Advertisement
independentt

Hack me I am bored ASF

Sep 13th, 2020
8,735
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.62 KB | None | 0 0
  1. root@kali:~# MYIP=$(curl -v https://api.ipify.org?format=json | grep ip) && echo "Hey my IP is $MYIP try to hack me I am fucking bored" && nmap -vv -Pn 127.0.0.1 -p 1-65355 && echo "VNC password is 123456"
  2. % Total % Received % Xferd Average Speed Time Time Time Current
  3. Dload Upload Total Spent Left Speed
  4. 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 23.21.126.66:443...
  5. * Connected to api.ipify.org (23.21.126.66) port 443 (#0)
  6. * ALPN, offering h2
  7. * ALPN, offering http/1.1
  8. * successfully set certificate verify locations:
  9. * CAfile: /etc/ssl/certs/ca-certificates.crt
  10. CApath: /etc/ssl/certs
  11. } [5 bytes data]
  12. * TLSv1.3 (OUT), TLS handshake, Client hello (1):
  13. } [512 bytes data]
  14. * TLSv1.3 (IN), TLS handshake, Server hello (2):
  15. { [89 bytes data]
  16. * TLSv1.2 (IN), TLS handshake, Certificate (11):
  17. { [4421 bytes data]
  18. * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
  19. { [333 bytes data]
  20. * TLSv1.2 (IN), TLS handshake, Server finished (14):
  21. { [4 bytes data]
  22. * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
  23. } [70 bytes data]
  24. * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
  25. } [1 bytes data]
  26. * TLSv1.2 (OUT), TLS handshake, Finished (20):
  27. } [16 bytes data]
  28. * TLSv1.2 (IN), TLS handshake, Finished (20):
  29. { [16 bytes data]
  30. * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
  31. * ALPN, server did not agree to a protocol
  32. * Server certificate:
  33. * subject: OU=Domain Control Validated; OU=PositiveSSL Wildcard; CN=*.ipify.org
  34. * start date: Jan 24 00:00:00 2018 GMT
  35. * expire date: Jan 23 23:59:59 2021 GMT
  36. * subjectAltName: host "api.ipify.org" matched cert's "*.ipify.org"
  37. * issuer: C=GB; ST=Greater Manchester; L=Salford; O=COMODO CA Limited; CN=COMODO RSA Domain Validation Secure Server CA
  38. * SSL certificate verify ok.
  39. } [5 bytes data]
  40. > GET /?format=json HTTP/1.1
  41. > Host: api.ipify.org
  42. > User-Agent: curl/7.72.0
  43. > Accept: */*
  44. >
  45. { [5 bytes data]
  46. * Mark bundle as not supporting multiuse
  47. < HTTP/1.1 200 OK
  48. < Server: Cowboy
  49. < Connection: keep-alive
  50. < Content-Type: application/json
  51. < Vary: Origin
  52. < Date: Sun, 13 Sep 2020 05:41:24 GMT
  53. < Content-Length: 22
  54. < Via: 1.1 vegur
  55. <
  56. { [22 bytes data]
  57. 100 22 100 22 0 0 130 0 --:--:-- --:--:-- --:--:-- 130
  58. * Connection #0 to host api.ipify.org left intact
  59. Hey my IP is {"ip":"24.203.90.108"} try to hack me I am fucking bored
  60. Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-13 01:41 EDT
  61. Initiating SYN Stealth Scan at 01:41
  62. Scanning localhost (127.0.0.1) [65355 ports]
  63. Discovered open port 22/tcp on 127.0.0.1
  64. Discovered open port 443/tcp on 127.0.0.1
  65. Discovered open port 80/tcp on 127.0.0.1
  66. Discovered open port 5903/tcp on 127.0.0.1
  67. Discovered open port 7004/tcp on 127.0.0.1
  68. Discovered open port 1716/tcp on 127.0.0.1
  69. Completed SYN Stealth Scan at 01:41, 1.66s elapsed (65355 total ports)
  70. Nmap scan report for localhost (127.0.0.1)
  71. Host is up, received user-set (0.000015s latency).
  72. Scanned at 2020-09-13 01:41:23 EDT for 2s
  73. Not shown: 65349 closed ports
  74. Reason: 65349 resets
  75. PORT STATE SERVICE REASON
  76. 22/tcp open ssh syn-ack ttl 64
  77. 80/tcp open http syn-ack ttl 64
  78. 443/tcp open https syn-ack ttl 64
  79. 1716/tcp open xmsg syn-ack ttl 64
  80. 5903/tcp open vnc-3 syn-ack ttl 64
  81. 7004/tcp open afs3-kaserver syn-ack ttl 64
  82.  
  83. Read data files from: /usr/bin/../share/nmap
  84. Nmap done: 1 IP address (1 host up) scanned in 1.84 seconds
  85. Raw packets sent: 65355 (2.876MB) | Rcvd: 130716 (5.490MB)
  86. VNC password is 123456
  87. root@kali:~#
  88. I AM NOT JOKING!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement