Advertisement
Guest User

OBamaCare.

a guest
Sep 29th, 2013
353
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.01 KB | None | 0 0
  1.  
  2.  
  3. Loaded 110 scripts for scanning.
  4.  
  5. Script Pre-scanning.
  6.  
  7. Initiating Ping Scan at 13:25
  8.  
  9. Scanning obamacare.com (67.43.2.177) [4 ports]
  10.  
  11. Completed Ping Scan at 13:25, 0.28s elapsed (1 total hosts)
  12.  
  13. Initiating Parallel DNS resolution of 1 host. at 13:25
  14.  
  15. Completed Parallel DNS resolution of 1 host. at 13:25, 0.19s elapsed
  16.  
  17. Initiating SYN Stealth Scan at 13:25
  18.  
  19. Scanning obamacare.com (67.43.2.177) [1000 ports]
  20.  
  21. Discovered open port 3306/tcp on 67.43.2.177
  22.  
  23. Discovered open port 110/tcp on 67.43.2.177
  24.  
  25. Discovered open port 143/tcp on 67.43.2.177
  26.  
  27. Discovered open port 22/tcp on 67.43.2.177
  28.  
  29. Discovered open port 21/tcp on 67.43.2.177
  30.  
  31. Discovered open port 995/tcp on 67.43.2.177
  32.  
  33. Discovered open port 993/tcp on 67.43.2.177
  34.  
  35. Discovered open port 80/tcp on 67.43.2.177
  36.  
  37. Discovered open port 443/tcp on 67.43.2.177
  38.  
  39. Discovered open port 53/tcp on 67.43.2.177
  40.  
  41. Discovered open port 465/tcp on 67.43.2.177
  42.  
  43. Completed SYN Stealth Scan at 13:25, 6.40s elapsed (1000 total ports)
  44.  
  45. Initiating Service scan at 13:25
  46.  
  47. Scanning 11 services on obamacare.com (67.43.2.177)
  48.  
  49. Completed Service scan at 13:26, 36.07s elapsed (11 services on 1 host)
  50.  
  51. Initiating OS detection (try #1) against obamacare.com (67.43.2.177)
  52.  
  53. Retrying OS detection (try #2) against obamacare.com (67.43.2.177)
  54.  
  55. Initiating Traceroute at 13:26
  56.  
  57. Completed Traceroute at 13:26, 0.24s elapsed
  58.  
  59. Initiating Parallel DNS resolution of 17 hosts. at 13:26
  60.  
  61. Completed Parallel DNS resolution of 17 hosts. at 13:26, 0.24s elapsed
  62.  
  63. NSE: Script scanning 67.43.2.177.
  64.  
  65. Initiating NSE at 13:26
  66.  
  67. Completed NSE at 13:26, 30.35s elapsed
  68.  
  69. Nmap scan report for obamacare.com (67.43.2.177)
  70.  
  71. Host is up (0.12s latency).
  72.  
  73. rDNS record for 67.43.2.177: host2.24kconsulting.net
  74.  
  75. Not shown: 988 filtered ports
  76.  
  77. PORT STATE SERVICE VERSION
  78.  
  79. 20/tcp closed ftp-data
  80.  
  81. 21/tcp open ftp Pure-FTPd
  82.  
  83. | ssl-cert: Subject: commonName=host2.24kconsulting.net/organizationName=Unknown/stateOrProvinceName=Unknown/countryName=US
  84.  
  85. | Issuer: commonName=host2.24kconsulting.net/organizationName=Unknown/stateOrProvinceName=Unknown/countryName=US
  86.  
  87. | Public Key type: rsa
  88.  
  89. | Public Key bits: 2048
  90.  
  91. | Not valid before: 2012-11-28T15:25:38+00:00
  92.  
  93. | Not valid after: 2013-11-28T15:25:38+00:00
  94.  
  95. | MD5: cf7f 1773 3220 ca08 802b 4d83 f6c6 acd0
  96.  
  97. |_SHA-1: bf8a 13fc b62f 7f57 895f 7991 9b9a a8d1 bcd4 2494
  98.  
  99. |_ssl-date: 2013-09-29T11:26:19+00:00; -1s from local time.
  100.  
  101. 22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
  102.  
  103. | ssh-hostkey: 1024 1f:25:20:ca:87:4c:da:15:a6:c6:ec:07:56:b2:d3:02 (DSA)
  104.  
  105. |_2048 c7:b7:4e:8b:6c:9c:14:ed:ed:d5:bc:66:35:7a:1a:ec (RSA)
  106.  
  107. 53/tcp open domain
  108.  
  109. | dns-nsid:
  110.  
  111. |_ bind.version: 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6
  112.  
  113. 80/tcp open http Apache httpd 2.2.23 ((Unix) mod_ssl/2.2.23 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635)
  114.  
  115. |_http-generator: Drupal 7 (http://drupal.org)
  116.  
  117. |_http-methods: No Allow or Public header in OPTIONS response (status code 301)
  118.  
  119. | http-robots.txt: 54 disallowed entries (15 shown)
  120.  
  121. | /includes/ /misc/ /modules/ /profiles/ /scripts/
  122.  
  123. | /themes/ /CHANGELOG.txt /cron.php /INSTALL.mysql.txt
  124.  
  125. | /INSTALL.pgsql.txt /INSTALL.sqlite.txt /install.php /INSTALL.txt
  126.  
  127. |_/LICENSE.txt /MAINTAINERS.txt
  128.  
  129. | http-title: ObamaCare | Affordable Care Act Facts and Resource Information...
  130.  
  131. |_Requested resource was http://www.obamacare.com/
  132.  
  133. 110/tcp open pop3 Courier pop3d
  134.  
  135. |_pop3-capabilities: PIPELINING LOGIN-DELAY(10) USER STLS IMPLEMENTATION(Courier Mail Server) TOP UIDL
  136.  
  137. 143/tcp open imap Courier Imapd (released 2011)
  138.  
  139. |_imap-capabilities: THREAD=REFERENCES CAPABILITY UIDPLUS ACL NAMESPACE completed SORT IDLE THREAD=ORDEREDSUBJECT QUOTA OK STARTTLSA0001 ACL2=UNION CHILDREN IMAP4rev1
  140.  
  141. 443/tcp open http Apache httpd 2.2.23 ((Unix) mod_ssl/2.2.23 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635)
  142.  
  143. | http-methods: GET HEAD POST OPTIONS TRACE
  144.  
  145. | Potentially risky methods: TRACE
  146.  
  147. |_See http://nmap.org/nsedoc/scripts/http-methods.html
  148.  
  149. |_http-title: Site doesn't have a title (text/html).
  150.  
  151. 465/tcp open ssl/smtp Exim smtpd 4.80.1
  152.  
  153. | smtp-commands: host2.24kconsulting.net Hello d51a59487.access.telenet.be [81.165.148.135], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
  154.  
  155. |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  156.  
  157. | ssl-cert: Subject: commonName=host2.24kconsulting.net/organizationName=Unknown/stateOrProvinceName=Unknown/countryName=US
  158.  
  159. | Issuer: commonName=avast! Mail Scanner Root/organizationName=avast! Mail Scanner
  160.  
  161. | Public Key type: rsa
  162.  
  163. | Public Key bits: 2048
  164.  
  165. | Not valid before: 2012-11-28T15:25:39+00:00
  166.  
  167. | Not valid after: 2013-11-28T15:25:39+00:00
  168.  
  169. | MD5: 72bc 88aa 0f6b ac5b e19e e98f 6a70 9821
  170.  
  171. |_SHA-1: 8f52 9a30 4454 f19e 54c6 09fa d856 24ae 9fae 5e7b
  172.  
  173. |_ssl-date: 2013-09-29T11:26:20+00:00; 0s from local time.
  174.  
  175. | sslv2:
  176.  
  177. | SSLv2 supported
  178.  
  179. |_ ciphers: none
  180.  
  181. 993/tcp open imaps?
  182.  
  183. | ssl-cert: Subject: commonName=host2.24kconsulting.net/organizationName=Unknown/stateOrProvinceName=Unknown/countryName=US
  184.  
  185. | Issuer: commonName=avast! Mail Scanner Root/organizationName=avast! Mail Scanner
  186.  
  187. | Public Key type: rsa
  188.  
  189. | Public Key bits: 2048
  190.  
  191. | Not valid before: 2012-11-28T15:25:38+00:00
  192.  
  193. | Not valid after: 2013-11-28T15:25:38+00:00
  194.  
  195. | MD5: 5ef8 5d6f 803a 06f5 3bfa 62a4 5e1f 7772
  196.  
  197. |_SHA-1: 4d87 3f7a 631a bc91 b390 051e a23c d57e 77bd 5aea
  198.  
  199. |_ssl-date: 2013-09-29T11:26:20+00:00; 0s from local time.
  200.  
  201. | sslv2:
  202.  
  203. | SSLv2 supported
  204.  
  205. |_ ciphers: none
  206.  
  207. 995/tcp open ssl/pop3 Courier pop3d
  208.  
  209. |_pop3-capabilities: PIPELINING LOGIN-DELAY(10) USER UIDL IMPLEMENTATION(Courier Mail Server) TOP
  210.  
  211. | ssl-cert: Subject: commonName=host2.24kconsulting.net/organizationName=Unknown/stateOrProvinceName=Unknown/countryName=US
  212.  
  213. | Issuer: commonName=avast! Mail Scanner Root/organizationName=avast! Mail Scanner
  214.  
  215. | Public Key type: rsa
  216.  
  217. | Public Key bits: 2048
  218.  
  219. | Not valid before: 2012-11-28T15:25:39+00:00
  220.  
  221. | Not valid after: 2013-11-28T15:25:39+00:00
  222.  
  223. | MD5: 879c bf87 be1a d10d 4428 63c6 9b7a ee9b
  224.  
  225. |_SHA-1: daba c7a0 3d30 4274 d16b b745 cee5 7cce f9e7 9967
  226.  
  227. |_ssl-date: 2013-09-29T11:26:21+00:00; 0s from local time.
  228.  
  229. | sslv2:
  230.  
  231. | SSLv2 supported
  232.  
  233. |_ ciphers: none
  234.  
  235. 3306/tcp open mysql MySQL 5.1.70-cll
  236.  
  237. | mysql-info: Protocol: 10
  238.  
  239. | Version: 5.1.70-cll
  240.  
  241. | Thread ID: 285884
  242.  
  243. | Some Capabilities: Long Passwords, Connect with DB, Compress, ODBC, Transactions, Secure Connection
  244.  
  245. | Status: Autocommit
  246.  
  247. |_Salt: vX4;i#n%h]{qHP<wg~e_
  248.  
  249. Device type: WAP|general purpose|router|broadband router
  250.  
  251. Running (JUST GUESSING): Linksys Linux 2.4.X (96%), Linux 2.4.X|2.6.X|3.X (96%), Asus Linux 2.6.X (92%), Netgear embedded (89%)
  252.  
  253. OS CPE: cpe:/o:linksys:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:3 cpe:/h:asus:rt-n16 cpe:/o:asus:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.6.38 cpe:/h:netgear:dg834g
  254.  
  255. Aggressive OS guesses: OpenWrt White Russian 0.9 (Linux 2.4.30) (96%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (96%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), Linux 3.0 (94%), Linux 2.4.18 (93%), Asus RT-N16 WAP (Linux 2.6) (92%), Asus RT-AC66U router (Linux 2.6) (92%), Asus RT-N66U WAP (Linux 2.6) (92%), Tomato 1.28 (Linux 2.6.22) (92%), Linux 2.6.38 (92%)
  256.  
  257. No exact OS matches for host (test conditions non-ideal).
  258.  
  259. Network Distance: 17 hops
  260.  
  261. TCP Sequence Prediction: Difficulty=262 (Good luck!)
  262.  
  263. IP ID Sequence Generation: All zeros
  264.  
  265.  
  266.  
  267. TRACEROUTE (using port 20/tcp)
  268.  
  269. HOP RTT ADDRESS
  270.  
  271. 1 12.00 ms d51A59001.access.telenet.be (81.165.144.1)
  272.  
  273. 2 14.00 ms dD5E0C141.access.telenet.be (213.224.193.65)
  274.  
  275. 3 15.00 ms dD5E0FD51.access.telenet.be (213.224.253.81)
  276.  
  277. 4 14.00 ms ae52.bar1.Brussels1.Level3.net (212.3.238.129)
  278.  
  279. 5 15.00 ms ae-0-11.bar2.Brussels1.Level3.net (4.69.148.178)
  280.  
  281. 6 116.00 ms ae-7-7.ebr1.London1.Level3.net (4.69.148.182)
  282.  
  283. 7 108.00 ms vlan102.ebr2.London1.Level3.net (4.69.143.90)
  284.  
  285. 8 109.00 ms ae-43-43.ebr1.NewYork1.Level3.net (4.69.137.74)
  286.  
  287. 9 109.00 ms 4.69.201.42
  288.  
  289. 10 104.00 ms ae-1-100.ebr2.NewYork2.Level3.net (4.69.135.254)
  290.  
  291. 11 106.00 ms ae-2-2.ebr1.Chicago1.Level3.net (4.69.132.65)
  292.  
  293. 12 111.00 ms ae-6-6.ebr1.Chicago2.Level3.net (4.69.140.190)
  294.  
  295. 13 110.00 ms ae-103-3503.edge2.Chicago2.Level3.net (4.69.158.9)
  296.  
  297. 14 117.00 ms CWIE-LLC.edge2.Chicago2.Level3.net (4.59.29.82)
  298.  
  299. 15 122.00 ms lw-core4-te91.rtr.liquidweb.com (209.59.157.206)
  300.  
  301. 16 119.00 ms lw-dc3-dist15.rtr.liquidweb.com (69.167.128.201)
  302.  
  303. 17 125.00 ms host2.24kconsulting.net (67.43.2.177)
  304.  
  305.  
  306.  
  307. NSE: Script Post-scanning.
  308.  
  309. Initiating NSE at 13:26
  310.  
  311. Completed NSE at 13:26, 0.00s elapsed
  312.  
  313. Read data files from: C:\Program Files\Nmap
  314.  
  315. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  316.  
  317. Nmap done: 1 IP address (1 host up) scanned in 100.74 seconds
  318.  
  319. Raw packets sent: 2068 (94.388KB) | Rcvd: 84 (6.161KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement