Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- █[1]█
- █[2]█
- █[3]█
- ╔════════════════════════════════════════════════════════════════╗
- ║ YUKI-CHAN STARTED ║
- ╚════════════════════════════════════════════════════════════════╝
- ╔════════════════════════════════════════════════════════════════╗
- ║ Let's Find Who The Hell Is This Owner ║
- ╚════════════════════════════════════════════════════════════════╝
- whois looking up (if not run maybe not installed in your OS)
- Domain Name: VENTUREWORLDS.ONLINE
- Registry Domain ID: D58405088-CNIC
- Registrar WHOIS Server: whois.namecheap.com
- Registrar URL:
- Updated Date: 2018-02-02T09:58:39.0Z
- Creation Date: 2017-12-22T13:40:10.0Z
- Registry Expiry Date: 2018-12-22T23:59:59.0Z
- Registrar: Namecheap
- Registrar IANA ID: 1068
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Registry Registrant ID: C169633953-CNIC
- Registrant Name: WhoisGuard Protected
- Registrant Organization: WhoisGuard, Inc.
- Registrant Street: P.O. Box 0823-03411
- Registrant City: Panama
- Registrant State/Province: Panama
- Registrant Postal Code:
- Registrant Country: PA
- Registrant Phone: +507.8365503
- Registrant Fax: +51.17057182
- Registrant Email: 1834e138b0e64d4a8d93e132f7c2fe6f.protect@whoisguard.com
- Registry Admin ID: C169633958-CNIC
- Admin Name: WhoisGuard Protected
- Admin Organization: WhoisGuard, Inc.
- Admin Street: P.O. Box 0823-03411
- Admin City: Panama
- Admin State/Province: Panama
- Admin Postal Code:
- Admin Country: PA
- Admin Phone: +507.8365503
- Admin Fax: +51.17057182
- Admin Email: 1834e138b0e64d4a8d93e132f7c2fe6f.protect@whoisguard.com
- Registry Tech ID: C169633963-CNIC
- Tech Name: WhoisGuard Protected
- Tech Organization: WhoisGuard, Inc.
- Tech Street: P.O. Box 0823-03411
- Tech City: Panama
- Tech State/Province: Panama
- Tech Postal Code:
- Tech Country: PA
- Tech Phone: +507.8365503
- Tech Fax: +51.17057182
- Tech Email: 1834e138b0e64d4a8d93e132f7c2fe6f.protect@whoisguard.com
- Name Server: AMY.NS.CLOUDFLARE.COM
- Name Server: OWEN.NS.CLOUDFLARE.COM
- DNSSEC: unsigned
- Registry Billing ID: C169633968-CNIC
- Billing Name: WhoisGuard Protected
- Billing Organization: WhoisGuard, Inc.
- Billing Street: P.O. Box 0823-03411
- Billing City: Panama
- Billing State/Province: Panama
- Billing Postal Code:
- Billing Country: PA
- Billing Phone: +507.8365503
- Billing Fax: +51.17057182
- Billing Email: 1834e138b0e64d4a8d93e132f7c2fe6f.protect@whoisguard.com
- Registrar Abuse Contact Email: abuse@namecheap.com
- Registrar Abuse Contact Phone: +1.6613102107
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of WHOIS database: 2018-04-22T17:26:02.0Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- This whois service is provided by CentralNic Ltd and only contains
- information pertaining to Internet domain names registered by our
- our customers. By using this service you are agreeing (1) not to use any
- information presented here for any purpose other than determining
- ownership of domain names, (2) not to store or reproduce this data in
- any way, (3) not to use any high-volume, automated, electronic processes
- to obtain data from this service. Abuse of this service is monitored and
- actions in contravention of these terms will result in being permanently
- blacklisted. All data is (c) CentralNic Ltd https://www.centralnic.com/
- Access to the whois service is rate limited. For more information, please
- see https://registrar-console.centralnic.com/pub/whois_guidance.
- whois looking up finished
- nslooking up (if not run maybe not installed in your OS)
- Server: 1.1.1.1
- Address: 1.1.1.1#53
- Non-authoritative answer:
- Name: ventureworlds.online
- Address: 104.24.110.217
- Name: ventureworlds.online
- Address: 104.24.111.217
- Name: ventureworlds.online
- Address: 2400:cb00:2048:1::6818:6ed9
- Name: ventureworlds.online
- Address: 2400:cb00:2048:1::6818:6fd9
- nslooking up finished
- scanning with nmap (if not run maybe not installed in your OS)
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-04-22 13:26 EDT
- Initiating Ping Scan at 13:26
- Scanning ventureworlds.online (104.24.110.217) [4 ports]
- Completed Ping Scan at 13:26, 0.00s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:26
- Completed Parallel DNS resolution of 1 host. at 13:26, 0.08s elapsed
- Initiating SYN Stealth Scan at 13:26
- Scanning ventureworlds.online (104.24.110.217) [1000 ports]
- Discovered open port 80/tcp on 104.24.110.217
- Discovered open port 443/tcp on 104.24.110.217
- Discovered open port 8080/tcp on 104.24.110.217
- Completed SYN Stealth Scan at 13:26, 4.93s elapsed (1000 total ports)
- Initiating OS detection (try #1) against ventureworlds.online (104.24.110.217)
- Retrying OS detection (try #2) against ventureworlds.online (104.24.110.217)
- Nmap scan report for ventureworlds.online (104.24.110.217)
- Host is up (0.010s latency).
- Other addresses for ventureworlds.online (not scanned): 104.24.111.217 2400:cb00:2048:1::6818:6ed9 2400:cb00:2048:1::6818:6fd9
- Not shown: 997 filtered ports
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- 8080/tcp open http-proxy
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: bridge|general purpose
- Running (JUST GUESSING): Oracle Virtualbox (98%), QEMU (93%)
- OS CPE: cpe:/o:oracle:virtualbox cpe:/a:qemu:qemu
- Aggressive OS guesses: Oracle Virtualbox (98%), QEMU user mode network gateway (93%)
- No exact OS matches for host (test conditions non-ideal).
- Read data files from: /usr/bin/../share/nmap
- OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 8.94 seconds
- Raw packets sent: 2051 (93.496KB) | Rcvd: 36 (2.008KB)
- scanning with nmap finished
- starting the harvester for gathering email and subdomain information
- *******************************************************************
- * *
- * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
- * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
- * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
- * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
- * *
- * TheHarvester Ver. 2.7 *
- * Coded by Christian Martorella *
- * Edge-Security Research *
- * cmartorella@edge-security.com *
- *******************************************************************
- [-] Searching in Google:
- Searching 0 results...
- Searching 100 results...
- Searching 200 results...
- Searching 300 results...
- Searching 400 results...
- Searching 500 results...
- [+] Emails found:
- ------------------
- No emails found
- [+] Hosts found in search engines:
- ------------------------------------
- No hosts found
- the harvester finished
- starting metagoofil for gathering document maybe important
- ******************************************************
- * /\/\ ___| |_ __ _ __ _ ___ ___ / _(_) | *
- * / \ / _ \ __/ _` |/ _` |/ _ \ / _ \| |_| | | *
- * / /\/\ \ __/ || (_| | (_| | (_) | (_) | _| | | *
- * \/ \/\___|\__\__,_|\__, |\___/ \___/|_| |_|_| *
- * |___/ *
- * Metagoofil Ver 2.2 *
- * Christian Martorella *
- * Edge-Security.com *
- * cmartorella_at_edge-security.com *
- ******************************************************
- [-] Starting online search...
- [-] Searching for doc files, with a limit of 200
- Searching 100 results...
- Searching 200 results...
- Results: 0 files found
- Starting to download 50 of them:
- ----------------------------------------
- [-] Searching for pdf files, with a limit of 200
- Searching 100 results...
- Searching 200 results...
- Results: 0 files found
- Starting to download 50 of them:
- ----------------------------------------
- [-] Searching for xls files, with a limit of 200
- Searching 100 results...
- Searching 200 results...
- Results: 0 files found
- Starting to download 50 of them:
- ----------------------------------------
- [-] Searching for csv files, with a limit of 200
- Searching 100 results...
- Searching 200 results...
- Results: 0 files found
- Starting to download 50 of them:
- ----------------------------------------
- [-] Searching for txt files, with a limit of 200
- Searching 100 results...
- Searching 200 results...
- Results: 0 files found
- Starting to download 50 of them:
- ----------------------------------------
- processing
- user
- email
- [+] List of users found:
- --------------------------
- [+] List of software found:
- -----------------------------
- [+] List of paths and servers found:
- ---------------------------------------
- [+] List of e-mails found:
- ----------------------------
- metagoofil finished
- starting dnsrecon for gathering DNS record
- [*] Performing General Enumeration of Domain: ventureworlds.online
- [*] Checking for Zone Transfer for ventureworlds.online name servers
- [*] Resolving SOA Record
- [+] SOA amy.ns.cloudflare.com 173.245.58.101
- [*] Resolving NS Records
- [*] NS Servers found:
- [*] NS amy.ns.cloudflare.com 173.245.58.101
- [*] NS amy.ns.cloudflare.com 2400:cb00:2049:1::adf5:3a65
- [*] NS owen.ns.cloudflare.com 173.245.59.219
- [*] NS owen.ns.cloudflare.com 2400:cb00:2049:1::adf5:3bdb
- [*] Removing any duplicate NS server IP Addresses...
- [*]
- [*] Trying NS server 2400:cb00:2049:1::adf5:3a65
- [-] Zone Transfer Failed for 2400:cb00:2049:1::adf5:3a65!
- [-] Port 53 TCP is being filtered
- [*]
- [*] Trying NS server 2400:cb00:2049:1::adf5:3bdb
- [-] Zone Transfer Failed for 2400:cb00:2049:1::adf5:3bdb!
- [-] Port 53 TCP is being filtered
- [*]
- [*] Trying NS server 173.245.59.219
- [+] 173.245.59.219 Has port 53 TCP Open
- [-] Zone Transfer Failed!
- [-] No answer or RRset not for qname
- [*]
- [*] Trying NS server 173.245.58.101
- [+] 173.245.58.101 Has port 53 TCP Open
- [-] Zone Transfer Failed!
- [-] No answer or RRset not for qname
- [*] Checking for Zone Transfer for ventureworlds.online name servers
- [*] Resolving SOA Record
- [+] SOA amy.ns.cloudflare.com 173.245.58.101
- [*] Resolving NS Records
- [*] NS Servers found:
- [*] NS amy.ns.cloudflare.com 173.245.58.101
- [*] NS amy.ns.cloudflare.com 2400:cb00:2049:1::adf5:3a65
- [*] NS owen.ns.cloudflare.com 173.245.59.219
- [*] NS owen.ns.cloudflare.com 2400:cb00:2049:1::adf5:3bdb
- [*] Removing any duplicate NS server IP Addresses...
- [*]
- [*] Trying NS server 2400:cb00:2049:1::adf5:3a65
- [-] Zone Transfer Failed for 2400:cb00:2049:1::adf5:3a65!
- [-] Port 53 TCP is being filtered
- [*]
- [*] Trying NS server 2400:cb00:2049:1::adf5:3bdb
- [-] Zone Transfer Failed for 2400:cb00:2049:1::adf5:3bdb!
- [-] Port 53 TCP is being filtered
- [*]
- [*] Trying NS server 173.245.59.219
- [+] 173.245.59.219 Has port 53 TCP Open
- [-] Zone Transfer Failed!
- [-] No answer or RRset not for qname
- [*]
- [*] Trying NS server 173.245.58.101
- [+] 173.245.58.101 Has port 53 TCP Open
- [-] Zone Transfer Failed!
- [-] No answer or RRset not for qname
- [-] DNSSEC is not configured for ventureworlds.online
- [*] SOA amy.ns.cloudflare.com 173.245.58.101
- [*] NS amy.ns.cloudflare.com 173.245.58.101
- [*] Bind Version for 173.245.58.101 20171212
- [*] NS amy.ns.cloudflare.com 2400:cb00:2049:1::adf5:3a65
- [*] NS owen.ns.cloudflare.com 173.245.59.219
- [*] Bind Version for 173.245.59.219 20171212
- [*] NS owen.ns.cloudflare.com 2400:cb00:2049:1::adf5:3bdb
- [-] Could not Resolve MX Records for ventureworlds.online
- [*] A ventureworlds.online 104.24.110.217
- [*] A ventureworlds.online 104.24.111.217
- [*] AAAA ventureworlds.online 2400:cb00:2048:1::6818:6ed9
- [*] AAAA ventureworlds.online 2400:cb00:2048:1::6818:6fd9
- [*] Enumerating SRV Records
- [-] No SRV Records Found for ventureworlds.online
- [+] 0 Records Found
- [*] Performing Google Search Enumeration
- [-] Google has detected the search as 'bot activity, stopping search...
- dnsrecon finished
- ; <<>> DiG 9.11.2-5-Debian <<>> -x ventureworlds.online
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22301
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 1536
- ;; QUESTION SECTION:
- ;online.ventureworlds.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- in-addr.arpa. 2196 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2018013348 1800 900 604800 3600
- ;; Query time: 23 msec
- ;; SERVER: 1.1.1.1#53(1.1.1.1)
- ;; WHEN: Sun Apr 22 13:26:38 EDT 2018
- ;; MSG SIZE rcvd: 130
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [-] Enumerating subdomains now for ventureworlds.online
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- [-] Total Unique Subdomains Found: 4
- www.ventureworlds.online
- iu.ventureworlds.online
- log.ventureworlds.online
- zeeplay.ventureworlds.online
- ╔════════════════════════════════════════════════════════════════╗
- ║ Got It :v wkwkwkwkwk ║
- ╚════════════════════════════════════════════════════════════════╝
- ╔════════════════════════════════════════════════════════════════╗
- ║ Web Application Firewall Scanning Starting ║
- ╚════════════════════════════════════════════════════════════════╝
- scanning WAF with wafw00f
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://ventureworlds.online
- The site http://ventureworlds.online is behind a CloudFlare
- Number of requests: 1
- scanning finished next...
- try bypass WAF with wafninja
- ./yuki.sh: line 139: ./wafninja: Permission denied
- ╔════════════════════════════════════════════════════════════════╗
- ║ Web Application Firewall Scanning Finished ║
- ╚════════════════════════════════════════════════════════════════╝
- ╔════════════════════════════════════════════════════════════════╗
- ║ XSS Scanning Starting ║
- ╚════════════════════════════════════════════════════════════════╝
- XssPy - Finding XSS made easier
- Author: Faizan Ahmad (Fsecurify)
- Email: fsecurify@gmail.com
- Usage: XssPy.py website.com (Not www.website.com OR http://www.website.com)
- Comprehensive Scan: python XssPy.py -u website.com -e
- Verbose logging: python XssPy.py -u website.com -v
- Cookies: python XssPy.py -u website.complex -c name=val name=val
- Description: XssPy is a python tool for finding Cross Site Scripting
- vulnerabilities in websites. This tool is the first of its kind.
- Instead of just checking one page as most of the tools do, this tool
- traverses the website and find all the links and subdomains first.
- After that, it starts scanning each and every input on each and every
- page that it found while its traversal. It uses small yet effective
- payloads to search for XSS vulnerabilities. XSS in many high
- profile websites and educational institutes has been found
- by using this very tool.
- [13:27:11] Doing a short traversal.
- [13:27:11] Number of links to test are: 0
- [13:27:11] Started finding XSS
- [13:27:11] No link found, exiting
- ╔════════════════════════════════════════════════════════════════╗
- ║ XSS Scanning Finished ║
- ╚════════════════════════════════════════════════════════════════╝
- ╔════════════════════════════════════════════════════════════════╗
- ║ Web / CMS Vulnerability Scanning Starting ║
- ╚════════════════════════════════════════════════════════════════╝
- checking web with whatweb (if not run maybe not installed in your OS)
- ./yuki.sh: line 159: ./Module/WhatWeb/whatweb: Permission denied
- checking web with spaghetti
- _____ _ _ _ _
- | __|___ ___ ___| |_ ___| |_| |_|_|
- |__ | . | .'| . | | -_| _| _| |
- |_____| _|__,|_ |_|_|___|_| |_| |_|
- |_| |___| v0.1.0
- || Spaghetti - Web Application Security Scanner
- || Codename - "Pasta"
- || Momo Outaadi (M4ll0k)
- || https://github.com/m4ll0k/Spaghetti
- [+] Target: http://ventureworlds.online
- [+] IP: Host name lookup failure
- [+] Starting: 22/04/2018 13:27:12
- [+] Server: cloudflare
- [+] Firewall: CloudFlare Web Application Firewall (CloudFlare)
- [+] Uncommon header 'Cache-Control' found, with contents: no-cache
- [+] Uncommon header 'X-Frame-Options' found, with contents: SAMEORIGIN
- ╔════════════════════════════════════════════════════════════════╗
- ║ Scan Wordpress Starting ║
- ╚════════════════════════════════════════════════════════════════╝
- start scanning wpscan.rb (if not run maybe not installed in your OS)
- _______________________________________________________________
- __ _______ _____
- \ \ / / __ \ / ____|
- \ \ /\ / /| |__) | (___ ___ __ _ _ __ ®
- \ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
- \ /\ / | | ____) | (__| (_| | | | |
- \/ \/ |_| |_____/ \___|\__,_|_| |_|
- WordPress Security Scanner by the WPScan Team
- Version 2.9.3
- Sponsored by Sucuri - https://sucuri.net
- @_WPScan_, @ethicalhack3r, @erwan_lr, pvdl, @_FireFart_
- _______________________________________________________________
- [!] The remote website is up, but does not seem to be running WordPress.
- If Your OS Doesn't Have WPScan
- Dont Worry Dude I Have Alternative Scanner For You
- Next Time Use Kali Linux if you want this tool work perfectly
- _ _______
- | | | | ___ \
- | | | | |_/ /__ ___ __ _ _ __ _ __ ___ _ __
- | |/\| | __/ __|/ __/ _` | '_ \| '_ \ / _ \ '__|
- \ /\ / | \__ \ (_| (_| | | | | | | | __/ |
- \/ \/\_| |___/\___\__,_|_| |_|_| |_|\___|_|
- Wpscanner@WordPress Users Scanner
- >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
- > GITHUB : www.github.com/KyxRecon >
- > SITE : www.kyxhack.blogspot.mx >
- > >
- >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
- [+]: Scanning http://ventureworlds.online/
- [ERROR]: Could not find anything, or something went wrong!
- [+] Expected folder returned status '503', expected file returned not found status.
- [+] It is possible that http://ventureworlds.online/ is not running wordpress. If you disagree, please specify a --method.
- __ ______ ____ _
- \ \ / / _ \/ ___| ___| | ___ _
- \ \ /\ / /| |_) \___ \ / _ \ |/ / | | |
- \ V V / | __/ ___) | __/ <| |_| |
- \_/\_/ |_| |____/ \___|_|\_\\__,_|
- || WPSeku - Wordpress Security Scanner
- || Version 0.2.1
- || Momo Outaadi (M4ll0k)
- || https://github.com/m4ll0k/WPSeku
- [+] Target: http://ventureworlds.online
- [+] Starting: 22/04/2018 13:27:15
- [*] Checking sitemap...
- [-] sitemap.xml not available
- [*] Checking license...
- [-] license.txt not available
- [*] Checking robots...
- [*] Checking crossdomain...
- [-] crossdomain.xml not available
- [*] Checking readme...
- [-] readme.html not available
- [*] Checking .htaccess...
- [-] .htaccess not available
- [*] Checking xmlrpc...
- [-] XML-RPC not available
- [*] Checking Full Path Disclosure...
- [-] Full Path Disclosure not available
- [*] Checking wp-config...
- [-] wp-config not available
- [*] Checking wp-config-sample...
- [-] wp-config-sample not available
- [*] Checking wp-config backup...
- [-] wp-config.php~ backup not available
- [-] wp-config.backup backup not available
- [-] wp-config.bck backup not available
- [-] wp-config.old backup not available
- [-] wp-config.save backup not available
- [-] wp-config.bak backup not available
- [-] wp-config.copy backup not available
- [-] wp-config.tmp backup not available
- [-] wp-config.txt backup not available
- [-] wp-config.zip backup not available
- [-] wp-config.db backup not available
- [-] wp-config.dat backup not available
- [-] wp-config.tar.gz backup not available
- [-] wp-config.back backup not available
- [-] wp-config.test backup not available
- [-] wp-config.temp backup not available
- [-] wp-config.orig backup not available
- [*] Checking dir listing...
- [-] dir /wp-admin not listing enabled
- [-] dir /wp-includes not listing enabled
- [-] dir /wp-content/uploads not listing enabled
- [-] dir /wp-content/plugins not listing enabled
- [-] dir /wp-content/themes not listing enabled
- [*] Interesting headers...
- Cache-Control: no-cache
- Connection: close
- Content-Type: text/html; charset=UTF-8
- Date: Sun, 22 Apr 2018 17:27:20 GMT
- Server: cloudflare
- Set-Cookie: __cfduid=d1203ac24e9200b84a3c945598df7b8031524418040; expires=Mon, 22-Apr-19 17:27:20 GMT; path=/; domain=.ventureworlds.online; HttpOnly
- Transfer-Encoding: chunked
- X-Frame-Options: SAMEORIGIN
- [*] Checking WAF...
- [*] Checking wp-login protection...
- [*] Checking wordpress version...
- [*] Enumeration themes...
- | Not found themes
- [*] Enumeration plugins...
- [*] Enumeration usernames...
- | Not found usernames
- ╔════════════════════════════════════════════════════════════════╗
- ║ Scan Wordpress Finished ║
- ╚════════════════════════════════════════════════════════════════╝
- ╔════════════════════════════════════════════════════════════════╗
- ║ Scan Joomla Starting ║
- ╚════════════════════════════════════════════════════════════════╝
- start scanning
- ./yuki.sh: line 187: ./joomscan: Permission denied
- ^C
- Shutting down...
- ╔════════════════════════════════════════════════════════════════╗
- ║ Scan Joomla Finished ║
- ╚════════════════════════════════════════════════════════════════╝
- ╔════════════════════════════════════════════════════════════════╗
- ║ Scan Other CMS Starting ║
- ╚════════════════════════════════════════════════════════════════╝
- scan drupal cms
- [+] Expected folder returned status '503', expected file returned not found status.
- [+] It is possible that http://ventureworlds.online/ is not running drupal. If you disagree, please specify a --method.
- scan dupal cms finished next....
- scan silverstripe cms
- [+] Expected folder returned status '503', expected file returned not found status.
- [+] It is possible that http://ventureworlds.online/ is not running silverstripe. If you disagree, please specify a --method.
- scan silverstripe cms finished next.....
- scan moodle cms
- [+] Expected folder returned status '503', expected file returned not found status.
- [+] It is possible that http://ventureworlds.online/ is not running moodle. If you disagree, please specify a --method.
- scan moodle cms finished next.....
- ╔════════════════════════════════════════════════════════════════╗
- ║ Scan Other CMS Finished ║
- ╚════════════════════════════════════════════════════════════════╝
- ╔════════════════════════════════════════════════════════════════╗
- ║ Web / CMS Vulnerability Scanning Finished ║
- ╚════════════════════════════════════════════════════════════════╝
- ╔════════════════════════════════════════════════════════════════╗
- ║ SSL Vulnerability Scanning Starting ║
- ╚════════════════════════════════════════════════════════════════╝
- starting sslscan (if not run maybe not installed in your OS)
- Version: 1.11.10-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Testing SSL server ventureworlds.online on port 443 using SNI name ventureworlds.online
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-ECDSA-CHACHA20-POLY1305 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA384 Curve P-256 DHE 256
- Preferred TLSv1.1 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
- Preferred TLSv1.0 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
- ^C
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement