Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Twitter -; @WaveAnonops
- _____________________________________________________________________________________________
- Host's addresses:
- iamgay.us
- 28800 IN A 64.20.55.150
- Name Servers:
- ns4.xxx-server.biz 14400 IN A 64.20.55.147
- ns.xxx-server.biz 14400 IN A 92.48.84.196
- ns3.xxx-server.biz 14400 IN A 64.20.55.146
- Mail (MX) Servers:
- iamgay.us 28790 IN A 64.20.55.150
- Trying Zone Transfer for iamgay.us on ns.xxx-server.biz ...
- iamgay.us 86400 IN SOA
- iamgay.us 28800 IN MX
- iamgay.us 86400 IN NS
- iamgay.us 86400 IN NS
- iamgay.us 86400 IN NS
- iamgay.us 28800 IN A 64.20.55.150
- ftp.iamgay.us 28800 IN CNAME
- localhost.iamgay.us 28800 IN A 127.0.0.1
- mail.iamgay.us 28800 IN CNAME
- www.iamgay.us 28800 IN CNAME
- ns.xxx-server.biz Bind Version:
- 9.6.-ESV-R3
- ______________________________________________________________________________________________
- Discovered open port 110/tcp on 64.20.55.150
- Discovered open port 25/tcp on 64.20.55.150
- Discovered open port 22/tcp on 64.20.55.150
- Discovered open port 21/tcp on 64.20.55.150
- Discovered open port 993/tcp on 64.20.55.150
- Discovered open port 3306/tcp on 64.20.55.150
- Discovered open port 995/tcp on 64.20.55.150
- Discovered open port 53/tcp on 64.20.55.150
- Discovered open port 80/tcp on 64.20.55.150
- Discovered open port 143/tcp on 64.20.55.150
- Discovered open port 443/tcp on 64.20.55.150
- Discovered open port 465/tcp on 64.20.55.150
- Discovered open port 26/tcp on 64.20.55.150
- ______________________________________________________________________________________________
- PORT STATE SERVICE VERSION
- 21/tcp open ftp PureFTPd
- |_ftp-anon: Anonymous FTP login allowed
- 22/tcp open ssh OpenSSH 5.8p2_hpn13v11 (FreeBSD 20110503; protocol 2.0)
- 25/tcp open smtp Exim smtpd 4.77
- 26/tcp open smtp Exim smtpd 4.77
- 53/tcp open domain ISC BIND NSD 3.2.10
- 80/tcp open tcpwrapped
- 110/tcp open pop3 Dovecot pop3d
- 143/tcp open imap Dovecot imapd
- 443/tcp open tcpwrapped
- 465/tcp open ssl/smtp Exim smtpd 4.77
- 993/tcp open ssl/imap Dovecot imapd
- 995/tcp open ssl/pop3 Dovecot pop3d
- 1720/tcp filtered H.323/Q.931
- 3306/tcp open mysql MySQL 5.5.20-log
- | mysql-info: Protocol: 10
- | Version: 5.5.20-log
- Service Info: OS: FreeBSD
- ______________________________________________________________________________________________
- ________________________________________________________________________________________________
- <ROOT>
- <SiteVulList>
- <VulRow>
- <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi?l=botlink</ReferURL>
- <Parameter>l=botlink</Parameter>
- <Type>String</Type>
- <KWordActionURL>function</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- <VulRow>
- <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi^l=botlink</ReferURL>
- <Parameter>l=botlink</Parameter>
- <Type>String</Type>
- <KWordActionURL>floor</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- <VulRow>
- <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi?id=377&l=toplist&trade=http://www.gayica.net</ReferURL>
- <Parameter>trade=http://www.gayica.net</Parameter>
- <Type>String</Type>
- <KWordActionURL>naked</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- <VulRow>
- <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi?id=377&l=toplist^trade=http://www.gayica.net</ReferURL>
- <Parameter>trade=http://www.gayica.net</Parameter>
- <Type>String</Type>
- <KWordActionURL>XMLHttpRequest</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- <VulRow>
- <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi?l=toplist&trade=http://twinkspix.com/&id=420</ReferURL>
- <Parameter>id=420</Parameter>
- <Type>String</Type>
- <KWordActionURL>action</KWordActionURL>
- <Vulnerability>URL SQL INJECTION</Vulnerability>
- </VulRow>
- <VulRow>
- <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi?l=toplist&trade=http://twinkspix.com/^id=420</ReferURL>
- <Parameter>id=420</Parameter>
- <Type>Integer</Type>
- <KWordActionURL>typeof</KWordActionURL>
- <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
- </VulRow>
- </SiteVulList>
- </ROOT>
- ________________________________________________________________________________________________
- #We are Anonymous
- #We are Legion
- #We do not Forgive
- #We do not forget
- #Expect us
- #OpPedoChat
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement