Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Exploitation & Vulnerability Test ' by Anon-Ninja-Cat <3 For full Report see Anon Ninja Cat' who will contact Infosec Cat 'who will get Clearance from Cone Cat to Access the Cyber Hive index.
- We Are Anonymous
- We Are Legion
- We Are Ghosts of the CyberHive.
- Anon Familia <3
- ------------------------------------------------------
- http://www.sonypictures.com/ (Hollywood, FL, US)
- IP Address 72.52.12.83 <<< unknown.prolexic.com < Prolexic: DoS and DDoS Protection )
- Server Type Apache
- report for www.sonypictures.com (72.52.12.83) <<< unknown.prolexic.com < Prolexic: DoS and DDoS Protection )
- Host is up (0.012s latency).
- rDNS record for 72.52.12.83: unknown.prolexic.com
- PORT STATE SERVICE
- 80/tcp open http
- Target IP: 72.52.12.83 <<< prolexic.com < Prolexic: DoS and DDoS Protection )
- + Target Hostname: www.sonypictures.com
- + Target Port: 80
- + Start Time: 2014-12-02 08:00:59 (GMT-5)
- ---------------------------------------------------------------------------
- + Server: Apache
- + robots.txt contains 2 entries which should be manually viewed.
- + ETag header found on server, fields: 0x4fad 0x5092bb9bcf9a9
- + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
- + /WEB-INF/web.xml: JRUN default file found.
- + OSVDB-9392: /userinfo.php?uid=1;: Xoops portal gives detailed error messages including SQL syntax and may allow an exploit.
- + OSVDB-3092: /beta/: This might be interesting...
- + OSVDB-3092: /test.txt: This might be interesting...
- + OSVDB-3233: /netbasic/websinfo.bas: Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.
- + OSVDB-3092: /tv/: This might be interesting... potential country code (Tuvalu)
- /maintenance/: Admin login page/section found.
- 11 site(s) hosted on ip 72.52.12.83
- Location: Hollywood,United States
- sonypictures.com
- d-9.com
- thisistheend.com
- thesocialnetwork-movie.com
- dragontattoo.com
- sonypictures.net
- sonypicturesanimation.com
- entertheunderworld.com
- skyfall-movie.com
- smurfhappens.com
- omnicorp.com
- ======================================================================================================
- Server:Apache
- IP Address:198.212.50.74
- Port:443
- Hostname:www.sonypictures.com
- sonypictures.com A 5 minutes 198.212.50.74
- report for 198.212.50.74
- Host is up (0.024s latency).
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- mail.sonypictures.com A 5 minutes 209.0.235.15 (US)
- test.sonypictures.com A 5 minutes 64.37.182.123 (San Diego, CA, US)
- www.sonypictures.com A 5 minutes 72.52.12.83 (Hollywood, FL, US)
- DOMAINS:
- www.sonypictures.com, sonypictures.com, ultraviolet.sonypictures.com, uv.sonypictures.com,
- ultraviolet.sonypictures.co.nz, ultraviolet.sonypictures.com.au
- Serial Number:18DAD19E267DE8BB4A2158CDCC6B3B4A
- Fingerprint (SHA-1):4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
- Serial Number:5B88DA6C7ADA7A593E729363BCB75843
- Fingerprint (SHA-1):8AE1D106CACCD3A2B7CBBF0FD8447EF02CB6E869
- # robots.txt for SonyPictures.com
- User-agent: *
- Disallow: /global
- Disallow: /homevideo/bluray/ajax
- The target site has no DNS wildcard, and the contents of http://sonypictures.com/search differ from the contents of http://www.sonypictures.com
- The contents of http://72.52.12.83 differ from the contents of http://www.sonypictures.com
- A robots.txt file was found at: "http://www.sonypictures.com/robots.txt".
- The URL: "http://www.sonypictures.com/" sent the cookie: "NSC_tpozqjd-83+63+23+94-91=ffffffffc5dc2c5345525d5f4f58455e445a4a423660;path=/;httponly".
- The URL: "http://www.sonypictures.com/" sent the cookie: "sto-id-20480=KABOAAAKFAAA; Expires=Fri, 29-Nov-2024 14:28:16 GMT; Path=/".
- The URL: "http://www.sonypictures.com/" returned a response that may contain a "SHA1" hash. The hash is: "bf433b366f10c888002d617a38d2309abe303d79"
- ==================================================================================================================
- GET http://www.sonypictures.com/crossdomain.xml HTTP/1.1
- Host: www.sonypictures.com
- Cookie: NSC_tpozqjd-83+63+23+94-91=ffffffffc5dc2c5345525d5f4f58455e445a4a423660; sto-id-20480=KFBOAAAKFAAA
- crossdomain.xml" file allows access from: "www.sonypictures.com
- crossdomain.xml" file allows access from: "flash.sonypictures.com
- crossdomain.xml" file allows access from: "secure.sonypictures.com
- crossdomain.xml" file allows access from: "www.sonypictures.net
- crossdomain.xml" file allows access from: "www.sonypictures.co.uk
- crossdomain.xml" file allows access from: "www.sonypictures.com.au
- crossdomain.xml" file allows access from: "www.sonypictures.jp
- crossdomain.xml" file allows access from: "www.sonywonder.com
- crossdomain.xml" file allows access from: "www.wheeloffortune.com
- crossdomain.xml" file allows access from: "www.vannastyle.com
- crossdomain.xml" file allows access from: "www.jeopardy.com
- crossdomain.xml" file allows access from: "www.007.com
- crossdomain.xml" file allows access from: "www.battlela.com
- crossdomain.xml" file allows access from: "www.district9movie.com
- crossdomain.xml" file allows access from: "www.multinationalunited.com
- crossdomain.xml" file allows access from: "www.residentevil-movie.com
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- The mail account: "[email protected]
- ======================================================================================================================
- EXPLOITS:
- Server does not use secure renegotiation settings
- Site is more vulnerable to Denial of Service (DOS) attacks
- Server does not have session resumption enabled
- Users may experience slower performance
- Server has not enabled HTTP Strict-Transport-Security
- Users may be exposed to man-in-the-middle attacks
- Server doesn’t prefer ciphers that enable forward secrecy.
- Encrypted communications captured today are at risk of being decrypted by an attacker in the future.
- Server uses RC4 cipher with modern browsers
- More secure ciphers are available for TLS 1.1 and newer
- Server is using RC4-based ciphersuites which have known vulnerabilities
- Evaluate your client compatibility requirements to determine if you can disable RC4-based ciphersuites
- Server configuration does not meet FIPS guidelines
- Federal standards for data handling are not being met
- Server does not have OCSP stapling configured
- Users may receive slower performance and privacy may be reduced
- SSL 2.0 Disabled:Pass
- SSL 3.0 Disabled:Pass
- TLS 1.0 Enabled:Pass
- TLS 1.1 Enabled:Pass
- TLS 1.2 Enabled:Pass
- Weak ciphersuites disabled:Pass
- Certificates configured correctly:Pass
- Secure renegotiation configured:Fail <<<<<
- Session resumption configured:Fail <<<<<<
- BEAST Vulnerability:Pass
- OCSP Stapling:Fail <<<<<<
- PCI Compliant:Pass
- FIPS Compliant:Fail <<<<
- Forward Secrecy Supported:Fail <<<<<
- Heartbleed Vulnerability:Pass
- Certificate validation URIs resolve to IPv6 addresses:Fail
- Strict Transport Security:Fail <<<<<
- Mixed Content (HTTP and HTTPS):Timed Out <<<<<<
- Domain name resolves to IPv4 address:Pass
- Domain name resolves to IPv6 address:Fail <<<<<
- To Sony ' it is dissapointing to see a multi billion dollar Company ' have a GRADE F/ website System ?Yes i have Graded you ? i could strip & found more Exploits & Error's 'all day long.this Exploitation & Vulnerability Test is 43% ' Pull YouR sOcKS uP ' oh and "FURY" was a good Movie , you could make a Movie about how Sony got Hacked ' i assure you it would be a Box Office HIT . p.s. you gonna have to take a pay cut & Fire someone in your Computer WEB/Security/ Department ???? ASAP
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement