to main site)
appsrviess.iess.gob.ec External service applications
facturacion.iess.gob.ec Electronic billing
denuncias.iess.gob.ec Whistleblower/complaint channel

PII-Handling Portals

Sensitive Path Results

Path Result
/.env 404
/.git/config 404
/wp-json/ 403 (blocked)
/wp-json/wp/v2/users 403 (blocked)
/xmlrpc.php 403 (blocked)
/robots.txt Standard WP (blocks /wp-admin/, allows admin-ajax.php)

Security Assessment


3. bce.fin.ec -- BCE (Banco Central del Ecuador / Central Bank)

Technology Stack

Analytics

Subdomains Discovered

Subdomain Purpose
mail.bce.fin.ec Webmail portal
facturacion.bce.fin.ec Electronic invoicing (JSF login)
museodelamoneda.bce.fin.ec Money museum
biblioteca.bce.ec Economic library
www.eci.bce.ec Electronic certification

Sensitive Path Results

Path Result
/.env Blocked by security policy (ticket number returned)
/.git/config Blocked by security policy
/wp-json/ EXPOSED -- Full API root with 12+ namespaces
/wp-json/wp/v2/users 404 (user route disabled/removed)
/xmlrpc.php Returns homepage (soft redirect, not blocked)
/robots.txt Permissive -- empty Disallow, 3 sitemaps exposed

WP REST API Exposure

Publicly accessible namespaces include:

Security Assessment


4. aduana.gob.ec -- SENAE (Servicio Nacional de Aduana del Ecuador / Customs)

Technology Stack

Analytics

Subdomains Discovered

Subdomain Purpose
ecuapass.aduana.gob.ec Customs declaration system (returned JS error on probe)
servicios.aduana.gob.ec Services portal
mesadeservicios.aduana.gob.ec Service desk
ventanillaunica.aduana.gob.ec Single window for international commerce
adjudicacion.aduana.gob.ec Auctions
portal.aduana.gob.ec Customs portal

Sensitive Path Results

Path Result
/.env Returns homepage content (soft fail, not blocked)
/.git/config 500 Internal Server Error
/wp-json/ EXPOSED -- Full API root
/wp-json/wp/v2/users EXPOSED -- Full user enumeration
/xmlrpc.php 403 (blocked)
/robots.txt Blocks wp-admin, uploads, plugins, themes, PHP/JS/CSS files

CRITICAL: User Enumeration

/wp-json/wp/v2/users returns 8 WordPress accounts:

ID Username Full Name Notes
1 oraculo oraculo Admin account -- vendor/service account
2 cargonza Carlos Gonzalez Staff
3 jcortez Jackson Cortez Staff
4 dizamora Didimo Zamora Staff
5 gicordo Giovanny Cordova Staff (primary author, most posts)
6 garellano Galo Arellano Staff
8 mquiroga Miguel Quiroga Staff
23 rasanchez Ronald Sanchez Staff

The oraculo account (ID 1) is the original WordPress admin/superuser. This same "oraculo" pattern has been observed on other Ecuadorian government WordPress sites, suggesting a shared vendor/contractor that deploys and manages these sites.

WP REST API Namespaces

Media API Exposure

/wp-json/wp/v2/media exposes internal document filenames:

500 Error on .git/config

The server returns a 500 Internal Server Error for /.git/config rather than 404, which may indicate the path is being processed before failing -- potentially a .git directory exists but is not properly served.


5. ecuapass.aduana.gob.ec -- Ecuapass Customs Portal

Assessment


6. superbancos.gob.ec -- Superintendencia de Bancos (Banking Superintendency)

Technology Stack

Analytics

None detected.

Subdomains Discovered

Subdomain Purpose
appweb.superbancos.gob.ec Internal application portal (OCI -- Oracle Cloud)
cas.superbancos.gob.ec:8443 CAS authentication server
catastrocompanias.superbancos.gob.ec Company registry
educacionfinanciera.superbancos.gob.ec Financial education
estadisticas.superbancos.gob.ec Statistics portal

Sensitive Path Results

Path Result
/.env 404
/.git/config Not probed (root domain inaccessible)
/bancos/wp-json/ EXPOSED -- 21 API namespaces
/bancos/wp-json/wp/v2/users 403 (blocked)
/robots.txt 404

HIGH: Tomcat Default Page on CAS Server

https://cas.superbancos.gob.ec:8443 returns the Apache Tomcat default welcome page instead of a CAS login screen. This reveals:

This is the Central Authentication Service for Ecuador's banking regulator. A default Tomcat page on a CAS server indicates incomplete deployment or misconfiguration.

Internal Login Portal

/bancos/ingresosb exposes an intranet login with:

WP REST API -- Extensive Namespace Exposure

21 namespaces including:

Infrastructure


7. seps.gob.ec -- SEPS (Superintendencia de Economia Popular y Solidaria)

Technology Stack

Analytics & Tracking

Subdomains Discovered

Subdomain Purpose
servicios.seps.gob.ec Portal services
sistemas.seps.gob.ec Technical systems
estadisticas.seps.gob.ec Statistics portal
data.seps.gob.ec Data portal (DataSEPS)
mail.seps.gob.ec Webmail
intranet.seps.gob.ec Internal network
centroserviciosacopio.seps.gob.ec Information center

Sensitive Path Results

Path Result
/.env 404
/.git/config 404
/wp-json/ EXPOSED -- Full API root
/wp-json/wp/v2/users EXPOSED -- 3 users enumerated
/xmlrpc.php 405 Method Not Allowed (exists, blocks GET)
/robots.txt Blocks wp-admin, documents, internal pages, service portal

CRITICAL: User Enumeration

/wp-json/wp/v2/users returns 3 accounts:

ID Username Full Name Notes
1 admins3ps2021 Alejandro Admin account with year "2021" in name
3 inhuman_ec Roque Proano Likely external contractor
5 simbiontec Alejandro Lozano Likely external contractor (Simbiontec is an Ecuadorian web agency)

The admin username admins3ps2021 is concerning:

XML-RPC Status

Returns 405 (Method Not Allowed) for GET requests. This means the endpoint EXISTS and may accept POST requests, which would enable:

Privacy Concerns


8. finanzas.gob.ec -- Ministerio de Economia y Finanzas (Ministry of Finance)

Technology Stack

Analytics

None detected.

Subdomains & Internal Systems Discovered

System URL Technology Purpose
eSIGEF
aduana.gob.ec G-7R2ZYSV7DY --
seps.gob.ec G-47SH65ZV9H, UA-35721055-1 Facebook Pixel 436848186041416, FingerprintJS
iess.gob.ec None --
superbancos.gob.ec None --
finanzas.gob.ec None --