Advertisement
TheAnon0ne

#OpPedoChat - Target information, Mhamic.org & amikejo.org

Jul 10th, 2012
3,715
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.11 KB | None | 0 0
  1. Twitter @TheAnon0ne | E: theanon0ne@hushmail.com | Voicemail: +1 (615)-Anon0ne
  2.  
  3. OpPedoChat --> Target information, Mhamic.org & amikejo.org
  4. Moar info: http://pastebin.com/rXYfrTKf
  5.  
  6. + Target IP: 88.80.6.210
  7. + Target Hostname: www.mhamic.org
  8. + Target Port: 80
  9. + Start Time: 2012-07-10 00:43:19
  10. ---------------------------------------------------------------------------
  11. + Server: Apache/2.2.3 (FreeBSD) mod_ssl/2.2.3 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.10 with Suhosin-Patch
  12. + Server banner has changed from Apache/2.2.3 (FreeBSD) mod_ssl/2.2.3 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.10 with Suhosin-Patch to Apache/2.2, this may suggest a WAF or load balancer is in place
  13. + PHP/5.2.10 appears to be outdated (current is at least 5.3.5)
  14. + Apache/2.2.3 appears to be outdated (current is at least Apache/2.2.17). Apache 1.3.42 (final release) and 2.0.64 are also current.
  15. + mod_ssl/2.2.3 appears to be outdated (current is at least 2.8.31) (may depend on server version)
  16. + Number of sections in the version string differ from those in the database, the server reports: openssl/0.9.7e-p1 while the database has: 1.0.0.100. This may cause false positives.
  17. + OpenSSL/0.9.7e-p1 appears to be outdated (current is at least 1.0.0d). OpenSSL 0.9.8r is also current.
  18. + ETag header found on server, inode: 2426155, size: 5031, mtime: 0x749520c0
  19. + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE
  20. + mod_ssl/2.2.3 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.10 with Suhosin-Patch - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell (difficult to exploit). CVE-2002-0082, OSVDB-756.
  21.  
  22.  
  23. ###########################################################################
  24.  
  25. ---------------------------------------------------------------------------
  26. + Target IP: 72.167.183.31
  27. + Target Hostname: www.amikejo.org
  28. + Target Port: 80
  29. + Start Time: 2012-07-10 00:29:04
  30. ---------------------------------------------------------------------------
  31. + Server: Apache
  32. + No CGI Directories found (use '-C all' to force check all possible dirs)
  33. + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
  34. + OSVDB-3268: /icons/: Directory indexing found.
  35. + OSVDB-3233: /icons/README: Apache default file found.
  36.  
  37.  
  38.  
  39. ###########################################################################
  40.  
  41.  
  42.  
  43. dennisummels23@hotmail.com 86.94.61.217
  44.  
  45. http://mineurs.nl/advancedguestbook/index.php?entry=20
  46.  
  47. 21), IP-adres genoteerd Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; GTB6.3. Dennis en Angelique. dennisummels23(at)hotmail(dot)com. Plaats: ...
  48.  
  49.  
  50. -------------------------------------------------------------------------
  51.  
  52. HJMLagarde@hetnet.nl 86.85.13.28
  53.  
  54. hein Lagarde
  55.  
  56. http://www.brommerclub-lauwe.nl/index.php?p=gastenboek
  57.  
  58. Germa Lagarde
  59.  
  60. http://www.fortisturnen.nl/old/index_bestanden/Page441.htm
  61. http://www.paxchristicollege.nl/Media/view/2953/Klankbordouders%20Havo-Vwo%20JCW%202011-2012.pdf
  62.  
  63. We are Anonymous.
  64. We are Legion.
  65. We do not Forgive.
  66. We do not Forget.
  67. Expect Us.
  68.  
  69. Twitter @TheAnon0ne | E: theanon0ne@hushmail.com | Voicemail: +1 (615)-Anon0ne
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement