Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ____ __. .__ .__ __ _________
- | |/ _| ____ |__| ____ | |___/ |_/ _____/ ____ ____
- | < / \| |/ ___\| | \ __\_____ \_/ __ \_/ ___\
- | | \| | \ / /_/ > Y \ | / \ ___/\ \___
- |____|__ \___| /__\___ /|___| /__|/_______ /\___ >\___ >
- \/ \/ /_____/ \/ \/ \/ \/
- 6 year old girl attacked by 16 year old pedophile at school and cops did nothing. Watch this video. #JusticeForSummer
- http://www.youtube.com/watch?v=NB44wMGaAgg&feature=youtu.be
- Greetings Mclouth school district, authorities, and citizens of kansas We are Anonymous, We are #KnightSec
- the video above is appalling, that a failure of a small towns judicial system and policework would let a rapist walk free, much like that of our current operation which has gained worldwide noteriety entitled #oprollredroll. Your town has even less police than steubenville ohio yet the same amount of corruption it seems. you have one month to fix it, or we intervene. Do not take us for a joke, a simple google search will show we follow through with our actions. Expect us.
- Vulnerability List of http://www.mclouth.org/
- -<ROOT> -<SiteVulList> -<VulRow> <ReferURL>http://www.mclouth.org/vcalendar/?keyword=&submit=Go&Ctype=monthly&D=1357192800&page=month_calendar&FROMPAGE=Search&Org_ID[]=1</ReferURL> <Parameter>Org_ID[]=1</Parameter> <Type>Integer</Type> <KWordActionURL>McLouth</KWordActionURL> <Vulnerability>URL SQL INJECTION</Vulnerability> </VulRow> -<VulRow> <ReferURL>http://www.mclouth.org/vcalendar/^ACTION=Login&FROMPAGE=Nav_Login&EmailAddress=WCRTESTINPUT000000&Password=99999999</ReferURL> <Parameter>Password=99999999</Parameter> <Type>Integer</Type> <KWordActionURL>McLouth</KWordActionURL> <Vulnerability>POST SQL INJECTION</Vulnerability> </VulRow> -<VulRow> <ReferURL>http://www.mclouth.org/vnews/display.v/SEC/District Information|Employment Opportunities^Moderated_Flag=1&Email_Verify_Flag=&Topic_Name=employement opp.&Topic_ID=</ReferURL> <Parameter>Topic_ID=</Parameter> <Type>Search</Type> <KWordActionURL>Employment</KWordActionURL> <Vulnerability>POST SQL INJECTION</Vulnerability> </VulRow> -<VulRow> <ReferURL>http://www.mclouth.org/vcalendar/?Ctype=monthly&oldCurrent=1357192800&Date_Month=01^Date_Year=2003</ReferURL> <Parameter>Date_Year=2003</Parameter> <Type>String</Type> <KWordActionURL>McLouth</KWordActionURL> <Vulnerability>COOKIE SQL INJECTION</Vulnerability> </VulRow> -<VulRow> <ReferURL>http://www.mclouth.org/vcalendar/?oldCurrent=1357192800&Date_Month=01&Date_Year=2003&Ctype=monthly</ReferURL> <Parameter>Ctype=monthly</Parameter> <Type>String</Type> <KWordActionURL>McLouth</KWordActionURL> <Vulnerability>URL SQL INJECTION</Vulnerability> </VulRow> </SiteVulList> </ROOT>
- --------------------------------begin scan of site--------------------------------------------------
- Scanning 173.252.100.16 [4 ports]
- Completed Ping Scan at 11:37, 0.26s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 11:37
- Completed Parallel DNS resolution of 1 host. at 11:37, 0.06s elapsed
- Initiating SYN Stealth Scan at 11:37
- Scanning www-slb-ecmp-12-frc1.facebook.com (173.252.100.16) [1000 ports]
- Discovered open port 443/tcp on 173.252.100.16
- Discovered open port 80/tcp on 173.252.100.16
- Completed SYN Stealth Scan at 11:37, 6.25s elapsed (1000 total ports)
- Initiating Service scan at 11:37
- Scanning 2 services on www-slb-ecmp-12-frc1.facebook.com (173.252.100.16)
- Completed Service scan at 11:37, 15.49s elapsed (2 services on 1 host)
- Initiating OS detection (try #1) against www-slb-ecmp-12-frc1.facebook.com (173.252.100.16)
- Retrying OS detection (try #2) against www-slb-ecmp-12-frc1.facebook.com (173.252.100.16)
- Initiating Traceroute at 11:37
- Completed Traceroute at 11:37, 0.02s elapsed
- Initiating Parallel DNS resolution of 2 hosts. at 11:37
- Completed Parallel DNS resolution of 2 hosts. at 11:37, 0.01s elapsed
- NSE: Script scanning 173.252.100.16.
- Initiating NSE at 11:37
- Completed NSE at 11:38, 11.24s elapsed
- Nmap scan report for www-slb-ecmp-12-frc1.facebook.com (173.252.100.16)
- Host is up (0.013s latency).
- Not shown: 996 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open http?
- |_http-favicon: Unknown favicon MD5: 3BB1F77F50310C05F150D8C8856DDED3
- |_http-methods: No Allow or Public header in OPTIONS response (status code 302)
- | http-robots.txt: 15 disallowed entries
- | /ac.php /ae.php /album.php /ap.php /autologin.php
- | /checkpoint/ /feeds/ /l.php /o.php /p.php /photo.php
- |_/photo_comments.php /photo_search.php /photos.php /
- |_http-title: Did not follow redirect to https://www-slb-ecmp-12-frc1.facebook.com/
- 139/tcp closed netbios-ssn
- 443/tcp open https?
- |_http-favicon: Unknown favicon MD5: 3BB1F77F50310C05F150D8C8856DDED3
- |_http-methods: No Allow or Public header in OPTIONS response (status code 301)
- | http-robots.txt: 15 disallowed entries
- | /ac.php /ae.php /album.php /ap.php /autologin.php
- | /checkpoint/ /feeds/ /l.php /o.php /p.php /photo.php
- |_/photo_comments.php /photo_search.php /photos.php /
- | http-title: Welcome to Facebook - Log In, Sign Up or Learn More
- |_Requested resource was https://www.facebook.com/
- | ssl-cert: Subject: commonName=www.facebook.com/organizationName=Facebook, Inc./stateOrProvinceName=California/countryName=US
- | Issuer: organizationName=VeriSign Trust Network
- | Public Key type: rsa
- | Public Key bits: 1024
- | Not valid before: 2012-06-20T23:00:00+00:00
- | Not valid after: 2013-12-31T23:59:59+00:00
- | MD5: 8e74 0cf8 e550 76ec 04f0 d9c5 b7ad b43a
- |_SHA-1: 9c53 b1a4 16f9 5879 1bda d028 a9fa 5d65 4c5f 8152
- |_ssl-date: 2013-01-03T16:37:55+00:00; 0s from local time.
- | tls-nextprotoneg:
- |_ http/1.1
- 445/tcp closed microsoft-ds
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
- SF-Port80-TCP:V=6.25%I=7%D=1/3%Time=50E5B3D5%P=i686-pc-windows-windows%r(G
- SF:etRequest,E6,"HTTP/1\.0\x20302\x20Found\r\nLocation:\x20https://173\.25
- SF:2\.100\.16/\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nX-FB-Deb
- SF:ug:\x20Gpo70SwgGLJLqZiU4cMNf7whs9obklLUc7XqCQtfFew=\r\nDate:\x20Thu,\x2
- SF:003\x20Jan\x202013\x2016:37:41\x20GMT\r\nConnection:\x20close\r\nConten
- SF:t-Length:\x200\r\n\r\n")%r(HTTPOptions,E6,"HTTP/1\.0\x20302\x20Found\r\
- SF:nLocation:\x20https://173\.252\.100\.16/\r\nContent-Type:\x20text/html;
- SF:\x20charset=utf-8\r\nX-FB-Debug:\x20BtXZ9G3wOtE3lqjMJ71neM6AZaVa1UFkr/D
- SF:3t1DUYJ4=\r\nDate:\x20Thu,\x2003\x20Jan\x202013\x2016:37:42\x20GMT\r\nC
- SF:onnection:\x20close\r\nContent-Length:\x200\r\n\r\n")%r(RTSPRequest,8C0
- SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20
- SF:charset=utf-8\r\nConnection:\x20close\r\nContent-Length:\x202131\r\n\r\
- SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20XHTML\x201\.0\x20Stric
- SF:t//EN\"\n\x20\x20\x20\"http://www\.w3\.org/TR/xhtml1/DTD/xhtml1-strict\
- SF:.dtd\">\n<html\x20xmlns=\"http://www\.w3\.org/1999/xhtml\"\n\x20\x20\x2
- SF:0xml:lang=\"en\"\x20lang=\"en\"\x20id=\"facebook\">\n\x20\x20<head>\n\x
- SF:20\x20\x20\x20<title>Facebook\x20\|\x20Error</title>\n\x20\x20\x20\x20<
- SF:meta\x20http-equiv=\"Content-Type\"\x20\x20content=\"text/html;\x20char
- SF:set=utf-8\"\x20/>\n\x20\x20\x20\x20<meta\x20http-equiv=\"Cache-Control\
- SF:"\x20content=\"no-cache\"\x20/>\n\x20\x20\x20\x20<meta\x20name=\"robots
- SF:\"\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20content=\"noi
- SF:ndex,nofollow\"\x20/>\n\x20\x20\x20\x20<style\x20type=\"text/css\">\n\x
- SF:20\x20\x20\x20\x20\x20html,\x20body\x20{\n\x20\x20\x20\x20\x20\x20\x20\
- SF:x20margin:\x20\x20\x20\x20\x20\x20\x200px;\n\x20\x20\x20\x20\x20\x20\x2
- SF:0\x20padding:\x20\x20\x20\x20\x20\x200px;\n\x20\x20\x20\x20\x20\x20\x20
- SF:\x20text-align:\x20\x20\x20center;\n\x20\x20\x20\x20\x20\x20\x20\x20fon
- SF:t-family:\x20\x20\"Lucida\x20Grande\",\x20\"Tahoma\",\x20\"Verdana\",\x
- SF:20\"Arial\",\x20sans-serif;\n\x20\x20\x20\x20\x20\x20\x20\x20color:\x20
- SF:\x20\x20\x20\x20\x20\x20\x20#333333;\n\x20\x20\x20\x20\x20\x20}\n\n\x20
- SF:\x20\x20\x20\x20\x20a\.menu\x20{\n\x20\x20\x20\x20\x20\x20\x20\x20margi
- SF:n:\x20\x20\x20\x20\x20auto;\n\x20\x20\x20\x20\x20\x20\x20\x20position:\
- SF:x20\x20\x20relative;\n\x20\x20\x20\x20\x20\x20\x20\x20display:\x20\x20\
- SF:x20\x20bloc");
- Device type: WAP|printer|general purpose
- Running (JUST GUESSING): Linux 2.6.X (86%), Lexmark embedded (86%), OpenBSD 4.X (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:lexmark:x644e cpe:/o:openbsd:openbsd:4.3
- Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (86%), Lexmark X644e printer (86%), OpenBSD 4.3 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.000 days (since Thu Jan 03 11:37:47 2013)
- Network Distance: 2 hops
- IP ID Sequence Generation: All zeros
- --------------------------open vulnerable ports list-------------
- 25
- 80
- 81
- 82
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement