Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- every IP listed in this paste is from; http://www.ip.com.my/malaysia-ip-address-range
- malaysian network blocks
- [
- 111.67.32.0--111.67.47.255, ttl ips: 4096
- ][
- 1.32.0.0--1.32.127.255, ttl ips: 32768
- ]
- --------------------------------------------
- \~Routers~/
- 1.32.0.54:8080/cgi-bin/webproc
- http://1.32.0.49:8080/login.asp
- --------------------------------------------
- \~Unknown devices~/
- Discovered open port 80/tcp on 1.32.0.91
- Discovered open port 80/tcp on 1.32.0.135
- Discovered open port 80/tcp on 1.32.0.129
- Discovered open port 80/tcp on 1.32.0.160
- Discovered open port 80/tcp on 1.32.0.200
- Discovered open port 80/tcp on 1.32.0.215
- Discovered open port 8080/tcp on 1.32.0.54
- Discovered open port 8080/tcp on 1.32.0.231
- Discovered open port 8080/tcp on 1.32.0.49
- Discovered open port 80/tcp on 1.32.0.86
- Discovered open port 443/tcp on 1.32.0.86
- Discovered open port 8080/tcp on 1.32.0.168
- Discovered open port 80/tcp on 1.32.0.84
- Discovered open port 1443/tcp on 1.32.0.72
- Discovered open port 443/tcp on 1.32.0.197
- Discovered open port 8080/tcp on 1.32.0.197
- --------------------------------------------
- More detailed information;
- 111.67.32.4
- Running: Microsoft Windows 2012
- Host is up (0.27s latency).
- PORT STATE SERVICE VERSION
- 80/tcp open http Microsoft IIS httpd 8.5
- |_http-server-header: Microsoft-IIS/8.5
- 443/tcp open ssl/https?
- --------------------------------------------
- 111.67.32.8
- OS details: Cisco Adaptive Security Appliance (PIX OS 8.4)
- Network Distance: 18 hops
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: Randomized
- Service Info: Device: firewall; CPE: cpe:/h:cisco:asa_5510
- PORT STATE SERVICE VERSION
- 80/tcp filtered http
- 443/tcp open ssl/http Cisco ASA 5510 firewall http config
- | ssl-poodle:
- | VULNERABLE:
- | SSL POODLE information leak
- | State: VULNERABLE
- | IDs: OSVDB:113251 CVE:CVE-2014-3566
- | The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and
- | other products, uses nondeterministic CBC padding, which makes it easier
- | for man-in-the-middle attackers to obtain cleartext data via a
- | padding-oracle attack, aka the "POODLE" issue.
- | Disclosure date: 2014-10-14
- | Check results:
- | TLS_RSA_WITH_AES_128_CBC_SHA
- | References:
- | https://www.imperialviolet.org/2014/10/14/poodle.html
- | http://osvdb.org/113251
- | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
- |_ https://www.openssl.org/~bodo/ssl-poodle.pdf
- --------------------------------------------------
- 111.67.32.77
- Device type: general purpose
- Running (JUST GUESSING): Linux 3.X|2.6.X (92%)
- OS CPE: cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:2.6.32
- Host is up (0.26s latency).
- PORT STATE SERVICE VERSION
- 80/tcp filtered http
- 443/tcp open ssl/http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.1e-fips PHP/5.4.16)
- |_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips PHP/5.4.16
- | ssl-poodle:
- | VULNERABLE:
- | SSL POODLE information leak
- | State: LIKELY VULNERABLE
- | IDs: OSVDB:113251 CVE:CVE-2014-3566
- | The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and
- | other products, uses nondeterministic CBC padding, which makes it easier
- | for man-in-the-middle attackers to obtain cleartext data via a
- | padding-oracle attack, aka the "POODLE" issue.
- | Disclosure date: 2014-10-14
- | Check results:
- | TLS_RSA_WITH_AES_128_CBC_SHA
- | TLS_FALLBACK_SCSV properly implemented
- | References:
- | https://www.imperialviolet.org/2014/10/14/poodle.html
- | http://osvdb.org/113251
- | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
- |_ https://www.openssl.org/~bodo/ssl-poodle.pdf
- -------------------------------------------------------
- 111.67.32.80
- Host is up (0.27s latency).
- PORT STATE SERVICE VERSION
- 80/tcp filtered http
- 443/tcp open ssl/http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16)
- |_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16
- | ssl-poodle:
- | VULNERABLE:
- | SSL POODLE information leak
- | State: LIKELY VULNERABLE
- | IDs: OSVDB:113251 CVE:CVE-2014-3566
- --------------------------------------------
- 111.67.32.116
- Host is up (0.26s latency).
- PORT STATE SERVICE VERSION
- 80/tcp filtered http
- 443/tcp open ssl/http Cisco ASA 5510 firewall http config
- | ssl-poodle:
- | VULNERABLE:
- | SSL POODLE information leak
- | State: VULNERABLE
- | IDs: OSVDB:113251 CVE:CVE-2014-3566
- ----------------------------------------------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement