Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Twitter @TheAnon0ne | E: theanon0ne@hushmail.com | Voicemail: +1 (615)-Anon0ne
- OpPedoChat --> Target information, Mhamic.org & amikejo.org
- Moar info: http://pastebin.com/rXYfrTKf
- + Target IP: 88.80.6.210
- + Target Hostname: www.mhamic.org
- + Target Port: 80
- + Start Time: 2012-07-10 00:43:19
- ---------------------------------------------------------------------------
- + Server: Apache/2.2.3 (FreeBSD) mod_ssl/2.2.3 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.10 with Suhosin-Patch
- + Server banner has changed from Apache/2.2.3 (FreeBSD) mod_ssl/2.2.3 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.10 with Suhosin-Patch to Apache/2.2, this may suggest a WAF or load balancer is in place
- + PHP/5.2.10 appears to be outdated (current is at least 5.3.5)
- + Apache/2.2.3 appears to be outdated (current is at least Apache/2.2.17). Apache 1.3.42 (final release) and 2.0.64 are also current.
- + mod_ssl/2.2.3 appears to be outdated (current is at least 2.8.31) (may depend on server version)
- + Number of sections in the version string differ from those in the database, the server reports: openssl/0.9.7e-p1 while the database has: 1.0.0.100. This may cause false positives.
- + OpenSSL/0.9.7e-p1 appears to be outdated (current is at least 1.0.0d). OpenSSL 0.9.8r is also current.
- + ETag header found on server, inode: 2426155, size: 5031, mtime: 0x749520c0
- + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE
- + mod_ssl/2.2.3 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.10 with Suhosin-Patch - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell (difficult to exploit). CVE-2002-0082, OSVDB-756.
- ###########################################################################
- ---------------------------------------------------------------------------
- + Target IP: 72.167.183.31
- + Target Hostname: www.amikejo.org
- + Target Port: 80
- + Start Time: 2012-07-10 00:29:04
- ---------------------------------------------------------------------------
- + Server: Apache
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
- + OSVDB-3268: /icons/: Directory indexing found.
- + OSVDB-3233: /icons/README: Apache default file found.
- ###########################################################################
- dennisummels23@hotmail.com 86.94.61.217
- http://mineurs.nl/advancedguestbook/index.php?entry=20
- 21), IP-adres genoteerd Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; GTB6.3. Dennis en Angelique. dennisummels23(at)hotmail(dot)com. Plaats: ...
- -------------------------------------------------------------------------
- HJMLagarde@hetnet.nl 86.85.13.28
- hein Lagarde
- http://www.brommerclub-lauwe.nl/index.php?p=gastenboek
- Germa Lagarde
- http://www.fortisturnen.nl/old/index_bestanden/Page441.htm
- http://www.paxchristicollege.nl/Media/view/2953/Klankbordouders%20Havo-Vwo%20JCW%202011-2012.pdf
- We are Anonymous.
- We are Legion.
- We do not Forgive.
- We do not Forget.
- Expect Us.
- Twitter @TheAnon0ne | E: theanon0ne@hushmail.com | Voicemail: +1 (615)-Anon0ne
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement