Advertisement
NSAFROG

Malaysian POODLES

Jun 23rd, 2017
141
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.71 KB | None | 0 0
  1. every IP listed in this paste is from; http://www.ip.com.my/malaysia-ip-address-range
  2. malaysian network blocks
  3. [
  4. 111.67.32.0--111.67.47.255, ttl ips: 4096
  5. ][
  6. 1.32.0.0--1.32.127.255, ttl ips: 32768
  7. ]
  8. --------------------------------------------
  9. \~Routers~/
  10. 1.32.0.54:8080/cgi-bin/webproc
  11. http://1.32.0.49:8080/login.asp
  12. --------------------------------------------
  13. \~Unknown devices~/
  14. Discovered open port 80/tcp on 1.32.0.91
  15. Discovered open port 80/tcp on 1.32.0.135
  16. Discovered open port 80/tcp on 1.32.0.129
  17. Discovered open port 80/tcp on 1.32.0.160
  18. Discovered open port 80/tcp on 1.32.0.200
  19. Discovered open port 80/tcp on 1.32.0.215
  20. Discovered open port 8080/tcp on 1.32.0.54
  21. Discovered open port 8080/tcp on 1.32.0.231
  22. Discovered open port 8080/tcp on 1.32.0.49
  23. Discovered open port 80/tcp on 1.32.0.86
  24. Discovered open port 443/tcp on 1.32.0.86
  25. Discovered open port 8080/tcp on 1.32.0.168
  26. Discovered open port 80/tcp on 1.32.0.84
  27. Discovered open port 1443/tcp on 1.32.0.72
  28. Discovered open port 443/tcp on 1.32.0.197
  29. Discovered open port 8080/tcp on 1.32.0.197
  30. --------------------------------------------
  31. More detailed information;
  32.  
  33. 111.67.32.4
  34. Running: Microsoft Windows 2012
  35. Host is up (0.27s latency).
  36. PORT STATE SERVICE VERSION
  37. 80/tcp open http Microsoft IIS httpd 8.5
  38. |_http-server-header: Microsoft-IIS/8.5
  39. 443/tcp open ssl/https?
  40. --------------------------------------------
  41. 111.67.32.8
  42. OS details: Cisco Adaptive Security Appliance (PIX OS 8.4)
  43. Network Distance: 18 hops
  44. TCP Sequence Prediction: Difficulty=262 (Good luck!)
  45. IP ID Sequence Generation: Randomized
  46. Service Info: Device: firewall; CPE: cpe:/h:cisco:asa_5510
  47.  
  48. PORT STATE SERVICE VERSION
  49. 80/tcp filtered http
  50. 443/tcp open ssl/http Cisco ASA 5510 firewall http config
  51. | ssl-poodle:
  52. | VULNERABLE:
  53. | SSL POODLE information leak
  54. | State: VULNERABLE
  55. | IDs: OSVDB:113251 CVE:CVE-2014-3566
  56. | The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and
  57. | other products, uses nondeterministic CBC padding, which makes it easier
  58. | for man-in-the-middle attackers to obtain cleartext data via a
  59. | padding-oracle attack, aka the "POODLE" issue.
  60. | Disclosure date: 2014-10-14
  61. | Check results:
  62. | TLS_RSA_WITH_AES_128_CBC_SHA
  63. | References:
  64. | https://www.imperialviolet.org/2014/10/14/poodle.html
  65. | http://osvdb.org/113251
  66. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
  67. |_ https://www.openssl.org/~bodo/ssl-poodle.pdf
  68. --------------------------------------------------
  69. 111.67.32.77
  70. Device type: general purpose
  71. Running (JUST GUESSING): Linux 3.X|2.6.X (92%)
  72. OS CPE: cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:2.6.32
  73.  
  74. Host is up (0.26s latency).
  75. PORT STATE SERVICE VERSION
  76. 80/tcp filtered http
  77. 443/tcp open ssl/http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.1e-fips PHP/5.4.16)
  78. |_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips PHP/5.4.16
  79. | ssl-poodle:
  80. | VULNERABLE:
  81. | SSL POODLE information leak
  82. | State: LIKELY VULNERABLE
  83. | IDs: OSVDB:113251 CVE:CVE-2014-3566
  84. | The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and
  85. | other products, uses nondeterministic CBC padding, which makes it easier
  86. | for man-in-the-middle attackers to obtain cleartext data via a
  87. | padding-oracle attack, aka the "POODLE" issue.
  88. | Disclosure date: 2014-10-14
  89. | Check results:
  90. | TLS_RSA_WITH_AES_128_CBC_SHA
  91. | TLS_FALLBACK_SCSV properly implemented
  92. | References:
  93. | https://www.imperialviolet.org/2014/10/14/poodle.html
  94. | http://osvdb.org/113251
  95. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
  96. |_ https://www.openssl.org/~bodo/ssl-poodle.pdf
  97. -------------------------------------------------------
  98. 111.67.32.80
  99. Host is up (0.27s latency).
  100. PORT STATE SERVICE VERSION
  101. 80/tcp filtered http
  102. 443/tcp open ssl/http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16)
  103. |_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16
  104. | ssl-poodle:
  105. | VULNERABLE:
  106. | SSL POODLE information leak
  107. | State: LIKELY VULNERABLE
  108. | IDs: OSVDB:113251 CVE:CVE-2014-3566
  109. --------------------------------------------
  110. 111.67.32.116
  111. Host is up (0.26s latency).
  112. PORT STATE SERVICE VERSION
  113. 80/tcp filtered http
  114. 443/tcp open ssl/http Cisco ASA 5510 firewall http config
  115. | ssl-poodle:
  116. | VULNERABLE:
  117. | SSL POODLE information leak
  118. | State: VULNERABLE
  119. | IDs: OSVDB:113251 CVE:CVE-2014-3566
  120. ----------------------------------------------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement