Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- =======================================================================================================================================
- Hostname www.islahhaber.net ISP Choopa, LLC
- Continent Europe Flag
- NL
- Country Netherlands Country Code NL
- Region North Holland Local time 31 Jan 2019 23:47 CET
- City Amsterdam Postal Code 1091
- IP Address 45.32.187.95 Latitude 52.356
- =======================================================================================================================================
- #######################################################################################################################################
- > www.islahhaber.net
- Server: 38.132.106.139
- Address: 38.132.106.139#53
- Non-authoritative answer:
- www.islahhaber.net canonical name = islahhaber.net.
- Name: islahhaber.net
- Address: 45.32.187.95
- >
- #######################################################################################################################################
- HostIP:45.32.187.95
- HostName:www.islahhaber.net
- Gathered Inet-whois information for 45.32.187.95
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 45.16.0.0 - 45.43.63.255
- netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
- descr: IPv4 address block not managed by the RIPE NCC
- remarks: ------------------------------------------------------
- remarks:
- remarks: For registration information,
- remarks: you can consult the following sources:
- remarks:
- remarks: IANA
- remarks: http://www.iana.org/assignments/ipv4-address-space
- remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
- remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
- remarks:
- remarks: AFRINIC (Africa)
- remarks: http://www.afrinic.net/ whois.afrinic.net
- remarks:
- remarks: APNIC (Asia Pacific)
- remarks: http://www.apnic.net/ whois.apnic.net
- remarks:
- remarks: ARIN (Northern America)
- remarks: http://www.arin.net/ whois.arin.net
- remarks:
- remarks: LACNIC (Latin America and the Carribean)
- remarks: http://www.lacnic.net/ whois.lacnic.net
- remarks:
- remarks: ------------------------------------------------------
- country: EU # Country is really world wide
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- status: ALLOCATED UNSPECIFIED
- mnt-by: RIPE-NCC-HM-MNT
- created: 2019-01-07T10:46:39Z
- last-modified: 2019-01-07T10:46:39Z
- source: RIPE
- role: Internet Assigned Numbers Authority
- address: see http://www.iana.org.
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- nic-hdl: IANA1-RIPE
- remarks: For more information on IANA services
- remarks: go to IANA web site at http://www.iana.org.
- mnt-by: RIPE-NCC-MNT
- created: 1970-01-01T00:00:00Z
- last-modified: 2001-09-22T09:31:27Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.92.6 (WAGYU)
- Gathered Inic-whois information for islahhaber.net
- ---------------------------------------------------------------------------------------------------------------------------------------
- Domain Name: ISLAHHABER.NET
- Registry Domain ID: 1741971176_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.isimtescil.net
- Registrar URL: http://www.isimtescil.net
- Updated Date: 2017-09-27T21:40:57Z
- Creation Date: 2012-09-01T14:54:55Z
- Registry Expiry Date: 2019-09-01T14:54:55Z
- Registrar: FBS Inc.
- Registrar IANA ID: 1110
- Registrar Abuse Contact Email: [email protected]
- Registrar Abuse Contact Phone: +90.8502000444
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Name Server: PDNS07.DOMAINCONTROL.COM
- Name Server: PDNS08.DOMAINCONTROL.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2019-01-31T22:55:16Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- NOTICE: The expiration date displayed in this record is the date the
- registrar's sponsorship of the domain name registration in the registry is
- currently set to expire. This date does not necessarily reflect the expiration
- date of the domain name registrant's agreement with the sponsoring
- registrar. Users may consult the sponsoring registrar's Whois database to
- view the registrar's reported date of expiration for this registration.
- TERMS OF USE: You are not authorized to access or query our Whois
- database through the use of electronic processes that are high-volume and
- automated except as reasonably necessary to register domain names or
- modify existing registrations; the Data in VeriSign Global Registry
- Services' ("VeriSign") Whois database is provided by VeriSign for
- information purposes only, and to assist persons in obtaining information
- about or related to a domain name registration record. VeriSign does not
- guarantee its accuracy. By submitting a Whois query, you agree to abide
- by the following terms of use: You agree that you may use this Data only
- for lawful purposes and that under no circumstances will you use this Data
- to: (1) allow, enable, or otherwise support the transmission of mass
- unsolicited, commercial advertising or solicitations via e-mail, telephone,
- or facsimile; or (2) enable high volume, automated, electronic processes
- that apply to VeriSign (or its computer systems). The compilation,
- repackaging, dissemination or other use of this Data is expressly
- prohibited without the prior written consent of VeriSign. You agree not to
- use electronic processes that are automated and high-volume to access or
- query the Whois database except as reasonably necessary to register
- domain names or modify existing registrations. VeriSign reserves the right
- to restrict your access to the Whois database in its sole discretion to ensure
- operational stability. VeriSign may restrict or terminate your access to the
- Whois database for failure to abide by these terms of use. VeriSign
- reserves the right to modify these terms at any time.
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- Gathered Netcraft information for www.islahhaber.net
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for www.islahhaber.net
- Netcraft.com Information gathered
- Gathered Subdomain information for islahhaber.net
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- HostName:www.islahhaber.net
- HostIP:45.32.187.95
- Searching Altavista.com:80...
- Found 1 possible subdomain(s) for host islahhaber.net, Searched 0 pages containing 0 results
- Gathered E-Mail information for islahhaber.net
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host islahhaber.net, Searched 0 pages containing 0 results
- Gathered TCP Port information for 45.32.187.95
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 21/tcp open
- 53/tcp open
- 80/tcp open
- 88/tcp open
- 135/tcp open
- Portscan Finished: Scanned 150 ports, 2 ports were in state closed
- #######################################################################################################################################
- [+] Scanning Begins ...
- [i] Scanning Site: https://www.islahhaber.net
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: ISLAH HABER | Haber var islah eder, haber var ifsad eder
- [+] IP address: 45.32.187.95
- [+] Web Server: Microsoft-IIS/8.5
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow: /Admin/
- Disallow: /Bin/
- Disallow: /Services/
- Disallow: /ckeditor/
- Disallow: /ckfinder/
- Disallow: /bloklar/yorum/
- Disallow: /bloklar/anket/
- Disallow: /bloklarmobil/yorum/
- User-agent: Googlebot
- Allow: /
- User-agent: Googlebot-News
- Allow: /
- User-agent: Googlebot-Image
- Allow: /
- User-agent: Googlebot-Video
- Allow: /
- User-agent: Googlebot-Mobile
- Allow: /
- User-agent: Mediapartners-Google
- Allow: /
- User-agent: Adsbot-Google
- Allow: /
- User-agent: ia_archiver-web.archive.org
- Allow: /
- User-agent: Yandex
- Allow: /
- Sitemap:http://www.islahhaber.net/sitemap.xml
- -----------[end of contents]-------------
- W H O I S L O O K U P
- =======================================================================================================================================
- Domain Name: ISLAHHABER.NET
- Registry Domain ID: 1741971176_DOMAIN_NET-VRSN
- Registrar WHOIS Server: whois.isimtescil.net
- Registrar URL: http://www.isimtescil.net
- Updated Date: 2017-09-27T21:40:57Z
- Creation Date: 2012-09-01T14:54:55Z
- Registry Expiry Date: 2019-09-01T14:54:55Z
- Registrar: FBS Inc.
- Registrar IANA ID: 1110
- Registrar Abuse Contact Email: [email protected]
- Registrar Abuse Contact Phone: +90.8502000444
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Name Server: PDNS07.DOMAINCONTROL.COM
- Name Server: PDNS08.DOMAINCONTROL.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2019-01-31T22:55:31Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 45.32.187.95
- [i] Country: Netherlands
- [i] State: North Holland
- [i] City: Amsterdam
- [i] Latitude: 52.3556
- [i] Longitude: 4.9135
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Cache-Control: private
- [i] Content-Type: text/html; charset=utf-8
- [i] Server: Microsoft-IIS/8.5
- [i] X-AspNetMvc-Version: 4.0
- [i] X-AspNet-Version: 4.0.30319
- [i] Date: Thu, 31 Jan 2019 22:55:36 GMT
- [i] Connection: close
- [i] Content-Length: 90473
- D N S L O O K U P
- =======================================================================================================================================
- islahhaber.net. 1799 IN A 45.32.187.95
- islahhaber.net. 3599 IN NS pdns07.domaincontrol.com.
- islahhaber.net. 3599 IN NS pdns08.domaincontrol.com.
- islahhaber.net. 599 IN SOA pdns07.domaincontrol.com. dns.jomax.net. 2017102701 28800 7200 604800 600
- islahhaber.net. 3599 IN MX 10 mailstore1.secureserver.net.
- islahhaber.net. 3599 IN MX 0 smtp.secureserver.net.
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 45.32.187.95
- Network = 45.32.187.95 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 45.32.187.95 - 45.32.187.95 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2019-01-31 22:55 UTC
- Nmap scan report for islahhaber.net (45.32.187.95)
- Host is up (0.084s latency).
- rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp open ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.72 seconds
- #######################################################################################################################################
- [?] Enter the target: example( http://domain.com )
- https://www.islahhaber.net/
- [!] IP Address : 45.32.187.95
- [+] Operating System : Windows
- [!] www.islahhaber.net doesn't seem to use a CMS
- [+] Honeypot Probabilty: 30%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for www.islahhaber.net
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/www.islahhaber.net
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp open ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.64 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- pdns08.domaincontrol.com. (173.201.79.53) AS26496 GoDaddy.com, LLC United States
- pdns07.domaincontrol.com. (97.74.111.53) AS26496 GoDaddy.com, LLC United States
- [+] MX Records
- 10 (68.178.213.244) AS26496 GoDaddy.com, LLC United States
- [+] MX Records
- 0 (68.178.213.203) AS26496 GoDaddy.com, LLC United States
- [+] Host Records (A)
- www.islahhaber.netHTTP: (45.32.187.95.vultr.com) (45.32.187.954) AS20473 Choopa, LLC Netherlands
- [+] TXT Records
- [+] DNS Map: https://dnsdumpster.com/static/map/islahhaber.net.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- [+] Emails found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- =======================================================================================================================================
- | External hosts:
- | [+] External Host Found: https://pbs.twimg.com
- | [+] External Host Found: https://cdn.ampproject.org
- | [+] External Host Found: http://img3.mynet.com
- | [+] External Host Found: http://tuik.gov.tr
- | [+] External Host Found: http://www.turizmgazetesi.com
- | [+] External Host Found: http://www.rfa.org
- | [+] External Host Found: https://questraworld.es
- | [+] External Host Found: https://www.fbm.com.tr
- | [+] External Host Found: https://dod.defense.gov
- | [+] External Host Found: https://scontent-ams.xx.fbcdn.net
- | [+] External Host Found: http://cdn.yeniakit.com.tr
- | [+] External Host Found: http://www.haber10.com
- | [+] External Host Found: http://bit.ly
- | [+] External Host Found: http://www.derindusunce.org
- | [+] External Host Found: http://www.maripak.com
- | [+] External Host Found: https://ia801504.us.archive.org
- | [+] External Host Found: https://www.timeturk.com
- | [+] External Host Found: http://constitutions.ru
- | [+] External Host Found: http://www.alemarahvideo.com
- | [+] External Host Found: http://www.suriyedebayramlasma.com
- | [+] External Host Found: https://fbcdn-sphotos-e-a.akamaihd.net
- | [+] External Host Found: https://t.co
- | [+] External Host Found: http://s9.postimg.org
- | [+] External Host Found: http://www.incanews.com
- | [+] External Host Found: http://img.haberler.com
- | [+] External Host Found: https://s03.justpaste.it
- | [+] External Host Found: http://www.milligazete.com.tr
- | [+] External Host Found: https://www.hrw.org
- | [+] External Host Found: http://www.centcom.mil
- | [+] External Host Found: http://www.avax.com.tr
- | [+] External Host Found: http://i.sabah.com.tr
- | [+] External Host Found: http://cdn1.cnnturk.com
- | [+] External Host Found: http://www.kahvekitap.com
- | [+] External Host Found: http://www.milliyet.com.tr
- | [+] External Host Found: https://www.youtube.com
- | [+] External Host Found: http://www.sahimerdansari.com
- | [+] External Host Found: http://www.turnike.com.tr
- | [+] External Host Found: https://uyghuristaninfo.files.wordpress.com
- | [+] External Host Found: http://www.dailymail.co.uk
- | [+] External Host Found: https://fbcdn-sphotos-h-a.akamaihd.net
- | [+] External Host Found: https://s04.justpaste.it
- | [+] External Host Found: https://twitter.com
- | [+] External Host Found: http://asal.msb.gov.tr
- | [+] External Host Found: http://image.yenisafak.com
- | [+] External Host Found: https://www.ubeybi.com
- | [+] External Host Found: https://s01.justpaste.it
- | [+] External Host Found: http://www.ddizi1.com
- | [+] External Host Found: http://i.hizliresim.com
- | [+] External Host Found: http://cdn.yenisafak.net
- | [+] External Host Found: https://encrypted-tbn0.gstatic.com
- | [+] External Host Found: http://image.cdn.haber7.com
- | [+] External Host Found: https://cocuk.tbmm.gov.tr
- | [+] External Host Found: http://islahhaber.net
- | [+] External Host Found: https://scontent-ams3-1.xx.fbcdn.net
- | [+] External Host Found: https://scontent-cdg2-1.xx.fbcdn.net
- | [+] External Host Found: https://cdnjs.cloudflare.com
- | [+] External Host Found: https://cdn.yeniakit.com.tr
- | [+] External Host Found: http://www.rohingya.org.tr
- | [+] External Host Found: http://www.rna-press.com
- | [+] External Host Found: http://www.aydinlikgazete.com
- | [+] External Host Found: http://www.timeturk.com
- | [+] External Host Found: http://im.haberturk.com
- | [+] External Host Found: http://cdn.ar.com
- | [+] External Host Found: https://www.modalarda.com
- | [+] External Host Found: http://appsaljazeera.com
- | [+] External Host Found: http://siyasetkulubu.blogspot.com.tr
- | [+] External Host Found: http://i.hurimg.com
- | [+] External Host Found: https://play.google.com
- | [+] External Host Found: http://www.damladanismanlik.com
- | [+] External Host Found: https://tr.euronews.com
- | [+] External Host Found: http://www.pressmedya.com
- | [+] External Host Found: https://www.dw.com
- | [+] External Host Found: http://www.f5haber.com
- | [+] External Host Found: https://fbcdn-sphotos-f-a.akamaihd.net
- | [+] External Host Found: http://xslt.alexa.com
- | [+] External Host Found: https://www.facebook.com
- | [+] External Host Found: https://scontent-amt2-1.xx.fbcdn.net
- | [+] External Host Found: https://itunes.apple.com
- | [+] External Host Found: http://www.medyatimes.com
- | [+] External Host Found: https://scontent-frt3-1.xx.fbcdn.net
- | [+] External Host Found: http://tuketici.gtb.gov.tr
- | [+] External Host Found: http://www.turnikesistemi.com.tr
- | [+] External Host Found: http://2.bp.blogspot.com
- | [+] External Host Found: http://www.engelligecisturnikesi.com
- | [+] External Host Found: http://ajanskafkas.com
- | [+] External Host Found: https://fbcdn-sphotos-c-a.akamaihd.net
- | [+] External Host Found: https://www.dunyabulteni.net
- | [+] External Host Found: http://tupbebek1.com
- | [+] External Host Found: http://www.turkishny.com
- | [+] External Host Found: http://www.youtube.com
- | [+] External Host Found: https://scontent-lhr3-1.xx.fbcdn.net
- =======================================================================================================================================
- | E-mails:
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- | [+] E-mail Found: [email protected]
- =======================================================================================================================================
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P1-1-Debian <<>> islahhaber.net
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15260
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;islahhaber.net. IN A
- ;; ANSWER SECTION:
- islahhaber.net. 511 IN A 45.32.187.95
- ;; Query time: 35 msec
- ;; SERVER: 38.132.106.139#53(38.132.106.139)
- ;; WHEN: jeu jan 31 18:41:16 EST 2019
- ;; MSG SIZE rcvd: 59
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P1-1-Debian <<>> +trace islahhaber.net
- ;; global options: +cmd
- . 85080 IN NS g.root-servers.net.
- . 85080 IN NS i.root-servers.net.
- . 85080 IN NS a.root-servers.net.
- . 85080 IN NS h.root-servers.net.
- . 85080 IN NS j.root-servers.net.
- . 85080 IN NS f.root-servers.net.
- . 85080 IN NS m.root-servers.net.
- . 85080 IN NS b.root-servers.net.
- . 85080 IN NS e.root-servers.net.
- . 85080 IN NS l.root-servers.net.
- . 85080 IN NS k.root-servers.net.
- . 85080 IN NS c.root-servers.net.
- . 85080 IN NS d.root-servers.net.
- . 85080 IN RRSIG NS 8 0 518400 20190213170000 20190131160000 16749 . QWsKOKRZvf2yfhwJXwpsDpj27UIdPnNupSNH5zq7bdHb8RGEUGDC2db7 YIRhVH9RfLnaRqLdCeSdlP7zOZaLQ7Qrx99u9ePlJBhjFp9drTJOpDFh Z0T8/EouIpLWV3gL68/wlMYrlvC4H3bv+VibhWCXQs8UNRYHXb9A28ZL YyFtD0CMHmQK3nvDHr8QhFu8MuurkPatMaloEHY/fFIKNu8+Bl9rhLNI FgYeAj/pItqw2emrvxOVDoZKAZlJTBqRKoOnRT33zXitVaWW65ZZp1hX oL0IeVU2fRAN67cmHLYTUGCfgzhdPOizMYlwFQ210ftJQJs6D38e9xqH ckMysQ==
- ;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 36 ms
- net. 172800 IN NS l.gtld-servers.net.
- net. 172800 IN NS b.gtld-servers.net.
- net. 172800 IN NS c.gtld-servers.net.
- net. 172800 IN NS d.gtld-servers.net.
- net. 172800 IN NS e.gtld-servers.net.
- net. 172800 IN NS f.gtld-servers.net.
- net. 172800 IN NS g.gtld-servers.net.
- net. 172800 IN NS a.gtld-servers.net.
- net. 172800 IN NS h.gtld-servers.net.
- net. 172800 IN NS i.gtld-servers.net.
- net. 172800 IN NS j.gtld-servers.net.
- net. 172800 IN NS k.gtld-servers.net.
- net. 172800 IN NS m.gtld-servers.net.
- net. 86400 IN DS 35886 8 2 7862B27F5F516EBE19680444D4CE5E762981931842C465F00236401D 8BD973EE
- net. 86400 IN RRSIG DS 8 1 86400 20190213170000 20190131160000 16749 . egovExQlbWVYH5EfDhzTDJbaObSKqL7HZoK2N1tCECKVsS4tA4qid5JY cib+npUVoD00/rDvY9nmdE9Mwu90Yjcn/3I6YY2jCrqD68uCLqRgDDC3 DSEgLQh3IuMMceQbnN5oVEs3q2Z7e/92WNUFaT6r8Cysq96HaVZO/G51 PLYoKyQjEZ+Wk82sj03y1CqdEHtIZu1XEiTDNlGfOV4r/4KHWr7ym41b miRIsUpTqvHygJTMN2f0fAIzbu7r4KgsFGnw8UhMdXpy4BaCFwerGOui FHKE7YtX8v4z2LwHx4mZxX0ckgetpHhz8a5vODzNzAxsCY/fNenjUHku iGeelQ==
- ;; Received 1171 bytes from 192.5.5.241#53(f.root-servers.net) in 22 ms
- islahhaber.net. 172800 IN NS pdns07.domaincontrol.com.
- islahhaber.net. 172800 IN NS pdns08.domaincontrol.com.
- A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 86400 IN NSEC3 1 1 0 - A1RUUFFJKCT2Q54P78F8EJGJ8JBK7I8B NS SOA RRSIG DNSKEY NSEC3PARAM
- A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 86400 IN RRSIG NSEC3 8 2 86400 20190204063546 20190128052546 51638 net. PjGXbob7PjgLCtvp5sALlA4p72/D6vG7Bt70/uXnhax1aHe09GSMo8qU wiNBlt6AA1bl1k63VxAczTpL866lBvs5/gHtlOiyQ/egNhGHK3W9gjxL Bnpr6vODCkndFjfEd1afNjM8bi6MtD8R+n7Nz6ebk6lUsCMTYByxfXb8 JhE=
- 8H8NQ4G8UEM4UBJAGMFUF1NV9OKBTNVL.net. 86400 IN NSEC3 1 1 0 - 8H9DILVHJGV3N4V433CSSEB2J0VH351O NS DS RRSIG
- 8H8NQ4G8UEM4UBJAGMFUF1NV9OKBTNVL.net. 86400 IN RRSIG NSEC3 8 2 86400 20190204062722 20190128051722 51638 net. DJVylXjU/sGfibUIcjRKZkqE9TVhU/hE4jDscT3u9A7Sa+5pAojXWh0S VmYTAb7LC1FgZFQY5yfFZVsb6/b09+75w0wVQaKcqQnZPpR2JaqfxM0c 1UAbdtHLRkdCDEIWJaMZrieMsCK3C8E8nZF/gMvwD4c5zuILu5v88rTX kX0=
- ;; Received 675 bytes from 2001:503:39c1::30#53(i.gtld-servers.net) in 85 ms
- islahhaber.net. 1800 IN A 45.32.187.95
- islahhaber.net. 3600 IN NS pdns07.domaincontrol.com.
- islahhaber.net. 3600 IN NS pdns08.domaincontrol.com.
- ;; Received 118 bytes from 97.74.111.53#53(pdns07.domaincontrol.com) in 30 ms
- #######################################################################################################################################
- Saut Nom d'hôte Adresse IP Temps 1
- 1 10.246.200.1 10.246.200.1 23.711
- 1 10.246.200.1 10.246.200.1 23.014
- 2 vlan102.as02.qc1.ca.m247.com 176.113.74.17 23.672
- 3 37.120.128.168 37.120.128.168 38.362
- 4 te-1-5-2-0.bb1.fra2.de.m247.com 82.102.29.44 23.184
- 5 motl-b1-link.telia.net 62.115.162.41 23.113
- 6 nyk-bb3-link.telia.net 62.115.137.142 107.178
- 7 ldn-bb4-link.telia.net 62.115.112.245 110.269
- 8 adm-bb4-link.telia.net 62.115.134.26 111.348
- #######################################################################################################################################
- Port État Service
- 21/tcp open ftp
- 25/tcp closed smtp
- 53/tcp open domain
- 80/tcp open http
- 88/tcp open kerberos-sec
- 135/tcp open msrpc
- 139/tcp closed netbios-ssn
- 389/tcp open ldap
- 443/tcp open https
- 445/tcp closed microsoft-ds
- 464/tcp open kpasswd5
- 515/tcp open printer
- 593/tcp open http-rpc-epmap
- 636/tcp open ldapssl
- 3268/tcp open globalcatLDAP
- 3269/tcp open globalcatLDAPssl
- 3389/tcp open ms-wbt-server
- 9415/tcp open unknown
- 9418/tcp open git
- 9595/tcp open pds
- 49154/tcp open unknown
- 49155/tcp open unknown
- 49157/tcp open unknown
- 49158/tcp open unknown
- 49163/tcp open unknown
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: islahhaber.net
- [-] DNSSEC is not configured for islahhaber.net
- [*] SOA pdns07.domaincontrol.com 97.74.111.53
- [*] NS pdns07.domaincontrol.com 97.74.111.53
- [*] NS pdns07.domaincontrol.com 2603:5:21f1::35
- [*] NS pdns08.domaincontrol.com 173.201.79.53
- [*] NS pdns08.domaincontrol.com 2603:5:22f1::35
- [*] MX smtp.secureserver.net 68.178.213.203
- [*] MX smtp.secureserver.net 68.178.213.37
- [*] MX smtp.secureserver.net 72.167.238.29
- [*] MX mailstore1.secureserver.net 68.178.213.244
- [*] MX mailstore1.secureserver.net 72.167.238.32
- [*] MX mailstore1.secureserver.net 68.178.213.243
- [*] A islahhaber.net 45.32.187.95
- [*] Enumerating SRV Records
- [*] SRV _autodiscover._tcp.islahhaber.net autodiscover.int.secureserver.net 172.19.66.223 443 0
- [+] 1 Records Found
- #######################################################################################################################################
- [+] Testing domain
- www.islahhaber.net 45.32.187.95
- [+] Dns resolving
- Domain name Ip address Name server
- islahhaber.net 45.32.187.95 45.32.187.95.vultr.com
- Found 1 host(s) for islahhaber.net
- [+] Testing wildcard
- Ok, no wildcard found.
- [+] Scanning for subdomain on islahhaber.net
- [!] Wordlist not specified. I scannig with my internal wordlist...
- Estimated time about 16.65 seconds
- Subdomain Ip address Name server
- email.islahhaber.net 45.40.140.6 p3plgemwbe27-v05.prod.phx3.secureserver.net
- ftp.islahhaber.net 45.32.187.95 45.32.187.95.vultr.com
- imap.islahhaber.net 68.178.252.117 p3plprx11-v01.prod.phx3.secureserver.net
- pop.islahhaber.net 173.201.192.158 p3plprx07-v01.prod.phx3.secureserver.net
- smtp.islahhaber.net 72.167.238.29 p3plibsmtp01-v01.prod.phx3.secureserver.net
- www.islahhaber.net 45.32.187.95 45.32.187.95.vultr.com
- #######################################################################################################################################
- [*] Processing domain islahhaber.net
- [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
- [+] Getting nameservers
- 173.201.79.53 - pdns08.domaincontrol.com
- 97.74.111.53 - pdns07.domaincontrol.com
- [-] Zone transfer failed
- [+] MX records found, added to target list
- 0 smtp.secureserver.net.
- 10 mailstore1.secureserver.net.
- [*] Scanning islahhaber.net for A records
- 45.32.187.95 - islahhaber.net
- 173.201.192.148 - email.islahhaber.net
- 97.74.135.133 - email.islahhaber.net
- 45.40.130.40 - email.islahhaber.net
- 173.201.193.148 - email.islahhaber.net
- 97.74.135.55 - email.islahhaber.net
- 173.201.192.20 - email.islahhaber.net
- 173.201.193.133 - email.islahhaber.net
- 173.201.192.133 - email.islahhaber.net
- 68.178.252.148 - email.islahhaber.net
- 173.201.192.5 - email.islahhaber.net
- 97.74.135.148 - email.islahhaber.net
- 72.167.218.183 - email.islahhaber.net
- 72.167.218.173 - email.islahhaber.net
- 72.167.218.55 - email.islahhaber.net
- 173.201.193.20 - email.islahhaber.net
- 72.167.218.45 - email.islahhaber.net
- 173.201.193.5 - email.islahhaber.net
- 68.178.252.5 - email.islahhaber.net
- 68.178.252.20 - email.islahhaber.net
- 45.40.130.41 - email.islahhaber.net
- 68.178.252.133 - email.islahhaber.net
- 97.74.135.45 - email.islahhaber.net
- 45.40.140.6 - email.islahhaber.net
- 45.32.187.95 - ftp.islahhaber.net
- 97.74.135.10 - imap.islahhaber.net
- 173.201.193.129 - imap.islahhaber.net
- 97.74.135.143 - imap.islahhaber.net
- 173.201.193.97 - imap.islahhaber.net
- 72.167.218.138 - imap.islahhaber.net
- 173.201.192.129 - imap.islahhaber.net
- 173.201.192.158 - imap.islahhaber.net
- 68.178.252.117 - imap.islahhaber.net
- 97.74.135.143 - pop.islahhaber.net
- 173.201.193.97 - pop.islahhaber.net
- 72.167.218.138 - pop.islahhaber.net
- 68.178.252.117 - pop.islahhaber.net
- 97.74.135.10 - pop.islahhaber.net
- 173.201.192.158 - pop.islahhaber.net
- 173.201.192.129 - pop.islahhaber.net
- 173.201.193.129 - pop.islahhaber.net
- 68.178.213.37 - smtp.islahhaber.net
- 68.178.213.203 - smtp.islahhaber.net
- 72.167.238.29 - smtp.islahhaber.net
- 45.32.187.95 - www.islahhaber.net
- #######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 45.40.140.6 301 alias email.islahhaber.net Apache
- 45.40.140.6 301 host email.secureserver.net Apache
- 72.167.218.45 301 host email.secureserver.net Apache
- 68.178.252.20 301 host email.secureserver.net Apache
- 97.74.135.45 301 host email.secureserver.net Apache
- 173.201.192.5 301 host email.secureserver.net Apache
- 72.167.218.183 301 host email.secureserver.net Apache
- 68.178.252.5 301 host email.secureserver.net Apache
- 173.201.192.133 301 host email.secureserver.net Apache
- 72.167.218.173 301 host email.secureserver.net Apache
- 97.74.135.133 301 host email.secureserver.net Apache
- 45.40.130.40 301 host email.secureserver.net Apache
- 97.74.135.148 301 host email.secureserver.net Apache
- 173.201.193.133 301 host email.secureserver.net Apache
- 68.178.252.148 301 host email.secureserver.net Apache
- 72.167.218.55 301 host email.secureserver.net Apache
- 97.74.135.55 301 host email.secureserver.net Apache
- 68.178.252.133 301 host email.secureserver.net Apache
- 173.201.193.20 301 host email.secureserver.net Apache
- 173.201.193.148 301 host email.secureserver.net Apache
- 173.201.193.5 301 host email.secureserver.net Apache
- 45.40.130.41 301 host email.secureserver.net Apache
- 173.201.192.20 301 host email.secureserver.net Apache
- 173.201.192.148 301 host email.secureserver.net Apache
- 45.32.187.95 404 alias ftp.islahhaber.net Microsoft-IIS/8.5
- 45.32.187.95 404 host islahhaber.net Microsoft-IIS/8.5
- 173.201.192.129 alias imap.islahhaber.net
- 173.201.192.129 host imap.secureserver.net
- 97.74.135.143 host imap.secureserver.net
- 72.167.218.138 host imap.secureserver.net
- 173.201.192.158 host imap.secureserver.net
- 173.201.193.97 host imap.secureserver.net
- 173.201.193.129 host imap.secureserver.net
- 68.178.252.117 host imap.secureserver.net
- 97.74.135.10 host imap.secureserver.net
- 173.201.193.129 alias pop.islahhaber.net
- 173.201.193.129 host pop.secureserver.net
- 72.167.218.138 host pop.secureserver.net
- 97.74.135.10 host pop.secureserver.net
- 97.74.135.143 host pop.secureserver.net
- 173.201.193.97 host pop.secureserver.net
- 173.201.192.129 host pop.secureserver.net
- 68.178.252.117 host pop.secureserver.net
- 173.201.192.158 host pop.secureserver.net
- 68.178.213.37 alias smtp.islahhaber.net
- 68.178.213.37 host smtp.secureserver.net
- 68.178.213.203 host smtp.secureserver.net
- 72.167.238.29 host smtp.secureserver.net
- 45.32.187.95 404 alias www.islahhaber.net Microsoft-IIS/8.5
- 45.32.187.95 404 host islahhaber.net Microsoft-IIS/8.5
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- www.islahhaber.net -----
- Host's addresses:
- __________________
- islahhaber.net. 1214 IN A 45.32.187.95
- Name Servers:
- ______________
- pdns08.domaincontrol.com. 86341 IN A 173.201.79.53
- pdns07.domaincontrol.com. 83281 IN A 97.74.111.53
- Mail (MX) Servers:
- ___________________
- mailstore1.secureserver.net. 60 IN A 68.178.213.243
- mailstore1.secureserver.net. 60 IN A 72.167.238.32
- mailstore1.secureserver.net. 60 IN A 68.178.213.244
- smtp.secureserver.net. 60 IN A 68.178.213.203
- smtp.secureserver.net. 60 IN A 72.167.238.29
- smtp.secureserver.net. 60 IN A 68.178.213.37
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for www.islahhaber.net on pdns08.domaincontrol.com ...
- Trying Zone Transfer for www.islahhaber.net on pdns07.domaincontrol.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- Running Source: Ask
- Running Source: Archive.is
- Running Source: Baidu
- Running Source: Bing
- Running Source: CertDB
- Running Source: CertificateTransparency
- Running Source: Certspotter
- Running Source: Commoncrawl
- Running Source: Crt.sh
- Running Source: Dnsdb
- Running Source: DNSDumpster
- Running Source: DNSTable
- Running Source: Dogpile
- Running Source: Exalead
- Running Source: Findsubdomains
- Running Source: Googleter
- Running Source: Hackertarget
- Running Source: Ipv4Info
- Running Source: PTRArchive
- Running Source: Sitedossier
- Running Source: Threatcrowd
- Running Source: ThreatMiner
- Running Source: WaybackArchive
- Running Source: Yahoo
- Running enumeration on www.islahhaber.net
- dnsdb: Unexpected return status 503
- crtsh: json: cannot unmarshal array into Go value of type crtsh.crtshObject
- waybackarchive: Get http://web.archive.org/cdx/search/cdx?url=*.www.islahhaber.net/*&output=json&fl=original&collapse=urlkey&page=
- : net/http: HTTP/1.x transport connection broken: malformed HTTP response "<html>"
- Starting Bruteforcing of www.islahhaber.net with 9985 words
- Total 1 Unique subdomains found for www.islahhaber.net
- .www.islahhaber.net
- #######################################################################################################################################
- [+] www.islahhaber.net has no SPF record!
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for www.islahhaber.net!
- ######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:59 EST
- Nmap scan report for www.islahhaber.net (45.32.187.95)
- Host is up (0.088s latency).
- rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
- Not shown: 463 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 53/tcp open domain
- 80/tcp open http
- 88/tcp open kerberos-sec
- 135/tcp open msrpc
- 389/tcp open ldap
- 443/tcp open https
- 515/tcp open printer
- 3389/tcp open ms-wbt-server
- 5985/tcp open wsman
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:59 EST
- Nmap scan report for www.islahhaber.net (45.32.187.95)
- Host is up (0.043s latency).
- rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:59 EST
- Nmap scan report for www.islahhaber.net (45.32.187.95)
- Host is up (0.11s latency).
- rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
- PORT STATE SERVICE VERSION
- 21/tcp open tcpwrapped
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 5500 guesses in 360 seconds, average tps: 15.0
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Microsoft Windows 2012 (88%)
- OS CPE: cpe:/o:microsoft:windows_server_2012:r2
- Aggressive OS guesses: Microsoft Windows Server 2012 or Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 10 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 25.19 ms 10.246.200.1
- 2 25.22 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 29.96 ms 37.120.128.168
- 4 25.23 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 25.24 ms 62.115.162.41
- 6 ...
- 7 139.39 ms ldn-bb4-link.telia.net (62.115.136.184)
- 8 135.09 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 109.27 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:07 EST
- Nmap scan report for www.islahhaber.net (45.32.187.95)
- Host is up (0.11s latency).
- rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
- PORT STATE SERVICE VERSION
- 53/tcp open domain?
- |_dns-fuzz: Server didn't response to our probe, can't fuzz
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | fingerprint-strings:
- | DNSVersionBindReqTCP:
- | version
- |_ bind
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port53-TCP:V=7.70%I=7%D=1/31%Time=5C537FB3%P=x86_64-pc-linux-gnu%r(DNSV
- SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
- SF:x04bind\0\0\x10\0\x03");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Microsoft Windows 2012 (88%)
- OS CPE: cpe:/o:microsoft:windows_server_2012:r2
- Aggressive OS guesses: Microsoft Windows Server 2012 or Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 10 hops
- Host script results:
- | dns-brute:
- | DNS Brute-force hostnames:
- | www.islahhaber.net - 45.32.187.95
- | ftp.islahhaber.net - 45.32.187.95
- | smtp.islahhaber.net - 68.178.213.203
- | smtp.islahhaber.net - 68.178.213.37
- |_ smtp.islahhaber.net - 72.167.238.29
- TRACEROUTE (using port 53/tcp)
- HOP RTT ADDRESS
- 1 28.13 ms 10.246.200.1
- 2 28.69 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 37.15 ms 37.120.128.168
- 4 28.70 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 28.68 ms 62.115.162.41
- 6 111.55 ms nyk-bb4-link.telia.net (62.115.134.52)
- 7 111.15 ms ldn-bb4-link.telia.net (62.115.136.184)
- 8 113.02 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 110.24 ms 45.32.187.95.vultr.com (45.32.187.95)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 174.67 seconds
- + -- --=[Port 67 closed... skipping.
- + -- --=[Port 68 closed... skipping.
- + -- --=[Port 69 closed... skipping.
- + -- --=[Port 79 closed... skipping.
- + -- --=[Port 80 opened... running tests...
- ######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://www.islahhaber.net
- Generic Detection results:
- The site http://www.islahhaber.net seems to be behind a WAF or some sort of security solution
- Reason: The server header is different when an attack is detected.
- The server header for a normal response is "Microsoft-IIS/8.5", while the server header a response to an attack is "Microsoft-HTTPAPI/2.0.",
- Number of requests: 14
- #######################################################################################################################################
- http://www.islahhaber.net [301 Moved Permanently] Country[RESERVED][ZZ], HTTPServer[Microsoft-IIS/8.5], IP[45.32.187.95], Microsoft-IIS[8.5], RedirectLocation[https://www.islahhaber.net/], Title[Document Moved]
- https://www.islahhaber.net/ [200 OK] ASP_NET[4.0.30319][MVC4.0], Country[RESERVED][ZZ], Frame, Google-Analytics[Universal][UA-35363848-1,UA-4313077-25], HTTPServer[Microsoft-IIS/8.5], IP[45.32.187.95], JQuery[1.7.1], Microsoft-IIS[8.5], PasswordField[Sifre], Script[application/json,text/javascript], Title[ISLAH HABER | Haber var islah eder, haber var ifsad eder], UncommonHeaders[x-aspnetmvc-version]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning https://www.islahhaber.net...
- _____________________________ SITE INFO _____________________________
- IP Title
- 45.32.187.95 ISLAH HABER | Haber var islah eder, haber
- ______________________________ VERSION ______________________________
- Name Versions Type
- ASP.NET 4.7.2558.0 Platform
- IIS 8.5 Platform
- Microsoft Windows Server 2012 R2 OS
- ____________________________ INTERESTING ____________________________
- URL Note Type
- /test.htm Test file Interesting
- /_layouts/create.aspx ASP.NET detailed error Interesting
- _______________________ PLATFORM OBSERVATIONS _______________________
- Platform URL Type
- ASP.NET 4.0.30319 / Observation
- ASP.NET 4.7.2558.0 /_layouts/create.aspx Observation
- _____________________________________________________________________
- Time: 47.6 sec Urls: 669 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 404 Not Found
- Cache-Control: private
- Content-Length: 4806
- Content-Type: text/html; charset=utf-8
- Server: Microsoft-IIS/8.5
- Date: Thu, 31 Jan 2019 23:11:11 GMT
- Connection: close
- HTTP/1.1 404 Not Found
- Cache-Control: private
- Content-Length: 4806
- Content-Type: text/html; charset=utf-8
- Server: Microsoft-IIS/8.5
- Date: Thu, 31 Jan 2019 23:11:12 GMT
- Connection: close
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:13 EST
- Nmap scan report for www.islahhaber.net (45.32.187.95)
- Host is up (0.11s latency).
- rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
- PORT STATE SERVICE VERSION
- 135/tcp open msrpc Microsoft Windows RPC
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Microsoft Windows 2012 (88%)
- OS CPE: cpe:/o:microsoft:windows_server_2012
- Aggressive OS guesses: Microsoft Windows Server 2012 (88%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 R2 (88%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 10 hops
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 24.43 ms 10.246.200.1
- 2 24.86 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 80.02 ms 37.120.128.168
- 4 24.84 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 24.87 ms 62.115.162.41
- 6 110.00 ms nyk-bb3-link.telia.net (62.115.137.142)
- 7 107.45 ms ldn-bb4-link.telia.net (62.115.136.184)
- 8 107.27 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 107.02 ms 45.32.187.95.vultr.com (45.32.187.95)
- ######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:14 EST
- Nmap scan report for www.islahhaber.net (45.32.187.95)
- Host is up (0.11s latency).
- rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
- PORT STATE SERVICE VERSION
- 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: sube.toygur.com, Site: Default-First-Site-Name)
- | ldap-rootdse:
- | LDAP Results
- | <ROOT>
- | currentTime: 20190131231802.0Z
- | subschemaSubentry: CN=Aggregate,CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
- | dsServiceName: CN=NTDS Settings,CN=WINDOWS-VULTR,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=sube,DC=toygur,DC=com
- | namingContexts: DC=sube,DC=toygur,DC=com
- | namingContexts: CN=Configuration,DC=sube,DC=toygur,DC=com
- | namingContexts: CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
- | namingContexts: DC=DomainDnsZones,DC=sube,DC=toygur,DC=com
- | namingContexts: DC=ForestDnsZones,DC=sube,DC=toygur,DC=com
- | defaultNamingContext: DC=sube,DC=toygur,DC=com
- | schemaNamingContext: CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
- | configurationNamingContext: CN=Configuration,DC=sube,DC=toygur,DC=com
- | rootDomainNamingContext: DC=sube,DC=toygur,DC=com
- | supportedControl: 1.2.840.113556.1.4.319
- | supportedControl: 1.2.840.113556.1.4.801
- | supportedControl: 1.2.840.113556.1.4.473
- | supportedControl: 1.2.840.113556.1.4.528
- | supportedControl: 1.2.840.113556.1.4.417
- | supportedControl: 1.2.840.113556.1.4.619
- | supportedControl: 1.2.840.113556.1.4.841
- | supportedControl: 1.2.840.113556.1.4.529
- | supportedControl: 1.2.840.113556.1.4.805
- | supportedControl: 1.2.840.113556.1.4.521
- | supportedControl: 1.2.840.113556.1.4.970
- | supportedControl: 1.2.840.113556.1.4.1338
- | supportedControl: 1.2.840.113556.1.4.474
- | supportedControl: 1.2.840.113556.1.4.1339
- | supportedControl: 1.2.840.113556.1.4.1340
- | supportedControl: 1.2.840.113556.1.4.1413
- | supportedControl: 2.16.840.1.113730.3.4.9
- | supportedControl: 2.16.840.1.113730.3.4.10
- | supportedControl: 1.2.840.113556.1.4.1504
- | supportedControl: 1.2.840.113556.1.4.1852
- | supportedControl: 1.2.840.113556.1.4.802
- | supportedControl: 1.2.840.113556.1.4.1907
- | supportedControl: 1.2.840.113556.1.4.1948
- | supportedControl: 1.2.840.113556.1.4.1974
- | supportedControl: 1.2.840.113556.1.4.1341
- | supportedControl: 1.2.840.113556.1.4.2026
- | supportedControl: 1.2.840.113556.1.4.2064
- | supportedControl: 1.2.840.113556.1.4.2065
- | supportedControl: 1.2.840.113556.1.4.2066
- | supportedControl: 1.2.840.113556.1.4.2090
- | supportedControl: 1.2.840.113556.1.4.2205
- | supportedControl: 1.2.840.113556.1.4.2204
- | supportedControl: 1.2.840.113556.1.4.2206
- | supportedControl: 1.2.840.113556.1.4.2211
- | supportedControl: 1.2.840.113556.1.4.2239
- | supportedControl: 1.2.840.113556.1.4.2255
- | supportedControl: 1.2.840.113556.1.4.2256
- | supportedLDAPVersion: 3
- | supportedLDAPVersion: 2
- | supportedLDAPPolicies: MaxPoolThreads
- | supportedLDAPPolicies: MaxPercentDirSyncRequests
- | supportedLDAPPolicies: MaxDatagramRecv
- | supportedLDAPPolicies: MaxReceiveBuffer
- | supportedLDAPPolicies: InitRecvTimeout
- | supportedLDAPPolicies: MaxConnections
- | supportedLDAPPolicies: MaxConnIdleTime
- | supportedLDAPPolicies: MaxPageSize
- | supportedLDAPPolicies: MaxBatchReturnMessages
- | supportedLDAPPolicies: MaxQueryDuration
- | supportedLDAPPolicies: MaxTempTableSize
- | supportedLDAPPolicies: MaxResultSetSize
- | supportedLDAPPolicies: MinResultSets
- | supportedLDAPPolicies: MaxResultSetsPerConn
- | supportedLDAPPolicies: MaxNotificationPerConn
- | supportedLDAPPolicies: MaxValRange
- | supportedLDAPPolicies: MaxValRangeTransitive
- | supportedLDAPPolicies: ThreadMemoryLimit
- | supportedLDAPPolicies: SystemMemoryLimitPercent
- | highestCommittedUSN: 12830934
- | supportedSASLMechanisms: GSSAPI
- | supportedSASLMechanisms: GSS-SPNEGO
- | supportedSASLMechanisms: EXTERNAL
- | supportedSASLMechanisms: DIGEST-MD5
- | dnsHostName: windows-vultr.sube.toygur.com
- | ldapServiceName: sube.toygur.com:[email protected]
- | serverName: CN=WINDOWS-VULTR,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=sube,DC=toygur,DC=com
- | supportedCapabilities: 1.2.840.113556.1.4.800
- | supportedCapabilities: 1.2.840.113556.1.4.1670
- | supportedCapabilities: 1.2.840.113556.1.4.1791
- | supportedCapabilities: 1.2.840.113556.1.4.1935
- | supportedCapabilities: 1.2.840.113556.1.4.2080
- | supportedCapabilities: 1.2.840.113556.1.4.2237
- | isSynchronized: TRUE
- | isGlobalCatalogReady: TRUE
- | domainFunctionality: 6
- | forestFunctionality: 6
- |_ domainControllerFunctionality: 6
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Microsoft Windows 2012 (88%)
- OS CPE: cpe:/o:microsoft:windows_server_2012
- Aggressive OS guesses: Microsoft Windows Server 2012 (88%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 R2 (88%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 10 hops
- Service Info: Host: WINDOWS-VULTR; OS: Windows 2012 R2; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 389/tcp)
- HOP RTT ADDRESS
- 1 27.92 ms 10.246.200.1
- 2 56.15 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 38.58 ms 37.120.128.168
- 4 27.99 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 28.01 ms 62.115.162.41
- 6 110.99 ms nyk-bb4-link.telia.net (62.115.134.52)
- 7 106.86 ms ldn-bb4-link.telia.net (62.115.136.184)
- 8 104.16 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 105.38 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- https://www.islahhaber.net [200 OK] ASP_NET[4.0.30319][MVC4.0], Country[RESERVED][ZZ], Frame, Google-Analytics[Universal][UA-35363848-1,UA-4313077-25], HTTPServer[Microsoft-IIS/8.5], IP[45.32.187.95], JQuery[1.7.1], Microsoft-IIS[8.5], PasswordField[Sifre], Script[application/json,text/javascript], Title[ISLAH HABER | Haber var islah eder, haber var ifsad eder], UncommonHeaders[x-aspnetmvc-version]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning https://www.islahhaber.net...
- _____________________________ SITE INFO _____________________________
- IP Title
- 45.32.187.95 ISLAH HABER | Haber var islah eder, haber
- ______________________________ VERSION ______________________________
- Name Versions Type
- ASP.NET 4.7.2558.0 Platform
- IIS 8.5 Platform
- Microsoft Windows Server 2012 R2 OS
- ____________________________ INTERESTING ____________________________
- URL Note Type
- /test.htm Test file Interesting
- /_layouts/create.aspx ASP.NET detailed error Interesting
- _______________________ PLATFORM OBSERVATIONS _______________________
- Platform URL Type
- ASP.NET 4.0.30319 / Observation
- ASP.NET 4.7.2558.0 /_layouts/create.aspx Observation
- _____________________________________________________________________
- Time: 1.8 sec Urls: 669 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 404 Not Found
- Cache-Control: private
- Content-Length: 4808
- Content-Type: text/html; charset=utf-8
- Server: Microsoft-IIS/8.5
- Date: Thu, 31 Jan 2019 23:18:19 GMT
- Connection: close
- HTTP/1.1 404 Not Found
- Cache-Control: private
- Content-Length: 4808
- Content-Type: text/html; charset=utf-8
- Server: Microsoft-IIS/8.5
- Date: Thu, 31 Jan 2019 23:18:20 GMT
- Connection: close
- #######################################################################################################################################
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 45.32.187.95
- Testing SSL server www.islahhaber.net on port 443 using SNI name www.islahhaber.net
- TLS Fallback SCSV:
- Server does not support TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-521 DHE 521
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-521 DHE 521
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-521 DHE 521
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-521 DHE 521
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-521 DHE 521
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-521 DHE 521
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-521 DHE 521
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-521 DHE 521
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: www.islahhaber.net
- Altnames: DNS:www.islahhaber.net, DNS:islahhaber.net
- Issuer: SignSec Certification Authority
- Not valid before: Sep 22 00:00:00 2018 GMT
- Not valid after: Sep 22 23:59:59 2019 GMT
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:18 EST
- Nmap scan report for www.islahhaber.net (45.32.187.95)
- Host is up (0.11s latency).
- rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
- PORT STATE SERVICE VERSION
- 3389/tcp open ms-wbt-server Microsoft Terminal Service
- | rdp-enum-encryption:
- | Security layer
- | CredSSP: SUCCESS
- | Native RDP: SUCCESS
- | SSL: SUCCESS
- | RDP Encryption level: Unknown
- |_ 128-bit RC4: SUCCESS
- |_rdp-vuln-ms12-020: ERROR: Script execution failed (use -d to debug)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- OS fingerprint not ideal because: Timing level 5 (Insane) used
- No OS matches for host
- Network Distance: 10 hops
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 3389/tcp)
- HOP RTT ADDRESS
- 1 23.14 ms 10.246.200.1
- 2 23.77 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 27.59 ms 37.120.128.168
- 4 23.58 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 23.57 ms 62.115.162.41
- 6 108.00 ms nyk-bb3-link.telia.net (62.115.137.142)
- 7 113.43 ms ldn-bb4-link.telia.net (62.115.112.245)
- 8 107.82 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 105.72 ms 45.32.187.95.vultr.com (45.32.187.95)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 44.89 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:55 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.087s latency).
- Not shown: 463 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 53/tcp open domain
- 80/tcp open http
- 88/tcp open kerberos-sec
- 135/tcp open msrpc
- 389/tcp open ldap
- 443/tcp open https
- 515/tcp open printer
- 3389/tcp open ms-wbt-server
- 5985/tcp open wsman
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:55 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.039s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:55 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Microsoft ftpd
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 4088 guesses in 274 seconds, average tps: 14.5
- | ftp-syst:
- |_ SYST: Windows_NT
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Microsoft Windows 2012 (89%)
- OS CPE: cpe:/o:microsoft:windows_server_2012
- Aggressive OS guesses: Microsoft Windows Server 2012 (89%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (89%), Microsoft Windows Server 2012 R2 (89%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 10 hops
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 24.57 ms 10.246.200.1
- 2 25.19 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 32.63 ms 37.120.128.168
- 4 24.99 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 25.02 ms 62.115.162.41
- 6 107.70 ms nyk-bb4-link.telia.net (62.115.134.52)
- 7 108.74 ms ldn-bb4-link.telia.net (62.115.136.184)
- 8 108.22 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 109.05 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:01 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 53/tcp open domain?
- |_dns-fuzz: Server didn't response to our probe, can't fuzz
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | fingerprint-strings:
- | DNSVersionBindReqTCP:
- | version
- |_ bind
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port53-TCP:V=7.70%I=7%D=1/31%Time=5C537E53%P=x86_64-pc-linux-gnu%r(DNSV
- SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
- SF:x04bind\0\0\x10\0\x03");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Tomato 1.27 - 1.28 (Linux 2.4.20) (97%), Linux 2.6.18 - 2.6.22 (97%), D-Link DWL-624+ or DWL-2000AP, or TRENDnet TEW-432BRP WAP (96%), Fortinet FortiGate-50B or 310B firewall (95%), Fortinet FortiGate 1500D firewall (95%), Microsoft Windows Vista Home Premium SP1 (93%), Fortinet FortiGate 100D firewall (92%), Fortinet FortiGate-60B or -100A firewall (92%), Vonage V-Portal VoIP adapter (92%), Lexmark Z2400 printer (92%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 10 hops
- Host script results:
- | dns-brute:
- |_ DNS Brute-force hostnames: No results.
- TRACEROUTE (using port 53/tcp)
- HOP RTT ADDRESS
- 1 24.55 ms 10.246.200.1
- 2 24.91 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 34.10 ms 37.120.128.168
- 4 24.59 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 24.58 ms 62.115.162.41
- 6 109.30 ms nyk-bb3-link.telia.net (62.115.137.142)
- 7 107.01 ms ldn-bb4-link.telia.net (62.115.136.184)
- 8 109.27 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 109.36 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:04 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 10 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 22.96 ms 10.246.200.1
- 2 23.34 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 41.64 ms 37.120.128.168
- 4 23.17 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 23.16 ms 62.115.162.41
- 6 ...
- 7 107.64 ms ldn-bb4-link.telia.net (62.115.112.245)
- 8 107.62 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 107.30 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:06 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- Network Distance: 10 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 23.12 ms 10.246.200.1
- 2 45.24 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 37.98 ms 37.120.128.168
- 4 23.35 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 23.35 ms 62.115.162.41
- 6 106.08 ms nyk-bb3-link.telia.net (62.115.137.142)
- 7 107.92 ms ldn-bb4-link.telia.net (62.115.112.245)
- 8 108.07 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 107.92 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:08 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 10 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 26.45 ms 10.246.200.1
- 2 26.85 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 43.25 ms 37.120.128.168
- 4 26.66 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 26.67 ms 62.115.162.41
- 6 ...
- 7 113.73 ms ldn-bb4-link.telia.net (62.115.112.245)
- 8 110.95 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 110.76 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://45.32.187.95...
- ____________________________________________ SITE INFO _____________________________________________
- IP Title
- 45.32.187.95
- _____________________________________________ VERSION ______________________________________________
- Name Versions Type
- microsoft-httpapi 2.0 Platform
- Microsoft Windows 7 OS
- Microsoft Windows Server 2003 SP2 | 2003 SP3 | 2008 | 2008 R2 | 2012 | 2012 R2 OS
- ____________________________________________________________________________________________________
- Time: 17.6 sec Urls: 599 Fingerprints: 40401
- ######################################################################################################################################
- HTTP/1.1 404 Not Found
- Content-Length: 315
- Content-Type: text/html; charset=us-ascii
- Server: Microsoft-HTTPAPI/2.0
- Date: Thu, 31 Jan 2019 23:11:41 GMT
- Connection: close
- HTTP/1.1 404 Not Found
- Content-Length: 315
- Content-Type: text/html; charset=us-ascii
- Server: Microsoft-HTTPAPI/2.0
- Date: Thu, 31 Jan 2019 23:11:42 GMT
- Connection: close
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:11 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.12s latency).
- PORT STATE SERVICE VERSION
- 123/udp open ntp NTP v3
- | ntp-info:
- |_ receive time stamp: 2019-01-31T23:12:21
- Too many fingerprints match this host to give specific OS details
- Network Distance: 10 hops
- TRACEROUTE (using port 123/udp)
- HOP RTT ADDRESS
- 1 23.99 ms 10.246.200.1
- 2 24.28 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 45.03 ms 37.120.128.168
- 4 24.27 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 24.97 ms 62.115.162.41
- 6 106.98 ms nyk-bb4-link.telia.net (62.115.134.52)
- 7 107.06 ms ldn-bb4-link.telia.net (62.115.136.184)
- 8 108.93 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 107.06 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:14 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 135/tcp open msrpc Microsoft Windows RPC
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Microsoft Windows 2012 (88%)
- OS CPE: cpe:/o:microsoft:windows_server_2012:r2
- Aggressive OS guesses: Microsoft Windows Server 2012 or Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 10 hops
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 22.57 ms 10.246.200.1
- 2 23.76 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 24.01 ms 37.120.128.168
- 4 22.97 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 22.96 ms 62.115.162.41
- 6 105.28 ms nyk-bb4-link.telia.net (62.115.134.52)
- 7 107.83 ms ldn-bb4-link.telia.net (62.115.112.245)
- 8 107.87 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 106.65 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:15 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 161/tcp filtered snmp
- 161/udp open|filtered snmp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 10 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 21.41 ms 10.246.200.1
- 2 45.12 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 41.12 ms 37.120.128.168
- 4 21.74 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 21.77 ms 62.115.162.41
- 6 ...
- 7 112.77 ms ldn-bb4-link.telia.net (62.115.112.245)
- 8 106.42 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 105.65 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:17 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: sube.toygur.com, Site: Default-First-Site-Name)
- | ldap-rootdse:
- | LDAP Results
- | <ROOT>
- | currentTime: 20190131232112.0Z
- | subschemaSubentry: CN=Aggregate,CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
- | dsServiceName: CN=NTDS Settings,CN=WINDOWS-VULTR,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=sube,DC=toygur,DC=com
- | namingContexts: DC=sube,DC=toygur,DC=com
- | namingContexts: CN=Configuration,DC=sube,DC=toygur,DC=com
- | namingContexts: CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
- | namingContexts: DC=DomainDnsZones,DC=sube,DC=toygur,DC=com
- | namingContexts: DC=ForestDnsZones,DC=sube,DC=toygur,DC=com
- | defaultNamingContext: DC=sube,DC=toygur,DC=com
- | schemaNamingContext: CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
- | configurationNamingContext: CN=Configuration,DC=sube,DC=toygur,DC=com
- | rootDomainNamingContext: DC=sube,DC=toygur,DC=com
- | supportedControl: 1.2.840.113556.1.4.319
- | supportedControl: 1.2.840.113556.1.4.801
- | supportedControl: 1.2.840.113556.1.4.473
- | supportedControl: 1.2.840.113556.1.4.528
- | supportedControl: 1.2.840.113556.1.4.417
- | supportedControl: 1.2.840.113556.1.4.619
- | supportedControl: 1.2.840.113556.1.4.841
- | supportedControl: 1.2.840.113556.1.4.529
- | supportedControl: 1.2.840.113556.1.4.805
- | supportedControl: 1.2.840.113556.1.4.521
- | supportedControl: 1.2.840.113556.1.4.970
- | supportedControl: 1.2.840.113556.1.4.1338
- | supportedControl: 1.2.840.113556.1.4.474
- | supportedControl: 1.2.840.113556.1.4.1339
- | supportedControl: 1.2.840.113556.1.4.1340
- | supportedControl: 1.2.840.113556.1.4.1413
- | supportedControl: 2.16.840.1.113730.3.4.9
- | supportedControl: 2.16.840.1.113730.3.4.10
- | supportedControl: 1.2.840.113556.1.4.1504
- | supportedControl: 1.2.840.113556.1.4.1852
- | supportedControl: 1.2.840.113556.1.4.802
- | supportedControl: 1.2.840.113556.1.4.1907
- | supportedControl: 1.2.840.113556.1.4.1948
- | supportedControl: 1.2.840.113556.1.4.1974
- | supportedControl: 1.2.840.113556.1.4.1341
- | supportedControl: 1.2.840.113556.1.4.2026
- | supportedControl: 1.2.840.113556.1.4.2064
- | supportedControl: 1.2.840.113556.1.4.2065
- | supportedControl: 1.2.840.113556.1.4.2066
- | supportedControl: 1.2.840.113556.1.4.2090
- | supportedControl: 1.2.840.113556.1.4.2205
- | supportedControl: 1.2.840.113556.1.4.2204
- | supportedControl: 1.2.840.113556.1.4.2206
- | supportedControl: 1.2.840.113556.1.4.2211
- | supportedControl: 1.2.840.113556.1.4.2239
- | supportedControl: 1.2.840.113556.1.4.2255
- | supportedControl: 1.2.840.113556.1.4.2256
- | supportedLDAPVersion: 3
- | supportedLDAPVersion: 2
- | supportedLDAPPolicies: MaxPoolThreads
- | supportedLDAPPolicies: MaxPercentDirSyncRequests
- | supportedLDAPPolicies: MaxDatagramRecv
- | supportedLDAPPolicies: MaxReceiveBuffer
- | supportedLDAPPolicies: InitRecvTimeout
- | supportedLDAPPolicies: MaxConnections
- | supportedLDAPPolicies: MaxConnIdleTime
- | supportedLDAPPolicies: MaxPageSize
- | supportedLDAPPolicies: MaxBatchReturnMessages
- | supportedLDAPPolicies: MaxQueryDuration
- | supportedLDAPPolicies: MaxTempTableSize
- | supportedLDAPPolicies: MaxResultSetSize
- | supportedLDAPPolicies: MinResultSets
- | supportedLDAPPolicies: MaxResultSetsPerConn
- | supportedLDAPPolicies: MaxNotificationPerConn
- | supportedLDAPPolicies: MaxValRange
- | supportedLDAPPolicies: MaxValRangeTransitive
- | supportedLDAPPolicies: ThreadMemoryLimit
- | supportedLDAPPolicies: SystemMemoryLimitPercent
- | highestCommittedUSN: 12831025
- | supportedSASLMechanisms: GSSAPI
- | supportedSASLMechanisms: GSS-SPNEGO
- | supportedSASLMechanisms: EXTERNAL
- | supportedSASLMechanisms: DIGEST-MD5
- | dnsHostName: windows-vultr.sube.toygur.com
- | ldapServiceName: sube.toygur.com:[email protected]
- | serverName: CN=WINDOWS-VULTR,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=sube,DC=toygur,DC=com
- | supportedCapabilities: 1.2.840.113556.1.4.800
- | supportedCapabilities: 1.2.840.113556.1.4.1670
- | supportedCapabilities: 1.2.840.113556.1.4.1791
- | supportedCapabilities: 1.2.840.113556.1.4.1935
- | supportedCapabilities: 1.2.840.113556.1.4.2080
- | supportedCapabilities: 1.2.840.113556.1.4.2237
- | isSynchronized: TRUE
- | isGlobalCatalogReady: TRUE
- | domainFunctionality: 6
- | forestFunctionality: 6
- |_ domainControllerFunctionality: 6
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Microsoft Windows 2012 (89%)
- OS CPE: cpe:/o:microsoft:windows_server_2012:r2
- Aggressive OS guesses: Microsoft Windows Server 2012 or Windows Server 2012 R2 (89%), Microsoft Windows Server 2012 R2 (89%), Microsoft Windows Server 2012 (87%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 10 hops
- Service Info: Host: WINDOWS-VULTR; OS: Windows 2012 R2; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 389/tcp)
- HOP RTT ADDRESS
- 1 22.75 ms 10.246.200.1
- 2 23.98 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 29.97 ms 37.120.128.168
- 4 23.97 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 24.00 ms 62.115.162.41
- 6 106.04 ms nyk-bb4-link.telia.net (62.115.134.52)
- 7 105.63 ms ldn-bb4-link.telia.net (62.115.136.184)
- 8 106.07 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 114.12 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 45.32.187.95
- Testing SSL server 45.32.187.95 on port 443 using SNI name 45.32.187.95
- TLS Fallback SCSV:
- Server does not support TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:21 EST
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 3389/tcp open ms-wbt-server Microsoft Terminal Service
- | rdp-enum-encryption:
- | Security layer
- | CredSSP: SUCCESS
- | Native RDP: SUCCESS
- | SSL: SUCCESS
- | RDP Encryption level: Unknown
- |_ 128-bit RC4: SUCCESS
- |_rdp-vuln-ms12-020: ERROR: Script execution failed (use -d to debug)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- OS fingerprint not ideal because: Timing level 5 (Insane) used
- No OS matches for host
- Network Distance: 10 hops
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 3389/tcp)
- HOP RTT ADDRESS
- 1 27.40 ms 10.246.200.1
- 2 52.96 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 29.16 ms 37.120.128.168
- 4 27.42 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 27.43 ms 62.115.162.41
- 6 112.43 ms nyk-bb3-link.telia.net (62.115.137.142)
- 7 110.11 ms ldn-bb4-link.telia.net (62.115.136.184)
- 8 110.12 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 110.11 ms 45.32.187.95.vultr.com (45.32.187.95)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:27 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 18:27
- Completed NSE at 18:27, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 18:27
- Completed NSE at 18:27, 0.00s elapsed
- Initiating Ping Scan at 18:27
- Scanning 45.32.187.95 [4 ports]
- Completed Ping Scan at 18:27, 0.15s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 18:27
- Completed Parallel DNS resolution of 1 host. at 18:27, 0.03s elapsed
- Initiating Connect Scan at 18:27
- Scanning 45.32.187.95.vultr.com (45.32.187.95) [1000 ports]
- Discovered open port 80/tcp on 45.32.187.95
- Discovered open port 443/tcp on 45.32.187.95
- Discovered open port 135/tcp on 45.32.187.95
- Discovered open port 53/tcp on 45.32.187.95
- Discovered open port 21/tcp on 45.32.187.95
- Discovered open port 3389/tcp on 45.32.187.95
- Discovered open port 389/tcp on 45.32.187.95
- Discovered open port 49163/tcp on 45.32.187.95
- Discovered open port 9418/tcp on 45.32.187.95
- Discovered open port 9595/tcp on 45.32.187.95
- Discovered open port 49155/tcp on 45.32.187.95
- Discovered open port 515/tcp on 45.32.187.95
- Discovered open port 49158/tcp on 45.32.187.95
- Discovered open port 464/tcp on 45.32.187.95
- Discovered open port 49154/tcp on 45.32.187.95
- Discovered open port 593/tcp on 45.32.187.95
- Discovered open port 636/tcp on 45.32.187.95
- Discovered open port 49157/tcp on 45.32.187.95
- Discovered open port 88/tcp on 45.32.187.95
- Discovered open port 3268/tcp on 45.32.187.95
- Discovered open port 3269/tcp on 45.32.187.95
- Discovered open port 9415/tcp on 45.32.187.95
- Completed Connect Scan at 18:27, 7.23s elapsed (1000 total ports)
- Initiating Service scan at 18:27
- Scanning 22 services on 45.32.187.95.vultr.com (45.32.187.95)
- Completed Service scan at 18:29, 139.47s elapsed (22 services on 1 host)
- Initiating OS detection (try #1) against 45.32.187.95.vultr.com (45.32.187.95)
- adjust_timeouts2: packet supposedly had rtt of -952749 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -952749 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -626776 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -626776 microseconds. Ignoring time.
- Retrying OS detection (try #2) against 45.32.187.95.vultr.com (45.32.187.95)
- adjust_timeouts2: packet supposedly had rtt of -65013 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -65013 microseconds. Ignoring time.
- Initiating Traceroute at 18:29
- Completed Traceroute at 18:29, 3.03s elapsed
- Initiating Parallel DNS resolution of 9 hosts. at 18:29
- Completed Parallel DNS resolution of 9 hosts. at 18:30, 16.50s elapsed
- NSE: Script scanning 45.32.187.95.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 18:30
- NSE Timing: About 99.77% done; ETC: 18:30 (0:00:00 remaining)
- NSE Timing: About 99.80% done; ETC: 18:31 (0:00:00 remaining)
- NSE Timing: About 99.83% done; ETC: 18:31 (0:00:00 remaining)
- NSE Timing: About 99.87% done; ETC: 18:32 (0:00:00 remaining)
- NSE Timing: About 99.90% done; ETC: 18:32 (0:00:00 remaining)
- NSE Timing: About 99.93% done; ETC: 18:33 (0:00:00 remaining)
- NSE Timing: About 99.97% done; ETC: 18:33 (0:00:00 remaining)
- Completed NSE at 18:33, 222.32s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 18:33
- Completed NSE at 18:33, 1.13s elapsed
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up, received syn-ack ttl 116 (0.11s latency).
- Scanned at 2019-01-31 18:27:15 EST for 395s
- Not shown: 975 filtered ports
- Reason: 975 no-responses
- PORT STATE SERVICE REASON VERSION
- 21/tcp open ftp syn-ack Microsoft ftpd
- | ftp-syst:
- |_ SYST: Windows_NT
- |_ssl-date: 2019-01-31T23:30:12+00:00; 0s from scanner time.
- 25/tcp closed smtp conn-refused
- 53/tcp open domain? syn-ack
- | fingerprint-strings:
- | DNSVersionBindReqTCP:
- | version
- |_ bind
- 80/tcp open http syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
- |_http-server-header: Microsoft-HTTPAPI/2.0
- |_http-title: Not Found
- 88/tcp open kerberos-sec syn-ack Microsoft Windows Kerberos (server time: 2019-01-31 23:27:29Z)
- 135/tcp open msrpc syn-ack Microsoft Windows RPC
- 139/tcp closed netbios-ssn conn-refused
- 389/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: sube.toygur.com, Site: Default-First-Site-Name)
- 443/tcp open ssl/https? syn-ack
- |_ssl-date: 2019-01-31T23:30:11+00:00; 0s from scanner time.
- 445/tcp closed microsoft-ds conn-refused
- 464/tcp open kpasswd5? syn-ack
- 515/tcp open printer syn-ack Microsoft lpd
- 593/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0
- 636/tcp open tcpwrapped syn-ack
- 3268/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: sube.toygur.com, Site: Default-First-Site-Name)
- 3269/tcp open tcpwrapped syn-ack
- 3389/tcp open ms-wbt-server syn-ack Microsoft Terminal Service
- | ssl-cert: Subject: commonName=windows-vultr.sube.toygur.com
- | Issuer: commonName=windows-vultr.sube.toygur.com
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-12-01T21:11:42
- | Not valid after: 2019-06-02T21:11:42
- | MD5: da67 6313 5569 dc13 8227 11c0 b651 7432
- | SHA-1: 5130 7168 1367 9a89 6460 4d9d 5769 76e0 8208 4104
- | -----BEGIN CERTIFICATE-----
- | MIIC/jCCAeagAwIBAgIQYLFKlc1asohPjm0X28NJdDANBgkqhkiG9w0BAQsFADAo
- | MSYwJAYDVQQDEx13aW5kb3dzLXZ1bHRyLnN1YmUudG95Z3VyLmNvbTAeFw0xODEy
- | MDEyMTExNDJaFw0xOTA2MDIyMTExNDJaMCgxJjAkBgNVBAMTHXdpbmRvd3MtdnVs
- | dHIuc3ViZS50b3lndXIuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
- | AQEAsdxiq8qSO1fLnZxH+05bS6jn2bjiS3e1N99tW20d6T8YVe7a/qtBxJFCCkAo
- | oo9FRGFcS4rXxeFmb1iH23McmA+6Vthn7x5DXoxp3POBexXbv3mGQ52EvCswRvbg
- | iS2P1V6RWfOJLkqrYRz1RZd+F7HH3MQizDG9m9iJf1dzHSouxanX6Rku1cIYjccW
- | jcvLzs2WdFp1qvVp9H8R8XNaP9BjUiZNKkacaLzXVXsRdF/EaMsSWWBypevN8qqK
- | Wr/NOeTfoMPEGOFCkwta3xMUMpE1nq51L7Hc/4+JNKJ9AHWt7MWRU1pgkUbXrUgl
- | AY0CclrNAZoUDbc1SlBetUOQmQIDAQABoyQwIjATBgNVHSUEDDAKBggrBgEFBQcD
- | ATALBgNVHQ8EBAMCBDAwDQYJKoZIhvcNAQELBQADggEBADenv40725hwljEZffv4
- | IL8+7e+kTe2MRSAjfaOgGi16LFFu72g8kHLVsc2eOQ4lnZfPTuXWVSuBlmQeFUyv
- | YCYrHWY/fC4HsaYQXepMTDStr7YPA6uw5e166vVgeX4UHa9A1QFeLercoTHj75cS
- | pj5jtpvmIA+suILO/UruvhjiC+pjyq4w8c2M+yXU9p4sYgqGXeYDS72n6ew0xl0i
- | q57I9Nqdnxa5H7aQIvVK3TicIiZRc8HGYSsmAKHqZL9HktN/lvOI1iNcpO1SBTI4
- | AJU9wrdQZGb0XEx0pShZgOKiWTdPn0vrR6hXhkEuSPWy4WYcKvPkamsd98p2bNVZ
- | wdk=
- |_-----END CERTIFICATE-----
- 9415/tcp open http syn-ack Microsoft IIS httpd 8.5
- |_http-favicon: Unknown favicon MD5: 4859E39AE6C0F1F428F2126A6BB32BD9
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Microsoft-IIS/8.5
- |_http-title: Home Page
- 9418/tcp open http syn-ack Microsoft IIS httpd 8.5
- |_http-favicon: Unknown favicon MD5: 4859E39AE6C0F1F428F2126A6BB32BD9
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Microsoft-IIS/8.5
- |_http-title: Home Page
- 9595/tcp open http syn-ack Microsoft IIS httpd 8.5
- |_http-favicon: Unknown favicon MD5: 4859E39AE6C0F1F428F2126A6BB32BD9
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Microsoft-IIS/8.5
- |_http-title: Home Page - My ASP.NET Application
- 49154/tcp open msrpc syn-ack Microsoft Windows RPC
- 49155/tcp open msrpc syn-ack Microsoft Windows RPC
- 49157/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0
- 49158/tcp open msrpc syn-ack Microsoft Windows RPC
- 49163/tcp open msrpc syn-ack Microsoft Windows RPC
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port53-TCP:V=7.70%I=7%D=1/31%Time=5C538466%P=x86_64-pc-linux-gnu%r(DNSV
- SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
- SF:x04bind\0\0\x10\0\x03");
- Device type: general purpose|storage-misc|WAP|router
- Running (JUST GUESSING): Linux 2.6.X|2.4.X (90%), HP embedded (89%), MikroTik RouterOS 6.X (86%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:hp:p2000_g3 cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:mikrotik:routeros:6.15
- OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
- Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (90%), HP P2000 G3 NAS device (89%), Tomato 1.27 - 1.28 (Linux 2.4.20) (86%), MikroTik RouterOS 6.15 (Linux 3.3.5) (86%)
- No exact OS matches for host (test conditions non-ideal).
- TCP/IP fingerprint:
- SCAN(V=7.70%E=4%D=1/31%OT=21%CT=25%CU=%PV=N%DS=10%DC=T%G=N%TM=5C5385DE%P=x86_64-pc-linux-gnu)
- SEQ(CI=Z%TS=7)
- SEQ(SP=107%GCD=1%ISR=10E%CI=RI%TS=7)
- OPS(O1=M4B3NW8ST11%O2=M4B3NW8ST11%O3=M4B3NW8NNT11%O4=M4B3NW8ST11%O5=M4B3NW8ST11%O6=M4B3ST11)
- WIN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6=2000)
- ECN(R=Y%DF=Y%TG=80%W=2000%O=M4B3NW8NNS%CC=Y%Q=)
- T1(R=Y%DF=Y%TG=80%S=O%A=S+%F=AS%RD=0%Q=)
- T2(R=N)
- T2(R=Y%DF=Y%TG=80%W=2000%S=O%A=O%F=AS%O=M4B3NW8ST11%RD=0%Q=)
- T3(R=N)
- T4(R=N)
- T4(R=Y%DF=Y%TG=80%W=2000%S=O%A=O%F=AS%O=M4B3NW8ST11%RD=0%Q=)
- T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
- T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
- T7(R=N)
- U1(R=N)
- IE(R=N)
- Uptime guess: 58.274 days (since Tue Dec 4 11:58:39 2018)
- Network Distance: 10 hops
- TCP Sequence Prediction: Difficulty=263 (Good luck!)
- IP ID Sequence Generation: Busy server or unknown class
- Service Info: Host: WINDOWS-VULTR; OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- |_clock-skew: mean: 0s, deviation: 0s, median: 0s
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 23.26 ms 10.246.200.1
- 2 23.68 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 42.56 ms 37.120.128.168
- 4 23.69 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
- 5 23.69 ms 62.115.162.41
- 6 113.51 ms nyk-bb3-link.telia.net (62.115.137.142)
- 7 108.67 ms ldn-bb4-link.telia.net (62.115.112.245)
- 8 108.65 ms adm-bb4-link.telia.net (62.115.134.26)
- 9 ...
- 10 107.67 ms 45.32.187.95.vultr.com (45.32.187.95)
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 18:33
- Completed NSE at 18:33, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 18:33
- Completed NSE at 18:33, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 395.54 seconds
- Raw packets sent: 107 (9.280KB) | Rcvd: 3048 (1.829MB)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:33 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 18:33
- Completed NSE at 18:33, 0.00s elapsed
- Initiating NSE at 18:33
- Completed NSE at 18:33, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 18:33
- Completed Parallel DNS resolution of 1 host. at 18:33, 0.02s elapsed
- Initiating UDP Scan at 18:33
- Scanning 45.32.187.95.vultr.com (45.32.187.95) [14 ports]
- Discovered open port 123/udp on 45.32.187.95
- Discovered open port 53/udp on 45.32.187.95
- Completed UDP Scan at 18:33, 1.38s elapsed (14 total ports)
- Initiating Service scan at 18:33
- Scanning 12 services on 45.32.187.95.vultr.com (45.32.187.95)
- Discovered open port 88/udp on 45.32.187.95
- Discovered open|filtered port 88/udp on 45.32.187.95.vultr.com (45.32.187.95) is actually open
- Service scan Timing: About 25.00% done; ETC: 18:40 (0:04:54 remaining)
- Completed Service scan at 18:35, 102.58s elapsed (12 services on 1 host)
- Initiating OS detection (try #1) against 45.32.187.95.vultr.com (45.32.187.95)
- Retrying OS detection (try #2) against 45.32.187.95.vultr.com (45.32.187.95)
- Initiating Traceroute at 18:35
- Completed Traceroute at 18:35, 7.09s elapsed
- Initiating Parallel DNS resolution of 1 host. at 18:35
- Completed Parallel DNS resolution of 1 host. at 18:35, 0.02s elapsed
- NSE: Script scanning 45.32.187.95.
- Initiating NSE at 18:35
- Completed NSE at 18:36, 16.42s elapsed
- Initiating NSE at 18:36
- Completed NSE at 18:36, 1.02s elapsed
- Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
- Host is up (0.058s latency).
- PORT STATE SERVICE VERSION
- 53/udp open domain?
- | fingerprint-strings:
- | DNS-SD:
- | _services
- | _dns-sd
- | _udp
- | local
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | NBTStat:
- | CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- | root-servers
- |_ root-servers
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open kerberos-sec Microsoft Windows Kerberos (server time: 2019-01-31 23:33:57Z)
- 123/udp open ntp NTP v3
- | ntp-info:
- |_ receive time stamp: 2019-01-31T23:36:00
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port53-UDP:V=7.70%I=7%D=1/31%Time=5C5385F4%P=x86_64-pc-linux-gnu%r(NBTS
- SF:tat,1ED,"\x80\xf0\x80\0\0\x01\0\0\0\r\0\x01\x20CKAAAAAAAAAAAAAAAAAAAAAA
- SF:AAAAAAAA\0\0!\0\x01\0\0\x02\0\x01\0\0\x0e\x10\0\x14\x01i\x0croot-server
- SF:s\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01k\x0croot-servers\x03n
- SF:et\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01c\x0croot-servers\x03net\0\x
- SF:c02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01b\x0croot-servers\x03net\0\xc02\0\
- SF:x02\0\x01\0\0\x0e\x10\0\x14\x01m\x0croot-servers\x03net\0\xc02\0\x02\0\
- SF:x01\0\0\x0e\x10\0\x14\x01a\x0croot-servers\x03net\0\xc02\0\x02\0\x01\0\
- SF:0\x0e\x10\0\x14\x01d\x0croot-servers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\
- SF:x10\0\x14\x01h\x0croot-servers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\
- SF:x14\x01f\x0croot-servers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x0
- SF:1j\x0croot-servers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01l\x0c
- SF:root-servers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01e\x0croot-s
- SF:ervers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01g\x0croot-servers
- SF:\x03net\0\xc0=\0\x1c\0\x01\0\0\x0e\x10\0\x10\x20\x01\x07\xfe\0\0\0\0\0\
- SF:0\0\0\0\0\0S")%r(DNS-SD,1E9,"\0\0\x80\0\0\x01\0\0\0\r\0\x01\t_services\
- SF:x07_dns-sd\x04_udp\x05local\0\0\x0c\0\x01\0\0\x02\0\x01\0\0\x0e\x10\0\x
- SF:14\x01k\x0croot-servers\x03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x0
- SF:1c\x0croot-servers\x03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01b\x0
- SF:croot-servers\x03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01m\x0croot
- SF:-servers\x03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01a\x0croot-serv
- SF:ers\x03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01d\x0croot-servers\x
- SF:03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01h\x0croot-servers\x03net
- SF:\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01f\x0croot-servers\x03net\0\xc
- SF:0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01j\x0croot-servers\x03net\0\xc0\.\0
- SF:\x02\0\x01\0\0\x0e\x10\0\x14\x01l\x0croot-servers\x03net\0\xc0\.\0\x02\
- SF:0\x01\0\0\x0e\x10\0\x14\x01e\x0croot-servers\x03net\0\xc0\.\0\x02\0\x01
- SF:\0\0\x0e\x10\0\x14\x01g\x0croot-servers\x03net\0\xc0\.\0\x02\0\x01\0\0\
- SF:x0e\x10\0\x14\x01i\x0croot-servers\x03net\0\xc09\0\x1c\0\x01\0\0\x0e\x1
- SF:0\0\x10\x20\x01\x07\xfd\0\0\0\0\0\0\0\0\0\0\0\x01");
- Too many fingerprints match this host to give specific OS details
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- Host script results:
- |_clock-skew: mean: 13s, deviation: 0s, median: 13s
- TRACEROUTE (using port 137/udp)
- HOP RTT ADDRESS
- 1 26.89 ms 10.246.200.1
- 2 ... 3
- 4 23.46 ms 10.246.200.1
- 5 27.23 ms 10.246.200.1
- 6 27.11 ms 10.246.200.1
- 7 27.11 ms 10.246.200.1
- 8 27.11 ms 10.246.200.1
- 9 27.12 ms 10.246.200.1
- 10 27.13 ms 10.246.200.1
- 11 ... 18
- 19 25.62 ms 10.246.200.1
- 20 27.06 ms 10.246.200.1
- 21 ... 28
- 29 24.32 ms 10.246.200.1
- 30 22.51 ms 10.246.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 18:36
- Completed NSE at 18:36, 0.00s elapsed
- Initiating NSE at 18:36
- Completed NSE at 18:36, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 132.66 seconds
- Raw packets sent: 138 (12.352KB) | Rcvd: 2808 (334.023KB)
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 45.32.187.95
- + Target Hostname: 45.32.187.95
- + Target Port: 80
- + Start Time: 2019-01-31 17:55:54 (GMT-5)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: No banner retrieved
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Uncommon header 'x-squid-error' found, with contents: ERR_INVALID_REQ 0
- + 7534 requests: 0 error(s) and 4 item(s) reported on remote host
- + End Time: 2019-01-31 18:24:25 (GMT-5) (1711 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 45.32.187.95
- + Target Hostname: www.islahhaber.net
- + Target Port: 443
- ---------------------------------------------------------------------------------------------------------------------------------------
- + SSL Info: Subject: /OU=Domain Control Validated/OU=Provided by ISIMTESCIL BILISIM ANONIM SIRKETI/OU=TrustSafe PRO - DV/CN=www.islahhaber.net
- Ciphers: ECDHE-RSA-AES256-SHA384
- Issuer: /C=US/ST=CA/L=Irvine/O=FBS Inc/OU=SSL Department/CN=SignSec Certification Authority
- + Start Time: 2019-01-31 17:55:39 (GMT-5)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: Microsoft-IIS/8.5
- + Retrieved x-aspnet-version header: 4.0.30319
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Entry '/bloklar/yorum/' in robots.txt returned a non-forbidden or redirect HTTP code (500)
- + Entry '/bloklar/anket/' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + Entry '/bloklarmobil/yorum/' in robots.txt returned a non-forbidden or redirect HTTP code (500)
- + "robots.txt" contains 17 entries which should be manually viewed.
- + ERROR: Error limit (20) reached for host, giving up. Last error: opening stream: can't connect: SSL negotiation failed: at /var/lib/nikto/plugins/LW2.pm line 5157.
- at /var/lib/nikto/plugins/LW2.pm line 5157.
- ; Connection reset by peer at /var/lib/nikto/plugins/LW2.pm line 5157.
- : Connection reset by peer
- + Scan terminated: 20 error(s) and 9 item(s) reported on remote host
- + End Time: 2019-01-31 17:59:38 (GMT-5) (239 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- Anonymous JTSEC #OpIsis Full Recon #10
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement