Guest User

Anonymous JTSEC #OpSudan Full Recon #13

a guest
Feb 15th, 2019
4,912
0
Never
8
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 88.09 KB | None | 0 0
  1. #######################################################################################################################################
  2. =======================================================================================================================================
  3. Hostname aldabba.gov.sd ISP NICDC
  4. Continent Africa Flag
  5. SD
  6. Country Sudan Country Code SD
  7. Region Unknown Local time 16 Feb 2019 02:06 CAT
  8. City Unknown Postal Code Unknown
  9. IP Address 62.12.105.4 Latitude 15
  10. Longitude 30
  11. =======================================================================================================================================
  12. #######################################################################################################################################
  13. > aldabba.gov.sd
  14. Server: 38.132.106.139
  15. Address: 38.132.106.139#53
  16.  
  17. Non-authoritative answer:
  18. Name: aldabba.gov.sd
  19. Address: 62.12.105.4
  20. >
  21. #######################################################################################################################################
  22. HostIP:62.12.105.4
  23. HostName:aldabba.gov.sd
  24.  
  25. Gathered Inet-whois information for 62.12.105.4
  26. ---------------------------------------------------------------------------------------------------------------------------------------
  27.  
  28.  
  29. inetnum: 62.12.96.0 - 62.12.127.255
  30. netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
  31. descr: IPv4 address block not managed by the RIPE NCC
  32. remarks: ------------------------------------------------------
  33. remarks:
  34. remarks: For registration information,
  35. remarks: you can consult the following sources:
  36. remarks:
  37. remarks: IANA
  38. remarks: http://www.iana.org/assignments/ipv4-address-space
  39. remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
  40. remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
  41. remarks:
  42. remarks: AFRINIC (Africa)
  43. remarks: http://www.afrinic.net/ whois.afrinic.net
  44. remarks:
  45. remarks: APNIC (Asia Pacific)
  46. remarks: http://www.apnic.net/ whois.apnic.net
  47. remarks:
  48. remarks: ARIN (Northern America)
  49. remarks: http://www.arin.net/ whois.arin.net
  50. remarks:
  51. remarks: LACNIC (Latin America and the Carribean)
  52. remarks: http://www.lacnic.net/ whois.lacnic.net
  53. remarks:
  54. remarks: ------------------------------------------------------
  55. country: EU # Country is really world wide
  56. admin-c: IANA1-RIPE
  57. tech-c: IANA1-RIPE
  58. status: ALLOCATED UNSPECIFIED
  59. mnt-by: RIPE-NCC-HM-MNT
  60. created: 2019-01-07T10:46:54Z
  61. last-modified: 2019-01-07T10:46:54Z
  62. source: RIPE
  63.  
  64. role: Internet Assigned Numbers Authority
  65. address: see http://www.iana.org.
  66. admin-c: IANA1-RIPE
  67. tech-c: IANA1-RIPE
  68. nic-hdl: IANA1-RIPE
  69. remarks: For more information on IANA services
  70. remarks: go to IANA web site at http://www.iana.org.
  71. mnt-by: RIPE-NCC-MNT
  72. created: 1970-01-01T00:00:00Z
  73. last-modified: 2001-09-22T09:31:27Z
  74. source: RIPE # Filtered
  75.  
  76. % This query was served by the RIPE Database Query Service version 1.92.6 (WAGYU)
  77.  
  78.  
  79.  
  80. Gathered Inic-whois information for aldabba.gov.sd
  81. ---------------------------------
  82. Error: Unable to connect - Invalid Host
  83. ERROR: Connection to InicWhois Server sd.whois-servers.net failed
  84. close error
  85.  
  86. Gathered Netcraft information for aldabba.gov.sd
  87. ---------------------------------
  88.  
  89. Retrieving Netcraft.com information for aldabba.gov.sd
  90. Netcraft.com Information gathered
  91.  
  92. Gathered Subdomain information for aldabba.gov.sd
  93. ---------------------------------
  94. Searching Google.com:80...
  95. HostName:www.aldabba.gov.sd
  96. HostIP:62.12.105.4
  97. Searching Altavista.com:80...
  98. Found 1 possible subdomain(s) for host aldabba.gov.sd, Searched 0 pages containing 0 results
  99.  
  100. Gathered E-Mail information for aldabba.gov.sd
  101. ---------------------------------
  102. Searching Google.com:80...
  103. Searching Altavista.com:80...
  104. Found 0 E-Mail(s) for host aldabba.gov.sd, Searched 0 pages containing 0 results
  105.  
  106. Gathered TCP Port information for 62.12.105.4
  107. ---------------------------------------------------------------------------------------------------------------------------------------
  108.  
  109. Port State
  110.  
  111. 21/tcp open
  112. 80/tcp open
  113. 110/tcp open
  114. 143/tcp open
  115.  
  116. Portscan Finished: Scanned 150 ports, 5 ports were in state closed
  117. #######################################################################################################################################
  118. [i] Scanning Site: http://aldabba.gov.sd
  119.  
  120.  
  121.  
  122. B A S I C I N F O
  123. =======================================================================================================================================
  124.  
  125.  
  126. [+] Site Title: محلية الدبة
  127. [+] IP address: 62.12.105.4
  128. [+] Web Server: Could Not Detect
  129. [+] CMS: Joomla
  130. [+] Cloudflare: Not Detected
  131. [+] Robots File: Found
  132.  
  133. -------------[ contents ]----------------
  134. User-agent: *
  135. Disallow: /administrator/
  136. Disallow: /cache/
  137. Disallow: /components/
  138. Disallow: /images/
  139. Disallow: /includes/
  140. Disallow: /installation/
  141. Disallow: /language/
  142. Disallow: /libraries/
  143. Disallow: /media/
  144. Disallow: /modules/
  145. Disallow: /plugins/
  146. Disallow: /templates/
  147. Disallow: /tmp/
  148. Disallow: /xmlrpc/
  149.  
  150. -----------[end of contents]-------------
  151.  
  152.  
  153.  
  154. G E O I P L O O K U P
  155. =======================================================================================================================================
  156.  
  157. [i] IP Address: 62.12.105.4
  158. [i] Country: Sudan
  159. [i] State:
  160. [i] City:
  161. [i] Latitude: 15.0
  162. [i] Longitude: 30.0
  163.  
  164.  
  165.  
  166.  
  167. H T T P H E A D E R S
  168. =======================================================================================================================================
  169.  
  170.  
  171. [i] HTTP/1.1 200 OK
  172. [i] Date: Fri, 15 Feb 2019 23:26:51 GMT
  173. [i] Content-Type: text/html; charset=utf-8
  174. [i] Content-Length: 45294
  175. [i] X-Powered-By: PHP/5.4.16
  176. [i] P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
  177. [i] Expires: Mon, 1 Jan 2001 00:00:00 GMT
  178. [i] Cache-Control: post-check=0, pre-check=0
  179. [i] Pragma: no-cache
  180. [i] Set-Cookie: dba52603cb1126534e3b339094dcfc62=047g62k8bovf3heuf3qgo8pgc2; path=/
  181. [i] Last-Modified: Fri, 15 Feb 2019 23:26:51 GMT
  182. [i] X-Powered-By: PleskLin
  183. [i] Connection: close
  184.  
  185.  
  186.  
  187.  
  188. D N S L O O K U P
  189. =======================================================================================================================================
  190.  
  191. aldabba.gov.sd. 21599 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2016011408 10800 900 604800 86400
  192. aldabba.gov.sd. 21599 IN NS ns0.ndc.gov.sd.
  193. aldabba.gov.sd. 21599 IN NS ns1.ndc.gov.sd.
  194. aldabba.gov.sd. 21599 IN A 62.12.105.4
  195. aldabba.gov.sd. 21599 IN MX 10 mail.aldabba.gov.sd.
  196. aldabba.gov.sd. 21599 IN TXT "v=spf1 mx -all"
  197.  
  198.  
  199.  
  200.  
  201. S U B N E T C A L C U L A T I O N
  202. =======================================================================================================================================
  203.  
  204. Address = 62.12.105.4
  205. Network = 62.12.105.4 / 32
  206. Netmask = 255.255.255.255
  207. Broadcast = not needed on Point-to-Point links
  208. Wildcard Mask = 0.0.0.0
  209. Hosts Bits = 0
  210. Max. Hosts = 1 (2^0 - 0)
  211. Host Range = { 62.12.105.4 - 62.12.105.4 }
  212.  
  213.  
  214.  
  215. N M A P P O R T S C A N
  216. =======================================================================================================================================
  217.  
  218.  
  219. Starting Nmap 7.40 ( https://nmap.org ) at 2019-02-16 00:34 UTC
  220. Nmap scan report for aldabba.gov.sd (62.12.105.4)
  221. Host is up (0.22s latency).
  222. rDNS record for 62.12.105.4: f05-web03.nic.gov.sd
  223. PORT STATE SERVICE
  224. 21/tcp filtered ftp
  225. 22/tcp filtered ssh
  226. 23/tcp filtered telnet
  227. 80/tcp filtered http
  228. 110/tcp filtered pop3
  229. 143/tcp filtered imap
  230. 443/tcp filtered https
  231. 3389/tcp filtered ms-wbt-server
  232.  
  233. Nmap done: 1 IP address (1 host up) scanned in 11.32 seconds
  234. #######################################################################################################################################
  235. [?] Enter the target: example( http://domain.com )
  236. http://aldabba.gov.sd/
  237. [!] IP Address : 62.12.105.4
  238. [!] aldabba.gov.sd doesn't seem to use a CMS
  239. [+] Honeypot Probabilty: 30%
  240. ---------------------------------------------------------------------------------------------------------------------------------------
  241. [~] Trying to gather whois information for aldabba.gov.sd
  242. [+] Whois information found
  243. [-] Unable to build response, visit https://who.is/whois/aldabba.gov.sd
  244. ---------------------------------------------------------------------------------------------------------------------------------------
  245. PORT STATE SERVICE
  246. 21/tcp filtered ftp
  247. 22/tcp filtered ssh
  248. 23/tcp filtered telnet
  249. 80/tcp filtered http
  250. 110/tcp filtered pop3
  251. 143/tcp filtered imap
  252. 443/tcp filtered https
  253. 3389/tcp filtered ms-wbt-server
  254. Nmap done: 1 IP address (1 host up) scanned in 14.61 seconds
  255. ---------------------------------------------------------------------------------------------------------------------------------------
  256.  
  257. [+] DNS Records
  258. ns0.ndc.gov.sd. (62.12.109.2) Egypt Egypt
  259. ns1.ndc.gov.sd. (62.12.109.3) Egypt Egypt
  260.  
  261. [+] MX Records
  262. 10 (197.254.200.161) AS33788 KANARTEL Sudan
  263.  
  264. [+] Host Records (A)
  265. aldabba.gov.sd (62.12.105.4) Egypt Egypt
  266.  
  267. [+] TXT Records
  268. "v=spf1 mx -all"
  269.  
  270. [+] DNS Map: https://dnsdumpster.com/static/map/aldabba.gov.sd.png
  271.  
  272. [>] Initiating 3 intel modules
  273. [>] Loading Alpha module (1/3)
  274. [>] Beta module deployed (2/3)
  275. [>] Gamma module initiated (3/3)
  276.  
  277.  
  278. [+] Emails found:
  279. ---------------------------------------------------------------------------------------------------------------------------------------
  280.  
  281. [+] Hosts found in search engines:
  282. ---------------------------------------------------------------------------------------------------------------------------------------
  283. [-] Resolving hostnames IPs...
  284. 62.12.105.4:www.aldabba.gov.sd
  285. [+] Virtual hosts:
  286. ---------------------------------------------------------------------------------------------------------------------------------------
  287. #######################################################################################################################################
  288. Enter Address Website = aldabba.gov.sd
  289.  
  290.  
  291. Reverse IP With YouGetSignal 'aldabba.gov.sd'
  292. ---------------------------------------------------------------------------------------------------------------------------------------
  293.  
  294. [*] IP: 62.12.105.4
  295. [*] Domain: aldabba.gov.sd
  296. [*] Total Domains: 3
  297.  
  298. [+] aldabba.gov.sd
  299. [+] ffamc.gov.sd
  300. [+] sudanradio.gov.sd
  301. #######################################################################################################################################
  302. Geo IP Lookup 'aldabba.gov.sd'
  303. ---------------------------------------------------------------------------------------------------------------------------------------
  304.  
  305. [+] IP Address: 62.12.105.4
  306. [+] Country: Sudan
  307. [+] State:
  308. [+] City:
  309. [+] Latitude: 15.0
  310. [+] Longitude: 30.0
  311. #######################################################################################################################################
  312. DNS Lookup 'aldabba.gov.sd'
  313. ---------------------------------------------------------------------------------------------------------------------------------------
  314.  
  315. [+] aldabba.gov.sd. 21599 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2016011408 10800 900 604800 86400
  316. [+] aldabba.gov.sd. 21599 IN NS ns0.ndc.gov.sd.
  317. [+] aldabba.gov.sd. 21599 IN NS ns1.ndc.gov.sd.
  318. [+] aldabba.gov.sd. 21599 IN A 62.12.105.4
  319. [+] aldabba.gov.sd. 21599 IN MX 10 mail.aldabba.gov.sd.
  320. [+] aldabba.gov.sd. 21599 IN TXT "v=spf1 mx -all"
  321. #######################################################################################################################################
  322. Show HTTP Header 'aldabba.gov.sd'
  323. ---------------------------------------------------------------------------------------------------------------------------------------
  324.  
  325. [+] HTTP/1.1 200 OK
  326. [+] Server: nginx
  327. [+] Date: Fri, 15 Feb 2019 23:26:37 GMT
  328. [+] Content-Type: text/html; charset=utf-8
  329. [+] Connection: keep-alive
  330. [+] X-Powered-By: PHP/5.4.16
  331. [+] P3P: CP=NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM
  332. [+] Expires: Mon, 1 Jan 2001 00:00:00 GMT
  333. [+] Cache-Control: post-check=0, pre-check=0
  334. [+] Pragma: no-cache
  335. [+] Set-Cookie: dba52603cb1126534e3b339094dcfc62=t2qt9kostn76eeachgs8np2vk5; path=/
  336. [+] Last-Modified: Fri, 15 Feb 2019 23:26:37 GMT
  337. [+] X-Powered-By: PleskLin
  338. #######################################################################################################################################
  339. Port Scan 'aldabba.gov.sd'
  340. ---------------------------------------------------------------------------------------------------------------------------------------
  341.  
  342.  
  343. Starting Nmap 7.40 ( https://nmap.org ) at 2019-02-16 00:34 UTC
  344. Nmap scan report for aldabba.gov.sd (62.12.105.4)
  345. Host is up (0.22s latency).
  346. rDNS record for 62.12.105.4: f05-web03.nic.gov.sd
  347. PORT STATE SERVICE
  348. 21/tcp filtered ftp
  349. 22/tcp filtered ssh
  350. 23/tcp filtered telnet
  351. 80/tcp filtered http
  352. 110/tcp filtered pop3
  353. 143/tcp filtered imap
  354. 443/tcp filtered https
  355. 3389/tcp filtered ms-wbt-server
  356.  
  357. Nmap done: 1 IP address (1 host up) scanned in 15.41 seconds
  358. #######################################################################################################################################
  359. Robot.txt 'aldabba.gov.sd'
  360. ---------------------------------------------------------------------------------------------------------------------------------------
  361.  
  362. User-agent: *
  363. Disallow: /administrator/
  364. Disallow: /cache/
  365. Disallow: /components/
  366. Disallow: /images/
  367. Disallow: /includes/
  368. Disallow: /installation/
  369. Disallow: /language/
  370. Disallow: /libraries/
  371. Disallow: /media/
  372. Disallow: /modules/
  373. Disallow: /plugins/
  374. Disallow: /templates/
  375. Disallow: /tmp/
  376. Disallow: /xmlrpc/
  377. #######################################################################################################################################
  378. Traceroute 'aldabba.gov.sd'
  379. ---------------------------------------------------------------------------------------------------------------------------------------
  380.  
  381. Start: 2019-02-16T00:34:41+0000
  382. HOST: web01 Loss% Snt Last Avg Best Wrst StDev
  383. 1.|-- 45.79.12.201 0.0% 3 0.7 0.8 0.6 1.0 0.2
  384. 2.|-- 45.79.12.0 0.0% 3 1.1 0.7 0.4 1.1 0.3
  385. 3.|-- hu0-7-0-7.ccr41.dfw03.atlas.cogentco.com 0.0% 3 1.7 1.5 1.1 1.7 0.3
  386. 4.|-- be2764.ccr32.dfw01.atlas.cogentco.com 0.0% 3 1.4 1.7 1.4 2.2 0.4
  387. 5.|-- be2433.ccr22.mci01.atlas.cogentco.com 0.0% 3 11.5 11.6 11.4 11.7 0.2
  388. 6.|-- be2832.ccr42.ord01.atlas.cogentco.com 0.0% 3 23.9 23.8 23.7 23.9 0.1
  389. 7.|-- be2718.ccr22.cle04.atlas.cogentco.com 0.0% 3 30.9 30.5 30.2 30.9 0.3
  390. 8.|-- be2879.ccr22.alb02.atlas.cogentco.com 0.0% 3 41.5 41.7 41.5 41.9 0.2
  391. 9.|-- be3600.ccr32.bos01.atlas.cogentco.com 0.0% 3 46.0 45.9 45.7 46.0 0.1
  392. 10.|-- be2983.ccr42.lon13.atlas.cogentco.com 0.0% 3 107.6 108.2 107.6 108.5 0.5
  393. 11.|-- be2871.ccr21.lon01.atlas.cogentco.com 0.0% 3 107.6 108.0 107.6 108.2 0.3
  394. 12.|-- expressotelecom.demarc.cogentco.com 0.0% 3 107.4 107.5 107.4 107.5 0.1
  395. 13.|-- 185.153.20.70 0.0% 3 185.6 185.9 185.6 186.0 0.2
  396. 14.|-- 185.153.20.82 0.0% 3 185.7 194.1 185.7 210.9 14.5
  397. 15.|-- 185.153.20.94 0.0% 3 185.5 185.7 185.5 186.0 0.3
  398. 16.|-- 185.153.20.153 0.0% 3 216.3 218.7 216.3 221.9 2.9
  399. 17.|-- 212.0.131.109 0.0% 3 226.6 230.7 226.6 238.7 6.9
  400. 18.|-- 196.202.137.249 0.0% 3 219.1 219.1 218.8 219.5 0.4
  401. 19.|-- 196.202.145.94 0.0% 3 219.2 219.1 219.0 219.2 0.1
  402. 20.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
  403. #######################################################################################################################################
  404. Ping 'aldabba.gov.sd'
  405. ---------------------------------------------------------------------------------------------------------------------------------------
  406.  
  407. Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-02-16 00:35 UTC
  408. SENT (0.4250s) ICMP [104.237.144.6 > 62.12.105.4 Echo request (type=8/code=0) id=58045 seq=1] IP [ttl=64 id=43580 iplen=28 ]
  409. SENT (1.4252s) ICMP [104.237.144.6 > 62.12.105.4 Echo request (type=8/code=0) id=58045 seq=2] IP [ttl=64 id=43580 iplen=28 ]
  410. SENT (2.4265s) ICMP [104.237.144.6 > 62.12.105.4 Echo request (type=8/code=0) id=58045 seq=3] IP [ttl=64 id=43580 iplen=28 ]
  411. SENT (3.4281s) ICMP [104.237.144.6 > 62.12.105.4 Echo request (type=8/code=0) id=58045 seq=4] IP [ttl=64 id=43580 iplen=28 ]
  412.  
  413. Max rtt: N/A | Min rtt: N/A | Avg rtt: N/A
  414. Raw packets sent: 4 (112B) | Rcvd: 0 (0B) | Lost: 4 (100.00%)
  415. Nping done: 1 IP address pinged in 4.43 seconds
  416. #######################################################################################################################################
  417. Page Admin Finder 'aldabba.gov.sd'
  418. ---------------------------------------------------------------------------------------------------------------------------------------
  419.  
  420. Avilable Links :
  421.  
  422. Find Page >> http://aldabba.gov.sd/admin/
  423.  
  424. Find Page >> http://aldabba.gov.sd/admin1/
  425.  
  426. Find Page >> http://aldabba.gov.sd/admin2/
  427.  
  428. Find Page >> http://aldabba.gov.sd/admin3/
  429.  
  430. Find Page >> http://aldabba.gov.sd/admin4/
  431.  
  432. Find Page >> http://aldabba.gov.sd/admin5/
  433.  
  434. Find Page >> http://aldabba.gov.sd/usuarios/
  435.  
  436. Find Page >> http://aldabba.gov.sd/usuario/
  437.  
  438. Find Page >> http://aldabba.gov.sd/moderator/
  439.  
  440. Find Page >> http://aldabba.gov.sd/webadmin/
  441.  
  442. Find Page >> http://aldabba.gov.sd/adminarea/
  443.  
  444. Find Page >> http://aldabba.gov.sd/bb-admin/
  445.  
  446. Find Page >> http://aldabba.gov.sd/adminLogin/
  447.  
  448. Find Page >> http://aldabba.gov.sd/admin_area/
  449.  
  450. Find Page >> http://aldabba.gov.sd/panel-administracion/
  451.  
  452. Find Page >> http://aldabba.gov.sd/instadmin/
  453.  
  454. Find Page >> http://aldabba.gov.sd/memberadmin/
  455.  
  456. Find Page >> http://aldabba.gov.sd/administratorlogin/
  457.  
  458. Find Page >> http://aldabba.gov.sd/adm/
  459.  
  460. Find Page >> http://aldabba.gov.sd/admin/account.php
  461.  
  462. Find Page >> http://aldabba.gov.sd/admin/index.php
  463.  
  464. Find Page >> http://aldabba.gov.sd/admin/login.php
  465.  
  466. Find Page >> http://aldabba.gov.sd/admin/admin.php
  467.  
  468. Find Page >> http://aldabba.gov.sd/admin_area/admin.php
  469.  
  470. Find Page >> http://aldabba.gov.sd/admin_area/login.php
  471.  
  472. Find Page >> http://aldabba.gov.sd/siteadmin/login.php
  473.  
  474. Find Page >> http://aldabba.gov.sd/siteadmin/index.php
  475.  
  476. Find Page >> http://aldabba.gov.sd/siteadmin/login.html
  477.  
  478. Find Page >> http://aldabba.gov.sd/admin/account.html
  479.  
  480. Find Page >> http://aldabba.gov.sd/admin/index.html
  481.  
  482. Find Page >> http://aldabba.gov.sd/admin/login.html
  483.  
  484. Find Page >> http://aldabba.gov.sd/admin/admin.html
  485.  
  486. Find Page >> http://aldabba.gov.sd/admin_area/index.php
  487.  
  488. Find Page >> http://aldabba.gov.sd/bb-admin/index.php
  489.  
  490. Find Page >> http://aldabba.gov.sd/bb-admin/login.php
  491.  
  492. Find Page >> http://aldabba.gov.sd/bb-admin/admin.php
  493.  
  494. Find Page >> http://aldabba.gov.sd/admin/home.php
  495.  
  496. Find Page >> http://aldabba.gov.sd/admin_area/login.html
  497.  
  498. Find Page >> http://aldabba.gov.sd/admin_area/index.html
  499.  
  500. Find Page >> http://aldabba.gov.sd/admin/controlpanel.php
  501.  
  502. Find Page >> http://aldabba.gov.sd/admin.php
  503.  
  504. Find Page >> http://aldabba.gov.sd/admincp/index.html
  505.  
  506. Find Page >> http://aldabba.gov.sd/adminpanel.html
  507.  
  508. Find Page >> http://aldabba.gov.sd/webadmin.html
  509.  
  510. Find Page >> http://aldabba.gov.sd/webadmin/index.html
  511.  
  512. Find Page >> http://aldabba.gov.sd/webadmin/admin.html
  513.  
  514. Find Page >> http://aldabba.gov.sd/webadmin/login.html
  515.  
  516. Find Page >> http://aldabba.gov.sd/admin/admin_login.html
  517.  
  518. Find Page >> http://aldabba.gov.sd/admin_login.html
  519.  
  520. Find Page >> http://aldabba.gov.sd/panel-administracion/login.html
  521.  
  522. Find Page >> http://aldabba.gov.sd/admin/cp.php
  523.  
  524. Find Page >> http://aldabba.gov.sd/cp.php
  525.  
  526. Find Page >> http://aldabba.gov.sd/nsw/admin/login.php
  527.  
  528. Find Page >> http://aldabba.gov.sd/webadmin/login.php
  529.  
  530. Find Page >> http://aldabba.gov.sd/admin/admin_login.php
  531.  
  532. Find Page >> http://aldabba.gov.sd/admin_login.php
  533.  
  534. Find Page >> http://aldabba.gov.sd/administrator.php
  535.  
  536. Find Page >> http://aldabba.gov.sd/admin_area/admin.html
  537.  
  538. Find Page >> http://aldabba.gov.sd/pages/admin/admin-login.php
  539.  
  540. Find Page >> http://aldabba.gov.sd/admin/admin-login.php
  541.  
  542. Find Page >> http://aldabba.gov.sd/admin-login.php
  543.  
  544. Find Page >> http://aldabba.gov.sd/bb-admin/index.html
  545.  
  546. Find Page >> http://aldabba.gov.sd/bb-admin/login.html
  547.  
  548. Find Page >> http://aldabba.gov.sd/acceso.php
  549.  
  550. Find Page >> http://aldabba.gov.sd/bb-admin/admin.html
  551.  
  552. Find Page >> http://aldabba.gov.sd/admin/home.html
  553.  
  554. Find Page >> http://aldabba.gov.sd/login.php
  555.  
  556. Find Page >> http://aldabba.gov.sd/modelsearch/login.php
  557.  
  558. Find Page >> http://aldabba.gov.sd/moderator.php
  559.  
  560. Find Page >> http://aldabba.gov.sd/moderator/login.php
  561.  
  562. Find Page >> http://aldabba.gov.sd/moderator/admin.php
  563.  
  564. Find Page >> http://aldabba.gov.sd/account.php
  565.  
  566. Find Page >> http://aldabba.gov.sd/pages/admin/admin-login.html
  567.  
  568. Find Page >> http://aldabba.gov.sd/admin/admin-login.html
  569.  
  570. Find Page >> http://aldabba.gov.sd/admin-login.html
  571.  
  572. Find Page >> http://aldabba.gov.sd/controlpanel.php
  573.  
  574. Find Page >> http://aldabba.gov.sd/admincontrol.php
  575.  
  576. Find Page >> http://aldabba.gov.sd/admin/adminLogin.html
  577.  
  578. Find Page >> http://aldabba.gov.sd/adminLogin.html
  579.  
  580. Find Page >> http://aldabba.gov.sd/home.html
  581.  
  582. Find Page >> http://aldabba.gov.sd/rcjakar/admin/login.php
  583.  
  584. Find Page >> http://aldabba.gov.sd/adminarea/index.html
  585.  
  586. Find Page >> http://aldabba.gov.sd/adminarea/admin.html
  587.  
  588. Find Page >> http://aldabba.gov.sd/webadmin.php
  589.  
  590. Find Page >> http://aldabba.gov.sd/webadmin/index.php
  591.  
  592. Find Page >> http://aldabba.gov.sd/webadmin/admin.php
  593.  
  594. Find Page >> http://aldabba.gov.sd/admin/controlpanel.html
  595.  
  596. Find Page >> http://aldabba.gov.sd/admin.html
  597.  
  598. Find Page >> http://aldabba.gov.sd/admin/cp.html
  599.  
  600. Find Page >> http://aldabba.gov.sd/cp.html
  601.  
  602. Find Page >> http://aldabba.gov.sd/adminpanel.php
  603.  
  604. Find Page >> http://aldabba.gov.sd/moderator.html
  605.  
  606. Find Page >> http://aldabba.gov.sd/user.html
  607.  
  608. Find Page >> http://aldabba.gov.sd/administrator.html
  609.  
  610. Find Page >> http://aldabba.gov.sd/login.html
  611.  
  612. Find Page >> http://aldabba.gov.sd/modelsearch/login.html
  613.  
  614. Find Page >> http://aldabba.gov.sd/moderator/login.html
  615.  
  616. Find Page >> http://aldabba.gov.sd/adminarea/login.html
  617.  
  618. Find Page >> http://aldabba.gov.sd/panel-administracion/index.html
  619.  
  620. Find Page >> http://aldabba.gov.sd/panel-administracion/admin.html
  621.  
  622. Find Page >> http://aldabba.gov.sd/modelsearch/index.html
  623.  
  624. Find Page >> http://aldabba.gov.sd/modelsearch/admin.html
  625.  
  626. Find Page >> http://aldabba.gov.sd/admincontrol/login.html
  627.  
  628. Find Page >> http://aldabba.gov.sd/adm/index.html
  629.  
  630. Find Page >> http://aldabba.gov.sd/adm.html
  631.  
  632. Find Page >> http://aldabba.gov.sd/moderator/admin.html
  633.  
  634. Find Page >> http://aldabba.gov.sd/user.php
  635.  
  636. Find Page >> http://aldabba.gov.sd/account.html
  637.  
  638. Find Page >> http://aldabba.gov.sd/controlpanel.html
  639.  
  640. Find Page >> http://aldabba.gov.sd/admincontrol.html
  641.  
  642. Find Page >> http://aldabba.gov.sd/panel-administracion/login.php
  643.  
  644. Find Page >> http://aldabba.gov.sd/wp-login.php
  645.  
  646. Find Page >> http://aldabba.gov.sd/adminLogin.php
  647.  
  648. Find Page >> http://aldabba.gov.sd/admin/adminLogin.php
  649.  
  650. Find Page >> http://aldabba.gov.sd/home.php
  651.  
  652. Find Page >> http://aldabba.gov.sd/adminarea/index.php
  653.  
  654. Find Page >> http://aldabba.gov.sd/adminarea/admin.php
  655.  
  656. Find Page >> http://aldabba.gov.sd/adminarea/login.php
  657.  
  658. Find Page >> http://aldabba.gov.sd/panel-administracion/index.php
  659.  
  660. Find Page >> http://aldabba.gov.sd/panel-administracion/admin.php
  661.  
  662. Find Page >> http://aldabba.gov.sd/modelsearch/index.php
  663.  
  664. Find Page >> http://aldabba.gov.sd/modelsearch/admin.php
  665.  
  666. Find Page >> http://aldabba.gov.sd/admincontrol/login.php
  667.  
  668. Find Page >> http://aldabba.gov.sd/adm/admloginuser.php
  669.  
  670. Find Page >> http://aldabba.gov.sd/admloginuser.php
  671.  
  672. Find Page >> http://aldabba.gov.sd/admin2.php
  673.  
  674. Find Page >> http://aldabba.gov.sd/admin2/login.php
  675.  
  676. Find Page >> http://aldabba.gov.sd/admin2/index.php
  677.  
  678. Find Page >> http://aldabba.gov.sd/usuarios/login.php
  679.  
  680. Find Page >> http://aldabba.gov.sd/adm/index.php
  681.  
  682. Find Page >> http://aldabba.gov.sd/adm.php
  683.  
  684. Find Page >> http://aldabba.gov.sd/affiliate.php
  685.  
  686. Find Page >> http://aldabba.gov.sd/adm_auth.php
  687.  
  688. Find Page >> http://aldabba.gov.sd/memberadmin.php
  689.  
  690. Find Page >> http://aldabba.gov.sd/administratorlogin.php
  691.  
  692. Find Page >> http://aldabba.gov.sd/admin_panel/
  693.  
  694. Find Page >> http://aldabba.gov.sd/admin_panel.html
  695.  
  696. Find Page >> http://aldabba.gov.sd/adm_cp/
  697. ######################################################################################################################################
  698. ; <<>> DiG 9.11.5-P1-1-Debian <<>> aldabba.gov.sd
  699. ;; global options: +cmd
  700. ;; Got answer:
  701. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8304
  702. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  703.  
  704. ;; OPT PSEUDOSECTION:
  705. ; EDNS: version: 0, flags:; udp: 4096
  706. ;; QUESTION SECTION:
  707. ;aldabba.gov.sd. IN A
  708.  
  709. ;; ANSWER SECTION:
  710. aldabba.gov.sd. 83838 IN A 62.12.105.4
  711.  
  712. ;; Query time: 216 msec
  713. ;; SERVER: 38.132.106.139#53(38.132.106.139)
  714. ;; WHEN: ven fév 15 19:48:31 EST 2019
  715. ;; MSG SIZE rcvd: 59
  716. ######################################################################################################################################
  717. ; <<>> DiG 9.11.5-P1-1-Debian <<>> +trace aldabba.gov.sd
  718. ;; global options: +cmd
  719. . 81241 IN NS l.root-servers.net.
  720. . 81241 IN NS a.root-servers.net.
  721. . 81241 IN NS d.root-servers.net.
  722. . 81241 IN NS c.root-servers.net.
  723. . 81241 IN NS m.root-servers.net.
  724. . 81241 IN NS i.root-servers.net.
  725. . 81241 IN NS j.root-servers.net.
  726. . 81241 IN NS h.root-servers.net.
  727. . 81241 IN NS e.root-servers.net.
  728. . 81241 IN NS b.root-servers.net.
  729. . 81241 IN NS g.root-servers.net.
  730. . 81241 IN NS f.root-servers.net.
  731. . 81241 IN NS k.root-servers.net.
  732. . 81241 IN RRSIG NS 8 0 518400 20190228170000 20190215160000 16749 . O0XEuM7e/SR8/zBP+t1ulOCHkRUmAfQMtM2qjCjNlPbTePjkgg152D8E tpSYeLlO+yuB49vjAFC+49JIBeCgJWe/bVFkMtwNpZohu1WIalQe3LSf VR3IAZC43a3wRRd7Y0z1M5CGE00xVKQAUKVMAzzdKLf8XepRHEm6db+Z gQn5UYyMmAef3EhwdGTYWNGZrgmxmPPLcppr1NdSiK/NNe2utSevAWTS CokI/cpAITUuKRtk/T8lUvs4HUOp8WKLKH04ZqjOo5xFouw5/UV+7r2T GdRhUugOdY4bRgScz2ThENsvK6PFr1e+GQI+3MCbSk3lGxud2GZziy/3 Dc8EEQ==
  733. ;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 216 ms
  734.  
  735. sd. 172800 IN NS sd.cctld.authdns.ripe.net.
  736. sd. 172800 IN NS ns1.uaenic.ae.
  737. sd. 172800 IN NS ns2.uaenic.ae.
  738. sd. 172800 IN NS ans1.sis.sd.
  739. sd. 172800 IN NS ans1.canar.sd.
  740. sd. 172800 IN NS ans2.canar.sd.
  741. sd. 172800 IN NS ns-sd.afrinic.net.
  742. sd. 86400 IN NSEC se. NS RRSIG NSEC
  743. sd. 86400 IN RRSIG NSEC 8 1 86400 20190228170000 20190215160000 16749 . GHfXxR4mlyuj+asn3iQo/1rlROc/LEqf5vnrpSNFs4CBBbp1UpLXDhig fOX6QVng9CkgZ+tKBQqzbzl6vQVEN0AN85/dKnD5R18HJCSRujy7KIdh K5/PgMBZbKwli/ldtTqFZl6n5WMmc/MCY+GxaXlUt+5VlFmGwva3oSA0 32Zro18HvLNNFltd/z7GqAjKO6i8DQFX2ImlwthVCjWCj24W+EiGnnCi oJjfyHcjCKpGej0+Sxkd1MWKhLZOhbNSi+sEiPI+aF92mHqJHu1zbdvQ 009zNQ7QUXK2MpHA10bz7qhBjXCsuzOjIj8ChiOY9SlBYh5/NU8afqTl XVSBNw==
  744. ;; Received 701 bytes from 2001:500:2d::d#53(d.root-servers.net) in 25 ms
  745.  
  746. gov.sd. 14400 IN NS sd.cctld.authdns.ripe.net.
  747. gov.sd. 14400 IN NS ns1.uaenic.ae.
  748. gov.sd. 14400 IN NS ns2.uaenic.ae.
  749. gov.sd. 14400 IN NS ans1.sis.sd.
  750. gov.sd. 14400 IN NS ans1.canar.sd.
  751. gov.sd. 14400 IN NS ans2.canar.sd.
  752. gov.sd. 14400 IN NS ns-sd.afrinic.net.
  753. ;; Received 270 bytes from 2001:43f8:120::26#53(ns-sd.afrinic.net) in 259 ms
  754.  
  755. ;; Received 71 bytes from 195.229.0.186#53(ns2.uaenic.ae) in 405 ms
  756. #######################################################################################################################################
  757. [*] Performing General Enumeration of Domain: aldabba.gov.sd
  758. [-] DNSSEC is not configured for aldabba.gov.sd
  759. [*] SOA ns0.ndc.gov.sd 62.12.109.2
  760. [*] NS ns1.ndc.gov.sd 62.12.109.3
  761. [*] Bind Version for 62.12.109.3 you guess!
  762. [*] NS ns0.ndc.gov.sd 62.12.109.2
  763. [*] Bind Version for 62.12.109.2 you guess!
  764. [*] MX mail.aldabba.gov.sd 197.254.200.161
  765. [*] A aldabba.gov.sd 62.12.105.4
  766. [*] TXT aldabba.gov.sd v=spf1 mx -all
  767. [*] Enumerating SRV Records
  768. [-] No SRV Records Found for aldabba.gov.sd
  769. [+] 0 Records Found
  770. #######################################################################################################################################
  771. [*] Processing domain aldabba.gov.sd
  772. [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
  773. [+] Getting nameservers
  774. 62.12.109.3 - ns1.ndc.gov.sd
  775. [+] Zone transfer sucessful using nameserver ns1.ndc.gov.sd
  776. aldabba.gov.sd. 86400 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2016011408 10800 900 604800 86400
  777. aldabba.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
  778. aldabba.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
  779. aldabba.gov.sd. 86400 IN A 62.12.105.4
  780. aldabba.gov.sd. 86400 IN MX 10 mail.aldabba.gov.sd.
  781. aldabba.gov.sd. 86400 IN TXT "v=spf1 mx -all"
  782. mail.aldabba.gov.sd. 86400 IN A 197.254.200.161
  783. mail.aldabba.gov.sd. 86400 IN MX 10 mail.aldabba.gov.sd.
  784. webmail.aldabba.gov.sd. 86400 IN CNAME mail.aldabba.gov.sd.
  785. www.aldabba.gov.sd. 86400 IN A 62.12.105.4
  786. #######################################################################################################################################
  787. Ip Address Status Type Domain Name Server
  788. ---------- ------ ---- ----------- ------
  789. 197.254.200.161 host mail.aldabba.gov.sd
  790. 197.254.200.161 alias webmail.aldabba.gov.sd
  791. 197.254.200.161 host mail.aldabba.gov.sd
  792. 62.12.105.4 200 host www.aldabba.gov.sd
  793. ######################################################################################################################################
  794. [+] Testing domain
  795. www.aldabba.gov.sd 62.12.105.4
  796. [+] Dns resolving
  797. Domain name Ip address Name server
  798. aldabba.gov.sd 62.12.105.4 f05-web03.nic.gov.sd
  799. Found 1 host(s) for aldabba.gov.sd
  800. [+] Testing wildcard
  801. Ok, no wildcard found.
  802.  
  803. [+] Scanning for subdomain on aldabba.gov.sd
  804. [!] Wordlist not specified. I scannig with my internal wordlist...
  805. Estimated time about 219.4 seconds
  806.  
  807. Subdomain Ip address Name server
  808.  
  809. www.aldabba.gov.sd 62.12.105.4 f05-web03.nic.gov.sd
  810. #######################################################################################################################################
  811. dnsenum VERSION:1.2.4
  812.  
  813. ----- aldabba.gov.sd -----
  814.  
  815.  
  816. Host's addresses:
  817. __________________
  818.  
  819. aldabba.gov.sd. 84006 IN A 62.12.105.4
  820.  
  821.  
  822. Name Servers:
  823. ______________
  824.  
  825. ns1.ndc.gov.sd. 83973 IN A 62.12.109.3
  826. ns0.ndc.gov.sd. 83973 IN A 62.12.109.2
  827.  
  828.  
  829. Mail (MX) Servers:
  830. ___________________
  831.  
  832. mail.aldabba.gov.sd. 85688 IN A 197.254.200.161
  833.  
  834.  
  835. Trying Zone Transfers and getting Bind Versions:
  836. _________________________________________________
  837.  
  838.  
  839. Trying Zone Transfer for aldabba.gov.sd on ns1.ndc.gov.sd ...
  840. aldabba.gov.sd. 86400 IN SOA (
  841. aldabba.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
  842. aldabba.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
  843. aldabba.gov.sd. 86400 IN A 62.12.105.4
  844. aldabba.gov.sd. 86400 IN MX 10
  845. aldabba.gov.sd. 86400 IN TXT "v=spf1
  846. mail.aldabba.gov.sd. 86400 IN A 197.254.200.161
  847. mail.aldabba.gov.sd. 86400 IN MX 10
  848. webmail.aldabba.gov.sd. 86400 IN CNAME mail.aldabba.gov.sd.
  849. www.aldabba.gov.sd. 86400 IN A 62.12.105.4
  850.  
  851. Trying Zone Transfer for aldabba.gov.sd on ns0.ndc.gov.sd ...
  852. aldabba.gov.sd. 86400 IN SOA (
  853. aldabba.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
  854. aldabba.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
  855. aldabba.gov.sd. 86400 IN A 62.12.105.4
  856. aldabba.gov.sd. 86400 IN MX 10
  857. aldabba.gov.sd. 86400 IN TXT "v=spf1
  858. mail.aldabba.gov.sd. 86400 IN A 197.254.200.161
  859. mail.aldabba.gov.sd. 86400 IN MX 10
  860. webmail.aldabba.gov.sd. 86400 IN CNAME mail.aldabba.gov.sd.
  861. www.aldabba.gov.sd. 86400 IN A 62.12.105.4
  862. #######################################################################################################################################
  863.  
  864. ____ _ _ _ _ _____
  865. / ___| _ _| |__ | (_)___| |_|___ / _ __
  866. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  867. ___) | |_| | |_) | | \__ \ |_ ___) | |
  868. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  869.  
  870. # Coded By Ahmed Aboul-Ela - @aboul3la
  871.  
  872. [-] Enumerating subdomains now for aldabba.gov.sd
  873. [-] verbosity is enabled, will show the subdomains results in realtime
  874. [-] Searching now in Baidu..
  875. [-] Searching now in Yahoo..
  876. [-] Searching now in Google..
  877. [-] Searching now in Bing..
  878. [-] Searching now in Ask..
  879. [-] Searching now in Netcraft..
  880. [-] Searching now in DNSdumpster..
  881. [-] Searching now in Virustotal..
  882. [-] Searching now in ThreatCrowd..
  883. [-] Searching now in SSL Certificates..
  884. [-] Searching now in PassiveDNS..
  885. Virustotal: www.aldabba.gov.sd
  886. Virustotal: mail.aldabba.gov.sd
  887. Yahoo: www.aldabba.gov.sd
  888. Bing: www.aldabba.gov.sd
  889. [-] Saving results to file: /usr/share/sniper/loot//domains/domains-aldabba.gov.sd.txt
  890. [-] Total Unique Subdomains Found: 2
  891. www.aldabba.gov.sd
  892. mail.aldabba.gov.sd
  893. #######################################################################################################################################
  894. mail.aldabba.gov.sd,197.254.200.161
  895. webmail.aldabba.gov.sd,197.254.200.161
  896. #######################################################################################################################################
  897. ===============================================
  898. -=Subfinder v1.1.3 github.com/subfinder/subfinder
  899. ===============================================
  900.  
  901.  
  902. Running Source: Ask
  903. Running Source: Archive.is
  904. Running Source: Baidu
  905. Running Source: Bing
  906. Running Source: CertDB
  907. Running Source: CertificateTransparency
  908. Running Source: Certspotter
  909. Running Source: Commoncrawl
  910. Running Source: Crt.sh
  911. Running Source: Dnsdb
  912. Running Source: DNSDumpster
  913. Running Source: DNSTable
  914. Running Source: Dogpile
  915. Running Source: Exalead
  916. Running Source: Findsubdomains
  917. Running Source: Googleter
  918. Running Source: Hackertarget
  919. Running Source: Ipv4Info
  920. Running Source: PTRArchive
  921. Running Source: Sitedossier
  922. Running Source: Threatcrowd
  923. Running Source: ThreatMiner
  924. Running Source: WaybackArchive
  925. Running Source: Yahoo
  926.  
  927. Running enumeration on aldabba.gov.sd
  928.  
  929. dnsdb: Unexpected return status 503
  930.  
  931. waybackarchive: Get https://web.archive.org/cdx/search/cdx?url=*.aldabba.gov.sd/*&output=json&fl=original&collapse=urlkey&page=: net/http: invalid header field value "http://web.archive.org/cdx/search/cdx?url=*.aldabba.gov.sd/*&output=json&fl=original&collapse=urlkey&page=\x00" for key Referer
  932.  
  933. archiveis: Get https://archive.fo/*.aldabba.gov.sd: dial tcp 213.183.51.24:443: connect: connection timed out
  934.  
  935.  
  936. Starting Bruteforcing of aldabba.gov.sd with 9985 words
  937.  
  938. Total 6 Unique subdomains found for aldabba.gov.sd
  939.  
  940. .aldabba.gov.sd
  941. mail.aldabba.gov.sd
  942. mail.aldabba.gov.sd
  943. webmail.aldabba.gov.sd
  944. www.aldabba.gov.sd
  945. www.aldabba.gov.sd
  946. #######################################################################################################################################
  947. [*] Found SPF record:
  948. [*] v=spf1 mx -all
  949. [*] SPF record contains an All item: -all
  950. [*] No DMARC record found. Looking for organizational record
  951. [+] No organizational DMARC record
  952. [+] Spoofing possible for aldabba.gov.sd!
  953. #######################################################################################################################################
  954. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 19:57 EST
  955. Warning: 62.12.105.4 giving up on port because retransmission cap hit (2).
  956. Nmap scan report for aldabba.gov.sd (62.12.105.4)
  957. Host is up (0.40s latency).
  958. rDNS record for 62.12.105.4: f05-web03.nic.gov.sd
  959. Not shown: 464 filtered ports, 4 closed ports
  960. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  961. PORT STATE SERVICE
  962. 21/tcp open ftp
  963. 80/tcp open http
  964. 110/tcp open pop3
  965. 143/tcp open imap
  966. 443/tcp open https
  967. 993/tcp open imaps
  968. 995/tcp open pop3s
  969. 8443/tcp open https-alt
  970. #######################################################################################################################################
  971. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 20:00 EST
  972. Nmap scan report for aldabba.gov.sd (62.12.105.4)
  973. Host is up (0.12s latency).
  974. rDNS record for 62.12.105.4: f05-web03.nic.gov.sd
  975. Not shown: 2 filtered ports
  976. PORT STATE SERVICE
  977. 53/udp open|filtered domain
  978. 67/udp open|filtered dhcps
  979. 68/udp open|filtered dhcpc
  980. 69/udp open|filtered tftp
  981. 88/udp open|filtered kerberos-sec
  982. 123/udp open|filtered ntp
  983. 139/udp open|filtered netbios-ssn
  984. 161/udp open|filtered snmp
  985. 162/udp open|filtered snmptrap
  986. 389/udp open|filtered ldap
  987. 520/udp open|filtered route
  988. 2049/udp open|filtered nfs
  989. #######################################################################################################################################
  990. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 20:00 EST
  991. Nmap scan report for aldabba.gov.sd (62.12.105.4)
  992. Host is up (0.37s latency).
  993. rDNS record for 62.12.105.4: f05-web03.nic.gov.sd
  994.  
  995. PORT STATE SERVICE VERSION
  996. 21/tcp open ftp ProFTPD 1.3.5d
  997. | ftp-brute:
  998. | Accounts: No valid accounts found
  999. |_ Statistics: Performed 1813 guesses in 181 seconds, average tps: 9.6
  1000. Too many fingerprints match this host to give specific OS details
  1001. Network Distance: 24 hops
  1002. Service Info: OS: Unix
  1003.  
  1004. TRACEROUTE (using port 21/tcp)
  1005. HOP RTT ADDRESS
  1006. 1 125.40 ms 10.251.200.1
  1007. 2 125.42 ms 190.124.251.129
  1008. 3 125.43 ms 172.16.21.1
  1009. 4 185.26 ms 91.205.233.128
  1010. 5 185.27 ms 192.168.7.2
  1011. 6 187.25 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  1012. 7 187.24 ms core3.t6-2.bbnet2.mia003.pnap.net (69.25.0.67)
  1013. 8 187.25 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
  1014. 9 187.25 ms 154.54.47.29
  1015. 10 199.82 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
  1016. 11 209.76 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
  1017. 12 214.27 ms be2806.ccr41.jfk02.atlas.cogentco.com (154.54.40.105)
  1018. 13 283.32 ms be2490.ccr42.lon13.atlas.cogentco.com (154.54.42.86)
  1019. 14 289.47 ms be2871.ccr21.lon01.atlas.cogentco.com (154.54.58.186)
  1020. 15 289.39 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
  1021. 16 363.40 ms 185.153.20.70
  1022. 17 361.43 ms 185.153.20.82
  1023. 18 362.71 ms 185.153.20.94
  1024. 19 378.98 ms 185.153.20.153
  1025. 20 ... 21
  1026. 22 398.46 ms 196.202.145.94
  1027. 23 ...
  1028. 24 397.94 ms f05-web03.nic.gov.sd (62.12.105.4)
  1029. #######################################################################################################################################
  1030. http://aldabba.gov.sd [200 OK] Cookies[dba52603cb1126534e3b339094dcfc62], IP[62.12.105.4], Joomla[1.5,1.5.23,1.5.24,1.5.25,1.5.26][com_content,com_mailto], probably Mambo[com_content,com_mailto], MetaGenerator[Joomla! 1.5 - Open Source Content Management], PHP[5.4.16,], Plesk[Lin], Script[text/javascript], Title[محلية الدبة], X-Powered-By[PHP/5.4.16, PleskLin]
  1031. #######################################################################################################################################
  1032. wig - WebApp Information Gatherer
  1033.  
  1034.  
  1035. Scanning http://aldabba.gov.sd...
  1036. _________________________________________________ SITE INFO _________________________________________________
  1037. IP Title
  1038. 62.12.105.4 محلية الدبة
  1039.  
  1040. __________________________________________________ VERSION __________________________________________________
  1041. Name Versions Type
  1042. Joomla! 1.5 CMS
  1043. Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.4 | 2.4.5 | 2.4.6 | 2.4.7 Platform
  1044. 2.4.8 | 2.4.9
  1045.  
  1046. ________________________________________________ INTERESTING ________________________________________________
  1047. URL Note Type
  1048. /robots.txt robots.txt index Interesting
  1049.  
  1050. ___________________________________________________ TOOLS ___________________________________________________
  1051. Name Link Software
  1052. CMSmap https://github.com/Dionach/CMSmap Joomla!
  1053. joomscan http://sourceforge.net/projects/joomscan/ Joomla!
  1054.  
  1055. ______________________________________________ VULNERABILITIES ______________________________________________
  1056. Affected #Vulns Link
  1057. Joomla! 1.5 14 http://cvedetails.com/version/53796
  1058.  
  1059. _____________________________________________________________________________________________________________
  1060. Time: 83.6 sec Urls: 437 Fingerprints: 40401
  1061. #######################################################################################################################################
  1062. HTTP/1.1 200 OK
  1063. Date: Sat, 16 Feb 2019 00:00:16 GMT
  1064. Content-Type: text/html; charset=utf-8
  1065. X-Powered-By: PHP/5.4.16
  1066. P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
  1067. Expires: Mon, 1 Jan 2001 00:00:00 GMT
  1068. Cache-Control: post-check=0, pre-check=0
  1069. Pragma: no-cache
  1070. Set-Cookie: dba52603cb1126534e3b339094dcfc62=spl9s16mn10quukgq0oue8h8l0; path=/
  1071. Last-Modified: Sat, 16 Feb 2019 00:00:16 GMT
  1072. X-Powered-By: PleskLin
  1073. Connection: keep-alive
  1074.  
  1075. HTTP/1.1 200 OK
  1076. Date: Sat, 16 Feb 2019 00:00:17 GMT
  1077. Content-Type: text/html; charset=utf-8
  1078. X-Powered-By: PHP/5.4.16
  1079. P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
  1080. Expires: Mon, 1 Jan 2001 00:00:00 GMT
  1081. Cache-Control: post-check=0, pre-check=0
  1082. Pragma: no-cache
  1083. Set-Cookie: dba52603cb1126534e3b339094dcfc62=sl8drdjrggfhvj9ee01flpif30; path=/
  1084. Last-Modified: Sat, 16 Feb 2019 00:00:17 GMT
  1085. X-Powered-By: PleskLin
  1086. Connection: keep-alive
  1087. #######################################################################################################################################
  1088. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 20:08 EST
  1089. Nmap scan report for aldabba.gov.sd (62.12.105.4)
  1090. Host is up (0.13s latency).
  1091. rDNS record for 62.12.105.4: f05-web03.nic.gov.sd
  1092.  
  1093. PORT STATE SERVICE VERSION
  1094. 110/tcp open pop3 Dovecot pop3d
  1095. | pop3-brute:
  1096. | Accounts: No valid accounts found
  1097. |_ Statistics: Performed 211 guesses in 187 seconds, average tps: 1.1
  1098. |_pop3-capabilities: STLS RESP-CODES USER AUTH-RESP-CODE SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) PIPELINING TOP APOP UIDL CAPA
  1099. Too many fingerprints match this host to give specific OS details
  1100. Network Distance: 1 hop
  1101.  
  1102. TRACEROUTE (using port 80/tcp)
  1103. HOP RTT ADDRESS
  1104. 1 124.41 ms f05-web03.nic.gov.sd (62.12.105.4)
  1105. #######################################################################################################################################
  1106. Version: 1.11.12-static
  1107. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  1108.  
  1109. Connected to 62.12.105.4
  1110.  
  1111. Testing SSL server aldabba.gov.sd on port 443 using SNI name aldabba.gov.sd
  1112.  
  1113. TLS Fallback SCSV:
  1114. Server supports TLS Fallback SCSV
  1115.  
  1116. TLS renegotiation:
  1117. Secure session renegotiation supported
  1118.  
  1119. TLS Compression:
  1120. Compression disabled
  1121.  
  1122. Heartbleed:
  1123. TLS 1.2 not vulnerable to heartbleed
  1124. TLS 1.1 not vulnerable to heartbleed
  1125. TLS 1.0 not vulnerable to heartbleed
  1126.  
  1127. Supported Server Cipher(s):
  1128. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  1129. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  1130. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1131. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  1132. Accepted TLSv1.2 256 bits AES256-SHA256
  1133. Accepted TLSv1.2 256 bits AES256-SHA
  1134. Accepted TLSv1.2 256 bits CAMELLIA256-SHA
  1135. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  1136. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  1137. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1138. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  1139. Accepted TLSv1.2 128 bits AES128-SHA256
  1140. Accepted TLSv1.2 128 bits AES128-SHA
  1141. Accepted TLSv1.2 128 bits CAMELLIA128-SHA
  1142. Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1143. Accepted TLSv1.1 256 bits AES256-SHA
  1144. Accepted TLSv1.1 256 bits CAMELLIA256-SHA
  1145. Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1146. Accepted TLSv1.1 128 bits AES128-SHA
  1147. Accepted TLSv1.1 128 bits CAMELLIA128-SHA
  1148. Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1149. Accepted TLSv1.0 256 bits AES256-SHA
  1150. Accepted TLSv1.0 256 bits CAMELLIA256-SHA
  1151. Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1152. Accepted TLSv1.0 128 bits AES128-SHA
  1153. Accepted TLSv1.0 128 bits CAMELLIA128-SHA
  1154.  
  1155. SSL Certificate:
  1156. Signature Algorithm: sha256WithRSAEncryption
  1157. RSA Key Strength: 2048
  1158.  
  1159. Subject: Plesk
  1160. Issuer: Plesk
  1161.  
  1162. Not valid before: Jul 20 00:21:23 2015 GMT
  1163. Not valid after: Jul 19 00:21:23 2016 GMT
  1164. ######################################################################################################################################
  1165. --------------------------------------------------------
  1166. <<<Yasuo discovered following vulnerable applications>>>
  1167. --------------------------------------------------------
  1168. +------------+--------------------------------------+--------------------------------------------------+----------+----------+
  1169. | App Name | URL to Application | Potential Exploit | Username | Password |
  1170. +------------+--------------------------------------+--------------------------------------------------+----------+----------+
  1171. | phpMyAdmin | https://62.12.105.4:8443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | None | None |
  1172. +------------+--------------------------------------+--------------------------------------------------+----------+----------+
  1173. #######################################################################################################################################
  1174. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 19:46 EST
  1175. Warning: 62.12.105.4 giving up on port because retransmission cap hit (2).
  1176. Nmap scan report for f05-web03.nic.gov.sd (62.12.105.4)
  1177. Host is up (0.40s latency).
  1178. Not shown: 464 filtered ports, 4 closed ports
  1179. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  1180. PORT STATE SERVICE
  1181. 21/tcp open ftp
  1182. 80/tcp open http
  1183. 110/tcp open pop3
  1184. 143/tcp open imap
  1185. 443/tcp open https
  1186. 993/tcp open imaps
  1187. 995/tcp open pop3s
  1188. 8443/tcp open https-alt
  1189. #######################################################################################################################################
  1190. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 19:48 EST
  1191. Nmap scan report for f05-web03.nic.gov.sd (62.12.105.4)
  1192. Host is up (0.12s latency).
  1193. Not shown: 2 filtered ports
  1194. PORT STATE SERVICE
  1195. 53/udp open|filtered domain
  1196. 67/udp open|filtered dhcps
  1197. 68/udp open|filtered dhcpc
  1198. 69/udp open|filtered tftp
  1199. 88/udp open|filtered kerberos-sec
  1200. 123/udp open|filtered ntp
  1201. 139/udp open|filtered netbios-ssn
  1202. 161/udp open|filtered snmp
  1203. 162/udp open|filtered snmptrap
  1204. 389/udp open|filtered ldap
  1205. 520/udp open|filtered route
  1206. 2049/udp open|filtered nfs
  1207. ######################################################################################################################################
  1208. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 19:48 EST
  1209. Nmap scan report for f05-web03.nic.gov.sd (62.12.105.4)
  1210. Host is up (0.36s latency).
  1211.  
  1212. PORT STATE SERVICE VERSION
  1213. 21/tcp open ftp ProFTPD 1.3.5d
  1214. | ftp-brute:
  1215. | Accounts: No valid accounts found
  1216. |_ Statistics: Performed 1943 guesses in 188 seconds, average tps: 10.0
  1217. Too many fingerprints match this host to give specific OS details
  1218. Network Distance: 24 hops
  1219. Service Info: OS: Unix
  1220.  
  1221. TRACEROUTE (using port 21/tcp)
  1222. HOP RTT ADDRESS
  1223. 1 124.75 ms 10.251.200.1
  1224. 2 124.79 ms 190.124.251.129
  1225. 3 124.82 ms 172.16.21.1
  1226. 4 184.43 ms 91.205.233.128
  1227. 5 185.05 ms 192.168.7.2
  1228. 6 185.12 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  1229. 7 185.10 ms core3.t6-2.bbnet2.mia003.pnap.net (69.25.0.67)
  1230. 8 185.12 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
  1231. 9 185.11 ms 154.54.47.29
  1232. 10 199.59 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
  1233. 11 208.19 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
  1234. 12 214.15 ms be2806.ccr41.jfk02.atlas.cogentco.com (154.54.40.105)
  1235. 13 289.82 ms be2490.ccr42.lon13.atlas.cogentco.com (154.54.42.86)
  1236. 14 288.51 ms be2871.ccr21.lon01.atlas.cogentco.com (154.54.58.186)
  1237. 15 285.91 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
  1238. 16 365.90 ms 185.153.20.70
  1239. 17 363.89 ms 185.153.20.82
  1240. 18 365.87 ms 185.153.20.94
  1241. 19 380.70 ms 185.153.20.153
  1242. 20 ... 21
  1243. 22 417.90 ms 196.202.145.94
  1244. 23 ...
  1245. 24 394.11 ms f05-web03.nic.gov.sd (62.12.105.4)
  1246. #######################################################################################################################################
  1247. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 19:53 EST
  1248. Nmap scan report for f05-web03.nic.gov.sd (62.12.105.4)
  1249. Host is up.
  1250.  
  1251. PORT STATE SERVICE VERSION
  1252. 67/udp open|filtered dhcps
  1253. |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
  1254. Too many fingerprints match this host to give specific OS details
  1255.  
  1256. TRACEROUTE (using proto 1/icmp)
  1257. HOP RTT ADDRESS
  1258. 1 125.49 ms 10.251.200.1
  1259. 2 125.53 ms 190.124.251.129
  1260. 3 125.89 ms 172.16.21.1
  1261. 4 185.73 ms 91.205.233.128
  1262. 5 187.50 ms 192.168.7.2
  1263. 6 187.94 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  1264. 7 188.27 ms 69.25.0.3
  1265. 8 189.34 ms te0-0-0-12.ccr21.mia03.atlas.cogentco.com (38.104.94.97)
  1266. 9 187.94 ms be3400.ccr21.mia01.atlas.cogentco.com (154.54.47.17)
  1267. 10 202.20 ms be3482.ccr41.atl01.atlas.cogentco.com (154.54.24.145)
  1268. 11 207.79 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
  1269. 12 214.34 ms be2806.ccr41.jfk02.atlas.cogentco.com (154.54.40.105)
  1270. 13 286.35 ms be2317.ccr41.lon13.atlas.cogentco.com (154.54.30.186)
  1271. 14 283.37 ms be2868.ccr21.lon01.atlas.cogentco.com (154.54.57.154)
  1272. 15 284.16 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
  1273. 16 362.76 ms 185.153.20.70
  1274. 17 361.97 ms 185.153.20.82
  1275. 18 362.77 ms 185.153.20.94
  1276. 19 386.33 ms 185.153.20.153
  1277. 20 395.62 ms 212.0.131.109
  1278. 21 390.02 ms 196.202.137.249
  1279. 22 399.11 ms 196.202.145.94
  1280. 23 ... 30
  1281. #######################################################################################################################################
  1282. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 19:56 EST
  1283. Nmap scan report for f05-web03.nic.gov.sd (62.12.105.4)
  1284. Host is up.
  1285.  
  1286. PORT STATE SERVICE VERSION
  1287. 68/udp open|filtered dhcpc
  1288. Too many fingerprints match this host to give specific OS details
  1289.  
  1290. TRACEROUTE (using proto 1/icmp)
  1291. HOP RTT ADDRESS
  1292. 1 124.45 ms 10.251.200.1
  1293. 2 124.50 ms 190.124.251.129
  1294. 3 124.53 ms 172.16.21.1
  1295. 4 185.18 ms 91.205.233.128
  1296. 5 185.12 ms 192.168.7.2
  1297. 6 185.17 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  1298. 7 185.26 ms 69.25.0.3
  1299. 8 185.28 ms te0-0-0-12.ccr21.mia03.atlas.cogentco.com (38.104.94.97)
  1300. 9 185.25 ms be3400.ccr21.mia01.atlas.cogentco.com (154.54.47.17)
  1301. 10 198.65 ms be3482.ccr41.atl01.atlas.cogentco.com (154.54.24.145)
  1302. 11 209.52 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
  1303. 12 215.67 ms be2806.ccr41.jfk02.atlas.cogentco.com (154.54.40.105)
  1304. 13 287.05 ms be2317.ccr41.lon13.atlas.cogentco.com (154.54.30.186)
  1305. 14 284.50 ms be2868.ccr21.lon01.atlas.cogentco.com (154.54.57.154)
  1306. 15 285.21 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
  1307. 16 363.48 ms 185.153.20.70
  1308. 17 362.84 ms 185.153.20.82
  1309. 18 363.48 ms 185.153.20.94
  1310. 19 379.60 ms 185.153.20.153
  1311. 20 392.82 ms 212.0.131.109
  1312. 21 390.28 ms 196.202.137.249
  1313. 22 400.80 ms 196.202.145.94
  1314. 23 ... 30
  1315. ######################################################################################################################################
  1316. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 19:58 EST
  1317. Nmap scan report for f05-web03.nic.gov.sd (62.12.105.4)
  1318. Host is up.
  1319.  
  1320. PORT STATE SERVICE VERSION
  1321. 69/udp open|filtered tftp
  1322. Too many fingerprints match this host to give specific OS details
  1323.  
  1324. TRACEROUTE (using proto 1/icmp)
  1325. HOP RTT ADDRESS
  1326. 1 124.37 ms 10.251.200.1
  1327. 2 124.30 ms 190.124.251.129
  1328. 3 124.35 ms 172.16.21.1
  1329. 4 185.02 ms 91.205.233.128
  1330. 5 185.06 ms 192.168.7.2
  1331. 6 185.05 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  1332. 7 185.26 ms 69.25.0.3
  1333. 8 185.08 ms te0-0-0-12.ccr21.mia03.atlas.cogentco.com (38.104.94.97)
  1334. 9 185.10 ms be3400.ccr21.mia01.atlas.cogentco.com (154.54.47.17)
  1335. 10 198.80 ms be3482.ccr41.atl01.atlas.cogentco.com (154.54.24.145)
  1336. 11 209.85 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
  1337. 12 216.19 ms be2806.ccr41.jfk02.atlas.cogentco.com (154.54.40.105)
  1338. 13 287.79 ms be2317.ccr41.lon13.atlas.cogentco.com (154.54.30.186)
  1339. 14 285.39 ms be2868.ccr21.lon01.atlas.cogentco.com (154.54.57.154)
  1340. 15 285.70 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
  1341. 16 365.48 ms 185.153.20.70
  1342. 17 365.44 ms 185.153.20.82
  1343. 18 365.45 ms 185.153.20.94
  1344. 19 381.33 ms 185.153.20.153
  1345. 20 394.20 ms 212.0.131.109
  1346. 21 388.89 ms 196.202.137.249
  1347. 22 399.53 ms 196.202.145.94
  1348. 23 ... 30
  1349. #######################################################################################################################################
  1350.  
  1351. wig - WebApp Information Gatherer
  1352.  
  1353.  
  1354. Scanning http://62.12.105.4...
  1355. _________________________________________ SITE INFO _________________________________________
  1356. IP Title
  1357. 62.12.105.4 Domain Default page
  1358.  
  1359. __________________________________________ VERSION __________________________________________
  1360. Name Versions Type
  1361. Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.4 | 2.4.5 | 2.4.6 | 2.4.7 Platform
  1362. 2.4.8 | 2.4.9
  1363.  
  1364. _____________________________________________________________________________________________
  1365. Time: 79.2 sec Urls: 810 Fingerprints: 40401
  1366. #######################################################################################################################################
  1367. HTTP/1.1 200 OK
  1368. Date: Fri, 15 Feb 2019 23:54:34 GMT
  1369. Content-Type: text/html
  1370. Content-Length: 3750
  1371. Last-Modified: Wed, 31 Jan 2018 01:28:47 GMT
  1372. ETag: "ea6-5640866950aeb"
  1373. Accept-Ranges: bytes
  1374. Connection: keep-alive
  1375.  
  1376. HTTP/1.1 200 OK
  1377. Date: Fri, 15 Feb 2019 23:54:35 GMT
  1378. Content-Type: text/html
  1379. Content-Length: 3750
  1380. Last-Modified: Wed, 31 Jan 2018 01:28:47 GMT
  1381. ETag: "ea6-5640866950aeb"
  1382. Accept-Ranges: bytes
  1383. Connection: keep-alive
  1384. #######################################################################################################################################
  1385. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 20:02 EST
  1386. Nmap scan report for f05-web03.nic.gov.sd (62.12.105.4)
  1387. Host is up (0.13s latency).
  1388.  
  1389. PORT STATE SERVICE VERSION
  1390. 110/tcp open pop3 Dovecot pop3d
  1391. | pop3-brute:
  1392. | Accounts: No valid accounts found
  1393. |_ Statistics: Performed 212 guesses in 187 seconds, average tps: 1.1
  1394. |_pop3-capabilities: UIDL TOP SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) APOP PIPELINING STLS USER CAPA AUTH-RESP-CODE RESP-CODES
  1395. Too many fingerprints match this host to give specific OS details
  1396. Network Distance: 1 hop
  1397.  
  1398. TRACEROUTE (using port 80/tcp)
  1399. HOP RTT ADDRESS
  1400. 1 124.41 ms f05-web03.nic.gov.sd (62.12.105.4)
  1401. #######################################################################################################################################
  1402. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 20:05 EST
  1403. Nmap scan report for f05-web03.nic.gov.sd (62.12.105.4)
  1404. Host is up.
  1405.  
  1406. PORT STATE SERVICE VERSION
  1407. 123/udp open|filtered ntp
  1408. Too many fingerprints match this host to give specific OS details
  1409.  
  1410. TRACEROUTE (using proto 1/icmp)
  1411. HOP RTT ADDRESS
  1412. 1 123.82 ms 10.251.200.1
  1413. 2 123.85 ms 190.124.251.129
  1414. 3 123.87 ms 172.16.21.1
  1415. 4 184.58 ms 91.205.233.128
  1416. 5 184.60 ms 192.168.7.2
  1417. 6 184.62 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  1418. 7 184.66 ms 69.25.0.3
  1419. 8 184.66 ms te0-0-0-12.ccr21.mia03.atlas.cogentco.com (38.104.94.97)
  1420. 9 184.66 ms be3400.ccr21.mia01.atlas.cogentco.com (154.54.47.17)
  1421. 10 198.32 ms be3482.ccr41.atl01.atlas.cogentco.com (154.54.24.145)
  1422. 11 208.70 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
  1423. 12 215.28 ms be2806.ccr41.jfk02.atlas.cogentco.com (154.54.40.105)
  1424. 13 287.02 ms be2317.ccr41.lon13.atlas.cogentco.com (154.54.30.186)
  1425. 14 284.70 ms be2868.ccr21.lon01.atlas.cogentco.com (154.54.57.154)
  1426. 15 285.44 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
  1427. 16 374.27 ms 185.153.20.70
  1428. 17 373.77 ms 185.153.20.82
  1429. 18 374.22 ms 185.153.20.94
  1430. 19 391.49 ms 185.153.20.153
  1431. 20 403.85 ms 212.0.131.109
  1432. 21 390.92 ms 196.202.137.249
  1433. 22 401.79 ms 196.202.145.94
  1434. 23 ... 30
  1435. ######################################################################################################################################
  1436. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 20:08 EST
  1437. Nmap scan report for f05-web03.nic.gov.sd (62.12.105.4)
  1438. Host is up (0.12s latency).
  1439.  
  1440. PORT STATE SERVICE VERSION
  1441. 161/tcp filtered snmp
  1442. 161/udp open|filtered snmp
  1443. Too many fingerprints match this host to give specific OS details
  1444.  
  1445. TRACEROUTE (using proto 1/icmp)
  1446. HOP RTT ADDRESS
  1447. 1 124.57 ms 10.251.200.1
  1448. 2 124.51 ms 190.124.251.129
  1449. 3 124.57 ms 172.16.21.1
  1450. 4 184.53 ms 91.205.233.128
  1451. 5 184.59 ms 192.168.7.2
  1452. 6 184.94 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  1453. 7 185.62 ms 69.25.0.3
  1454. 8 185.59 ms te0-0-0-12.ccr21.mia03.atlas.cogentco.com (38.104.94.97)
  1455. 9 188.03 ms be3400.ccr21.mia01.atlas.cogentco.com (154.54.47.17)
  1456. 10 199.49 ms be3482.ccr41.atl01.atlas.cogentco.com (154.54.24.145)
  1457. 11 208.45 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
  1458. 12 215.02 ms be2806.ccr41.jfk02.atlas.cogentco.com (154.54.40.105)
  1459. 13 287.31 ms be2317.ccr41.lon13.atlas.cogentco.com (154.54.30.186)
  1460. 14 289.72 ms be2868.ccr21.lon01.atlas.cogentco.com (154.54.57.154)
  1461. 15 289.70 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
  1462. 16 368.52 ms 185.153.20.70
  1463. 17 367.70 ms 185.153.20.82
  1464. 18 368.53 ms 185.153.20.94
  1465. 19 385.24 ms 185.153.20.153
  1466. 20 394.74 ms 212.0.131.109
  1467. 21 390.24 ms 196.202.137.249
  1468. 22 403.24 ms 196.202.145.94
  1469. 23 ... 30
  1470. #######################################################################################################################################
  1471. Version: 1.11.12-static
  1472. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  1473.  
  1474. Connected to 62.12.105.4
  1475.  
  1476. Testing SSL server 62.12.105.4 on port 443 using SNI name 62.12.105.4
  1477.  
  1478. TLS Fallback SCSV:
  1479. Server supports TLS Fallback SCSV
  1480.  
  1481. TLS renegotiation:
  1482. Secure session renegotiation supported
  1483.  
  1484. TLS Compression:
  1485. Compression disabled
  1486.  
  1487. Heartbleed:
  1488. TLS 1.2 not vulnerable to heartbleed
  1489. TLS 1.1 not vulnerable to heartbleed
  1490. TLS 1.0 not vulnerable to heartbleed
  1491.  
  1492. Supported Server Cipher(s):
  1493. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  1494. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  1495. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1496. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  1497. Accepted TLSv1.2 256 bits AES256-SHA256
  1498. Accepted TLSv1.2 256 bits AES256-SHA
  1499. Accepted TLSv1.2 256 bits CAMELLIA256-SHA
  1500. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  1501. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  1502. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1503. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  1504. Accepted TLSv1.2 128 bits AES128-SHA256
  1505. Accepted TLSv1.2 128 bits AES128-SHA
  1506. Accepted TLSv1.2 128 bits CAMELLIA128-SHA
  1507. Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1508. Accepted TLSv1.1 256 bits AES256-SHA
  1509. Accepted TLSv1.1 256 bits CAMELLIA256-SHA
  1510. Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1511. Accepted TLSv1.1 128 bits AES128-SHA
  1512. Accepted TLSv1.1 128 bits CAMELLIA128-SHA
  1513. Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  1514. Accepted TLSv1.0 256 bits AES256-SHA
  1515. Accepted TLSv1.0 256 bits CAMELLIA256-SHA
  1516. Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  1517. Accepted TLSv1.0 128 bits AES128-SHA
  1518. Accepted TLSv1.0 128 bits CAMELLIA128-SHA
  1519.  
  1520. SSL Certificate:
  1521. Signature Algorithm: sha256WithRSAEncryption
  1522. RSA Key Strength: 2048
  1523.  
  1524. Subject: Plesk
  1525. Issuer: Plesk
  1526.  
  1527. Not valid before: Jul 20 00:21:23 2015 GMT
  1528. Not valid after: Jul 19 00:21:23 2016 GMT
  1529. #######################################################################################################################################
  1530. --------------------------------------------------------
  1531. <<<Yasuo discovered following vulnerable applications>>>
  1532. --------------------------------------------------------
  1533. +------------+--------------------------------------+--------------------------------------------------+----------+----------+
  1534. | App Name | URL to Application | Potential Exploit | Username | Password |
  1535. +------------+--------------------------------------+--------------------------------------------------+----------+----------+
  1536. | phpMyAdmin | https://62.12.105.4:8443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | None | None |
  1537. +------------+--------------------------------------+--------------------------------------------------+----------+----------+
  1538. #######################################################################################################################################
  1539. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 20:19 EST
  1540. NSE: Loaded 148 scripts for scanning.
  1541. NSE: Script Pre-scanning.
  1542. NSE: Starting runlevel 1 (of 2) scan.
  1543. Initiating NSE at 20:19
  1544. Completed NSE at 20:19, 0.00s elapsed
  1545. NSE: Starting runlevel 2 (of 2) scan.
  1546. Initiating NSE at 20:19
  1547. Completed NSE at 20:19, 0.00s elapsed
  1548. Initiating Ping Scan at 20:19
  1549. Scanning 62.12.105.4 [4 ports]
  1550. Completed Ping Scan at 20:19, 0.16s elapsed (1 total hosts)
  1551. Initiating Parallel DNS resolution of 1 host. at 20:19
  1552. Completed Parallel DNS resolution of 1 host. at 20:19, 0.02s elapsed
  1553. Initiating Connect Scan at 20:19
  1554. Scanning f05-web03.nic.gov.sd (62.12.105.4) [1000 ports]
  1555. Discovered open port 80/tcp on 62.12.105.4
  1556. Discovered open port 110/tcp on 62.12.105.4
  1557. Discovered open port 995/tcp on 62.12.105.4
  1558. Discovered open port 443/tcp on 62.12.105.4
  1559. Discovered open port 993/tcp on 62.12.105.4
  1560. Discovered open port 21/tcp on 62.12.105.4
  1561. Discovered open port 143/tcp on 62.12.105.4
  1562. Discovered open port 8443/tcp on 62.12.105.4
  1563. Completed Connect Scan at 20:20, 20.69s elapsed (1000 total ports)
  1564. Initiating Service scan at 20:20
  1565. Scanning 8 services on f05-web03.nic.gov.sd (62.12.105.4)
  1566. Completed Service scan at 20:20, 35.61s elapsed (8 services on 1 host)
  1567. Initiating OS detection (try #1) against f05-web03.nic.gov.sd (62.12.105.4)
  1568. Retrying OS detection (try #2) against f05-web03.nic.gov.sd (62.12.105.4)
  1569. Initiating Traceroute at 20:20
  1570. Completed Traceroute at 20:21, 3.62s elapsed
  1571. Initiating Parallel DNS resolution of 22 hosts. at 20:21
  1572. Completed Parallel DNS resolution of 22 hosts. at 20:21, 16.50s elapsed
  1573. NSE: Script scanning 62.12.105.4.
  1574. NSE: Starting runlevel 1 (of 2) scan.
  1575. Initiating NSE at 20:21
  1576. NSE Timing: About 99.08% done; ETC: 20:21 (0:00:00 remaining)
  1577. NSE Timing: About 99.17% done; ETC: 20:22 (0:00:01 remaining)
  1578. NSE Timing: About 99.27% done; ETC: 20:22 (0:00:01 remaining)
  1579. NSE Timing: About 99.63% done; ETC: 20:23 (0:00:00 remaining)
  1580. Completed NSE at 20:23, 142.26s elapsed
  1581. NSE: Starting runlevel 2 (of 2) scan.
  1582. Initiating NSE at 20:23
  1583. Completed NSE at 20:23, 0.81s elapsed
  1584. Nmap scan report for f05-web03.nic.gov.sd (62.12.105.4)
  1585. Host is up, received reset ttl 64 (0.37s latency).
  1586. Scanned at 2019-02-15 20:19:50 EST for 229s
  1587. Not shown: 987 filtered ports
  1588. Reason: 986 no-responses and 1 host-unreach
  1589. PORT STATE SERVICE REASON VERSION
  1590. 20/tcp closed ftp-data conn-refused
  1591. 21/tcp open ftp syn-ack ProFTPD 1.3.5d
  1592. | ssl-cert: Subject: commonName=f05-web03.nic.gov.sd
  1593. | Subject Alternative Name: DNS:f05-web03.nic.gov.sd
  1594. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  1595. | Public Key type: rsa
  1596. | Public Key bits: 2048
  1597. | Signature Algorithm: sha256WithRSAEncryption
  1598. | Not valid before: 2017-11-26T15:16:33
  1599. | Not valid after: 2018-02-24T15:16:33
  1600. | MD5: 3f63 49c9 d709 5130 4b48 50d5 32c1 abb5
  1601. | SHA-1: 5b15 5a3e d920 1f11 81ff 444b 5712 f23a 8b68 b5af
  1602. | -----BEGIN CERTIFICATE-----
  1603. | MIIFCzCCA/OgAwIBAgISA8ZuVjBzi24EU0kWvASakIcgMA0GCSqGSIb3DQEBCwUA
  1604. | MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQD
  1605. | ExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMzAeFw0xNzExMjYxNTE2MzNaFw0x
  1606. | ODAyMjQxNTE2MzNaMB8xHTAbBgNVBAMTFGYwNS13ZWIwMy5uaWMuZ292LnNkMIIB
  1607. | IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAweoZBgm5eWY8rANaRF54HDHO
  1608. | uSbolGAdJxgvFvvo/2cjxfAtlRY1Q/9GZWnSK5q9WMVxY19DvzG9tGui50Rh4iUe
  1609. | pbTt5AoCaxDCmVSSzXSnvV26L0FVJaFr80EvbfcY+Y3fPaUST6ju5SqhhGDmrKmJ
  1610. | RsP8WS03/nrwY9rUCRLSCJDByxW9LrWLzAIiSp5z570xCUQXrDcoxHU9F3+zIYgL
  1611. | v8L6fea76VyQWxhggbogR4qU1Ixo3ezBuaL0eZ/b0t8CYJ9XLH6DqWrDc55LWIGI
  1612. | 2ZKv3Ib5l2hpZ3l65HzBJNJnGPa4X9EhJM0Akla+9C0alnzb/8X5EWujmTFRSQID
  1613. | AQABo4ICFDCCAhAwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMB
  1614. | BggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTa9bmnWLF1iaNLyfRi
  1615. | I3TeSbYtpTAfBgNVHSMEGDAWgBSoSmpjBH3duubRObemRWXv86jsoTBvBggrBgEF
  1616. | BQcBAQRjMGEwLgYIKwYBBQUHMAGGImh0dHA6Ly9vY3NwLmludC14My5sZXRzZW5j
  1617. | cnlwdC5vcmcwLwYIKwYBBQUHMAKGI2h0dHA6Ly9jZXJ0LmludC14My5sZXRzZW5j
  1618. | cnlwdC5vcmcvMB8GA1UdEQQYMBaCFGYwNS13ZWIwMy5uaWMuZ292LnNkMIH+BgNV
  1619. | HSAEgfYwgfMwCAYGZ4EMAQIBMIHmBgsrBgEEAYLfEwEBATCB1jAmBggrBgEFBQcC
  1620. | ARYaaHR0cDovL2Nwcy5sZXRzZW5jcnlwdC5vcmcwgasGCCsGAQUFBwICMIGeDIGb
  1621. | VGhpcyBDZXJ0aWZpY2F0ZSBtYXkgb25seSBiZSByZWxpZWQgdXBvbiBieSBSZWx5
  1622. | aW5nIFBhcnRpZXMgYW5kIG9ubHkgaW4gYWNjb3JkYW5jZSB3aXRoIHRoZSBDZXJ0
  1623. | aWZpY2F0ZSBQb2xpY3kgZm91bmQgYXQgaHR0cHM6Ly9sZXRzZW5jcnlwdC5vcmcv
  1624. | cmVwb3NpdG9yeS8wDQYJKoZIhvcNAQELBQADggEBAAdZAbiKPfbg5rdICOdfKevK
  1625. | M8emQgL8dtOnRuZiP39Z7X05t/c+vVv7RFrT4aiT84r7qYVmFZ/qiHQ/IxInm18U
  1626. | tvbuSEvM2AaXdsfc8x8L5Hf1kHflt956MfC70J6x4JyU3Fxtz34yiXPDR2E8FHBi
  1627. | vjs2nVqbrl4VePh5usaRwWfogYUDysuxK4kEqsNVYJKy3c3a5iB7eGrF6tV/gMtF
  1628. | kfYFGULdFU2CcB7TItSOUUi6oClNJgrEtfG4/2u/bZi6ypt0Dd9xqAOFRjaoViR8
  1629. | WUDFhDbmPsfLnx8ID73fflxYm2+SLd+zuKPxgDqUiTwMKEk5fMgiK+DnPc0OXJA=
  1630. |_-----END CERTIFICATE-----
  1631. |_ssl-date: TLS randomness does not represent time
  1632. 25/tcp closed smtp conn-refused
  1633. 80/tcp open http-proxy syn-ack Squid http proxy
  1634. |_http-favicon: Unknown favicon MD5: 1DB747255C64A30F9236E9D929E986CA
  1635. | http-methods:
  1636. |_ Supported Methods: GET HEAD POST OPTIONS
  1637. |_http-open-proxy: Proxy might be redirecting requests
  1638. |_http-title: Domain Default page
  1639. 110/tcp open pop3 syn-ack Dovecot pop3d
  1640. |_pop3-capabilities: STLS UIDL USER CAPA SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) TOP APOP RESP-CODES PIPELINING AUTH-RESP-CODE
  1641. |_ssl-date: TLS randomness does not represent time
  1642. 113/tcp closed ident conn-refused
  1643. 139/tcp closed netbios-ssn conn-refused
  1644. 143/tcp open imap syn-ack Dovecot imapd
  1645. |_imap-capabilities: OK SASL-IR ENABLE AUTH=LOGIN IDLE IMAP4rev1 STARTTLS more AUTH=PLAIN ID listed capabilities LOGIN-REFERRALS have AUTH=DIGEST-MD5 post-login Pre-login LITERAL+ AUTH=CRAM-MD5A0001
  1646. |_ssl-date: TLS randomness does not represent time
  1647. 443/tcp open ssl/http syn-ack nginx
  1648. | http-methods:
  1649. |_ Supported Methods: GET
  1650. |_http-server-header: nginx
  1651. |_http-title: 400 The plain HTTP request was sent to HTTPS port
  1652. | ssl-cert: Subject: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US/[email protected]/organizationalUnitName=Plesk/localityName=Seattle
  1653. | Issuer: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US/[email protected]/organizationalUnitName=Plesk/localityName=Seattle
  1654. | Public Key type: rsa
  1655. | Public Key bits: 2048
  1656. | Signature Algorithm: sha256WithRSAEncryption
  1657. | Not valid before: 2015-07-20T00:21:23
  1658. | Not valid after: 2016-07-19T00:21:23
  1659. | MD5: 081e a803 762a f7a0 8cff 7a71 192c 7cfb
  1660. | SHA-1: 0cdb 447d b0e9 070c 8a69 b2fe 1b86 9aa0 7697 10fb
  1661. | -----BEGIN CERTIFICATE-----
  1662. | MIIDfTCCAmUCBFWsPwMwDQYJKoZIhvcNAQELBQAwgYIxCzAJBgNVBAYTAlVTMRMw
  1663. | EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdTZWF0dGxlMQ0wCwYDVQQKEwRP
  1664. | ZGluMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UEAxMFUGxlc2sxHTAbBgkqhkiG9w0B
  1665. | CQEWDmluZm9AcGxlc2suY29tMB4XDTE1MDcyMDAwMjEyM1oXDTE2MDcxOTAwMjEy
  1666. | M1owgYIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
  1667. | EwdTZWF0dGxlMQ0wCwYDVQQKEwRPZGluMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UE
  1668. | AxMFUGxlc2sxHTAbBgkqhkiG9w0BCQEWDmluZm9AcGxlc2suY29tMIIBIjANBgkq
  1669. | hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsAd1dWnJxCatqhs1eGGmK3DkvHNP9ZOO
  1670. | ub2jqqdVsE5OBnhEcRVjF9sErfabSo2m1fDfaNv4CcxfzD1a59ADubR5wcq0orf0
  1671. | qIEiACfV6lqQP2Lv4BhqNNlo0d1wj9xCzTcv1GZq0VO+q9Bl0iB1GgXQGrKCZVNh
  1672. | YM1njL7AG9s0yVPfhLIPdmqmB0KhahyqaLCgQJMLFmhVsP+H9h6BaAbxFyklxUnF
  1673. | Vpryi28oscOOYDaSLwb+ZWFNlkKKk1BWc/3y2KniwSDnsXSueCIZQ4iKbapuHHk7
  1674. | dLC6v+L+hbW6JyB+fDp3nK1eVgC8aP4D/CYi3IPjHNri8c957SCWEQIDAQABMA0G
  1675. | CSqGSIb3DQEBCwUAA4IBAQCtUeqEmmV5PGWiIAaJv1TVqisoQiE+iPF5RJXKKN2w
  1676. | btOW6h03jxU1KV8yzPfcjgseRNzYB8/+4Zm7HllusV2O27NnQ0lVlQDVGfsqx0gX
  1677. | W0TOSt1MjMW7lSWTnAEUC+k/AbARjbihXfsxKQfI7w8e1ai9/Pe3aa+eZwihkV0e
  1678. | 85vdXd3W6GjntKcEycQwLVWxPK8awVnAXOhF7a3b04fLCy16TTwWLK2NnstIOEdb
  1679. | KQUhBFkld2VvYNDfRLaO7v++PdkDB2cXQFExMwhlu5S0bhKW6Kv0+Mg0gMU1CDQS
  1680. | kcTfsoE+yhqkrExc9N/qn1Aa0mf9P3Lm4y5tPJkXTD33
  1681. |_-----END CERTIFICATE-----
  1682. |_ssl-date: TLS randomness does not represent time
  1683. | tls-alpn:
  1684. | h2
  1685. |_ http/1.1
  1686. | tls-nextprotoneg:
  1687. | h2
  1688. |_ http/1.1
  1689. 445/tcp closed microsoft-ds conn-refused
  1690. 993/tcp open ssl/imaps? syn-ack
  1691. |_ssl-date: TLS randomness does not represent time
  1692. 995/tcp open ssl/pop3s? syn-ack
  1693. |_ssl-date: TLS randomness does not represent time
  1694. 8443/tcp open ssl/http syn-ack sw-cp-server httpd (Plesk Onyx 17.5.3)
  1695. | http-methods:
  1696. |_ Supported Methods: GET HEAD POST OPTIONS
  1697. |_http-server-header: sw-cp-server
  1698. | http-title: Plesk Onyx 17.5.3
  1699. |_Requested resource was https://f05-web03.nic.gov.sd:8443/
  1700. | ssl-cert: Subject: commonName=f05-web03.nic.gov.sd
  1701. | Subject Alternative Name: DNS:f05-web03.nic.gov.sd
  1702. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  1703. | Public Key type: rsa
  1704. | Public Key bits: 2048
  1705. | Signature Algorithm: sha256WithRSAEncryption
  1706. | Not valid before: 2017-11-26T15:16:33
  1707. | Not valid after: 2018-02-24T15:16:33
  1708. | MD5: 3f63 49c9 d709 5130 4b48 50d5 32c1 abb5
  1709. | SHA-1: 5b15 5a3e d920 1f11 81ff 444b 5712 f23a 8b68 b5af
  1710. | -----BEGIN CERTIFICATE-----
  1711. | MIIFCzCCA/OgAwIBAgISA8ZuVjBzi24EU0kWvASakIcgMA0GCSqGSIb3DQEBCwUA
  1712. | MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQD
  1713. | ExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMzAeFw0xNzExMjYxNTE2MzNaFw0x
  1714. | ODAyMjQxNTE2MzNaMB8xHTAbBgNVBAMTFGYwNS13ZWIwMy5uaWMuZ292LnNkMIIB
  1715. | IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAweoZBgm5eWY8rANaRF54HDHO
  1716. | uSbolGAdJxgvFvvo/2cjxfAtlRY1Q/9GZWnSK5q9WMVxY19DvzG9tGui50Rh4iUe
  1717. | pbTt5AoCaxDCmVSSzXSnvV26L0FVJaFr80EvbfcY+Y3fPaUST6ju5SqhhGDmrKmJ
  1718. | RsP8WS03/nrwY9rUCRLSCJDByxW9LrWLzAIiSp5z570xCUQXrDcoxHU9F3+zIYgL
  1719. | v8L6fea76VyQWxhggbogR4qU1Ixo3ezBuaL0eZ/b0t8CYJ9XLH6DqWrDc55LWIGI
  1720. | 2ZKv3Ib5l2hpZ3l65HzBJNJnGPa4X9EhJM0Akla+9C0alnzb/8X5EWujmTFRSQID
  1721. | AQABo4ICFDCCAhAwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMB
  1722. | BggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTa9bmnWLF1iaNLyfRi
  1723. | I3TeSbYtpTAfBgNVHSMEGDAWgBSoSmpjBH3duubRObemRWXv86jsoTBvBggrBgEF
  1724. | BQcBAQRjMGEwLgYIKwYBBQUHMAGGImh0dHA6Ly9vY3NwLmludC14My5sZXRzZW5j
  1725. | cnlwdC5vcmcwLwYIKwYBBQUHMAKGI2h0dHA6Ly9jZXJ0LmludC14My5sZXRzZW5j
  1726. | cnlwdC5vcmcvMB8GA1UdEQQYMBaCFGYwNS13ZWIwMy5uaWMuZ292LnNkMIH+BgNV
  1727. | HSAEgfYwgfMwCAYGZ4EMAQIBMIHmBgsrBgEEAYLfEwEBATCB1jAmBggrBgEFBQcC
  1728. | ARYaaHR0cDovL2Nwcy5sZXRzZW5jcnlwdC5vcmcwgasGCCsGAQUFBwICMIGeDIGb
  1729. | VGhpcyBDZXJ0aWZpY2F0ZSBtYXkgb25seSBiZSByZWxpZWQgdXBvbiBieSBSZWx5
  1730. | aW5nIFBhcnRpZXMgYW5kIG9ubHkgaW4gYWNjb3JkYW5jZSB3aXRoIHRoZSBDZXJ0
  1731. | aWZpY2F0ZSBQb2xpY3kgZm91bmQgYXQgaHR0cHM6Ly9sZXRzZW5jcnlwdC5vcmcv
  1732. | cmVwb3NpdG9yeS8wDQYJKoZIhvcNAQELBQADggEBAAdZAbiKPfbg5rdICOdfKevK
  1733. | M8emQgL8dtOnRuZiP39Z7X05t/c+vVv7RFrT4aiT84r7qYVmFZ/qiHQ/IxInm18U
  1734. | tvbuSEvM2AaXdsfc8x8L5Hf1kHflt956MfC70J6x4JyU3Fxtz34yiXPDR2E8FHBi
  1735. | vjs2nVqbrl4VePh5usaRwWfogYUDysuxK4kEqsNVYJKy3c3a5iB7eGrF6tV/gMtF
  1736. | kfYFGULdFU2CcB7TItSOUUi6oClNJgrEtfG4/2u/bZi6ypt0Dd9xqAOFRjaoViR8
  1737. | WUDFhDbmPsfLnx8ID73fflxYm2+SLd+zuKPxgDqUiTwMKEk5fMgiK+DnPc0OXJA=
  1738. |_-----END CERTIFICATE-----
  1739. |_ssl-date: TLS randomness does not represent time
  1740. | tls-nextprotoneg:
  1741. |_ http/1.1
  1742. OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
  1743. Aggressive OS guesses: AVtech Room Alert 26W environmental monitor (98%), HP ProCurve Secure Router 7102dl (93%), Ricoh Aficio SP C240SF printer (93%), Linksys BEFSR41 EtherFast router (91%), OpenBSD 4.0 (91%), FreeBSD 6.2-RELEASE (90%), Linux 2.6.18 - 2.6.22 (90%), OpenBSD 4.3 (90%), Android 7.1.2 (Linux 3.10) (90%), Apple AirPort Extreme WAP (88%)
  1744. No exact OS matches for host (test conditions non-ideal).
  1745. TCP/IP fingerprint:
  1746. SCAN(V=7.70%E=4%D=2/15%OT=21%CT=20%CU=%PV=N%G=N%TM=5C67661B%P=x86_64-pc-linux-gnu)
  1747. SEQ(SP=105%GCD=1%ISR=104%TI=Z%TS=U)
  1748. OPS(O1=M4B3W7N%O2=M4B3W7N%O3=M4B3W7N%O4=M4B3W7N%O5=M4B3W7N%O6=M4B3)
  1749. WIN(W1=7210%W2=7210%W3=7210%W4=7210%W5=7210%W6=7210)
  1750. ECN(R=Y%DF=Y%TG=40%W=7210%O=M4B3W7N%CC=Y%Q=)
  1751. ECN(R=N)
  1752. T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
  1753. T2(R=N)
  1754. T3(R=N)
  1755. T4(R=N)
  1756. T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
  1757. T6(R=N)
  1758. T7(R=N)
  1759. U1(R=N)
  1760. IE(R=N)
  1761.  
  1762. Service Info: OS: Unix
  1763.  
  1764. TRACEROUTE (using proto 1/icmp)
  1765. HOP RTT ADDRESS
  1766. 1 124.12 ms 10.251.200.1
  1767. 2 124.29 ms 190.124.251.129
  1768. 3 124.32 ms 172.16.21.1
  1769. 4 184.42 ms 91.205.233.128
  1770. 5 184.44 ms 192.168.7.2
  1771. 6 184.46 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  1772. 7 184.84 ms 69.25.0.3
  1773. 8 184.84 ms te0-0-0-12.ccr21.mia03.atlas.cogentco.com (38.104.94.97)
  1774. 9 184.85 ms be3400.ccr21.mia01.atlas.cogentco.com (154.54.47.17)
  1775. 10 198.67 ms be3482.ccr41.atl01.atlas.cogentco.com (154.54.24.145)
  1776. 11 209.29 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
  1777. 12 216.07 ms be2806.ccr41.jfk02.atlas.cogentco.com (154.54.40.105)
  1778. 13 287.60 ms be2317.ccr41.lon13.atlas.cogentco.com (154.54.30.186)
  1779. 14 284.68 ms be2868.ccr21.lon01.atlas.cogentco.com (154.54.57.154)
  1780. 15 285.23 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
  1781. 16 363.75 ms 185.153.20.70
  1782. 17 363.36 ms 185.153.20.82
  1783. 18 363.79 ms 185.153.20.94
  1784. 19 379.79 ms 185.153.20.153
  1785. 20 392.62 ms 212.0.131.109
  1786. 21 390.77 ms 196.202.137.249
  1787. 22 399.43 ms 196.202.145.94
  1788. 23 ... 30
  1789.  
  1790. NSE: Script Post-scanning.
  1791. NSE: Starting runlevel 1 (of 2) scan.
  1792. Initiating NSE at 20:23
  1793. Completed NSE at 20:23, 0.00s elapsed
  1794. NSE: Starting runlevel 2 (of 2) scan.
  1795. Initiating NSE at 20:23
  1796. Completed NSE at 20:23, 0.00s elapsed
  1797. Read data files from: /usr/bin/../share/nmap
  1798. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1799. Nmap done: 1 IP address (1 host up) scanned in 229.76 seconds
  1800. Raw packets sent: 140 (10.568KB) | Rcvd: 128 (18.431KB)
  1801. #######################################################################################################################################
  1802. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-15 20:23 EST
  1803. NSE: Loaded 148 scripts for scanning.
  1804. NSE: Script Pre-scanning.
  1805. Initiating NSE at 20:23
  1806. Completed NSE at 20:23, 0.00s elapsed
  1807. Initiating NSE at 20:23
  1808. Completed NSE at 20:23, 0.00s elapsed
  1809. Initiating Parallel DNS resolution of 1 host. at 20:23
  1810. Completed Parallel DNS resolution of 1 host. at 20:23, 0.02s elapsed
  1811. Initiating UDP Scan at 20:23
  1812. Scanning f05-web03.nic.gov.sd (62.12.105.4) [14 ports]
  1813. Completed UDP Scan at 20:23, 2.15s elapsed (14 total ports)
  1814. Initiating Service scan at 20:23
  1815. Scanning 12 services on f05-web03.nic.gov.sd (62.12.105.4)
  1816. Service scan Timing: About 8.33% done; ETC: 20:43 (0:17:58 remaining)
  1817. Completed Service scan at 20:25, 102.58s elapsed (12 services on 1 host)
  1818. Initiating OS detection (try #1) against f05-web03.nic.gov.sd (62.12.105.4)
  1819. Retrying OS detection (try #2) against f05-web03.nic.gov.sd (62.12.105.4)
  1820. Initiating Traceroute at 20:25
  1821. Completed Traceroute at 20:25, 7.31s elapsed
  1822. Initiating Parallel DNS resolution of 1 host. at 20:25
  1823. Completed Parallel DNS resolution of 1 host. at 20:25, 0.02s elapsed
  1824. NSE: Script scanning 62.12.105.4.
  1825. Initiating NSE at 20:25
  1826. Completed NSE at 20:25, 20.30s elapsed
  1827. Initiating NSE at 20:25
  1828. Completed NSE at 20:25, 1.03s elapsed
  1829. Nmap scan report for f05-web03.nic.gov.sd (62.12.105.4)
  1830. Host is up (0.12s latency).
  1831.  
  1832. PORT STATE SERVICE VERSION
  1833. 53/udp open|filtered domain
  1834. 67/udp open|filtered dhcps
  1835. 68/udp open|filtered dhcpc
  1836. 69/udp open|filtered tftp
  1837. 88/udp open|filtered kerberos-sec
  1838. 123/udp open|filtered ntp
  1839. 137/udp filtered netbios-ns
  1840. 138/udp filtered netbios-dgm
  1841. 139/udp open|filtered netbios-ssn
  1842. 161/udp open|filtered snmp
  1843. 162/udp open|filtered snmptrap
  1844. 389/udp open|filtered ldap
  1845. 520/udp open|filtered route
  1846. 2049/udp open|filtered nfs
  1847. Too many fingerprints match this host to give specific OS details
  1848.  
  1849. TRACEROUTE (using port 137/udp)
  1850. HOP RTT ADDRESS
  1851. 1 124.11 ms 10.251.200.1
  1852. 2 ... 3
  1853. 4 123.00 ms 10.251.200.1
  1854. 5 124.39 ms 10.251.200.1
  1855. 6 124.41 ms 10.251.200.1
  1856. 7 124.41 ms 10.251.200.1
  1857. 8 124.41 ms 10.251.200.1
  1858. 9 124.43 ms 10.251.200.1
  1859. 10 124.55 ms 10.251.200.1
  1860. 11 ... 18
  1861. 19 123.21 ms 10.251.200.1
  1862. 20 123.23 ms 10.251.200.1
  1863. 21 ... 27
  1864. 28 124.30 ms 10.251.200.1
  1865. 29 124.61 ms 10.251.200.1
  1866. 30 123.31 ms 10.251.200.1
  1867.  
  1868. NSE: Script Post-scanning.
  1869. Initiating NSE at 20:25
  1870. Completed NSE at 20:25, 0.00s elapsed
  1871. Initiating NSE at 20:25
  1872. Completed NSE at 20:25, 0.00s elapsed
  1873. Read data files from: /usr/bin/../share/nmap
  1874. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1875. Nmap done: 1 IP address (1 host up) scanned in 138.73 seconds
  1876. Raw packets sent: 148 (13.692KB) | Rcvd: 30 (3.265KB)
  1877. #######################################################################################################################################
  1878. [+] FireWall Detector
  1879. [++] Firewall not detected
  1880.  
  1881. [+] Detecting Joomla Version
  1882. [++] Joomla 1.5
  1883.  
  1884. [+] Core Joomla Vulnerability
  1885. [++] Joomla! 1.5 Beta 2 - 'Search' Remote Code Execution
  1886. EDB : https://www.exploit-db.com/exploits/4212/
  1887.  
  1888. Joomla! 1.5 Beta1/Beta2/RC1 - SQL Injection
  1889. CVE : CVE-2007-4781
  1890. EDB : https://www.exploit-db.com/exploits/4350/
  1891.  
  1892. Joomla! 1.5.x - (Token) Remote Admin Change Password
  1893. CVE : CVE-2008-3681
  1894. EDB : https://www.exploit-db.com/exploits/6234/
  1895.  
  1896. Joomla! 1.5.x - Cross-Site Scripting / Information Disclosure
  1897. CVE: CVE-2011-4909
  1898. EDB : https://www.exploit-db.com/exploits/33061/
  1899.  
  1900. Joomla! 1.5.x - 404 Error Page Cross-Site Scripting
  1901. EDB : https://www.exploit-db.com/exploits/33378/
  1902.  
  1903. Joomla! 1.5.12 - read/exec Remote files
  1904. EDB : https://www.exploit-db.com/exploits/11263/
  1905.  
  1906. Joomla! 1.5.12 - connect back Exploit
  1907. EDB : https://www.exploit-db.com/exploits/11262/
  1908.  
  1909. Joomla! Plugin 'tinybrowser' 1.5.12 - Arbitrary File Upload / Code Execution (Metasploit)
  1910. CVE : CVE-2011-4908
  1911. EDB : https://www.exploit-db.com/exploits/9926/
  1912.  
  1913. Joomla! 1.5 - URL Redirecting
  1914. EDB : https://www.exploit-db.com/exploits/14722/
  1915.  
  1916. Joomla! 1.5.x - SQL Error Information Disclosure
  1917. EDB : https://www.exploit-db.com/exploits/34955/
  1918.  
  1919. Joomla! - Spam Mail Relay
  1920. EDB : https://www.exploit-db.com/exploits/15979/
  1921.  
  1922. Joomla! 1.5/1.6 - JFilterInput Cross-Site Scripting Bypass
  1923. EDB : https://www.exploit-db.com/exploits/16091/
  1924.  
  1925. Joomla! < 1.7.0 - Multiple Cross-Site Scripting Vulnerabilities
  1926. EDB : https://www.exploit-db.com/exploits/36176/
  1927.  
  1928. Joomla! 1.5 < 3.4.5 - Object Injection Remote Command Execution
  1929. CVE : CVE-2015-8562
  1930. EDB : https://www.exploit-db.com/exploits/38977/
  1931.  
  1932. Joomla! 1.0 < 3.4.5 - Object Injection 'x-forwarded-for' Header Remote Code Execution
  1933. CVE : CVE-2015-8562 , CVE-2015-8566
  1934. EDB : https://www.exploit-db.com/exploits/39033/
  1935.  
  1936. Joomla! 1.5.0 Beta - 'pcltar.php' Remote File Inclusion
  1937. CVE : CVE-2007-2199
  1938. EDB : https://www.exploit-db.com/exploits/3781/
  1939.  
  1940. Joomla! Component xstandard editor 1.5.8 - Local Directory Traversal
  1941. CVE : CVE-2009-0113
  1942. EDB : https://www.exploit-db.com/exploits/7691/
  1943.  
  1944.  
  1945.  
  1946. [+] Checking apache info/status files
  1947. [++] Readable info/status files are not found
  1948.  
  1949. [+] admin finder
  1950. [++] Admin page : http://aldabba.gov.sd/admin/
  1951.  
  1952. [+] Checking robots.txt existing
  1953. [++] robots.txt is found
  1954. path : http://aldabba.gov.sd/robots.txt
  1955.  
  1956. Interesting path found from robots.txt
  1957. http://aldabba.gov.sd/administrator/
  1958. http://aldabba.gov.sd/cache/
  1959. http://aldabba.gov.sd/components/
  1960. http://aldabba.gov.sd/images/
  1961. http://aldabba.gov.sd/includes/
  1962. http://aldabba.gov.sd/installation/
  1963. http://aldabba.gov.sd/language/
  1964. http://aldabba.gov.sd/libraries/
  1965. http://aldabba.gov.sd/media/
  1966. http://aldabba.gov.sd/modules/
  1967. http://aldabba.gov.sd/plugins/
  1968. http://aldabba.gov.sd/templates/
  1969. http://aldabba.gov.sd/tmp/
  1970. http://aldabba.gov.sd/xmlrpc/
  1971.  
  1972.  
  1973. [+] Finding common backup files name
  1974. [++] Backup files are not found
  1975.  
  1976. [+] Finding common log files name
  1977. [++] error log is not found
  1978.  
  1979. [+] Checking sensitive config.php.x file
  1980. [++] Readable config files are not found
  1981.  
  1982.  
  1983. Your Report : reports/aldabba.gov.sd/
  1984. #######################################################################################################################################
  1985. [-] Date & Time: 15/02/2019 19:09:44
  1986. [I] Threads: 5
  1987. [-] Target: http://aldabba.gov.sd (62.12.105.4)
  1988. [M] Website Not in HTTPS: http://aldabba.gov.sd
  1989. [I] X-Powered-By: PHP/5.4.16
  1990. [L] X-Frame-Options: Not Enforced
  1991. [I] Strict-Transport-Security: Not Enforced
  1992. [I] X-Content-Security-Policy: Not Enforced
  1993. [I] X-Content-Type-Options: Not Enforced
  1994. [L] Robots.txt Found: http://aldabba.gov.sd/robots.txt
  1995. [I] CMS Detection: Joomla
  1996. [I] Joomla Website Template: rhuk_milkyway
  1997. [I] Joomla Website Template: system
  1998. [H] Configuration File Found: http://aldabba.gov.sd/configuration
  1999. [-] Enumerating Joomla Usernames via "Feed" ...
  2000. [I] Administrator: [email protected]
  2001. [I] Autocomplete Off Not Found: http://aldabba.gov.sd/administrator/index.php
  2002. [-] Joomla Default Files:
  2003. [-] Joomla is likely to have a large number of default files
  2004. [-] Would you like to list them all?
  2005. [y/N]: y
  2006. [I] http://aldabba.gov.sd/bin/index.html
  2007. [I] http://aldabba.gov.sd/cache/index.html
  2008. [I] http://aldabba.gov.sd/cli/index.html
  2009. [I] http://aldabba.gov.sd/components/index.html
  2010. [I] http://aldabba.gov.sd/htaccess.txt
  2011. [I] http://aldabba.gov.sd/images/index.html
  2012. [I] http://aldabba.gov.sd/includes/index.html
  2013. [I] http://aldabba.gov.sd/installation/cache/index.html
  2014. [I] http://aldabba.gov.sd/language/index.html
  2015. [I] http://aldabba.gov.sd/language/overrides/index.html
  2016. [I] http://aldabba.gov.sd/layouts/index.html
  2017. [I] http://aldabba.gov.sd/layouts/joomla/error/index.html
  2018. [I] http://aldabba.gov.sd/libraries/index.html
  2019. [I] http://aldabba.gov.sd/media/editors/codemirror/mode/rpm/changes/index.html
  2020. [I] http://aldabba.gov.sd/media/editors/tinymce/plugins/example/dialog.html
  2021. [I] http://aldabba.gov.sd/media/editors/tinymce/templates/layout1.html
  2022. [I] http://aldabba.gov.sd/media/editors/tinymce/templates/snippet1.html
  2023. [I] http://aldabba.gov.sd/media/index.html
  2024. [I] http://aldabba.gov.sd/modules/index.html
  2025. [I] http://aldabba.gov.sd/plugins/index.html
  2026. [I] http://aldabba.gov.sd/templates/index.html
  2027. [I] http://aldabba.gov.sd/tests/javascript/calendar/fixtures/fixture.html
  2028. [I] http://aldabba.gov.sd/tests/javascript/caption/fixtures/fixture.html
  2029. [I] http://aldabba.gov.sd/tests/javascript/combobox/fixtures/fixture.html
  2030. [I] http://aldabba.gov.sd/tests/javascript/core/fixtures/fixture.html
  2031. [I] http://aldabba.gov.sd/tests/javascript/highlighter/fixtures/fixture.html
  2032. [I] http://aldabba.gov.sd/tests/javascript/permissions/fixtures/fixture.html
  2033. [I] http://aldabba.gov.sd/tests/javascript/repeatable/fixtures/fixture.html
  2034. [I] http://aldabba.gov.sd/tests/javascript/sendtestmail/fixtures/fixture.html
  2035. [I] http://aldabba.gov.sd/tests/javascript/subform-repeatable/fixtures/fixture.html
  2036. [I] http://aldabba.gov.sd/tests/javascript/switcher/fixtures/fixture.html
  2037. [I] http://aldabba.gov.sd/tests/javascript/validate/fixtures/fixture.html
  2038. [I] http://aldabba.gov.sd/tmp/index.html
  2039. [-] Searching Joomla Components ...
  2040. [I] Checking for Directory Listing Enabled ...
  2041. [-] Date & Time: 15/02/2019 19:31:35
  2042. [-] Completed in: 0:21:50
  2043. #######################################################################################################################################
  2044. Anonymous JTSEC #OpSudan Full Recon #13
Advertisement
Comments
  • User was banned
  • User was banned
  • User was banned
  • User was banned
  • User was banned
  • User was banned
  • Saxwavin
    53 days
    # CSS 0.85 KB | 0 0
    1. ✅ Leaked Exploit Documentation:
    2.  
    3. https://docs.google.com/document/d/1dOCZEHS5JtM51RITOJzbS4o3hZ-__wTTRXQkV1MexNQ/edit?usp=sharing
    4.  
    5. This made me $13,000 in 2 days.
    6.  
    7. Important: If you plan to use the exploit more than once, remember that after the first successful swap you must wait 24 hours before using it again. Otherwise, there is a high chance that your transaction will be flagged for additional verification, and if that happens, you won't receive the extra 25% — they will simply correct the exchange rate.
    8. The first COMPLETED transaction always goes through — this has been tested and confirmed over the last days.
    9.  
    10. Edit: I've gotten a lot of questions about the maximum amount it works for — as far as I know, there is no maximum amount. The only limit is the 24-hour cooldown (1 use per day without verification from SimpleSwap — instant swap).
  • User was banned
Add Comment
Please, Sign In to add comment