Advertisement
Guest User

Anonymous JTSEC #OpIsis Full Recon #10

a guest
Jan 31st, 2019
7,145
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 103.42 KB | None | 0 0
  1. #######################################################################################################################################
  2. =======================================================================================================================================
  3. Hostname www.islahhaber.net ISP Choopa, LLC
  4. Continent Europe Flag
  5. NL
  6. Country Netherlands Country Code NL
  7. Region North Holland Local time 31 Jan 2019 23:47 CET
  8. City Amsterdam Postal Code 1091
  9. IP Address 45.32.187.95 Latitude 52.356
  10. =======================================================================================================================================
  11. #######################################################################################################################################
  12. > www.islahhaber.net
  13. Server: 38.132.106.139
  14. Address: 38.132.106.139#53
  15.  
  16. Non-authoritative answer:
  17. www.islahhaber.net canonical name = islahhaber.net.
  18. Name: islahhaber.net
  19. Address: 45.32.187.95
  20. >
  21. #######################################################################################################################################
  22. HostIP:45.32.187.95
  23. HostName:www.islahhaber.net
  24.  
  25. Gathered Inet-whois information for 45.32.187.95
  26. ---------------------------------------------------------------------------------------------------------------------------------------
  27.  
  28.  
  29. inetnum: 45.16.0.0 - 45.43.63.255
  30. netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
  31. descr: IPv4 address block not managed by the RIPE NCC
  32. remarks: ------------------------------------------------------
  33. remarks:
  34. remarks: For registration information,
  35. remarks: you can consult the following sources:
  36. remarks:
  37. remarks: IANA
  38. remarks: http://www.iana.org/assignments/ipv4-address-space
  39. remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
  40. remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
  41. remarks:
  42. remarks: AFRINIC (Africa)
  43. remarks: http://www.afrinic.net/ whois.afrinic.net
  44. remarks:
  45. remarks: APNIC (Asia Pacific)
  46. remarks: http://www.apnic.net/ whois.apnic.net
  47. remarks:
  48. remarks: ARIN (Northern America)
  49. remarks: http://www.arin.net/ whois.arin.net
  50. remarks:
  51. remarks: LACNIC (Latin America and the Carribean)
  52. remarks: http://www.lacnic.net/ whois.lacnic.net
  53. remarks:
  54. remarks: ------------------------------------------------------
  55. country: EU # Country is really world wide
  56. admin-c: IANA1-RIPE
  57. tech-c: IANA1-RIPE
  58. status: ALLOCATED UNSPECIFIED
  59. mnt-by: RIPE-NCC-HM-MNT
  60. created: 2019-01-07T10:46:39Z
  61. last-modified: 2019-01-07T10:46:39Z
  62. source: RIPE
  63.  
  64. role: Internet Assigned Numbers Authority
  65. address: see http://www.iana.org.
  66. admin-c: IANA1-RIPE
  67. tech-c: IANA1-RIPE
  68. nic-hdl: IANA1-RIPE
  69. remarks: For more information on IANA services
  70. remarks: go to IANA web site at http://www.iana.org.
  71. mnt-by: RIPE-NCC-MNT
  72. created: 1970-01-01T00:00:00Z
  73. last-modified: 2001-09-22T09:31:27Z
  74. source: RIPE # Filtered
  75.  
  76. % This query was served by the RIPE Database Query Service version 1.92.6 (WAGYU)
  77.  
  78.  
  79.  
  80. Gathered Inic-whois information for islahhaber.net
  81. ---------------------------------------------------------------------------------------------------------------------------------------
  82. Domain Name: ISLAHHABER.NET
  83. Registry Domain ID: 1741971176_DOMAIN_NET-VRSN
  84. Registrar WHOIS Server: whois.isimtescil.net
  85. Registrar URL: http://www.isimtescil.net
  86. Updated Date: 2017-09-27T21:40:57Z
  87. Creation Date: 2012-09-01T14:54:55Z
  88. Registry Expiry Date: 2019-09-01T14:54:55Z
  89. Registrar: FBS Inc.
  90. Registrar IANA ID: 1110
  91. Registrar Abuse Contact Email: [email protected]
  92. Registrar Abuse Contact Phone: +90.8502000444
  93. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  94. Name Server: PDNS07.DOMAINCONTROL.COM
  95. Name Server: PDNS08.DOMAINCONTROL.COM
  96. DNSSEC: unsigned
  97. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  98. >>> Last update of whois database: 2019-01-31T22:55:16Z <<<
  99.  
  100. For more information on Whois status codes, please visit https://icann.org/epp
  101.  
  102. NOTICE: The expiration date displayed in this record is the date the
  103. registrar's sponsorship of the domain name registration in the registry is
  104. currently set to expire. This date does not necessarily reflect the expiration
  105. date of the domain name registrant's agreement with the sponsoring
  106. registrar. Users may consult the sponsoring registrar's Whois database to
  107. view the registrar's reported date of expiration for this registration.
  108.  
  109. TERMS OF USE: You are not authorized to access or query our Whois
  110. database through the use of electronic processes that are high-volume and
  111. automated except as reasonably necessary to register domain names or
  112. modify existing registrations; the Data in VeriSign Global Registry
  113. Services' ("VeriSign") Whois database is provided by VeriSign for
  114. information purposes only, and to assist persons in obtaining information
  115. about or related to a domain name registration record. VeriSign does not
  116. guarantee its accuracy. By submitting a Whois query, you agree to abide
  117. by the following terms of use: You agree that you may use this Data only
  118. for lawful purposes and that under no circumstances will you use this Data
  119. to: (1) allow, enable, or otherwise support the transmission of mass
  120. unsolicited, commercial advertising or solicitations via e-mail, telephone,
  121. or facsimile; or (2) enable high volume, automated, electronic processes
  122. that apply to VeriSign (or its computer systems). The compilation,
  123. repackaging, dissemination or other use of this Data is expressly
  124. prohibited without the prior written consent of VeriSign. You agree not to
  125. use electronic processes that are automated and high-volume to access or
  126. query the Whois database except as reasonably necessary to register
  127. domain names or modify existing registrations. VeriSign reserves the right
  128. to restrict your access to the Whois database in its sole discretion to ensure
  129. operational stability. VeriSign may restrict or terminate your access to the
  130. Whois database for failure to abide by these terms of use. VeriSign
  131. reserves the right to modify these terms at any time.
  132.  
  133. The Registry database contains ONLY .COM, .NET, .EDU domains and
  134. Registrars.
  135.  
  136. Gathered Netcraft information for www.islahhaber.net
  137. ---------------------------------------------------------------------------------------------------------------------------------------
  138.  
  139. Retrieving Netcraft.com information for www.islahhaber.net
  140. Netcraft.com Information gathered
  141.  
  142. Gathered Subdomain information for islahhaber.net
  143. ---------------------------------------------------------------------------------------------------------------------------------------
  144. Searching Google.com:80...
  145. HostName:www.islahhaber.net
  146. HostIP:45.32.187.95
  147. Searching Altavista.com:80...
  148. Found 1 possible subdomain(s) for host islahhaber.net, Searched 0 pages containing 0 results
  149.  
  150. Gathered E-Mail information for islahhaber.net
  151. ---------------------------------------------------------------------------------------------------------------------------------------
  152. Searching Google.com:80...
  153. Searching Altavista.com:80...
  154. Found 0 E-Mail(s) for host islahhaber.net, Searched 0 pages containing 0 results
  155.  
  156. Gathered TCP Port information for 45.32.187.95
  157. ---------------------------------------------------------------------------------------------------------------------------------------
  158.  
  159. Port State
  160.  
  161. 21/tcp open
  162. 53/tcp open
  163. 80/tcp open
  164. 88/tcp open
  165. 135/tcp open
  166.  
  167. Portscan Finished: Scanned 150 ports, 2 ports were in state closed
  168. #######################################################################################################################################
  169. [+] Scanning Begins ...
  170. [i] Scanning Site: https://www.islahhaber.net
  171.  
  172.  
  173.  
  174. B A S I C I N F O
  175. =======================================================================================================================================
  176.  
  177.  
  178. [+] Site Title: ISLAH HABER | Haber var islah eder, haber var ifsad eder
  179. [+] IP address: 45.32.187.95
  180. [+] Web Server: Microsoft-IIS/8.5
  181. [+] CMS: Could Not Detect
  182. [+] Cloudflare: Not Detected
  183. [+] Robots File: Found
  184.  
  185. -------------[ contents ]----------------
  186. User-agent: *
  187. Disallow: /Admin/
  188. Disallow: /Bin/
  189. Disallow: /Services/
  190. Disallow: /ckeditor/
  191. Disallow: /ckfinder/
  192. Disallow: /bloklar/yorum/
  193. Disallow: /bloklar/anket/
  194. Disallow: /bloklarmobil/yorum/
  195. User-agent: Googlebot
  196. Allow: /
  197. User-agent: Googlebot-News
  198. Allow: /
  199. User-agent: Googlebot-Image
  200. Allow: /
  201. User-agent: Googlebot-Video
  202. Allow: /
  203. User-agent: Googlebot-Mobile
  204. Allow: /
  205. User-agent: Mediapartners-Google
  206. Allow: /
  207. User-agent: Adsbot-Google
  208. Allow: /
  209. User-agent: ia_archiver-web.archive.org
  210. Allow: /
  211. User-agent: Yandex
  212. Allow: /
  213. Sitemap:http://www.islahhaber.net/sitemap.xml
  214. -----------[end of contents]-------------
  215.  
  216.  
  217.  
  218. W H O I S L O O K U P
  219. =======================================================================================================================================
  220.  
  221. Domain Name: ISLAHHABER.NET
  222. Registry Domain ID: 1741971176_DOMAIN_NET-VRSN
  223. Registrar WHOIS Server: whois.isimtescil.net
  224. Registrar URL: http://www.isimtescil.net
  225. Updated Date: 2017-09-27T21:40:57Z
  226. Creation Date: 2012-09-01T14:54:55Z
  227. Registry Expiry Date: 2019-09-01T14:54:55Z
  228. Registrar: FBS Inc.
  229. Registrar IANA ID: 1110
  230. Registrar Abuse Contact Email: [email protected]
  231. Registrar Abuse Contact Phone: +90.8502000444
  232. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  233. Name Server: PDNS07.DOMAINCONTROL.COM
  234. Name Server: PDNS08.DOMAINCONTROL.COM
  235. DNSSEC: unsigned
  236. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  237. >>> Last update of whois database: 2019-01-31T22:55:31Z <<<
  238.  
  239. For more information on Whois status codes, please visit https://icann.org/epp
  240.  
  241.  
  242.  
  243. The Registry database contains ONLY .COM, .NET, .EDU domains and
  244. Registrars.
  245.  
  246.  
  247.  
  248.  
  249. G E O I P L O O K U P
  250. =======================================================================================================================================
  251.  
  252. [i] IP Address: 45.32.187.95
  253. [i] Country: Netherlands
  254. [i] State: North Holland
  255. [i] City: Amsterdam
  256. [i] Latitude: 52.3556
  257. [i] Longitude: 4.9135
  258.  
  259.  
  260.  
  261.  
  262. H T T P H E A D E R S
  263. =======================================================================================================================================
  264.  
  265.  
  266. [i] HTTP/1.1 200 OK
  267. [i] Cache-Control: private
  268. [i] Content-Type: text/html; charset=utf-8
  269. [i] Server: Microsoft-IIS/8.5
  270. [i] X-AspNetMvc-Version: 4.0
  271. [i] X-AspNet-Version: 4.0.30319
  272. [i] Date: Thu, 31 Jan 2019 22:55:36 GMT
  273. [i] Connection: close
  274. [i] Content-Length: 90473
  275.  
  276.  
  277.  
  278.  
  279. D N S L O O K U P
  280. =======================================================================================================================================
  281.  
  282. islahhaber.net. 1799 IN A 45.32.187.95
  283. islahhaber.net. 3599 IN NS pdns07.domaincontrol.com.
  284. islahhaber.net. 3599 IN NS pdns08.domaincontrol.com.
  285. islahhaber.net. 599 IN SOA pdns07.domaincontrol.com. dns.jomax.net. 2017102701 28800 7200 604800 600
  286. islahhaber.net. 3599 IN MX 10 mailstore1.secureserver.net.
  287. islahhaber.net. 3599 IN MX 0 smtp.secureserver.net.
  288.  
  289.  
  290.  
  291.  
  292. S U B N E T C A L C U L A T I O N
  293. =======================================================================================================================================
  294.  
  295. Address = 45.32.187.95
  296. Network = 45.32.187.95 / 32
  297. Netmask = 255.255.255.255
  298. Broadcast = not needed on Point-to-Point links
  299. Wildcard Mask = 0.0.0.0
  300. Hosts Bits = 0
  301. Max. Hosts = 1 (2^0 - 0)
  302. Host Range = { 45.32.187.95 - 45.32.187.95 }
  303.  
  304.  
  305.  
  306. N M A P P O R T S C A N
  307. =======================================================================================================================================
  308.  
  309.  
  310. Starting Nmap 7.40 ( https://nmap.org ) at 2019-01-31 22:55 UTC
  311. Nmap scan report for islahhaber.net (45.32.187.95)
  312. Host is up (0.084s latency).
  313. rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
  314. PORT STATE SERVICE
  315. 21/tcp open ftp
  316. 22/tcp filtered ssh
  317. 23/tcp filtered telnet
  318. 80/tcp open http
  319. 110/tcp filtered pop3
  320. 143/tcp filtered imap
  321. 443/tcp open https
  322. 3389/tcp open ms-wbt-server
  323.  
  324. Nmap done: 1 IP address (1 host up) scanned in 1.72 seconds
  325. #######################################################################################################################################
  326. [?] Enter the target: example( http://domain.com )
  327. https://www.islahhaber.net/
  328. [!] IP Address : 45.32.187.95
  329. [+] Operating System : Windows
  330. [!] www.islahhaber.net doesn't seem to use a CMS
  331. [+] Honeypot Probabilty: 30%
  332. ---------------------------------------------------------------------------------------------------------------------------------------
  333. [~] Trying to gather whois information for www.islahhaber.net
  334. [+] Whois information found
  335. [-] Unable to build response, visit https://who.is/whois/www.islahhaber.net
  336. ---------------------------------------------------------------------------------------------------------------------------------------
  337. PORT STATE SERVICE
  338. 21/tcp open ftp
  339. 22/tcp filtered ssh
  340. 23/tcp filtered telnet
  341. 80/tcp open http
  342. 110/tcp filtered pop3
  343. 143/tcp filtered imap
  344. 443/tcp open https
  345. 3389/tcp open ms-wbt-server
  346. Nmap done: 1 IP address (1 host up) scanned in 1.64 seconds
  347. ---------------------------------------------------------------------------------------------------------------------------------------
  348.  
  349. [+] DNS Records
  350. pdns08.domaincontrol.com. (173.201.79.53) AS26496 GoDaddy.com, LLC United States
  351. pdns07.domaincontrol.com. (97.74.111.53) AS26496 GoDaddy.com, LLC United States
  352.  
  353. [+] MX Records
  354. 10 (68.178.213.244) AS26496 GoDaddy.com, LLC United States
  355.  
  356. [+] MX Records
  357. 0 (68.178.213.203) AS26496 GoDaddy.com, LLC United States
  358.  
  359. [+] Host Records (A)
  360. www.islahhaber.netHTTP: (45.32.187.95.vultr.com) (45.32.187.954) AS20473 Choopa, LLC Netherlands
  361.  
  362. [+] TXT Records
  363.  
  364. [+] DNS Map: https://dnsdumpster.com/static/map/islahhaber.net.png
  365.  
  366. [>] Initiating 3 intel modules
  367. [>] Loading Alpha module (1/3)
  368. [>] Beta module deployed (2/3)
  369. [>] Gamma module initiated (3/3)
  370.  
  371.  
  372. [+] Emails found:
  373. ---------------------------------------------------------------------------------------------------------------------------------------
  374.  
  375. [+] Hosts found in search engines:
  376. ---------------------------------------------------------------------------------------------------------------------------------------
  377. [-] Resolving hostnames IPs...
  378. [+] Virtual hosts:
  379. ---------------------------------------------------------------------------------------------------------------------------------------
  380. #######################################################################################################################################
  381. =======================================================================================================================================
  382. | External hosts:
  383. | [+] External Host Found: https://pbs.twimg.com
  384. | [+] External Host Found: https://cdn.ampproject.org
  385. | [+] External Host Found: http://img3.mynet.com
  386. | [+] External Host Found: http://tuik.gov.tr
  387. | [+] External Host Found: http://www.turizmgazetesi.com
  388. | [+] External Host Found: http://www.rfa.org
  389. | [+] External Host Found: https://questraworld.es
  390. | [+] External Host Found: https://www.fbm.com.tr
  391. | [+] External Host Found: https://dod.defense.gov
  392. | [+] External Host Found: https://scontent-ams.xx.fbcdn.net
  393. | [+] External Host Found: http://cdn.yeniakit.com.tr
  394. | [+] External Host Found: http://www.haber10.com
  395. | [+] External Host Found: http://bit.ly
  396. | [+] External Host Found: http://www.derindusunce.org
  397. | [+] External Host Found: http://www.maripak.com
  398. | [+] External Host Found: https://ia801504.us.archive.org
  399. | [+] External Host Found: https://www.timeturk.com
  400. | [+] External Host Found: http://constitutions.ru
  401. | [+] External Host Found: http://www.alemarahvideo.com
  402. | [+] External Host Found: http://www.suriyedebayramlasma.com
  403. | [+] External Host Found: https://fbcdn-sphotos-e-a.akamaihd.net
  404. | [+] External Host Found: https://t.co
  405. | [+] External Host Found: http://s9.postimg.org
  406. | [+] External Host Found: http://www.incanews.com
  407. | [+] External Host Found: http://img.haberler.com
  408. | [+] External Host Found: https://s03.justpaste.it
  409. | [+] External Host Found: http://www.milligazete.com.tr
  410. | [+] External Host Found: https://www.hrw.org
  411. | [+] External Host Found: http://www.centcom.mil
  412. | [+] External Host Found: http://www.avax.com.tr
  413. | [+] External Host Found: http://i.sabah.com.tr
  414. | [+] External Host Found: http://cdn1.cnnturk.com
  415. | [+] External Host Found: http://www.kahvekitap.com
  416. | [+] External Host Found: http://www.milliyet.com.tr
  417. | [+] External Host Found: https://www.youtube.com
  418. | [+] External Host Found: http://www.sahimerdansari.com
  419. | [+] External Host Found: http://www.turnike.com.tr
  420. | [+] External Host Found: https://uyghuristaninfo.files.wordpress.com
  421. | [+] External Host Found: http://www.dailymail.co.uk
  422. | [+] External Host Found: https://fbcdn-sphotos-h-a.akamaihd.net
  423. | [+] External Host Found: https://s04.justpaste.it
  424. | [+] External Host Found: https://twitter.com
  425. | [+] External Host Found: http://asal.msb.gov.tr
  426. | [+] External Host Found: http://image.yenisafak.com
  427. | [+] External Host Found: https://www.ubeybi.com
  428. | [+] External Host Found: https://s01.justpaste.it
  429. | [+] External Host Found: http://www.ddizi1.com
  430. | [+] External Host Found: http://i.hizliresim.com
  431. | [+] External Host Found: http://cdn.yenisafak.net
  432. | [+] External Host Found: https://encrypted-tbn0.gstatic.com
  433. | [+] External Host Found: http://image.cdn.haber7.com
  434. | [+] External Host Found: https://cocuk.tbmm.gov.tr
  435. | [+] External Host Found: http://islahhaber.net
  436. | [+] External Host Found: https://scontent-ams3-1.xx.fbcdn.net
  437. | [+] External Host Found: https://scontent-cdg2-1.xx.fbcdn.net
  438. | [+] External Host Found: https://cdnjs.cloudflare.com
  439. | [+] External Host Found: https://cdn.yeniakit.com.tr
  440. | [+] External Host Found: http://www.rohingya.org.tr
  441. | [+] External Host Found: http://www.rna-press.com
  442. | [+] External Host Found: http://www.aydinlikgazete.com
  443. | [+] External Host Found: http://www.timeturk.com
  444. | [+] External Host Found: http://im.haberturk.com
  445. | [+] External Host Found: http://cdn.ar.com
  446. | [+] External Host Found: https://www.modalarda.com
  447. | [+] External Host Found: http://appsaljazeera.com
  448. | [+] External Host Found: http://siyasetkulubu.blogspot.com.tr
  449. | [+] External Host Found: http://i.hurimg.com
  450. | [+] External Host Found: https://play.google.com
  451. | [+] External Host Found: http://www.damladanismanlik.com
  452. | [+] External Host Found: https://tr.euronews.com
  453. | [+] External Host Found: http://www.pressmedya.com
  454. | [+] External Host Found: https://www.dw.com
  455. | [+] External Host Found: http://www.f5haber.com
  456. | [+] External Host Found: https://fbcdn-sphotos-f-a.akamaihd.net
  457. | [+] External Host Found: http://xslt.alexa.com
  458. | [+] External Host Found: https://www.facebook.com
  459. | [+] External Host Found: https://scontent-amt2-1.xx.fbcdn.net
  460. | [+] External Host Found: https://itunes.apple.com
  461. | [+] External Host Found: http://www.medyatimes.com
  462. | [+] External Host Found: https://scontent-frt3-1.xx.fbcdn.net
  463. | [+] External Host Found: http://tuketici.gtb.gov.tr
  464. | [+] External Host Found: http://www.turnikesistemi.com.tr
  465. | [+] External Host Found: http://2.bp.blogspot.com
  466. | [+] External Host Found: http://www.engelligecisturnikesi.com
  467. | [+] External Host Found: http://ajanskafkas.com
  468. | [+] External Host Found: https://fbcdn-sphotos-c-a.akamaihd.net
  469. | [+] External Host Found: https://www.dunyabulteni.net
  470. | [+] External Host Found: http://tupbebek1.com
  471. | [+] External Host Found: http://www.turkishny.com
  472. | [+] External Host Found: http://www.youtube.com
  473. | [+] External Host Found: https://scontent-lhr3-1.xx.fbcdn.net
  474. =======================================================================================================================================
  475. | E-mails:
  476. | [+] E-mail Found: [email protected]
  477. | [+] E-mail Found: [email protected]
  478. | [+] E-mail Found: [email protected]
  479. | [+] E-mail Found: [email protected]
  480. | [+] E-mail Found: [email protected]
  481. | [+] E-mail Found: [email protected]
  482. | [+] E-mail Found: [email protected]
  483. | [+] E-mail Found: [email protected]
  484. | [+] E-mail Found: [email protected]
  485. | [+] E-mail Found: [email protected]
  486. | [+] E-mail Found: [email protected]
  487. | [+] E-mail Found: [email protected]
  488. | [+] E-mail Found: [email protected]
  489. | [+] E-mail Found: [email protected]
  490. | [+] E-mail Found: [email protected]
  491. | [+] E-mail Found: [email protected]
  492. | [+] E-mail Found: [email protected]
  493. | [+] E-mail Found: [email protected]
  494. | [+] E-mail Found: [email protected]
  495. | [+] E-mail Found: [email protected]
  496. | [+] E-mail Found: [email protected]
  497. | [+] E-mail Found: [email protected]
  498. | [+] E-mail Found: [email protected]
  499. | [+] E-mail Found: [email protected]
  500. | [+] E-mail Found: [email protected]
  501. | [+] E-mail Found: [email protected]
  502. | [+] E-mail Found: [email protected]
  503. | [+] E-mail Found: [email protected]
  504. | [+] E-mail Found: [email protected]
  505. | [+] E-mail Found: [email protected]
  506. | [+] E-mail Found: [email protected]
  507. =======================================================================================================================================
  508. #######################################################################################################################################
  509. ; <<>> DiG 9.11.5-P1-1-Debian <<>> islahhaber.net
  510. ;; global options: +cmd
  511. ;; Got answer:
  512. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15260
  513. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  514.  
  515. ;; OPT PSEUDOSECTION:
  516. ; EDNS: version: 0, flags:; udp: 4096
  517. ;; QUESTION SECTION:
  518. ;islahhaber.net. IN A
  519.  
  520. ;; ANSWER SECTION:
  521. islahhaber.net. 511 IN A 45.32.187.95
  522.  
  523. ;; Query time: 35 msec
  524. ;; SERVER: 38.132.106.139#53(38.132.106.139)
  525. ;; WHEN: jeu jan 31 18:41:16 EST 2019
  526. ;; MSG SIZE rcvd: 59
  527. #######################################################################################################################################
  528. ; <<>> DiG 9.11.5-P1-1-Debian <<>> +trace islahhaber.net
  529. ;; global options: +cmd
  530. . 85080 IN NS g.root-servers.net.
  531. . 85080 IN NS i.root-servers.net.
  532. . 85080 IN NS a.root-servers.net.
  533. . 85080 IN NS h.root-servers.net.
  534. . 85080 IN NS j.root-servers.net.
  535. . 85080 IN NS f.root-servers.net.
  536. . 85080 IN NS m.root-servers.net.
  537. . 85080 IN NS b.root-servers.net.
  538. . 85080 IN NS e.root-servers.net.
  539. . 85080 IN NS l.root-servers.net.
  540. . 85080 IN NS k.root-servers.net.
  541. . 85080 IN NS c.root-servers.net.
  542. . 85080 IN NS d.root-servers.net.
  543. . 85080 IN RRSIG NS 8 0 518400 20190213170000 20190131160000 16749 . QWsKOKRZvf2yfhwJXwpsDpj27UIdPnNupSNH5zq7bdHb8RGEUGDC2db7 YIRhVH9RfLnaRqLdCeSdlP7zOZaLQ7Qrx99u9ePlJBhjFp9drTJOpDFh Z0T8/EouIpLWV3gL68/wlMYrlvC4H3bv+VibhWCXQs8UNRYHXb9A28ZL YyFtD0CMHmQK3nvDHr8QhFu8MuurkPatMaloEHY/fFIKNu8+Bl9rhLNI FgYeAj/pItqw2emrvxOVDoZKAZlJTBqRKoOnRT33zXitVaWW65ZZp1hX oL0IeVU2fRAN67cmHLYTUGCfgzhdPOizMYlwFQ210ftJQJs6D38e9xqH ckMysQ==
  544. ;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 36 ms
  545.  
  546. net. 172800 IN NS l.gtld-servers.net.
  547. net. 172800 IN NS b.gtld-servers.net.
  548. net. 172800 IN NS c.gtld-servers.net.
  549. net. 172800 IN NS d.gtld-servers.net.
  550. net. 172800 IN NS e.gtld-servers.net.
  551. net. 172800 IN NS f.gtld-servers.net.
  552. net. 172800 IN NS g.gtld-servers.net.
  553. net. 172800 IN NS a.gtld-servers.net.
  554. net. 172800 IN NS h.gtld-servers.net.
  555. net. 172800 IN NS i.gtld-servers.net.
  556. net. 172800 IN NS j.gtld-servers.net.
  557. net. 172800 IN NS k.gtld-servers.net.
  558. net. 172800 IN NS m.gtld-servers.net.
  559. net. 86400 IN DS 35886 8 2 7862B27F5F516EBE19680444D4CE5E762981931842C465F00236401D 8BD973EE
  560. net. 86400 IN RRSIG DS 8 1 86400 20190213170000 20190131160000 16749 . egovExQlbWVYH5EfDhzTDJbaObSKqL7HZoK2N1tCECKVsS4tA4qid5JY cib+npUVoD00/rDvY9nmdE9Mwu90Yjcn/3I6YY2jCrqD68uCLqRgDDC3 DSEgLQh3IuMMceQbnN5oVEs3q2Z7e/92WNUFaT6r8Cysq96HaVZO/G51 PLYoKyQjEZ+Wk82sj03y1CqdEHtIZu1XEiTDNlGfOV4r/4KHWr7ym41b miRIsUpTqvHygJTMN2f0fAIzbu7r4KgsFGnw8UhMdXpy4BaCFwerGOui FHKE7YtX8v4z2LwHx4mZxX0ckgetpHhz8a5vODzNzAxsCY/fNenjUHku iGeelQ==
  561. ;; Received 1171 bytes from 192.5.5.241#53(f.root-servers.net) in 22 ms
  562.  
  563. islahhaber.net. 172800 IN NS pdns07.domaincontrol.com.
  564. islahhaber.net. 172800 IN NS pdns08.domaincontrol.com.
  565. A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 86400 IN NSEC3 1 1 0 - A1RUUFFJKCT2Q54P78F8EJGJ8JBK7I8B NS SOA RRSIG DNSKEY NSEC3PARAM
  566. A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 86400 IN RRSIG NSEC3 8 2 86400 20190204063546 20190128052546 51638 net. PjGXbob7PjgLCtvp5sALlA4p72/D6vG7Bt70/uXnhax1aHe09GSMo8qU wiNBlt6AA1bl1k63VxAczTpL866lBvs5/gHtlOiyQ/egNhGHK3W9gjxL Bnpr6vODCkndFjfEd1afNjM8bi6MtD8R+n7Nz6ebk6lUsCMTYByxfXb8 JhE=
  567. 8H8NQ4G8UEM4UBJAGMFUF1NV9OKBTNVL.net. 86400 IN NSEC3 1 1 0 - 8H9DILVHJGV3N4V433CSSEB2J0VH351O NS DS RRSIG
  568. 8H8NQ4G8UEM4UBJAGMFUF1NV9OKBTNVL.net. 86400 IN RRSIG NSEC3 8 2 86400 20190204062722 20190128051722 51638 net. DJVylXjU/sGfibUIcjRKZkqE9TVhU/hE4jDscT3u9A7Sa+5pAojXWh0S VmYTAb7LC1FgZFQY5yfFZVsb6/b09+75w0wVQaKcqQnZPpR2JaqfxM0c 1UAbdtHLRkdCDEIWJaMZrieMsCK3C8E8nZF/gMvwD4c5zuILu5v88rTX kX0=
  569. ;; Received 675 bytes from 2001:503:39c1::30#53(i.gtld-servers.net) in 85 ms
  570.  
  571. islahhaber.net. 1800 IN A 45.32.187.95
  572. islahhaber.net. 3600 IN NS pdns07.domaincontrol.com.
  573. islahhaber.net. 3600 IN NS pdns08.domaincontrol.com.
  574. ;; Received 118 bytes from 97.74.111.53#53(pdns07.domaincontrol.com) in 30 ms
  575. #######################################################################################################################################
  576. Saut Nom d'hôte Adresse IP Temps 1
  577. 1 10.246.200.1 10.246.200.1 23.711
  578. 1 10.246.200.1 10.246.200.1 23.014
  579. 2 vlan102.as02.qc1.ca.m247.com 176.113.74.17 23.672
  580. 3 37.120.128.168 37.120.128.168 38.362
  581. 4 te-1-5-2-0.bb1.fra2.de.m247.com 82.102.29.44 23.184
  582. 5 motl-b1-link.telia.net 62.115.162.41 23.113
  583. 6 nyk-bb3-link.telia.net 62.115.137.142 107.178
  584. 7 ldn-bb4-link.telia.net 62.115.112.245 110.269
  585. 8 adm-bb4-link.telia.net 62.115.134.26 111.348
  586. #######################################################################################################################################
  587. Port État Service
  588. 21/tcp open ftp
  589. 25/tcp closed smtp
  590. 53/tcp open domain
  591. 80/tcp open http
  592. 88/tcp open kerberos-sec
  593. 135/tcp open msrpc
  594. 139/tcp closed netbios-ssn
  595. 389/tcp open ldap
  596. 443/tcp open https
  597. 445/tcp closed microsoft-ds
  598. 464/tcp open kpasswd5
  599. 515/tcp open printer
  600. 593/tcp open http-rpc-epmap
  601. 636/tcp open ldapssl
  602. 3268/tcp open globalcatLDAP
  603. 3269/tcp open globalcatLDAPssl
  604. 3389/tcp open ms-wbt-server
  605. 9415/tcp open unknown
  606. 9418/tcp open git
  607. 9595/tcp open pds
  608. 49154/tcp open unknown
  609. 49155/tcp open unknown
  610. 49157/tcp open unknown
  611. 49158/tcp open unknown
  612. 49163/tcp open unknown
  613. #######################################################################################################################################
  614. [*] Performing General Enumeration of Domain: islahhaber.net
  615. [-] DNSSEC is not configured for islahhaber.net
  616. [*] SOA pdns07.domaincontrol.com 97.74.111.53
  617. [*] NS pdns07.domaincontrol.com 97.74.111.53
  618. [*] NS pdns07.domaincontrol.com 2603:5:21f1::35
  619. [*] NS pdns08.domaincontrol.com 173.201.79.53
  620. [*] NS pdns08.domaincontrol.com 2603:5:22f1::35
  621. [*] MX smtp.secureserver.net 68.178.213.203
  622. [*] MX smtp.secureserver.net 68.178.213.37
  623. [*] MX smtp.secureserver.net 72.167.238.29
  624. [*] MX mailstore1.secureserver.net 68.178.213.244
  625. [*] MX mailstore1.secureserver.net 72.167.238.32
  626. [*] MX mailstore1.secureserver.net 68.178.213.243
  627. [*] A islahhaber.net 45.32.187.95
  628. [*] Enumerating SRV Records
  629. [*] SRV _autodiscover._tcp.islahhaber.net autodiscover.int.secureserver.net 172.19.66.223 443 0
  630. [+] 1 Records Found
  631. #######################################################################################################################################
  632. [+] Testing domain
  633. www.islahhaber.net 45.32.187.95
  634. [+] Dns resolving
  635. Domain name Ip address Name server
  636. islahhaber.net 45.32.187.95 45.32.187.95.vultr.com
  637. Found 1 host(s) for islahhaber.net
  638. [+] Testing wildcard
  639. Ok, no wildcard found.
  640.  
  641. [+] Scanning for subdomain on islahhaber.net
  642. [!] Wordlist not specified. I scannig with my internal wordlist...
  643. Estimated time about 16.65 seconds
  644.  
  645. Subdomain Ip address Name server
  646.  
  647. email.islahhaber.net 45.40.140.6 p3plgemwbe27-v05.prod.phx3.secureserver.net
  648. ftp.islahhaber.net 45.32.187.95 45.32.187.95.vultr.com
  649. imap.islahhaber.net 68.178.252.117 p3plprx11-v01.prod.phx3.secureserver.net
  650. pop.islahhaber.net 173.201.192.158 p3plprx07-v01.prod.phx3.secureserver.net
  651. smtp.islahhaber.net 72.167.238.29 p3plibsmtp01-v01.prod.phx3.secureserver.net
  652. www.islahhaber.net 45.32.187.95 45.32.187.95.vultr.com
  653. #######################################################################################################################################
  654. [*] Processing domain islahhaber.net
  655. [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
  656. [+] Getting nameservers
  657. 173.201.79.53 - pdns08.domaincontrol.com
  658. 97.74.111.53 - pdns07.domaincontrol.com
  659. [-] Zone transfer failed
  660.  
  661. [+] MX records found, added to target list
  662. 0 smtp.secureserver.net.
  663. 10 mailstore1.secureserver.net.
  664.  
  665. [*] Scanning islahhaber.net for A records
  666. 45.32.187.95 - islahhaber.net
  667. 173.201.192.148 - email.islahhaber.net
  668. 97.74.135.133 - email.islahhaber.net
  669. 45.40.130.40 - email.islahhaber.net
  670. 173.201.193.148 - email.islahhaber.net
  671. 97.74.135.55 - email.islahhaber.net
  672. 173.201.192.20 - email.islahhaber.net
  673. 173.201.193.133 - email.islahhaber.net
  674. 173.201.192.133 - email.islahhaber.net
  675. 68.178.252.148 - email.islahhaber.net
  676. 173.201.192.5 - email.islahhaber.net
  677. 97.74.135.148 - email.islahhaber.net
  678. 72.167.218.183 - email.islahhaber.net
  679. 72.167.218.173 - email.islahhaber.net
  680. 72.167.218.55 - email.islahhaber.net
  681. 173.201.193.20 - email.islahhaber.net
  682. 72.167.218.45 - email.islahhaber.net
  683. 173.201.193.5 - email.islahhaber.net
  684. 68.178.252.5 - email.islahhaber.net
  685. 68.178.252.20 - email.islahhaber.net
  686. 45.40.130.41 - email.islahhaber.net
  687. 68.178.252.133 - email.islahhaber.net
  688. 97.74.135.45 - email.islahhaber.net
  689. 45.40.140.6 - email.islahhaber.net
  690. 45.32.187.95 - ftp.islahhaber.net
  691. 97.74.135.10 - imap.islahhaber.net
  692. 173.201.193.129 - imap.islahhaber.net
  693. 97.74.135.143 - imap.islahhaber.net
  694. 173.201.193.97 - imap.islahhaber.net
  695. 72.167.218.138 - imap.islahhaber.net
  696. 173.201.192.129 - imap.islahhaber.net
  697. 173.201.192.158 - imap.islahhaber.net
  698. 68.178.252.117 - imap.islahhaber.net
  699. 97.74.135.143 - pop.islahhaber.net
  700. 173.201.193.97 - pop.islahhaber.net
  701. 72.167.218.138 - pop.islahhaber.net
  702. 68.178.252.117 - pop.islahhaber.net
  703. 97.74.135.10 - pop.islahhaber.net
  704. 173.201.192.158 - pop.islahhaber.net
  705. 173.201.192.129 - pop.islahhaber.net
  706. 173.201.193.129 - pop.islahhaber.net
  707. 68.178.213.37 - smtp.islahhaber.net
  708. 68.178.213.203 - smtp.islahhaber.net
  709. 72.167.238.29 - smtp.islahhaber.net
  710. 45.32.187.95 - www.islahhaber.net
  711. #######################################################################################################################################
  712. Ip Address Status Type Domain Name Server
  713. ---------- ------ ---- ----------- ------
  714. 45.40.140.6 301 alias email.islahhaber.net Apache
  715. 45.40.140.6 301 host email.secureserver.net Apache
  716. 72.167.218.45 301 host email.secureserver.net Apache
  717. 68.178.252.20 301 host email.secureserver.net Apache
  718. 97.74.135.45 301 host email.secureserver.net Apache
  719. 173.201.192.5 301 host email.secureserver.net Apache
  720. 72.167.218.183 301 host email.secureserver.net Apache
  721. 68.178.252.5 301 host email.secureserver.net Apache
  722. 173.201.192.133 301 host email.secureserver.net Apache
  723. 72.167.218.173 301 host email.secureserver.net Apache
  724. 97.74.135.133 301 host email.secureserver.net Apache
  725. 45.40.130.40 301 host email.secureserver.net Apache
  726. 97.74.135.148 301 host email.secureserver.net Apache
  727. 173.201.193.133 301 host email.secureserver.net Apache
  728. 68.178.252.148 301 host email.secureserver.net Apache
  729. 72.167.218.55 301 host email.secureserver.net Apache
  730. 97.74.135.55 301 host email.secureserver.net Apache
  731. 68.178.252.133 301 host email.secureserver.net Apache
  732. 173.201.193.20 301 host email.secureserver.net Apache
  733. 173.201.193.148 301 host email.secureserver.net Apache
  734. 173.201.193.5 301 host email.secureserver.net Apache
  735. 45.40.130.41 301 host email.secureserver.net Apache
  736. 173.201.192.20 301 host email.secureserver.net Apache
  737. 173.201.192.148 301 host email.secureserver.net Apache
  738. 45.32.187.95 404 alias ftp.islahhaber.net Microsoft-IIS/8.5
  739. 45.32.187.95 404 host islahhaber.net Microsoft-IIS/8.5
  740. 173.201.192.129 alias imap.islahhaber.net
  741. 173.201.192.129 host imap.secureserver.net
  742. 97.74.135.143 host imap.secureserver.net
  743. 72.167.218.138 host imap.secureserver.net
  744. 173.201.192.158 host imap.secureserver.net
  745. 173.201.193.97 host imap.secureserver.net
  746. 173.201.193.129 host imap.secureserver.net
  747. 68.178.252.117 host imap.secureserver.net
  748. 97.74.135.10 host imap.secureserver.net
  749. 173.201.193.129 alias pop.islahhaber.net
  750. 173.201.193.129 host pop.secureserver.net
  751. 72.167.218.138 host pop.secureserver.net
  752. 97.74.135.10 host pop.secureserver.net
  753. 97.74.135.143 host pop.secureserver.net
  754. 173.201.193.97 host pop.secureserver.net
  755. 173.201.192.129 host pop.secureserver.net
  756. 68.178.252.117 host pop.secureserver.net
  757. 173.201.192.158 host pop.secureserver.net
  758. 68.178.213.37 alias smtp.islahhaber.net
  759. 68.178.213.37 host smtp.secureserver.net
  760. 68.178.213.203 host smtp.secureserver.net
  761. 72.167.238.29 host smtp.secureserver.net
  762. 45.32.187.95 404 alias www.islahhaber.net Microsoft-IIS/8.5
  763. 45.32.187.95 404 host islahhaber.net Microsoft-IIS/8.5
  764. #######################################################################################################################################
  765. dnsenum VERSION:1.2.4
  766.  
  767. ----- www.islahhaber.net -----
  768.  
  769.  
  770. Host's addresses:
  771. __________________
  772.  
  773. islahhaber.net. 1214 IN A 45.32.187.95
  774.  
  775.  
  776. Name Servers:
  777. ______________
  778.  
  779. pdns08.domaincontrol.com. 86341 IN A 173.201.79.53
  780. pdns07.domaincontrol.com. 83281 IN A 97.74.111.53
  781.  
  782.  
  783. Mail (MX) Servers:
  784. ___________________
  785.  
  786. mailstore1.secureserver.net. 60 IN A 68.178.213.243
  787. mailstore1.secureserver.net. 60 IN A 72.167.238.32
  788. mailstore1.secureserver.net. 60 IN A 68.178.213.244
  789. smtp.secureserver.net. 60 IN A 68.178.213.203
  790. smtp.secureserver.net. 60 IN A 72.167.238.29
  791. smtp.secureserver.net. 60 IN A 68.178.213.37
  792.  
  793.  
  794. Trying Zone Transfers and getting Bind Versions:
  795. _________________________________________________
  796.  
  797.  
  798. Trying Zone Transfer for www.islahhaber.net on pdns08.domaincontrol.com ...
  799.  
  800. Trying Zone Transfer for www.islahhaber.net on pdns07.domaincontrol.com ...
  801.  
  802. brute force file not specified, bay.
  803. #######################################################################################################################################
  804.  
  805.  
  806. Running Source: Ask
  807. Running Source: Archive.is
  808. Running Source: Baidu
  809. Running Source: Bing
  810. Running Source: CertDB
  811. Running Source: CertificateTransparency
  812. Running Source: Certspotter
  813. Running Source: Commoncrawl
  814. Running Source: Crt.sh
  815. Running Source: Dnsdb
  816. Running Source: DNSDumpster
  817. Running Source: DNSTable
  818. Running Source: Dogpile
  819. Running Source: Exalead
  820. Running Source: Findsubdomains
  821. Running Source: Googleter
  822. Running Source: Hackertarget
  823. Running Source: Ipv4Info
  824. Running Source: PTRArchive
  825. Running Source: Sitedossier
  826. Running Source: Threatcrowd
  827. Running Source: ThreatMiner
  828. Running Source: WaybackArchive
  829. Running Source: Yahoo
  830.  
  831. Running enumeration on www.islahhaber.net
  832.  
  833. dnsdb: Unexpected return status 503
  834.  
  835. crtsh: json: cannot unmarshal array into Go value of type crtsh.crtshObject
  836.  
  837. waybackarchive: Get http://web.archive.org/cdx/search/cdx?url=*.www.islahhaber.net/*&output=json&fl=original&collapse=urlkey&page=
  838. : net/http: HTTP/1.x transport connection broken: malformed HTTP response "<html>"
  839.  
  840.  
  841. Starting Bruteforcing of www.islahhaber.net with 9985 words
  842.  
  843. Total 1 Unique subdomains found for www.islahhaber.net
  844.  
  845. .www.islahhaber.net
  846. #######################################################################################################################################
  847. [+] www.islahhaber.net has no SPF record!
  848. [*] No DMARC record found. Looking for organizational record
  849. [+] No organizational DMARC record
  850. [+] Spoofing possible for www.islahhaber.net!
  851. ######################################################################################################################################
  852. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:59 EST
  853. Nmap scan report for www.islahhaber.net (45.32.187.95)
  854. Host is up (0.088s latency).
  855. rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
  856. Not shown: 463 filtered ports, 3 closed ports
  857. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  858. PORT STATE SERVICE
  859. 21/tcp open ftp
  860. 53/tcp open domain
  861. 80/tcp open http
  862. 88/tcp open kerberos-sec
  863. 135/tcp open msrpc
  864. 389/tcp open ldap
  865. 443/tcp open https
  866. 515/tcp open printer
  867. 3389/tcp open ms-wbt-server
  868. 5985/tcp open wsman
  869. #######################################################################################################################################
  870. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:59 EST
  871. Nmap scan report for www.islahhaber.net (45.32.187.95)
  872. Host is up (0.043s latency).
  873. rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
  874. Not shown: 2 filtered ports
  875. PORT STATE SERVICE
  876. 53/udp open domain
  877. 67/udp open|filtered dhcps
  878. 68/udp open|filtered dhcpc
  879. 69/udp open|filtered tftp
  880. 88/udp open|filtered kerberos-sec
  881. 123/udp open ntp
  882. 139/udp open|filtered netbios-ssn
  883. 161/udp open|filtered snmp
  884. 162/udp open|filtered snmptrap
  885. 389/udp open|filtered ldap
  886. 520/udp open|filtered route
  887. 2049/udp open|filtered nfs
  888. #######################################################################################################################################
  889. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:59 EST
  890. Nmap scan report for www.islahhaber.net (45.32.187.95)
  891. Host is up (0.11s latency).
  892. rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
  893.  
  894. PORT STATE SERVICE VERSION
  895. 21/tcp open tcpwrapped
  896. | ftp-brute:
  897. | Accounts: No valid accounts found
  898. |_ Statistics: Performed 5500 guesses in 360 seconds, average tps: 15.0
  899. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  900. Device type: general purpose
  901. Running (JUST GUESSING): Microsoft Windows 2012 (88%)
  902. OS CPE: cpe:/o:microsoft:windows_server_2012:r2
  903. Aggressive OS guesses: Microsoft Windows Server 2012 or Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 (86%)
  904. No exact OS matches for host (test conditions non-ideal).
  905. Network Distance: 10 hops
  906.  
  907. TRACEROUTE (using port 21/tcp)
  908. HOP RTT ADDRESS
  909. 1 25.19 ms 10.246.200.1
  910. 2 25.22 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  911. 3 29.96 ms 37.120.128.168
  912. 4 25.23 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  913. 5 25.24 ms 62.115.162.41
  914. 6 ...
  915. 7 139.39 ms ldn-bb4-link.telia.net (62.115.136.184)
  916. 8 135.09 ms adm-bb4-link.telia.net (62.115.134.26)
  917. 9 ...
  918. 10 109.27 ms 45.32.187.95.vultr.com (45.32.187.95)
  919. #######################################################################################################################################
  920. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:07 EST
  921. Nmap scan report for www.islahhaber.net (45.32.187.95)
  922. Host is up (0.11s latency).
  923. rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
  924.  
  925. PORT STATE SERVICE VERSION
  926. 53/tcp open domain?
  927. |_dns-fuzz: Server didn't response to our probe, can't fuzz
  928. | dns-nsec-enum:
  929. |_ No NSEC records found
  930. | dns-nsec3-enum:
  931. |_ DNSSEC NSEC3 not supported
  932. | fingerprint-strings:
  933. | DNSVersionBindReqTCP:
  934. | version
  935. |_ bind
  936. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  937. SF-Port53-TCP:V=7.70%I=7%D=1/31%Time=5C537FB3%P=x86_64-pc-linux-gnu%r(DNSV
  938. SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
  939. SF:x04bind\0\0\x10\0\x03");
  940. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  941. Device type: general purpose
  942. Running (JUST GUESSING): Microsoft Windows 2012 (88%)
  943. OS CPE: cpe:/o:microsoft:windows_server_2012:r2
  944. Aggressive OS guesses: Microsoft Windows Server 2012 or Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 (86%)
  945. No exact OS matches for host (test conditions non-ideal).
  946. Network Distance: 10 hops
  947.  
  948. Host script results:
  949. | dns-brute:
  950. | DNS Brute-force hostnames:
  951. | www.islahhaber.net - 45.32.187.95
  952. | ftp.islahhaber.net - 45.32.187.95
  953. | smtp.islahhaber.net - 68.178.213.203
  954. | smtp.islahhaber.net - 68.178.213.37
  955. |_ smtp.islahhaber.net - 72.167.238.29
  956.  
  957. TRACEROUTE (using port 53/tcp)
  958. HOP RTT ADDRESS
  959. 1 28.13 ms 10.246.200.1
  960. 2 28.69 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  961. 3 37.15 ms 37.120.128.168
  962. 4 28.70 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  963. 5 28.68 ms 62.115.162.41
  964. 6 111.55 ms nyk-bb4-link.telia.net (62.115.134.52)
  965. 7 111.15 ms ldn-bb4-link.telia.net (62.115.136.184)
  966. 8 113.02 ms adm-bb4-link.telia.net (62.115.134.26)
  967. 9 ...
  968. 10 110.24 ms 45.32.187.95.vultr.com (45.32.187.95)
  969.  
  970. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  971. Nmap done: 1 IP address (1 host up) scanned in 174.67 seconds
  972. + -- --=[Port 67 closed... skipping.
  973. + -- --=[Port 68 closed... skipping.
  974. + -- --=[Port 69 closed... skipping.
  975. + -- --=[Port 79 closed... skipping.
  976. + -- --=[Port 80 opened... running tests...
  977. ######################################################################################################################################
  978.  
  979. ^ ^
  980. _ __ _ ____ _ __ _ _ ____
  981. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  982. | V V // o // _/ | V V // 0 // 0 // _/
  983. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  984. <
  985. ...'
  986.  
  987. WAFW00F - Web Application Firewall Detection Tool
  988.  
  989. By Sandro Gauci && Wendel G. Henrique
  990.  
  991. Checking http://www.islahhaber.net
  992. Generic Detection results:
  993. The site http://www.islahhaber.net seems to be behind a WAF or some sort of security solution
  994. Reason: The server header is different when an attack is detected.
  995. The server header for a normal response is "Microsoft-IIS/8.5", while the server header a response to an attack is "Microsoft-HTTPAPI/2.0.",
  996. Number of requests: 14
  997. #######################################################################################################################################
  998. http://www.islahhaber.net [301 Moved Permanently] Country[RESERVED][ZZ], HTTPServer[Microsoft-IIS/8.5], IP[45.32.187.95], Microsoft-IIS[8.5], RedirectLocation[https://www.islahhaber.net/], Title[Document Moved]
  999. https://www.islahhaber.net/ [200 OK] ASP_NET[4.0.30319][MVC4.0], Country[RESERVED][ZZ], Frame, Google-Analytics[Universal][UA-35363848-1,UA-4313077-25], HTTPServer[Microsoft-IIS/8.5], IP[45.32.187.95], JQuery[1.7.1], Microsoft-IIS[8.5], PasswordField[Sifre], Script[application/json,text/javascript], Title[ISLAH HABER | Haber var islah eder, haber var ifsad eder], UncommonHeaders[x-aspnetmvc-version]
  1000. #######################################################################################################################################
  1001. wig - WebApp Information Gatherer
  1002.  
  1003.  
  1004. Scanning https://www.islahhaber.net...
  1005. _____________________________ SITE INFO _____________________________
  1006. IP Title
  1007. 45.32.187.95 ISLAH HABER | Haber var islah eder, haber
  1008.  
  1009. ______________________________ VERSION ______________________________
  1010. Name Versions Type
  1011. ASP.NET 4.7.2558.0 Platform
  1012. IIS 8.5 Platform
  1013. Microsoft Windows Server 2012 R2 OS
  1014.  
  1015. ____________________________ INTERESTING ____________________________
  1016. URL Note Type
  1017. /test.htm Test file Interesting
  1018. /_layouts/create.aspx ASP.NET detailed error Interesting
  1019.  
  1020. _______________________ PLATFORM OBSERVATIONS _______________________
  1021. Platform URL Type
  1022. ASP.NET 4.0.30319 / Observation
  1023. ASP.NET 4.7.2558.0 /_layouts/create.aspx Observation
  1024.  
  1025. _____________________________________________________________________
  1026. Time: 47.6 sec Urls: 669 Fingerprints: 40401
  1027. #######################################################################################################################################
  1028. HTTP/1.1 404 Not Found
  1029. Cache-Control: private
  1030. Content-Length: 4806
  1031. Content-Type: text/html; charset=utf-8
  1032. Server: Microsoft-IIS/8.5
  1033. Date: Thu, 31 Jan 2019 23:11:11 GMT
  1034. Connection: close
  1035.  
  1036. HTTP/1.1 404 Not Found
  1037. Cache-Control: private
  1038. Content-Length: 4806
  1039. Content-Type: text/html; charset=utf-8
  1040. Server: Microsoft-IIS/8.5
  1041. Date: Thu, 31 Jan 2019 23:11:12 GMT
  1042. Connection: close
  1043. #######################################################################################################################################
  1044. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:13 EST
  1045. Nmap scan report for www.islahhaber.net (45.32.187.95)
  1046. Host is up (0.11s latency).
  1047. rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
  1048.  
  1049. PORT STATE SERVICE VERSION
  1050. 135/tcp open msrpc Microsoft Windows RPC
  1051. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1052. Device type: general purpose
  1053. Running (JUST GUESSING): Microsoft Windows 2012 (88%)
  1054. OS CPE: cpe:/o:microsoft:windows_server_2012
  1055. Aggressive OS guesses: Microsoft Windows Server 2012 (88%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 R2 (88%)
  1056. No exact OS matches for host (test conditions non-ideal).
  1057. Network Distance: 10 hops
  1058. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1059.  
  1060. TRACEROUTE (using port 443/tcp)
  1061. HOP RTT ADDRESS
  1062. 1 24.43 ms 10.246.200.1
  1063. 2 24.86 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1064. 3 80.02 ms 37.120.128.168
  1065. 4 24.84 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1066. 5 24.87 ms 62.115.162.41
  1067. 6 110.00 ms nyk-bb3-link.telia.net (62.115.137.142)
  1068. 7 107.45 ms ldn-bb4-link.telia.net (62.115.136.184)
  1069. 8 107.27 ms adm-bb4-link.telia.net (62.115.134.26)
  1070. 9 ...
  1071. 10 107.02 ms 45.32.187.95.vultr.com (45.32.187.95)
  1072. ######################################################################################################################################
  1073. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:14 EST
  1074. Nmap scan report for www.islahhaber.net (45.32.187.95)
  1075. Host is up (0.11s latency).
  1076. rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
  1077.  
  1078. PORT STATE SERVICE VERSION
  1079. 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: sube.toygur.com, Site: Default-First-Site-Name)
  1080. | ldap-rootdse:
  1081. | LDAP Results
  1082. | <ROOT>
  1083. | currentTime: 20190131231802.0Z
  1084. | subschemaSubentry: CN=Aggregate,CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
  1085. | dsServiceName: CN=NTDS Settings,CN=WINDOWS-VULTR,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=sube,DC=toygur,DC=com
  1086. | namingContexts: DC=sube,DC=toygur,DC=com
  1087. | namingContexts: CN=Configuration,DC=sube,DC=toygur,DC=com
  1088. | namingContexts: CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
  1089. | namingContexts: DC=DomainDnsZones,DC=sube,DC=toygur,DC=com
  1090. | namingContexts: DC=ForestDnsZones,DC=sube,DC=toygur,DC=com
  1091. | defaultNamingContext: DC=sube,DC=toygur,DC=com
  1092. | schemaNamingContext: CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
  1093. | configurationNamingContext: CN=Configuration,DC=sube,DC=toygur,DC=com
  1094. | rootDomainNamingContext: DC=sube,DC=toygur,DC=com
  1095. | supportedControl: 1.2.840.113556.1.4.319
  1096. | supportedControl: 1.2.840.113556.1.4.801
  1097. | supportedControl: 1.2.840.113556.1.4.473
  1098. | supportedControl: 1.2.840.113556.1.4.528
  1099. | supportedControl: 1.2.840.113556.1.4.417
  1100. | supportedControl: 1.2.840.113556.1.4.619
  1101. | supportedControl: 1.2.840.113556.1.4.841
  1102. | supportedControl: 1.2.840.113556.1.4.529
  1103. | supportedControl: 1.2.840.113556.1.4.805
  1104. | supportedControl: 1.2.840.113556.1.4.521
  1105. | supportedControl: 1.2.840.113556.1.4.970
  1106. | supportedControl: 1.2.840.113556.1.4.1338
  1107. | supportedControl: 1.2.840.113556.1.4.474
  1108. | supportedControl: 1.2.840.113556.1.4.1339
  1109. | supportedControl: 1.2.840.113556.1.4.1340
  1110. | supportedControl: 1.2.840.113556.1.4.1413
  1111. | supportedControl: 2.16.840.1.113730.3.4.9
  1112. | supportedControl: 2.16.840.1.113730.3.4.10
  1113. | supportedControl: 1.2.840.113556.1.4.1504
  1114. | supportedControl: 1.2.840.113556.1.4.1852
  1115. | supportedControl: 1.2.840.113556.1.4.802
  1116. | supportedControl: 1.2.840.113556.1.4.1907
  1117. | supportedControl: 1.2.840.113556.1.4.1948
  1118. | supportedControl: 1.2.840.113556.1.4.1974
  1119. | supportedControl: 1.2.840.113556.1.4.1341
  1120. | supportedControl: 1.2.840.113556.1.4.2026
  1121. | supportedControl: 1.2.840.113556.1.4.2064
  1122. | supportedControl: 1.2.840.113556.1.4.2065
  1123. | supportedControl: 1.2.840.113556.1.4.2066
  1124. | supportedControl: 1.2.840.113556.1.4.2090
  1125. | supportedControl: 1.2.840.113556.1.4.2205
  1126. | supportedControl: 1.2.840.113556.1.4.2204
  1127. | supportedControl: 1.2.840.113556.1.4.2206
  1128. | supportedControl: 1.2.840.113556.1.4.2211
  1129. | supportedControl: 1.2.840.113556.1.4.2239
  1130. | supportedControl: 1.2.840.113556.1.4.2255
  1131. | supportedControl: 1.2.840.113556.1.4.2256
  1132. | supportedLDAPVersion: 3
  1133. | supportedLDAPVersion: 2
  1134. | supportedLDAPPolicies: MaxPoolThreads
  1135. | supportedLDAPPolicies: MaxPercentDirSyncRequests
  1136. | supportedLDAPPolicies: MaxDatagramRecv
  1137. | supportedLDAPPolicies: MaxReceiveBuffer
  1138. | supportedLDAPPolicies: InitRecvTimeout
  1139. | supportedLDAPPolicies: MaxConnections
  1140. | supportedLDAPPolicies: MaxConnIdleTime
  1141. | supportedLDAPPolicies: MaxPageSize
  1142. | supportedLDAPPolicies: MaxBatchReturnMessages
  1143. | supportedLDAPPolicies: MaxQueryDuration
  1144. | supportedLDAPPolicies: MaxTempTableSize
  1145. | supportedLDAPPolicies: MaxResultSetSize
  1146. | supportedLDAPPolicies: MinResultSets
  1147. | supportedLDAPPolicies: MaxResultSetsPerConn
  1148. | supportedLDAPPolicies: MaxNotificationPerConn
  1149. | supportedLDAPPolicies: MaxValRange
  1150. | supportedLDAPPolicies: MaxValRangeTransitive
  1151. | supportedLDAPPolicies: ThreadMemoryLimit
  1152. | supportedLDAPPolicies: SystemMemoryLimitPercent
  1153. | highestCommittedUSN: 12830934
  1154. | supportedSASLMechanisms: GSSAPI
  1155. | supportedSASLMechanisms: GSS-SPNEGO
  1156. | supportedSASLMechanisms: EXTERNAL
  1157. | supportedSASLMechanisms: DIGEST-MD5
  1158. | dnsHostName: windows-vultr.sube.toygur.com
  1159. | ldapServiceName: sube.toygur.com:[email protected]
  1160. | serverName: CN=WINDOWS-VULTR,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=sube,DC=toygur,DC=com
  1161. | supportedCapabilities: 1.2.840.113556.1.4.800
  1162. | supportedCapabilities: 1.2.840.113556.1.4.1670
  1163. | supportedCapabilities: 1.2.840.113556.1.4.1791
  1164. | supportedCapabilities: 1.2.840.113556.1.4.1935
  1165. | supportedCapabilities: 1.2.840.113556.1.4.2080
  1166. | supportedCapabilities: 1.2.840.113556.1.4.2237
  1167. | isSynchronized: TRUE
  1168. | isGlobalCatalogReady: TRUE
  1169. | domainFunctionality: 6
  1170. | forestFunctionality: 6
  1171. |_ domainControllerFunctionality: 6
  1172. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1173. Device type: general purpose
  1174. Running (JUST GUESSING): Microsoft Windows 2012 (88%)
  1175. OS CPE: cpe:/o:microsoft:windows_server_2012
  1176. Aggressive OS guesses: Microsoft Windows Server 2012 (88%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 R2 (88%)
  1177. No exact OS matches for host (test conditions non-ideal).
  1178. Network Distance: 10 hops
  1179. Service Info: Host: WINDOWS-VULTR; OS: Windows 2012 R2; CPE: cpe:/o:microsoft:windows
  1180.  
  1181. TRACEROUTE (using port 389/tcp)
  1182. HOP RTT ADDRESS
  1183. 1 27.92 ms 10.246.200.1
  1184. 2 56.15 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1185. 3 38.58 ms 37.120.128.168
  1186. 4 27.99 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1187. 5 28.01 ms 62.115.162.41
  1188. 6 110.99 ms nyk-bb4-link.telia.net (62.115.134.52)
  1189. 7 106.86 ms ldn-bb4-link.telia.net (62.115.136.184)
  1190. 8 104.16 ms adm-bb4-link.telia.net (62.115.134.26)
  1191. 9 ...
  1192. 10 105.38 ms 45.32.187.95.vultr.com (45.32.187.95)
  1193. #######################################################################################################################################
  1194. https://www.islahhaber.net [200 OK] ASP_NET[4.0.30319][MVC4.0], Country[RESERVED][ZZ], Frame, Google-Analytics[Universal][UA-35363848-1,UA-4313077-25], HTTPServer[Microsoft-IIS/8.5], IP[45.32.187.95], JQuery[1.7.1], Microsoft-IIS[8.5], PasswordField[Sifre], Script[application/json,text/javascript], Title[ISLAH HABER | Haber var islah eder, haber var ifsad eder], UncommonHeaders[x-aspnetmvc-version]
  1195. #######################################################################################################################################
  1196.  
  1197. wig - WebApp Information Gatherer
  1198.  
  1199.  
  1200. Scanning https://www.islahhaber.net...
  1201. _____________________________ SITE INFO _____________________________
  1202. IP Title
  1203. 45.32.187.95 ISLAH HABER | Haber var islah eder, haber
  1204.  
  1205. ______________________________ VERSION ______________________________
  1206. Name Versions Type
  1207. ASP.NET 4.7.2558.0 Platform
  1208. IIS 8.5 Platform
  1209. Microsoft Windows Server 2012 R2 OS
  1210.  
  1211. ____________________________ INTERESTING ____________________________
  1212. URL Note Type
  1213. /test.htm Test file Interesting
  1214. /_layouts/create.aspx ASP.NET detailed error Interesting
  1215.  
  1216. _______________________ PLATFORM OBSERVATIONS _______________________
  1217. Platform URL Type
  1218. ASP.NET 4.0.30319 / Observation
  1219. ASP.NET 4.7.2558.0 /_layouts/create.aspx Observation
  1220.  
  1221. _____________________________________________________________________
  1222. Time: 1.8 sec Urls: 669 Fingerprints: 40401
  1223. #######################################################################################################################################
  1224. HTTP/1.1 404 Not Found
  1225. Cache-Control: private
  1226. Content-Length: 4808
  1227. Content-Type: text/html; charset=utf-8
  1228. Server: Microsoft-IIS/8.5
  1229. Date: Thu, 31 Jan 2019 23:18:19 GMT
  1230. Connection: close
  1231.  
  1232. HTTP/1.1 404 Not Found
  1233. Cache-Control: private
  1234. Content-Length: 4808
  1235. Content-Type: text/html; charset=utf-8
  1236. Server: Microsoft-IIS/8.5
  1237. Date: Thu, 31 Jan 2019 23:18:20 GMT
  1238. Connection: close
  1239. #######################################################################################################################################
  1240. Version: 1.11.12-static
  1241. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  1242.  
  1243. Connected to 45.32.187.95
  1244.  
  1245. Testing SSL server www.islahhaber.net on port 443 using SNI name www.islahhaber.net
  1246.  
  1247. TLS Fallback SCSV:
  1248. Server does not support TLS Fallback SCSV
  1249.  
  1250. TLS renegotiation:
  1251. Secure session renegotiation supported
  1252.  
  1253. TLS Compression:
  1254. Compression disabled
  1255.  
  1256. Heartbleed:
  1257. TLS 1.2 not vulnerable to heartbleed
  1258. TLS 1.1 not vulnerable to heartbleed
  1259. TLS 1.0 not vulnerable to heartbleed
  1260.  
  1261. Supported Server Cipher(s):
  1262. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-521 DHE 521
  1263. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-521 DHE 521
  1264. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-521 DHE 521
  1265. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-521 DHE 521
  1266. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  1267. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  1268. Accepted TLSv1.2 256 bits AES256-SHA256
  1269. Accepted TLSv1.2 256 bits AES256-SHA
  1270. Accepted TLSv1.2 128 bits AES128-SHA256
  1271. Accepted TLSv1.2 128 bits AES128-SHA
  1272. Accepted TLSv1.2 112 bits DES-CBC3-SHA
  1273. Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-521 DHE 521
  1274. Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-521 DHE 521
  1275. Accepted TLSv1.1 256 bits AES256-SHA
  1276. Accepted TLSv1.1 128 bits AES128-SHA
  1277. Accepted TLSv1.1 112 bits DES-CBC3-SHA
  1278. Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-521 DHE 521
  1279. Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-521 DHE 521
  1280. Accepted TLSv1.0 256 bits AES256-SHA
  1281. Accepted TLSv1.0 128 bits AES128-SHA
  1282. Accepted TLSv1.0 112 bits DES-CBC3-SHA
  1283.  
  1284. SSL Certificate:
  1285. Signature Algorithm: sha256WithRSAEncryption
  1286. RSA Key Strength: 2048
  1287.  
  1288. Subject: www.islahhaber.net
  1289. Altnames: DNS:www.islahhaber.net, DNS:islahhaber.net
  1290. Issuer: SignSec Certification Authority
  1291.  
  1292. Not valid before: Sep 22 00:00:00 2018 GMT
  1293. Not valid after: Sep 22 23:59:59 2019 GMT
  1294. #######################################################################################################################################
  1295. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:18 EST
  1296. Nmap scan report for www.islahhaber.net (45.32.187.95)
  1297. Host is up (0.11s latency).
  1298. rDNS record for 45.32.187.95: 45.32.187.95.vultr.com
  1299.  
  1300. PORT STATE SERVICE VERSION
  1301. 3389/tcp open ms-wbt-server Microsoft Terminal Service
  1302. | rdp-enum-encryption:
  1303. | Security layer
  1304. | CredSSP: SUCCESS
  1305. | Native RDP: SUCCESS
  1306. | SSL: SUCCESS
  1307. | RDP Encryption level: Unknown
  1308. |_ 128-bit RC4: SUCCESS
  1309. |_rdp-vuln-ms12-020: ERROR: Script execution failed (use -d to debug)
  1310. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1311. OS fingerprint not ideal because: Timing level 5 (Insane) used
  1312. No OS matches for host
  1313. Network Distance: 10 hops
  1314. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1315.  
  1316. TRACEROUTE (using port 3389/tcp)
  1317. HOP RTT ADDRESS
  1318. 1 23.14 ms 10.246.200.1
  1319. 2 23.77 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1320. 3 27.59 ms 37.120.128.168
  1321. 4 23.58 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1322. 5 23.57 ms 62.115.162.41
  1323. 6 108.00 ms nyk-bb3-link.telia.net (62.115.137.142)
  1324. 7 113.43 ms ldn-bb4-link.telia.net (62.115.112.245)
  1325. 8 107.82 ms adm-bb4-link.telia.net (62.115.134.26)
  1326. 9 ...
  1327. 10 105.72 ms 45.32.187.95.vultr.com (45.32.187.95)
  1328.  
  1329. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1330. Nmap done: 1 IP address (1 host up) scanned in 44.89 seconds
  1331. #######################################################################################################################################
  1332. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:55 EST
  1333. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1334. Host is up (0.087s latency).
  1335. Not shown: 463 filtered ports, 3 closed ports
  1336. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  1337. PORT STATE SERVICE
  1338. 21/tcp open ftp
  1339. 53/tcp open domain
  1340. 80/tcp open http
  1341. 88/tcp open kerberos-sec
  1342. 135/tcp open msrpc
  1343. 389/tcp open ldap
  1344. 443/tcp open https
  1345. 515/tcp open printer
  1346. 3389/tcp open ms-wbt-server
  1347. 5985/tcp open wsman
  1348. #######################################################################################################################################
  1349. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:55 EST
  1350. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1351. Host is up (0.039s latency).
  1352. Not shown: 2 filtered ports
  1353. PORT STATE SERVICE
  1354. 53/udp open domain
  1355. 67/udp open|filtered dhcps
  1356. 68/udp open|filtered dhcpc
  1357. 69/udp open|filtered tftp
  1358. 88/udp open|filtered kerberos-sec
  1359. 123/udp open ntp
  1360. 139/udp open|filtered netbios-ssn
  1361. 161/udp open|filtered snmp
  1362. 162/udp open|filtered snmptrap
  1363. 389/udp open|filtered ldap
  1364. 520/udp open|filtered route
  1365. 2049/udp open|filtered nfs
  1366. #######################################################################################################################################
  1367. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 17:55 EST
  1368. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1369. Host is up (0.11s latency).
  1370.  
  1371. PORT STATE SERVICE VERSION
  1372. 21/tcp open ftp Microsoft ftpd
  1373. | ftp-brute:
  1374. | Accounts: No valid accounts found
  1375. |_ Statistics: Performed 4088 guesses in 274 seconds, average tps: 14.5
  1376. | ftp-syst:
  1377. |_ SYST: Windows_NT
  1378. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1379. Device type: general purpose
  1380. Running (JUST GUESSING): Microsoft Windows 2012 (89%)
  1381. OS CPE: cpe:/o:microsoft:windows_server_2012
  1382. Aggressive OS guesses: Microsoft Windows Server 2012 (89%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (89%), Microsoft Windows Server 2012 R2 (89%)
  1383. No exact OS matches for host (test conditions non-ideal).
  1384. Network Distance: 10 hops
  1385. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1386.  
  1387. TRACEROUTE (using port 21/tcp)
  1388. HOP RTT ADDRESS
  1389. 1 24.57 ms 10.246.200.1
  1390. 2 25.19 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1391. 3 32.63 ms 37.120.128.168
  1392. 4 24.99 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1393. 5 25.02 ms 62.115.162.41
  1394. 6 107.70 ms nyk-bb4-link.telia.net (62.115.134.52)
  1395. 7 108.74 ms ldn-bb4-link.telia.net (62.115.136.184)
  1396. 8 108.22 ms adm-bb4-link.telia.net (62.115.134.26)
  1397. 9 ...
  1398. 10 109.05 ms 45.32.187.95.vultr.com (45.32.187.95)
  1399. #######################################################################################################################################
  1400. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:01 EST
  1401. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1402. Host is up (0.11s latency).
  1403.  
  1404. PORT STATE SERVICE VERSION
  1405. 53/tcp open domain?
  1406. |_dns-fuzz: Server didn't response to our probe, can't fuzz
  1407. | dns-nsec-enum:
  1408. |_ No NSEC records found
  1409. | dns-nsec3-enum:
  1410. |_ DNSSEC NSEC3 not supported
  1411. | fingerprint-strings:
  1412. | DNSVersionBindReqTCP:
  1413. | version
  1414. |_ bind
  1415. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  1416. SF-Port53-TCP:V=7.70%I=7%D=1/31%Time=5C537E53%P=x86_64-pc-linux-gnu%r(DNSV
  1417. SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
  1418. SF:x04bind\0\0\x10\0\x03");
  1419. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1420. Aggressive OS guesses: Tomato 1.27 - 1.28 (Linux 2.4.20) (97%), Linux 2.6.18 - 2.6.22 (97%), D-Link DWL-624+ or DWL-2000AP, or TRENDnet TEW-432BRP WAP (96%), Fortinet FortiGate-50B or 310B firewall (95%), Fortinet FortiGate 1500D firewall (95%), Microsoft Windows Vista Home Premium SP1 (93%), Fortinet FortiGate 100D firewall (92%), Fortinet FortiGate-60B or -100A firewall (92%), Vonage V-Portal VoIP adapter (92%), Lexmark Z2400 printer (92%)
  1421. No exact OS matches for host (test conditions non-ideal).
  1422. Network Distance: 10 hops
  1423.  
  1424. Host script results:
  1425. | dns-brute:
  1426. |_ DNS Brute-force hostnames: No results.
  1427.  
  1428. TRACEROUTE (using port 53/tcp)
  1429. HOP RTT ADDRESS
  1430. 1 24.55 ms 10.246.200.1
  1431. 2 24.91 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1432. 3 34.10 ms 37.120.128.168
  1433. 4 24.59 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1434. 5 24.58 ms 62.115.162.41
  1435. 6 109.30 ms nyk-bb3-link.telia.net (62.115.137.142)
  1436. 7 107.01 ms ldn-bb4-link.telia.net (62.115.136.184)
  1437. 8 109.27 ms adm-bb4-link.telia.net (62.115.134.26)
  1438. 9 ...
  1439. 10 109.36 ms 45.32.187.95.vultr.com (45.32.187.95)
  1440. #######################################################################################################################################
  1441. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:04 EST
  1442. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1443. Host is up (0.11s latency).
  1444.  
  1445. PORT STATE SERVICE VERSION
  1446. 67/udp open|filtered dhcps
  1447. |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
  1448. Too many fingerprints match this host to give specific OS details
  1449. Network Distance: 10 hops
  1450.  
  1451. TRACEROUTE (using proto 1/icmp)
  1452. HOP RTT ADDRESS
  1453. 1 22.96 ms 10.246.200.1
  1454. 2 23.34 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1455. 3 41.64 ms 37.120.128.168
  1456. 4 23.17 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1457. 5 23.16 ms 62.115.162.41
  1458. 6 ...
  1459. 7 107.64 ms ldn-bb4-link.telia.net (62.115.112.245)
  1460. 8 107.62 ms adm-bb4-link.telia.net (62.115.134.26)
  1461. 9 ...
  1462. 10 107.30 ms 45.32.187.95.vultr.com (45.32.187.95)
  1463. #######################################################################################################################################
  1464. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:06 EST
  1465. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1466. Host is up (0.11s latency).
  1467.  
  1468. PORT STATE SERVICE VERSION
  1469. 68/udp open|filtered dhcpc
  1470. Too many fingerprints match this host to give specific OS details
  1471. Network Distance: 10 hops
  1472.  
  1473. TRACEROUTE (using proto 1/icmp)
  1474. HOP RTT ADDRESS
  1475. 1 23.12 ms 10.246.200.1
  1476. 2 45.24 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1477. 3 37.98 ms 37.120.128.168
  1478. 4 23.35 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1479. 5 23.35 ms 62.115.162.41
  1480. 6 106.08 ms nyk-bb3-link.telia.net (62.115.137.142)
  1481. 7 107.92 ms ldn-bb4-link.telia.net (62.115.112.245)
  1482. 8 108.07 ms adm-bb4-link.telia.net (62.115.134.26)
  1483. 9 ...
  1484. 10 107.92 ms 45.32.187.95.vultr.com (45.32.187.95)
  1485. #######################################################################################################################################
  1486. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:08 EST
  1487. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1488. Host is up (0.11s latency).
  1489.  
  1490. PORT STATE SERVICE VERSION
  1491. 69/udp open|filtered tftp
  1492. Too many fingerprints match this host to give specific OS details
  1493. Network Distance: 10 hops
  1494.  
  1495. TRACEROUTE (using proto 1/icmp)
  1496. HOP RTT ADDRESS
  1497. 1 26.45 ms 10.246.200.1
  1498. 2 26.85 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1499. 3 43.25 ms 37.120.128.168
  1500. 4 26.66 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1501. 5 26.67 ms 62.115.162.41
  1502. 6 ...
  1503. 7 113.73 ms ldn-bb4-link.telia.net (62.115.112.245)
  1504. 8 110.95 ms adm-bb4-link.telia.net (62.115.134.26)
  1505. 9 ...
  1506. 10 110.76 ms 45.32.187.95.vultr.com (45.32.187.95)
  1507. #######################################################################################################################################
  1508.  
  1509. wig - WebApp Information Gatherer
  1510.  
  1511.  
  1512. Scanning http://45.32.187.95...
  1513. ____________________________________________ SITE INFO _____________________________________________
  1514. IP Title
  1515. 45.32.187.95
  1516.  
  1517. _____________________________________________ VERSION ______________________________________________
  1518. Name Versions Type
  1519. microsoft-httpapi 2.0 Platform
  1520. Microsoft Windows 7 OS
  1521. Microsoft Windows Server 2003 SP2 | 2003 SP3 | 2008 | 2008 R2 | 2012 | 2012 R2 OS
  1522.  
  1523. ____________________________________________________________________________________________________
  1524. Time: 17.6 sec Urls: 599 Fingerprints: 40401
  1525. ######################################################################################################################################
  1526. HTTP/1.1 404 Not Found
  1527. Content-Length: 315
  1528. Content-Type: text/html; charset=us-ascii
  1529. Server: Microsoft-HTTPAPI/2.0
  1530. Date: Thu, 31 Jan 2019 23:11:41 GMT
  1531. Connection: close
  1532.  
  1533. HTTP/1.1 404 Not Found
  1534. Content-Length: 315
  1535. Content-Type: text/html; charset=us-ascii
  1536. Server: Microsoft-HTTPAPI/2.0
  1537. Date: Thu, 31 Jan 2019 23:11:42 GMT
  1538. Connection: close
  1539. #######################################################################################################################################
  1540. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:11 EST
  1541. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1542. Host is up (0.12s latency).
  1543.  
  1544. PORT STATE SERVICE VERSION
  1545. 123/udp open ntp NTP v3
  1546. | ntp-info:
  1547. |_ receive time stamp: 2019-01-31T23:12:21
  1548. Too many fingerprints match this host to give specific OS details
  1549. Network Distance: 10 hops
  1550.  
  1551. TRACEROUTE (using port 123/udp)
  1552. HOP RTT ADDRESS
  1553. 1 23.99 ms 10.246.200.1
  1554. 2 24.28 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1555. 3 45.03 ms 37.120.128.168
  1556. 4 24.27 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1557. 5 24.97 ms 62.115.162.41
  1558. 6 106.98 ms nyk-bb4-link.telia.net (62.115.134.52)
  1559. 7 107.06 ms ldn-bb4-link.telia.net (62.115.136.184)
  1560. 8 108.93 ms adm-bb4-link.telia.net (62.115.134.26)
  1561. 9 ...
  1562. 10 107.06 ms 45.32.187.95.vultr.com (45.32.187.95)
  1563. #######################################################################################################################################
  1564. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:14 EST
  1565. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1566. Host is up (0.11s latency).
  1567.  
  1568. PORT STATE SERVICE VERSION
  1569. 135/tcp open msrpc Microsoft Windows RPC
  1570. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1571. Device type: general purpose
  1572. Running (JUST GUESSING): Microsoft Windows 2012 (88%)
  1573. OS CPE: cpe:/o:microsoft:windows_server_2012:r2
  1574. Aggressive OS guesses: Microsoft Windows Server 2012 or Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 R2 (88%), Microsoft Windows Server 2012 (86%)
  1575. No exact OS matches for host (test conditions non-ideal).
  1576. Network Distance: 10 hops
  1577. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1578.  
  1579. TRACEROUTE (using port 443/tcp)
  1580. HOP RTT ADDRESS
  1581. 1 22.57 ms 10.246.200.1
  1582. 2 23.76 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1583. 3 24.01 ms 37.120.128.168
  1584. 4 22.97 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1585. 5 22.96 ms 62.115.162.41
  1586. 6 105.28 ms nyk-bb4-link.telia.net (62.115.134.52)
  1587. 7 107.83 ms ldn-bb4-link.telia.net (62.115.112.245)
  1588. 8 107.87 ms adm-bb4-link.telia.net (62.115.134.26)
  1589. 9 ...
  1590. 10 106.65 ms 45.32.187.95.vultr.com (45.32.187.95)
  1591. #######################################################################################################################################
  1592. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:15 EST
  1593. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1594. Host is up (0.11s latency).
  1595.  
  1596. PORT STATE SERVICE VERSION
  1597. 161/tcp filtered snmp
  1598. 161/udp open|filtered snmp
  1599. Too many fingerprints match this host to give specific OS details
  1600. Network Distance: 10 hops
  1601.  
  1602. TRACEROUTE (using proto 1/icmp)
  1603. HOP RTT ADDRESS
  1604. 1 21.41 ms 10.246.200.1
  1605. 2 45.12 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1606. 3 41.12 ms 37.120.128.168
  1607. 4 21.74 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1608. 5 21.77 ms 62.115.162.41
  1609. 6 ...
  1610. 7 112.77 ms ldn-bb4-link.telia.net (62.115.112.245)
  1611. 8 106.42 ms adm-bb4-link.telia.net (62.115.134.26)
  1612. 9 ...
  1613. 10 105.65 ms 45.32.187.95.vultr.com (45.32.187.95)
  1614. #######################################################################################################################################
  1615. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:17 EST
  1616. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1617. Host is up (0.11s latency).
  1618.  
  1619. PORT STATE SERVICE VERSION
  1620. 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: sube.toygur.com, Site: Default-First-Site-Name)
  1621. | ldap-rootdse:
  1622. | LDAP Results
  1623. | <ROOT>
  1624. | currentTime: 20190131232112.0Z
  1625. | subschemaSubentry: CN=Aggregate,CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
  1626. | dsServiceName: CN=NTDS Settings,CN=WINDOWS-VULTR,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=sube,DC=toygur,DC=com
  1627. | namingContexts: DC=sube,DC=toygur,DC=com
  1628. | namingContexts: CN=Configuration,DC=sube,DC=toygur,DC=com
  1629. | namingContexts: CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
  1630. | namingContexts: DC=DomainDnsZones,DC=sube,DC=toygur,DC=com
  1631. | namingContexts: DC=ForestDnsZones,DC=sube,DC=toygur,DC=com
  1632. | defaultNamingContext: DC=sube,DC=toygur,DC=com
  1633. | schemaNamingContext: CN=Schema,CN=Configuration,DC=sube,DC=toygur,DC=com
  1634. | configurationNamingContext: CN=Configuration,DC=sube,DC=toygur,DC=com
  1635. | rootDomainNamingContext: DC=sube,DC=toygur,DC=com
  1636. | supportedControl: 1.2.840.113556.1.4.319
  1637. | supportedControl: 1.2.840.113556.1.4.801
  1638. | supportedControl: 1.2.840.113556.1.4.473
  1639. | supportedControl: 1.2.840.113556.1.4.528
  1640. | supportedControl: 1.2.840.113556.1.4.417
  1641. | supportedControl: 1.2.840.113556.1.4.619
  1642. | supportedControl: 1.2.840.113556.1.4.841
  1643. | supportedControl: 1.2.840.113556.1.4.529
  1644. | supportedControl: 1.2.840.113556.1.4.805
  1645. | supportedControl: 1.2.840.113556.1.4.521
  1646. | supportedControl: 1.2.840.113556.1.4.970
  1647. | supportedControl: 1.2.840.113556.1.4.1338
  1648. | supportedControl: 1.2.840.113556.1.4.474
  1649. | supportedControl: 1.2.840.113556.1.4.1339
  1650. | supportedControl: 1.2.840.113556.1.4.1340
  1651. | supportedControl: 1.2.840.113556.1.4.1413
  1652. | supportedControl: 2.16.840.1.113730.3.4.9
  1653. | supportedControl: 2.16.840.1.113730.3.4.10
  1654. | supportedControl: 1.2.840.113556.1.4.1504
  1655. | supportedControl: 1.2.840.113556.1.4.1852
  1656. | supportedControl: 1.2.840.113556.1.4.802
  1657. | supportedControl: 1.2.840.113556.1.4.1907
  1658. | supportedControl: 1.2.840.113556.1.4.1948
  1659. | supportedControl: 1.2.840.113556.1.4.1974
  1660. | supportedControl: 1.2.840.113556.1.4.1341
  1661. | supportedControl: 1.2.840.113556.1.4.2026
  1662. | supportedControl: 1.2.840.113556.1.4.2064
  1663. | supportedControl: 1.2.840.113556.1.4.2065
  1664. | supportedControl: 1.2.840.113556.1.4.2066
  1665. | supportedControl: 1.2.840.113556.1.4.2090
  1666. | supportedControl: 1.2.840.113556.1.4.2205
  1667. | supportedControl: 1.2.840.113556.1.4.2204
  1668. | supportedControl: 1.2.840.113556.1.4.2206
  1669. | supportedControl: 1.2.840.113556.1.4.2211
  1670. | supportedControl: 1.2.840.113556.1.4.2239
  1671. | supportedControl: 1.2.840.113556.1.4.2255
  1672. | supportedControl: 1.2.840.113556.1.4.2256
  1673. | supportedLDAPVersion: 3
  1674. | supportedLDAPVersion: 2
  1675. | supportedLDAPPolicies: MaxPoolThreads
  1676. | supportedLDAPPolicies: MaxPercentDirSyncRequests
  1677. | supportedLDAPPolicies: MaxDatagramRecv
  1678. | supportedLDAPPolicies: MaxReceiveBuffer
  1679. | supportedLDAPPolicies: InitRecvTimeout
  1680. | supportedLDAPPolicies: MaxConnections
  1681. | supportedLDAPPolicies: MaxConnIdleTime
  1682. | supportedLDAPPolicies: MaxPageSize
  1683. | supportedLDAPPolicies: MaxBatchReturnMessages
  1684. | supportedLDAPPolicies: MaxQueryDuration
  1685. | supportedLDAPPolicies: MaxTempTableSize
  1686. | supportedLDAPPolicies: MaxResultSetSize
  1687. | supportedLDAPPolicies: MinResultSets
  1688. | supportedLDAPPolicies: MaxResultSetsPerConn
  1689. | supportedLDAPPolicies: MaxNotificationPerConn
  1690. | supportedLDAPPolicies: MaxValRange
  1691. | supportedLDAPPolicies: MaxValRangeTransitive
  1692. | supportedLDAPPolicies: ThreadMemoryLimit
  1693. | supportedLDAPPolicies: SystemMemoryLimitPercent
  1694. | highestCommittedUSN: 12831025
  1695. | supportedSASLMechanisms: GSSAPI
  1696. | supportedSASLMechanisms: GSS-SPNEGO
  1697. | supportedSASLMechanisms: EXTERNAL
  1698. | supportedSASLMechanisms: DIGEST-MD5
  1699. | dnsHostName: windows-vultr.sube.toygur.com
  1700. | ldapServiceName: sube.toygur.com:[email protected]
  1701. | serverName: CN=WINDOWS-VULTR,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=sube,DC=toygur,DC=com
  1702. | supportedCapabilities: 1.2.840.113556.1.4.800
  1703. | supportedCapabilities: 1.2.840.113556.1.4.1670
  1704. | supportedCapabilities: 1.2.840.113556.1.4.1791
  1705. | supportedCapabilities: 1.2.840.113556.1.4.1935
  1706. | supportedCapabilities: 1.2.840.113556.1.4.2080
  1707. | supportedCapabilities: 1.2.840.113556.1.4.2237
  1708. | isSynchronized: TRUE
  1709. | isGlobalCatalogReady: TRUE
  1710. | domainFunctionality: 6
  1711. | forestFunctionality: 6
  1712. |_ domainControllerFunctionality: 6
  1713. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1714. Device type: general purpose
  1715. Running (JUST GUESSING): Microsoft Windows 2012 (89%)
  1716. OS CPE: cpe:/o:microsoft:windows_server_2012:r2
  1717. Aggressive OS guesses: Microsoft Windows Server 2012 or Windows Server 2012 R2 (89%), Microsoft Windows Server 2012 R2 (89%), Microsoft Windows Server 2012 (87%)
  1718. No exact OS matches for host (test conditions non-ideal).
  1719. Network Distance: 10 hops
  1720. Service Info: Host: WINDOWS-VULTR; OS: Windows 2012 R2; CPE: cpe:/o:microsoft:windows
  1721.  
  1722. TRACEROUTE (using port 389/tcp)
  1723. HOP RTT ADDRESS
  1724. 1 22.75 ms 10.246.200.1
  1725. 2 23.98 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1726. 3 29.97 ms 37.120.128.168
  1727. 4 23.97 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1728. 5 24.00 ms 62.115.162.41
  1729. 6 106.04 ms nyk-bb4-link.telia.net (62.115.134.52)
  1730. 7 105.63 ms ldn-bb4-link.telia.net (62.115.136.184)
  1731. 8 106.07 ms adm-bb4-link.telia.net (62.115.134.26)
  1732. 9 ...
  1733. 10 114.12 ms 45.32.187.95.vultr.com (45.32.187.95)
  1734. #######################################################################################################################################
  1735. Version: 1.11.12-static
  1736. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  1737.  
  1738. Connected to 45.32.187.95
  1739.  
  1740. Testing SSL server 45.32.187.95 on port 443 using SNI name 45.32.187.95
  1741.  
  1742. TLS Fallback SCSV:
  1743. Server does not support TLS Fallback SCSV
  1744.  
  1745. TLS renegotiation:
  1746. Session renegotiation not supported
  1747.  
  1748. TLS Compression:
  1749. Compression disabled
  1750.  
  1751. Heartbleed:
  1752. TLS 1.2 not vulnerable to heartbleed
  1753. TLS 1.1 not vulnerable to heartbleed
  1754. TLS 1.0 not vulnerable to heartbleed
  1755.  
  1756. Supported Server Cipher(s):
  1757. #######################################################################################################################################
  1758. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:21 EST
  1759. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1760. Host is up (0.11s latency).
  1761.  
  1762. PORT STATE SERVICE VERSION
  1763. 3389/tcp open ms-wbt-server Microsoft Terminal Service
  1764. | rdp-enum-encryption:
  1765. | Security layer
  1766. | CredSSP: SUCCESS
  1767. | Native RDP: SUCCESS
  1768. | SSL: SUCCESS
  1769. | RDP Encryption level: Unknown
  1770. |_ 128-bit RC4: SUCCESS
  1771. |_rdp-vuln-ms12-020: ERROR: Script execution failed (use -d to debug)
  1772. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1773. OS fingerprint not ideal because: Timing level 5 (Insane) used
  1774. No OS matches for host
  1775. Network Distance: 10 hops
  1776. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  1777.  
  1778. TRACEROUTE (using port 3389/tcp)
  1779. HOP RTT ADDRESS
  1780. 1 27.40 ms 10.246.200.1
  1781. 2 52.96 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1782. 3 29.16 ms 37.120.128.168
  1783. 4 27.42 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1784. 5 27.43 ms 62.115.162.41
  1785. 6 112.43 ms nyk-bb3-link.telia.net (62.115.137.142)
  1786. 7 110.11 ms ldn-bb4-link.telia.net (62.115.136.184)
  1787. 8 110.12 ms adm-bb4-link.telia.net (62.115.134.26)
  1788. 9 ...
  1789. 10 110.11 ms 45.32.187.95.vultr.com (45.32.187.95)
  1790. #######################################################################################################################################
  1791. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:27 EST
  1792. NSE: Loaded 148 scripts for scanning.
  1793. NSE: Script Pre-scanning.
  1794. NSE: Starting runlevel 1 (of 2) scan.
  1795. Initiating NSE at 18:27
  1796. Completed NSE at 18:27, 0.00s elapsed
  1797. NSE: Starting runlevel 2 (of 2) scan.
  1798. Initiating NSE at 18:27
  1799. Completed NSE at 18:27, 0.00s elapsed
  1800. Initiating Ping Scan at 18:27
  1801. Scanning 45.32.187.95 [4 ports]
  1802. Completed Ping Scan at 18:27, 0.15s elapsed (1 total hosts)
  1803. Initiating Parallel DNS resolution of 1 host. at 18:27
  1804. Completed Parallel DNS resolution of 1 host. at 18:27, 0.03s elapsed
  1805. Initiating Connect Scan at 18:27
  1806. Scanning 45.32.187.95.vultr.com (45.32.187.95) [1000 ports]
  1807. Discovered open port 80/tcp on 45.32.187.95
  1808. Discovered open port 443/tcp on 45.32.187.95
  1809. Discovered open port 135/tcp on 45.32.187.95
  1810. Discovered open port 53/tcp on 45.32.187.95
  1811. Discovered open port 21/tcp on 45.32.187.95
  1812. Discovered open port 3389/tcp on 45.32.187.95
  1813. Discovered open port 389/tcp on 45.32.187.95
  1814. Discovered open port 49163/tcp on 45.32.187.95
  1815. Discovered open port 9418/tcp on 45.32.187.95
  1816. Discovered open port 9595/tcp on 45.32.187.95
  1817. Discovered open port 49155/tcp on 45.32.187.95
  1818. Discovered open port 515/tcp on 45.32.187.95
  1819. Discovered open port 49158/tcp on 45.32.187.95
  1820. Discovered open port 464/tcp on 45.32.187.95
  1821. Discovered open port 49154/tcp on 45.32.187.95
  1822. Discovered open port 593/tcp on 45.32.187.95
  1823. Discovered open port 636/tcp on 45.32.187.95
  1824. Discovered open port 49157/tcp on 45.32.187.95
  1825. Discovered open port 88/tcp on 45.32.187.95
  1826. Discovered open port 3268/tcp on 45.32.187.95
  1827. Discovered open port 3269/tcp on 45.32.187.95
  1828. Discovered open port 9415/tcp on 45.32.187.95
  1829. Completed Connect Scan at 18:27, 7.23s elapsed (1000 total ports)
  1830. Initiating Service scan at 18:27
  1831. Scanning 22 services on 45.32.187.95.vultr.com (45.32.187.95)
  1832. Completed Service scan at 18:29, 139.47s elapsed (22 services on 1 host)
  1833. Initiating OS detection (try #1) against 45.32.187.95.vultr.com (45.32.187.95)
  1834. adjust_timeouts2: packet supposedly had rtt of -952749 microseconds. Ignoring time.
  1835. adjust_timeouts2: packet supposedly had rtt of -952749 microseconds. Ignoring time.
  1836. adjust_timeouts2: packet supposedly had rtt of -626776 microseconds. Ignoring time.
  1837. adjust_timeouts2: packet supposedly had rtt of -626776 microseconds. Ignoring time.
  1838. Retrying OS detection (try #2) against 45.32.187.95.vultr.com (45.32.187.95)
  1839. adjust_timeouts2: packet supposedly had rtt of -65013 microseconds. Ignoring time.
  1840. adjust_timeouts2: packet supposedly had rtt of -65013 microseconds. Ignoring time.
  1841. Initiating Traceroute at 18:29
  1842. Completed Traceroute at 18:29, 3.03s elapsed
  1843. Initiating Parallel DNS resolution of 9 hosts. at 18:29
  1844. Completed Parallel DNS resolution of 9 hosts. at 18:30, 16.50s elapsed
  1845. NSE: Script scanning 45.32.187.95.
  1846. NSE: Starting runlevel 1 (of 2) scan.
  1847. Initiating NSE at 18:30
  1848. NSE Timing: About 99.77% done; ETC: 18:30 (0:00:00 remaining)
  1849. NSE Timing: About 99.80% done; ETC: 18:31 (0:00:00 remaining)
  1850. NSE Timing: About 99.83% done; ETC: 18:31 (0:00:00 remaining)
  1851. NSE Timing: About 99.87% done; ETC: 18:32 (0:00:00 remaining)
  1852. NSE Timing: About 99.90% done; ETC: 18:32 (0:00:00 remaining)
  1853. NSE Timing: About 99.93% done; ETC: 18:33 (0:00:00 remaining)
  1854. NSE Timing: About 99.97% done; ETC: 18:33 (0:00:00 remaining)
  1855. Completed NSE at 18:33, 222.32s elapsed
  1856. NSE: Starting runlevel 2 (of 2) scan.
  1857. Initiating NSE at 18:33
  1858. Completed NSE at 18:33, 1.13s elapsed
  1859. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  1860. Host is up, received syn-ack ttl 116 (0.11s latency).
  1861. Scanned at 2019-01-31 18:27:15 EST for 395s
  1862. Not shown: 975 filtered ports
  1863. Reason: 975 no-responses
  1864. PORT STATE SERVICE REASON VERSION
  1865. 21/tcp open ftp syn-ack Microsoft ftpd
  1866. | ftp-syst:
  1867. |_ SYST: Windows_NT
  1868. |_ssl-date: 2019-01-31T23:30:12+00:00; 0s from scanner time.
  1869. 25/tcp closed smtp conn-refused
  1870. 53/tcp open domain? syn-ack
  1871. | fingerprint-strings:
  1872. | DNSVersionBindReqTCP:
  1873. | version
  1874. |_ bind
  1875. 80/tcp open http syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
  1876. |_http-server-header: Microsoft-HTTPAPI/2.0
  1877. |_http-title: Not Found
  1878. 88/tcp open kerberos-sec syn-ack Microsoft Windows Kerberos (server time: 2019-01-31 23:27:29Z)
  1879. 135/tcp open msrpc syn-ack Microsoft Windows RPC
  1880. 139/tcp closed netbios-ssn conn-refused
  1881. 389/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: sube.toygur.com, Site: Default-First-Site-Name)
  1882. 443/tcp open ssl/https? syn-ack
  1883. |_ssl-date: 2019-01-31T23:30:11+00:00; 0s from scanner time.
  1884. 445/tcp closed microsoft-ds conn-refused
  1885. 464/tcp open kpasswd5? syn-ack
  1886. 515/tcp open printer syn-ack Microsoft lpd
  1887. 593/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0
  1888. 636/tcp open tcpwrapped syn-ack
  1889. 3268/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: sube.toygur.com, Site: Default-First-Site-Name)
  1890. 3269/tcp open tcpwrapped syn-ack
  1891. 3389/tcp open ms-wbt-server syn-ack Microsoft Terminal Service
  1892. | ssl-cert: Subject: commonName=windows-vultr.sube.toygur.com
  1893. | Issuer: commonName=windows-vultr.sube.toygur.com
  1894. | Public Key type: rsa
  1895. | Public Key bits: 2048
  1896. | Signature Algorithm: sha256WithRSAEncryption
  1897. | Not valid before: 2018-12-01T21:11:42
  1898. | Not valid after: 2019-06-02T21:11:42
  1899. | MD5: da67 6313 5569 dc13 8227 11c0 b651 7432
  1900. | SHA-1: 5130 7168 1367 9a89 6460 4d9d 5769 76e0 8208 4104
  1901. | -----BEGIN CERTIFICATE-----
  1902. | MIIC/jCCAeagAwIBAgIQYLFKlc1asohPjm0X28NJdDANBgkqhkiG9w0BAQsFADAo
  1903. | MSYwJAYDVQQDEx13aW5kb3dzLXZ1bHRyLnN1YmUudG95Z3VyLmNvbTAeFw0xODEy
  1904. | MDEyMTExNDJaFw0xOTA2MDIyMTExNDJaMCgxJjAkBgNVBAMTHXdpbmRvd3MtdnVs
  1905. | dHIuc3ViZS50b3lndXIuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
  1906. | AQEAsdxiq8qSO1fLnZxH+05bS6jn2bjiS3e1N99tW20d6T8YVe7a/qtBxJFCCkAo
  1907. | oo9FRGFcS4rXxeFmb1iH23McmA+6Vthn7x5DXoxp3POBexXbv3mGQ52EvCswRvbg
  1908. | iS2P1V6RWfOJLkqrYRz1RZd+F7HH3MQizDG9m9iJf1dzHSouxanX6Rku1cIYjccW
  1909. | jcvLzs2WdFp1qvVp9H8R8XNaP9BjUiZNKkacaLzXVXsRdF/EaMsSWWBypevN8qqK
  1910. | Wr/NOeTfoMPEGOFCkwta3xMUMpE1nq51L7Hc/4+JNKJ9AHWt7MWRU1pgkUbXrUgl
  1911. | AY0CclrNAZoUDbc1SlBetUOQmQIDAQABoyQwIjATBgNVHSUEDDAKBggrBgEFBQcD
  1912. | ATALBgNVHQ8EBAMCBDAwDQYJKoZIhvcNAQELBQADggEBADenv40725hwljEZffv4
  1913. | IL8+7e+kTe2MRSAjfaOgGi16LFFu72g8kHLVsc2eOQ4lnZfPTuXWVSuBlmQeFUyv
  1914. | YCYrHWY/fC4HsaYQXepMTDStr7YPA6uw5e166vVgeX4UHa9A1QFeLercoTHj75cS
  1915. | pj5jtpvmIA+suILO/UruvhjiC+pjyq4w8c2M+yXU9p4sYgqGXeYDS72n6ew0xl0i
  1916. | q57I9Nqdnxa5H7aQIvVK3TicIiZRc8HGYSsmAKHqZL9HktN/lvOI1iNcpO1SBTI4
  1917. | AJU9wrdQZGb0XEx0pShZgOKiWTdPn0vrR6hXhkEuSPWy4WYcKvPkamsd98p2bNVZ
  1918. | wdk=
  1919. |_-----END CERTIFICATE-----
  1920. 9415/tcp open http syn-ack Microsoft IIS httpd 8.5
  1921. |_http-favicon: Unknown favicon MD5: 4859E39AE6C0F1F428F2126A6BB32BD9
  1922. | http-methods:
  1923. |_ Supported Methods: GET HEAD POST OPTIONS
  1924. |_http-server-header: Microsoft-IIS/8.5
  1925. |_http-title: Home Page
  1926. 9418/tcp open http syn-ack Microsoft IIS httpd 8.5
  1927. |_http-favicon: Unknown favicon MD5: 4859E39AE6C0F1F428F2126A6BB32BD9
  1928. | http-methods:
  1929. |_ Supported Methods: GET HEAD POST OPTIONS
  1930. |_http-server-header: Microsoft-IIS/8.5
  1931. |_http-title: Home Page
  1932. 9595/tcp open http syn-ack Microsoft IIS httpd 8.5
  1933. |_http-favicon: Unknown favicon MD5: 4859E39AE6C0F1F428F2126A6BB32BD9
  1934. | http-methods:
  1935. |_ Supported Methods: GET HEAD POST OPTIONS
  1936. |_http-server-header: Microsoft-IIS/8.5
  1937. |_http-title: Home Page - My ASP.NET Application
  1938. 49154/tcp open msrpc syn-ack Microsoft Windows RPC
  1939. 49155/tcp open msrpc syn-ack Microsoft Windows RPC
  1940. 49157/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0
  1941. 49158/tcp open msrpc syn-ack Microsoft Windows RPC
  1942. 49163/tcp open msrpc syn-ack Microsoft Windows RPC
  1943. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  1944. SF-Port53-TCP:V=7.70%I=7%D=1/31%Time=5C538466%P=x86_64-pc-linux-gnu%r(DNSV
  1945. SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
  1946. SF:x04bind\0\0\x10\0\x03");
  1947. Device type: general purpose|storage-misc|WAP|router
  1948. Running (JUST GUESSING): Linux 2.6.X|2.4.X (90%), HP embedded (89%), MikroTik RouterOS 6.X (86%)
  1949. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:hp:p2000_g3 cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:mikrotik:routeros:6.15
  1950. OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
  1951. Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (90%), HP P2000 G3 NAS device (89%), Tomato 1.27 - 1.28 (Linux 2.4.20) (86%), MikroTik RouterOS 6.15 (Linux 3.3.5) (86%)
  1952. No exact OS matches for host (test conditions non-ideal).
  1953. TCP/IP fingerprint:
  1954. SCAN(V=7.70%E=4%D=1/31%OT=21%CT=25%CU=%PV=N%DS=10%DC=T%G=N%TM=5C5385DE%P=x86_64-pc-linux-gnu)
  1955. SEQ(CI=Z%TS=7)
  1956. SEQ(SP=107%GCD=1%ISR=10E%CI=RI%TS=7)
  1957. OPS(O1=M4B3NW8ST11%O2=M4B3NW8ST11%O3=M4B3NW8NNT11%O4=M4B3NW8ST11%O5=M4B3NW8ST11%O6=M4B3ST11)
  1958. WIN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6=2000)
  1959. ECN(R=Y%DF=Y%TG=80%W=2000%O=M4B3NW8NNS%CC=Y%Q=)
  1960. T1(R=Y%DF=Y%TG=80%S=O%A=S+%F=AS%RD=0%Q=)
  1961. T2(R=N)
  1962. T2(R=Y%DF=Y%TG=80%W=2000%S=O%A=O%F=AS%O=M4B3NW8ST11%RD=0%Q=)
  1963. T3(R=N)
  1964. T4(R=N)
  1965. T4(R=Y%DF=Y%TG=80%W=2000%S=O%A=O%F=AS%O=M4B3NW8ST11%RD=0%Q=)
  1966. T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
  1967. T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
  1968. T7(R=N)
  1969. U1(R=N)
  1970. IE(R=N)
  1971.  
  1972. Uptime guess: 58.274 days (since Tue Dec 4 11:58:39 2018)
  1973. Network Distance: 10 hops
  1974. TCP Sequence Prediction: Difficulty=263 (Good luck!)
  1975. IP ID Sequence Generation: Busy server or unknown class
  1976. Service Info: Host: WINDOWS-VULTR; OS: Windows; CPE: cpe:/o:microsoft:windows
  1977.  
  1978. Host script results:
  1979. |_clock-skew: mean: 0s, deviation: 0s, median: 0s
  1980.  
  1981. TRACEROUTE (using proto 1/icmp)
  1982. HOP RTT ADDRESS
  1983. 1 23.26 ms 10.246.200.1
  1984. 2 23.68 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
  1985. 3 42.56 ms 37.120.128.168
  1986. 4 23.69 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
  1987. 5 23.69 ms 62.115.162.41
  1988. 6 113.51 ms nyk-bb3-link.telia.net (62.115.137.142)
  1989. 7 108.67 ms ldn-bb4-link.telia.net (62.115.112.245)
  1990. 8 108.65 ms adm-bb4-link.telia.net (62.115.134.26)
  1991. 9 ...
  1992. 10 107.67 ms 45.32.187.95.vultr.com (45.32.187.95)
  1993.  
  1994. NSE: Script Post-scanning.
  1995. NSE: Starting runlevel 1 (of 2) scan.
  1996. Initiating NSE at 18:33
  1997. Completed NSE at 18:33, 0.00s elapsed
  1998. NSE: Starting runlevel 2 (of 2) scan.
  1999. Initiating NSE at 18:33
  2000. Completed NSE at 18:33, 0.00s elapsed
  2001. Read data files from: /usr/bin/../share/nmap
  2002. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2003. Nmap done: 1 IP address (1 host up) scanned in 395.54 seconds
  2004. Raw packets sent: 107 (9.280KB) | Rcvd: 3048 (1.829MB)
  2005. #######################################################################################################################################
  2006. Starting Nmap 7.70 ( https://nmap.org ) at 2019-01-31 18:33 EST
  2007. NSE: Loaded 148 scripts for scanning.
  2008. NSE: Script Pre-scanning.
  2009. Initiating NSE at 18:33
  2010. Completed NSE at 18:33, 0.00s elapsed
  2011. Initiating NSE at 18:33
  2012. Completed NSE at 18:33, 0.00s elapsed
  2013. Initiating Parallel DNS resolution of 1 host. at 18:33
  2014. Completed Parallel DNS resolution of 1 host. at 18:33, 0.02s elapsed
  2015. Initiating UDP Scan at 18:33
  2016. Scanning 45.32.187.95.vultr.com (45.32.187.95) [14 ports]
  2017. Discovered open port 123/udp on 45.32.187.95
  2018. Discovered open port 53/udp on 45.32.187.95
  2019. Completed UDP Scan at 18:33, 1.38s elapsed (14 total ports)
  2020. Initiating Service scan at 18:33
  2021. Scanning 12 services on 45.32.187.95.vultr.com (45.32.187.95)
  2022. Discovered open port 88/udp on 45.32.187.95
  2023. Discovered open|filtered port 88/udp on 45.32.187.95.vultr.com (45.32.187.95) is actually open
  2024. Service scan Timing: About 25.00% done; ETC: 18:40 (0:04:54 remaining)
  2025. Completed Service scan at 18:35, 102.58s elapsed (12 services on 1 host)
  2026. Initiating OS detection (try #1) against 45.32.187.95.vultr.com (45.32.187.95)
  2027. Retrying OS detection (try #2) against 45.32.187.95.vultr.com (45.32.187.95)
  2028. Initiating Traceroute at 18:35
  2029. Completed Traceroute at 18:35, 7.09s elapsed
  2030. Initiating Parallel DNS resolution of 1 host. at 18:35
  2031. Completed Parallel DNS resolution of 1 host. at 18:35, 0.02s elapsed
  2032. NSE: Script scanning 45.32.187.95.
  2033. Initiating NSE at 18:35
  2034. Completed NSE at 18:36, 16.42s elapsed
  2035. Initiating NSE at 18:36
  2036. Completed NSE at 18:36, 1.02s elapsed
  2037. Nmap scan report for 45.32.187.95.vultr.com (45.32.187.95)
  2038. Host is up (0.058s latency).
  2039.  
  2040. PORT STATE SERVICE VERSION
  2041. 53/udp open domain?
  2042. | fingerprint-strings:
  2043. | DNS-SD:
  2044. | _services
  2045. | _dns-sd
  2046. | _udp
  2047. | local
  2048. | root-servers
  2049. | root-servers
  2050. | root-servers
  2051. | root-servers
  2052. | root-servers
  2053. | root-servers
  2054. | root-servers
  2055. | root-servers
  2056. | root-servers
  2057. | root-servers
  2058. | root-servers
  2059. | root-servers
  2060. | root-servers
  2061. | NBTStat:
  2062. | CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  2063. | root-servers
  2064. | root-servers
  2065. | root-servers
  2066. | root-servers
  2067. | root-servers
  2068. | root-servers
  2069. | root-servers
  2070. | root-servers
  2071. | root-servers
  2072. | root-servers
  2073. | root-servers
  2074. | root-servers
  2075. |_ root-servers
  2076. 67/udp open|filtered dhcps
  2077. 68/udp open|filtered dhcpc
  2078. 69/udp open|filtered tftp
  2079. 88/udp open kerberos-sec Microsoft Windows Kerberos (server time: 2019-01-31 23:33:57Z)
  2080. 123/udp open ntp NTP v3
  2081. | ntp-info:
  2082. |_ receive time stamp: 2019-01-31T23:36:00
  2083. 137/udp filtered netbios-ns
  2084. 138/udp filtered netbios-dgm
  2085. 139/udp open|filtered netbios-ssn
  2086. 161/udp open|filtered snmp
  2087. 162/udp open|filtered snmptrap
  2088. 389/udp open|filtered ldap
  2089. 520/udp open|filtered route
  2090. 2049/udp open|filtered nfs
  2091. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  2092. SF-Port53-UDP:V=7.70%I=7%D=1/31%Time=5C5385F4%P=x86_64-pc-linux-gnu%r(NBTS
  2093. SF:tat,1ED,"\x80\xf0\x80\0\0\x01\0\0\0\r\0\x01\x20CKAAAAAAAAAAAAAAAAAAAAAA
  2094. SF:AAAAAAAA\0\0!\0\x01\0\0\x02\0\x01\0\0\x0e\x10\0\x14\x01i\x0croot-server
  2095. SF:s\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01k\x0croot-servers\x03n
  2096. SF:et\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01c\x0croot-servers\x03net\0\x
  2097. SF:c02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01b\x0croot-servers\x03net\0\xc02\0\
  2098. SF:x02\0\x01\0\0\x0e\x10\0\x14\x01m\x0croot-servers\x03net\0\xc02\0\x02\0\
  2099. SF:x01\0\0\x0e\x10\0\x14\x01a\x0croot-servers\x03net\0\xc02\0\x02\0\x01\0\
  2100. SF:0\x0e\x10\0\x14\x01d\x0croot-servers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\
  2101. SF:x10\0\x14\x01h\x0croot-servers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\
  2102. SF:x14\x01f\x0croot-servers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x0
  2103. SF:1j\x0croot-servers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01l\x0c
  2104. SF:root-servers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01e\x0croot-s
  2105. SF:ervers\x03net\0\xc02\0\x02\0\x01\0\0\x0e\x10\0\x14\x01g\x0croot-servers
  2106. SF:\x03net\0\xc0=\0\x1c\0\x01\0\0\x0e\x10\0\x10\x20\x01\x07\xfe\0\0\0\0\0\
  2107. SF:0\0\0\0\0\0S")%r(DNS-SD,1E9,"\0\0\x80\0\0\x01\0\0\0\r\0\x01\t_services\
  2108. SF:x07_dns-sd\x04_udp\x05local\0\0\x0c\0\x01\0\0\x02\0\x01\0\0\x0e\x10\0\x
  2109. SF:14\x01k\x0croot-servers\x03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x0
  2110. SF:1c\x0croot-servers\x03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01b\x0
  2111. SF:croot-servers\x03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01m\x0croot
  2112. SF:-servers\x03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01a\x0croot-serv
  2113. SF:ers\x03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01d\x0croot-servers\x
  2114. SF:03net\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01h\x0croot-servers\x03net
  2115. SF:\0\xc0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01f\x0croot-servers\x03net\0\xc
  2116. SF:0\.\0\x02\0\x01\0\0\x0e\x10\0\x14\x01j\x0croot-servers\x03net\0\xc0\.\0
  2117. SF:\x02\0\x01\0\0\x0e\x10\0\x14\x01l\x0croot-servers\x03net\0\xc0\.\0\x02\
  2118. SF:0\x01\0\0\x0e\x10\0\x14\x01e\x0croot-servers\x03net\0\xc0\.\0\x02\0\x01
  2119. SF:\0\0\x0e\x10\0\x14\x01g\x0croot-servers\x03net\0\xc0\.\0\x02\0\x01\0\0\
  2120. SF:x0e\x10\0\x14\x01i\x0croot-servers\x03net\0\xc09\0\x1c\0\x01\0\0\x0e\x1
  2121. SF:0\0\x10\x20\x01\x07\xfd\0\0\0\0\0\0\0\0\0\0\0\x01");
  2122. Too many fingerprints match this host to give specific OS details
  2123. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  2124.  
  2125. Host script results:
  2126. |_clock-skew: mean: 13s, deviation: 0s, median: 13s
  2127.  
  2128. TRACEROUTE (using port 137/udp)
  2129. HOP RTT ADDRESS
  2130. 1 26.89 ms 10.246.200.1
  2131. 2 ... 3
  2132. 4 23.46 ms 10.246.200.1
  2133. 5 27.23 ms 10.246.200.1
  2134. 6 27.11 ms 10.246.200.1
  2135. 7 27.11 ms 10.246.200.1
  2136. 8 27.11 ms 10.246.200.1
  2137. 9 27.12 ms 10.246.200.1
  2138. 10 27.13 ms 10.246.200.1
  2139. 11 ... 18
  2140. 19 25.62 ms 10.246.200.1
  2141. 20 27.06 ms 10.246.200.1
  2142. 21 ... 28
  2143. 29 24.32 ms 10.246.200.1
  2144. 30 22.51 ms 10.246.200.1
  2145.  
  2146. NSE: Script Post-scanning.
  2147. Initiating NSE at 18:36
  2148. Completed NSE at 18:36, 0.00s elapsed
  2149. Initiating NSE at 18:36
  2150. Completed NSE at 18:36, 0.00s elapsed
  2151. Read data files from: /usr/bin/../share/nmap
  2152. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2153. Nmap done: 1 IP address (1 host up) scanned in 132.66 seconds
  2154. Raw packets sent: 138 (12.352KB) | Rcvd: 2808 (334.023KB)
  2155. #######################################################################################################################################
  2156. ---------------------------------------------------------------------------------------------------------------------------------------
  2157. + Target IP: 45.32.187.95
  2158. + Target Hostname: 45.32.187.95
  2159. + Target Port: 80
  2160. + Start Time: 2019-01-31 17:55:54 (GMT-5)
  2161. ---------------------------------------------------------------------------------------------------------------------------------------
  2162. + Server: No banner retrieved
  2163. + The anti-clickjacking X-Frame-Options header is not present.
  2164. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  2165. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  2166. + No CGI Directories found (use '-C all' to force check all possible dirs)
  2167. + Uncommon header 'x-squid-error' found, with contents: ERR_INVALID_REQ 0
  2168. + 7534 requests: 0 error(s) and 4 item(s) reported on remote host
  2169. + End Time: 2019-01-31 18:24:25 (GMT-5) (1711 seconds)
  2170. ---------------------------------------------------------------------------------------------------------------------------------------
  2171. #######################################################################################################################################
  2172. ---------------------------------------------------------------------------------------------------------------------------------------
  2173. + Target IP: 45.32.187.95
  2174. + Target Hostname: www.islahhaber.net
  2175. + Target Port: 443
  2176. ---------------------------------------------------------------------------------------------------------------------------------------
  2177. + SSL Info: Subject: /OU=Domain Control Validated/OU=Provided by ISIMTESCIL BILISIM ANONIM SIRKETI/OU=TrustSafe PRO - DV/CN=www.islahhaber.net
  2178. Ciphers: ECDHE-RSA-AES256-SHA384
  2179. Issuer: /C=US/ST=CA/L=Irvine/O=FBS Inc/OU=SSL Department/CN=SignSec Certification Authority
  2180. + Start Time: 2019-01-31 17:55:39 (GMT-5)
  2181. ---------------------------------------------------------------------------------------------------------------------------------------
  2182. + Server: Microsoft-IIS/8.5
  2183. + Retrieved x-aspnet-version header: 4.0.30319
  2184. + The anti-clickjacking X-Frame-Options header is not present.
  2185. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  2186. + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
  2187. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  2188. + Entry '/bloklar/yorum/' in robots.txt returned a non-forbidden or redirect HTTP code (500)
  2189. + Entry '/bloklar/anket/' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  2190. + Entry '/bloklarmobil/yorum/' in robots.txt returned a non-forbidden or redirect HTTP code (500)
  2191. + "robots.txt" contains 17 entries which should be manually viewed.
  2192. + ERROR: Error limit (20) reached for host, giving up. Last error: opening stream: can't connect: SSL negotiation failed: at /var/lib/nikto/plugins/LW2.pm line 5157.
  2193. at /var/lib/nikto/plugins/LW2.pm line 5157.
  2194. ; Connection reset by peer at /var/lib/nikto/plugins/LW2.pm line 5157.
  2195. : Connection reset by peer
  2196. + Scan terminated: 20 error(s) and 9 item(s) reported on remote host
  2197. + End Time: 2019-01-31 17:59:38 (GMT-5) (239 seconds)
  2198. ---------------------------------------------------------------------------------------------------------------------------------------
  2199. #######################################################################################################################################
  2200. Anonymous JTSEC #OpIsis Full Recon #10
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement