Advertisement
Guest User

Untitled

a guest
Jan 3rd, 2013
3,825
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.05 KB | None | 0 0
  1. ____ __. .__ .__ __ _________
  2. | |/ _| ____ |__| ____ | |___/ |_/ _____/ ____ ____
  3. | < / \| |/ ___\| | \ __\_____ \_/ __ \_/ ___\
  4. | | \| | \ / /_/ > Y \ | / \ ___/\ \___
  5. |____|__ \___| /__\___ /|___| /__|/_______ /\___ >\___ >
  6. \/ \/ /_____/ \/ \/ \/ \/
  7.  
  8.  
  9. 6 year old girl attacked by 16 year old pedophile at school and cops did nothing. Watch this video. #JusticeForSummer
  10. http://www.youtube.com/watch?v=NB44wMGaAgg&feature=youtu.be
  11.  
  12.  
  13. Greetings Mclouth school district, authorities, and citizens of kansas We are Anonymous, We are #KnightSec
  14.  
  15. the video above is appalling, that a failure of a small towns judicial system and policework would let a rapist walk free, much like that of our current operation which has gained worldwide noteriety entitled #oprollredroll. Your town has even less police than steubenville ohio yet the same amount of corruption it seems. you have one month to fix it, or we intervene. Do not take us for a joke, a simple google search will show we follow through with our actions. Expect us.
  16.  
  17.  
  18.  
  19.  
  20.  
  21.  
  22. Vulnerability List of http://www.mclouth.org/
  23.  
  24. -<ROOT> -<SiteVulList> -<VulRow> <ReferURL>http://www.mclouth.org/vcalendar/?keyword=&submit=Go&Ctype=monthly&D=1357192800&page=month_calendar&FROMPAGE=Search&Org_ID[]=1</ReferURL> <Parameter>Org_ID[]=1</Parameter> <Type>Integer</Type> <KWordActionURL>McLouth</KWordActionURL> <Vulnerability>URL SQL INJECTION</Vulnerability> </VulRow> -<VulRow> <ReferURL>http://www.mclouth.org/vcalendar/^ACTION=Login&FROMPAGE=Nav_Login&EmailAddress=WCRTESTINPUT000000&Password=99999999</ReferURL> <Parameter>Password=99999999</Parameter> <Type>Integer</Type> <KWordActionURL>McLouth</KWordActionURL> <Vulnerability>POST SQL INJECTION</Vulnerability> </VulRow> -<VulRow> <ReferURL>http://www.mclouth.org/vnews/display.v/SEC/District Information|Employment Opportunities^Moderated_Flag=1&Email_Verify_Flag=&Topic_Name=employement opp.&Topic_ID=</ReferURL> <Parameter>Topic_ID=</Parameter> <Type>Search</Type> <KWordActionURL>Employment</KWordActionURL> <Vulnerability>POST SQL INJECTION</Vulnerability> </VulRow> -<VulRow> <ReferURL>http://www.mclouth.org/vcalendar/?Ctype=monthly&oldCurrent=1357192800&Date_Month=01^Date_Year=2003</ReferURL> <Parameter>Date_Year=2003</Parameter> <Type>String</Type> <KWordActionURL>McLouth</KWordActionURL> <Vulnerability>COOKIE SQL INJECTION</Vulnerability> </VulRow> -<VulRow> <ReferURL>http://www.mclouth.org/vcalendar/?oldCurrent=1357192800&Date_Month=01&Date_Year=2003&Ctype=monthly</ReferURL> <Parameter>Ctype=monthly</Parameter> <Type>String</Type> <KWordActionURL>McLouth</KWordActionURL> <Vulnerability>URL SQL INJECTION</Vulnerability> </VulRow> </SiteVulList> </ROOT>
  25.  
  26. --------------------------------begin scan of site--------------------------------------------------
  27.  
  28. Scanning 173.252.100.16 [4 ports]
  29.  
  30. Completed Ping Scan at 11:37, 0.26s elapsed (1 total hosts)
  31.  
  32. Initiating Parallel DNS resolution of 1 host. at 11:37
  33.  
  34. Completed Parallel DNS resolution of 1 host. at 11:37, 0.06s elapsed
  35.  
  36. Initiating SYN Stealth Scan at 11:37
  37.  
  38. Scanning www-slb-ecmp-12-frc1.facebook.com (173.252.100.16) [1000 ports]
  39.  
  40. Discovered open port 443/tcp on 173.252.100.16
  41.  
  42. Discovered open port 80/tcp on 173.252.100.16
  43.  
  44. Completed SYN Stealth Scan at 11:37, 6.25s elapsed (1000 total ports)
  45.  
  46. Initiating Service scan at 11:37
  47.  
  48. Scanning 2 services on www-slb-ecmp-12-frc1.facebook.com (173.252.100.16)
  49.  
  50. Completed Service scan at 11:37, 15.49s elapsed (2 services on 1 host)
  51.  
  52. Initiating OS detection (try #1) against www-slb-ecmp-12-frc1.facebook.com (173.252.100.16)
  53.  
  54. Retrying OS detection (try #2) against www-slb-ecmp-12-frc1.facebook.com (173.252.100.16)
  55.  
  56. Initiating Traceroute at 11:37
  57.  
  58. Completed Traceroute at 11:37, 0.02s elapsed
  59.  
  60. Initiating Parallel DNS resolution of 2 hosts. at 11:37
  61.  
  62. Completed Parallel DNS resolution of 2 hosts. at 11:37, 0.01s elapsed
  63.  
  64. NSE: Script scanning 173.252.100.16.
  65.  
  66. Initiating NSE at 11:37
  67.  
  68. Completed NSE at 11:38, 11.24s elapsed
  69.  
  70. Nmap scan report for www-slb-ecmp-12-frc1.facebook.com (173.252.100.16)
  71.  
  72. Host is up (0.013s latency).
  73.  
  74. Not shown: 996 filtered ports
  75.  
  76. PORT STATE SERVICE VERSION
  77.  
  78. 80/tcp open http?
  79.  
  80. |_http-favicon: Unknown favicon MD5: 3BB1F77F50310C05F150D8C8856DDED3
  81.  
  82. |_http-methods: No Allow or Public header in OPTIONS response (status code 302)
  83.  
  84. | http-robots.txt: 15 disallowed entries
  85.  
  86. | /ac.php /ae.php /album.php /ap.php /autologin.php
  87.  
  88. | /checkpoint/ /feeds/ /l.php /o.php /p.php /photo.php
  89.  
  90. |_/photo_comments.php /photo_search.php /photos.php /
  91.  
  92. |_http-title: Did not follow redirect to https://www-slb-ecmp-12-frc1.facebook.com/
  93.  
  94. 139/tcp closed netbios-ssn
  95.  
  96. 443/tcp open https?
  97.  
  98. |_http-favicon: Unknown favicon MD5: 3BB1F77F50310C05F150D8C8856DDED3
  99.  
  100. |_http-methods: No Allow or Public header in OPTIONS response (status code 301)
  101.  
  102. | http-robots.txt: 15 disallowed entries
  103.  
  104. | /ac.php /ae.php /album.php /ap.php /autologin.php
  105.  
  106. | /checkpoint/ /feeds/ /l.php /o.php /p.php /photo.php
  107.  
  108. |_/photo_comments.php /photo_search.php /photos.php /
  109.  
  110. | http-title: Welcome to Facebook - Log In, Sign Up or Learn More
  111.  
  112. |_Requested resource was https://www.facebook.com/
  113.  
  114. | ssl-cert: Subject: commonName=www.facebook.com/organizationName=Facebook, Inc./stateOrProvinceName=California/countryName=US
  115.  
  116. | Issuer: organizationName=VeriSign Trust Network
  117.  
  118. | Public Key type: rsa
  119.  
  120. | Public Key bits: 1024
  121.  
  122. | Not valid before: 2012-06-20T23:00:00+00:00
  123.  
  124. | Not valid after: 2013-12-31T23:59:59+00:00
  125.  
  126. | MD5: 8e74 0cf8 e550 76ec 04f0 d9c5 b7ad b43a
  127.  
  128. |_SHA-1: 9c53 b1a4 16f9 5879 1bda d028 a9fa 5d65 4c5f 8152
  129.  
  130. |_ssl-date: 2013-01-03T16:37:55+00:00; 0s from local time.
  131.  
  132. | tls-nextprotoneg:
  133.  
  134. |_ http/1.1
  135.  
  136. 445/tcp closed microsoft-ds
  137.  
  138. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
  139.  
  140. SF-Port80-TCP:V=6.25%I=7%D=1/3%Time=50E5B3D5%P=i686-pc-windows-windows%r(G
  141.  
  142. SF:etRequest,E6,"HTTP/1\.0\x20302\x20Found\r\nLocation:\x20https://173\.25
  143.  
  144. SF:2\.100\.16/\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nX-FB-Deb
  145.  
  146. SF:ug:\x20Gpo70SwgGLJLqZiU4cMNf7whs9obklLUc7XqCQtfFew=\r\nDate:\x20Thu,\x2
  147.  
  148. SF:003\x20Jan\x202013\x2016:37:41\x20GMT\r\nConnection:\x20close\r\nConten
  149.  
  150. SF:t-Length:\x200\r\n\r\n")%r(HTTPOptions,E6,"HTTP/1\.0\x20302\x20Found\r\
  151.  
  152. SF:nLocation:\x20https://173\.252\.100\.16/\r\nContent-Type:\x20text/html;
  153.  
  154. SF:\x20charset=utf-8\r\nX-FB-Debug:\x20BtXZ9G3wOtE3lqjMJ71neM6AZaVa1UFkr/D
  155.  
  156. SF:3t1DUYJ4=\r\nDate:\x20Thu,\x2003\x20Jan\x202013\x2016:37:42\x20GMT\r\nC
  157.  
  158. SF:onnection:\x20close\r\nContent-Length:\x200\r\n\r\n")%r(RTSPRequest,8C0
  159.  
  160. SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20
  161.  
  162. SF:charset=utf-8\r\nConnection:\x20close\r\nContent-Length:\x202131\r\n\r\
  163.  
  164. SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20XHTML\x201\.0\x20Stric
  165.  
  166. SF:t//EN\"\n\x20\x20\x20\"http://www\.w3\.org/TR/xhtml1/DTD/xhtml1-strict\
  167.  
  168. SF:.dtd\">\n<html\x20xmlns=\"http://www\.w3\.org/1999/xhtml\"\n\x20\x20\x2
  169.  
  170. SF:0xml:lang=\"en\"\x20lang=\"en\"\x20id=\"facebook\">\n\x20\x20<head>\n\x
  171.  
  172. SF:20\x20\x20\x20<title>Facebook\x20\|\x20Error</title>\n\x20\x20\x20\x20<
  173.  
  174. SF:meta\x20http-equiv=\"Content-Type\"\x20\x20content=\"text/html;\x20char
  175.  
  176. SF:set=utf-8\"\x20/>\n\x20\x20\x20\x20<meta\x20http-equiv=\"Cache-Control\
  177.  
  178. SF:"\x20content=\"no-cache\"\x20/>\n\x20\x20\x20\x20<meta\x20name=\"robots
  179.  
  180. SF:\"\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20content=\"noi
  181.  
  182. SF:ndex,nofollow\"\x20/>\n\x20\x20\x20\x20<style\x20type=\"text/css\">\n\x
  183.  
  184. SF:20\x20\x20\x20\x20\x20html,\x20body\x20{\n\x20\x20\x20\x20\x20\x20\x20\
  185.  
  186. SF:x20margin:\x20\x20\x20\x20\x20\x20\x200px;\n\x20\x20\x20\x20\x20\x20\x2
  187.  
  188. SF:0\x20padding:\x20\x20\x20\x20\x20\x200px;\n\x20\x20\x20\x20\x20\x20\x20
  189.  
  190. SF:\x20text-align:\x20\x20\x20center;\n\x20\x20\x20\x20\x20\x20\x20\x20fon
  191.  
  192. SF:t-family:\x20\x20\"Lucida\x20Grande\",\x20\"Tahoma\",\x20\"Verdana\",\x
  193.  
  194. SF:20\"Arial\",\x20sans-serif;\n\x20\x20\x20\x20\x20\x20\x20\x20color:\x20
  195.  
  196. SF:\x20\x20\x20\x20\x20\x20\x20#333333;\n\x20\x20\x20\x20\x20\x20}\n\n\x20
  197.  
  198. SF:\x20\x20\x20\x20\x20a\.menu\x20{\n\x20\x20\x20\x20\x20\x20\x20\x20margi
  199.  
  200. SF:n:\x20\x20\x20\x20\x20auto;\n\x20\x20\x20\x20\x20\x20\x20\x20position:\
  201.  
  202. SF:x20\x20\x20relative;\n\x20\x20\x20\x20\x20\x20\x20\x20display:\x20\x20\
  203.  
  204. SF:x20\x20bloc");
  205.  
  206. Device type: WAP|printer|general purpose
  207.  
  208. Running (JUST GUESSING): Linux 2.6.X (86%), Lexmark embedded (86%), OpenBSD 4.X (85%)
  209.  
  210. OS CPE: cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:lexmark:x644e cpe:/o:openbsd:openbsd:4.3
  211.  
  212. Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (86%), Lexmark X644e printer (86%), OpenBSD 4.3 (85%)
  213.  
  214. No exact OS matches for host (test conditions non-ideal).
  215.  
  216. Uptime guess: 0.000 days (since Thu Jan 03 11:37:47 2013)
  217.  
  218. Network Distance: 2 hops
  219.  
  220. IP ID Sequence Generation: All zeros
  221.  
  222.  
  223. --------------------------open vulnerable ports list-------------
  224.  
  225.  
  226. 25
  227. 80
  228. 81
  229. 82
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement