Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@kali:~# MYIP=$(curl -v https://api.ipify.org?format=json | grep ip) && echo "Hey my IP is $MYIP try to hack me I am fucking bored" && nmap -vv -Pn 127.0.0.1 -p 1-65355 && echo "VNC password is 123456"
- % Total % Received % Xferd Average Speed Time Time Time Current
- Dload Upload Total Spent Left Speed
- 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 23.21.126.66:443...
- * Connected to api.ipify.org (23.21.126.66) port 443 (#0)
- * ALPN, offering h2
- * ALPN, offering http/1.1
- * successfully set certificate verify locations:
- * CAfile: /etc/ssl/certs/ca-certificates.crt
- CApath: /etc/ssl/certs
- } [5 bytes data]
- * TLSv1.3 (OUT), TLS handshake, Client hello (1):
- } [512 bytes data]
- * TLSv1.3 (IN), TLS handshake, Server hello (2):
- { [89 bytes data]
- * TLSv1.2 (IN), TLS handshake, Certificate (11):
- { [4421 bytes data]
- * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
- { [333 bytes data]
- * TLSv1.2 (IN), TLS handshake, Server finished (14):
- { [4 bytes data]
- * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
- } [70 bytes data]
- * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
- } [1 bytes data]
- * TLSv1.2 (OUT), TLS handshake, Finished (20):
- } [16 bytes data]
- * TLSv1.2 (IN), TLS handshake, Finished (20):
- { [16 bytes data]
- * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
- * ALPN, server did not agree to a protocol
- * Server certificate:
- * subject: OU=Domain Control Validated; OU=PositiveSSL Wildcard; CN=*.ipify.org
- * start date: Jan 24 00:00:00 2018 GMT
- * expire date: Jan 23 23:59:59 2021 GMT
- * subjectAltName: host "api.ipify.org" matched cert's "*.ipify.org"
- * issuer: C=GB; ST=Greater Manchester; L=Salford; O=COMODO CA Limited; CN=COMODO RSA Domain Validation Secure Server CA
- * SSL certificate verify ok.
- } [5 bytes data]
- > GET /?format=json HTTP/1.1
- > Host: api.ipify.org
- > User-Agent: curl/7.72.0
- > Accept: */*
- >
- { [5 bytes data]
- * Mark bundle as not supporting multiuse
- < HTTP/1.1 200 OK
- < Server: Cowboy
- < Connection: keep-alive
- < Content-Type: application/json
- < Vary: Origin
- < Date: Sun, 13 Sep 2020 05:41:24 GMT
- < Content-Length: 22
- < Via: 1.1 vegur
- <
- { [22 bytes data]
- 100 22 100 22 0 0 130 0 --:--:-- --:--:-- --:--:-- 130
- * Connection #0 to host api.ipify.org left intact
- Hey my IP is {"ip":"24.203.90.108"} try to hack me I am fucking bored
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-13 01:41 EDT
- Initiating SYN Stealth Scan at 01:41
- Scanning localhost (127.0.0.1) [65355 ports]
- Discovered open port 22/tcp on 127.0.0.1
- Discovered open port 443/tcp on 127.0.0.1
- Discovered open port 80/tcp on 127.0.0.1
- Discovered open port 5903/tcp on 127.0.0.1
- Discovered open port 7004/tcp on 127.0.0.1
- Discovered open port 1716/tcp on 127.0.0.1
- Completed SYN Stealth Scan at 01:41, 1.66s elapsed (65355 total ports)
- Nmap scan report for localhost (127.0.0.1)
- Host is up, received user-set (0.000015s latency).
- Scanned at 2020-09-13 01:41:23 EDT for 2s
- Not shown: 65349 closed ports
- Reason: 65349 resets
- PORT STATE SERVICE REASON
- 22/tcp open ssh syn-ack ttl 64
- 80/tcp open http syn-ack ttl 64
- 443/tcp open https syn-ack ttl 64
- 1716/tcp open xmsg syn-ack ttl 64
- 5903/tcp open vnc-3 syn-ack ttl 64
- 7004/tcp open afs3-kaserver syn-ack ttl 64
- Read data files from: /usr/bin/../share/nmap
- Nmap done: 1 IP address (1 host up) scanned in 1.84 seconds
- Raw packets sent: 65355 (2.876MB) | Rcvd: 130716 (5.490MB)
- VNC password is 123456
- root@kali:~#
- I AM NOT JOKING!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement