Advertisement
Guest User

#OPISIS Anonymous JTSEC full recon #1

a guest
Oct 19th, 2017
1,649
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 257.35 KB | None | 0 0
  1. #######################################################################################################################################
  2. Hostname alsomod-iea.info ISP Cloudflare Inc (AS13335)
  3. Continent North America Flag
  4. US
  5. Country United States Country Code US (USA)
  6. Region Unknown Local time 19 Oct 2017 04:11 CDT
  7. Metropolis Unknown Postal Code Unknown
  8. City Unknown Latitude 37.751
  9. IP Address 104.27.133.197 Longitude -97.822
  10. #######################################################################################################################################
  11.  
  12. #OPISIS Anonymous JTSEC full recon #1
  13.  
  14. [i] Scanning Site: http://alsomod-iea.info
  15.  
  16.  
  17.  
  18. B A S I C I N F O
  19. ====================
  20.  
  21.  
  22. [+] Site Title: مجلة الصمود الإسلامية – مجلة إسلامية شهرية يصدرها المركز الإعلامي لإمارة أفغانستان الإسلامية
  23. [+] IP address: 104.27.133.197
  24. [+] Web Server: cloudflare-nginx
  25. [+] CMS: WordPress
  26. [+] Cloudflare: Detected
  27. [+] Robots File: Could NOT Find robots.txt!
  28.  
  29.  
  30.  
  31.  
  32. W H O I S L O O K U P
  33. ========================
  34.  
  35. Domain Name: ALSOMOD-IEA.INFO
  36. Registry Domain ID: D503300000017088517-LRMS
  37. Registrar WHOIS Server:
  38. Registrar URL: www.ilovewww.com
  39. Updated Date: 2017-07-18T11:54:10Z
  40. Creation Date: 2016-08-13T03:32:43Z
  41. Registry Expiry Date: 2019-08-13T03:32:43Z
  42. Registrar Registration Expiration Date:
  43. Registrar: Shinjiru MSC Sdn Bhd
  44. Registrar IANA ID: 1741
  45. Registrar Abuse Contact Email:
  46. Registrar Abuse Contact Phone:
  47. Reseller:
  48. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  49. Registry Registrant ID: C172339866-LRMS
  50. Registrant Name: adil madani
  51. Registrant Organization: nunn.asia
  52. Registrant Street: doha
  53. Registrant City: doha
  54. Registrant State/Province: doha
  55. Registrant Postal Code: 6669
  56. Registrant Country: QA
  57. Registrant Phone: +974.55653730
  58. Registrant Phone Ext:
  59. Registrant Fax:
  60. Registrant Fax Ext:
  61. Registrant Email: adilmadani@yahoo.com
  62. Registry Admin ID: C172339867-LRMS
  63. Admin Name: adil madani
  64. Admin Organization: nunn.asia
  65. Admin Street: doha
  66. Admin City: doha
  67. Admin State/Province: doha
  68. Admin Postal Code: 6669
  69. Admin Country: QA
  70. Admin Phone: +974.55653730
  71. Admin Phone Ext:
  72. Admin Fax:
  73. Admin Fax Ext:
  74. Admin Email: adilmadani@yahoo.com
  75. Registry Tech ID: C172339868-LRMS
  76. Tech Name: adil madani
  77. Tech Organization: nunn.asia
  78. Tech Street: doha
  79. Tech City: doha
  80. Tech State/Province: doha
  81. Tech Postal Code: 6669
  82. Tech Country: QA
  83. Tech Phone: +974.55653730
  84. Tech Phone Ext:
  85. Tech Fax:
  86. Tech Fax Ext:
  87. Tech Email: adilmadani@yahoo.com
  88. Registry Billing ID: C172339869-LRMS
  89. Billing Name: adil madani
  90. Billing Organization: nunn.asia
  91. Billing Street: doha
  92. Billing City: doha
  93. Billing State/Province: doha
  94. Billing Postal Code: 6669
  95. Billing Country: QA
  96. Billing Phone: +974.55653730
  97. Billing Phone Ext:
  98. Billing Fax:
  99. Billing Fax Ext:
  100. Billing Email: adilmadani@yahoo.com
  101. Name Server: ZARA.NS.CLOUDFLARE.COM
  102. Name Server: LLOYD.NS.CLOUDFLARE.COM
  103. DNSSEC: unsigned
  104. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  105. >>> Last update of WHOIS database: 2017-10-19T09:13:44Z <<<
  106.  
  107. For more information on Whois status codes, please visit https://icann.org/epp
  108.  
  109.  
  110.  
  111.  
  112.  
  113. G E O I P L O O K U P
  114. =========================
  115.  
  116. [i] IP Address: 104.27.132.197
  117. [i] Country: US
  118. [i] State: N/A
  119. [i] City: N/A
  120. [i] Latitude: 37.750999
  121. [i] Longitude: -97.821999
  122.  
  123.  
  124.  
  125.  
  126. H T T P H E A D E R S
  127. =======================
  128.  
  129.  
  130. [i] HTTP/1.1 200 OK
  131. [i] Date: Thu, 19 Oct 2017 09:14:46 GMT
  132. [i] Content-Type: text/html; charset=UTF-8
  133. [i] Connection: close
  134. [i] Set-Cookie: __cfduid=d91a36fb3ac605f4727bef8f89566db3b1508404485; expires=Fri, 19-Oct-18 09:14:45 GMT; path=/; domain=.alsomod-iea.info; HttpOnly
  135. [i] X-Powered-By: PHP/5.5.38
  136. [i] Link: <http://www.alsomood.com/index.php?rest_route=/>; rel="https://api.w.org/"
  137. [i] Server: cloudflare-nginx
  138. [i] CF-RAY: 3b02a103e1533bf3-CDG
  139.  
  140.  
  141.  
  142.  
  143. D N S L O O K U P
  144. ===================
  145.  
  146. alsomod-iea.info. 296 IN A 104.27.133.197
  147. alsomod-iea.info. 296 IN A 104.27.132.197
  148. alsomod-iea.info. 3789 IN HINFO "ANY obsoleted" "See draft-ietf-dnsop-refuse-any"
  149.  
  150.  
  151.  
  152.  
  153. S U B N E T C A L C U L A T I O N
  154. ====================================
  155.  
  156. Address = 104.27.133.197
  157. Network = 104.27.133.197 / 32
  158. Netmask = 255.255.255.255
  159. Broadcast = not needed on Point-to-Point links
  160. Wildcard Mask = 0.0.0.0
  161. Hosts Bits = 0
  162. Max. Hosts = 1 (2^0 - 0)
  163. Host Range = { 104.27.133.197 - 104.27.133.197 }
  164.  
  165.  
  166.  
  167. N M A P P O R T S C A N
  168. ============================
  169.  
  170.  
  171. Starting Nmap 7.01 ( https://nmap.org ) at 2017-10-19 09:14 UTC
  172. Nmap scan report for alsomod-iea.info (104.27.133.197)
  173. Host is up (0.0077s latency).
  174. Other addresses for alsomod-iea.info (not scanned): 104.27.132.197
  175. PORT STATE SERVICE VERSION
  176. 21/tcp filtered ftp
  177. 22/tcp filtered ssh
  178. 23/tcp filtered telnet
  179. 25/tcp filtered smtp
  180. 80/tcp open http Cloudflare nginx
  181. 110/tcp filtered pop3
  182. 143/tcp filtered imap
  183. 443/tcp open ssl/http Cloudflare nginx
  184. 445/tcp filtered microsoft-ds
  185. 3389/tcp filtered ms-wbt-server
  186.  
  187. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  188. Nmap done: 1 IP address (1 host up) scanned in 14.05 seconds
  189.  
  190.  
  191.  
  192. S U B - D O M A I N F I N D E R
  193. ==================================
  194.  
  195.  
  196. [i] Total Subdomains Found : 2
  197.  
  198. [+] Subdomain: alsomod-iea.info
  199. [-] IP: 104.27.132.197
  200.  
  201. [+] Subdomain: alsomod-iea.info
  202. [-] IP: 104.27.133.197
  203. [*] Performing TLD Brute force Enumeration against alsomod-iea.info
  204. [*] The operation could take up to: 00:01:07
  205. [*] A alsomod-iea.biz.af 5.45.75.45
  206. [*] A alsomod-iea.co.asia 91.195.240.135
  207. [*] CNAME alsomod-iea.biz.at free.biz.at
  208. [*] A free.biz.at 216.92.134.29
  209. [*] A alsomod-iea.org.aw 142.4.20.12
  210. [*] A alsomod-iea.com.ax 185.55.85.123
  211. [*] A alsomod-iea.org.ax 185.55.85.123
  212. [*] A alsomod-iea.co.ba 176.9.45.78
  213. [*] A alsomod-iea.com.ba 195.222.33.180
  214. [*] A alsomod-iea.com.be 95.173.170.166
  215. [*] A alsomod-iea.biz.by 71.18.52.2
  216. [*] A alsomod-iea.biz.bz 199.59.242.150
  217. [*] A alsomod-iea.com.cc 54.252.107.64
  218. [*] A alsomod-iea.net.cc 54.252.89.206
  219. [*] A alsomod-iea.co.cc 175.126.123.219
  220. [*] A alsomod-iea.org.ch 72.52.4.122
  221. [*] A alsomod-iea.biz.cl 185.53.178.8
  222. [*] A alsomod-iea.co.cm 85.25.140.105
  223. [*] A alsomod-iea.net.cm 85.25.140.105
  224. [*] A alsomod-iea.com.com 52.33.196.199
  225. [*] A alsomod-iea.co.com 173.192.115.17
  226. [*] A alsomod-iea.net.com 199.59.242.150
  227. [*] A alsomod-iea.org.com 23.23.86.44
  228. [*] A alsomod-iea.com 144.76.0.242
  229. [*] A alsomod-iea.com 144.76.1.130
  230. [*] CNAME alsomod-iea.biz.cm i.cns.cm
  231. [*] A i.cns.cm 118.184.56.30
  232. [*] A alsomod-iea.biz.cr 72.52.4.122
  233. [*] A alsomod-iea.biz.cx 72.52.4.122
  234. [*] A alsomod-iea.net.cz 80.250.24.177
  235. [*] A alsomod-iea.com.cz 62.109.128.30
  236. [*] A alsomod-iea.biz.cz 185.53.179.7
  237. [*] A alsomod-iea.com.de 50.56.68.37
  238. [*] CNAME alsomod-iea.co.de co.de
  239. [*] A co.de 144.76.162.245
  240. [*] CNAME alsomod-iea.org.de www.org.de
  241. [*] A www.org.de 78.47.128.8
  242. [*] A alsomod-iea.net.eu 78.46.90.98
  243. [*] A alsomod-iea.org.eu 78.46.90.98
  244. [*] A alsomod-iea.biz.fi 185.55.85.123
  245. [*] A alsomod-iea.fm 173.230.131.38
  246. [*] A alsomod-iea.biz.fm 173.230.131.38
  247. [*] A alsomod-iea.org.fr 149.202.133.35
  248. [*] A alsomod-iea.biz.gl 72.52.4.122
  249. [*] CNAME alsomod-iea.co.gp co.gp
  250. [*] A co.gp 144.76.162.245
  251. [*] A alsomod-iea.co.hn 208.100.40.203
  252. [*] CNAME alsomod-iea.net.hr net.hr
  253. [*] A net.hr 192.0.78.25
  254. [*] A net.hr 192.0.78.24
  255. [*] A alsomod-iea.co.ht 72.52.4.122
  256. [*] CNAME alsomod-iea.biz.hn parkmydomain.vhostgo.com
  257. [*] CNAME parkmydomain.vhostgo.com westuser.dopa.com
  258. [*] A westuser.dopa.com 107.186.245.119
  259. [*] A alsomod-iea.info 104.27.133.197
  260. [*] A alsomod-iea.info 104.27.132.197
  261. [*] A alsomod-iea.co.jobs 50.17.193.222
  262. [*] A alsomod-iea.com.jobs 50.19.241.165
  263. [*] A alsomod-iea.net.jobs 50.19.241.165
  264. [*] A alsomod-iea.org.jobs 50.19.241.165
  265. [*] A alsomod-iea.biz.jobs 50.19.241.165
  266. [*] A alsomod-iea.la 173.230.141.80
  267. [*] CNAME alsomod-iea.biz.li 712936.parkingcrew.net
  268. [*] A 712936.parkingcrew.net 185.53.179.29
  269. [*] A alsomod-iea.biz.lu 195.26.5.2
  270. [*] A alsomod-iea.biz.ly 64.136.20.39
  271. [*] A alsomod-iea.biz.md 72.52.4.122
  272. [*] A alsomod-iea.co.mk 87.76.31.211
  273. [*] A alsomod-iea.co.mobi 54.225.105.179
  274. [*] A alsomod-iea.biz.my 202.190.174.44
  275. [*] A alsomod-iea.co.net 188.166.216.219
  276. [*] A alsomod-iea.net.net 52.50.81.210
  277. [*] A alsomod-iea.org.net 23.23.86.44
  278. [*] A alsomod-iea.co.nl 37.97.184.204
  279. [*] A alsomod-iea.com.nl 83.98.157.102
  280. [*] A alsomod-iea.net.nl 83.98.157.102
  281. [*] A alsomod-iea.co.nr 208.100.40.202
  282. [*] A alsomod-iea.net.nu 199.102.76.78
  283. [*] CNAME alsomod-iea.co.nu co.nu
  284. [*] A co.nu 144.76.162.245
  285. [*] CNAME alsomod-iea.com.nu com.nu
  286. [*] A com.nu 144.76.162.245
  287. [*] A alsomod-iea.org.nu 80.92.84.139
  288. [*] A alsomod-iea.com.org 23.23.86.44
  289. [*] CNAME alsomod-iea.net.org pewtrusts.org
  290. [*] A pewtrusts.org 204.74.99.100
  291. [*] A alsomod-iea.ph 45.79.222.138
  292. [*] A alsomod-iea.co.ph 45.79.222.138
  293. [*] A alsomod-iea.com.ph 45.79.222.138
  294. [*] A alsomod-iea.net.ph 45.79.222.138
  295. [*] A alsomod-iea.org.ph 45.79.222.138
  296. [*] A alsomod-iea.co.pl 212.91.6.55
  297. [*] A alsomod-iea.org.pm 208.73.210.217
  298. [*] A alsomod-iea.org.pm 208.73.210.202
  299. [*] A alsomod-iea.org.pm 208.73.211.177
  300. [*] A alsomod-iea.org.pm 208.73.211.165
  301. [*] A alsomod-iea.co.ps 66.96.132.56
  302. [*] A alsomod-iea.co.pt 194.107.127.52
  303. [*] A alsomod-iea.pw 141.8.226.58
  304. [*] A alsomod-iea.co.pw 141.8.226.59
  305. [*] A alsomod-iea.net.pw 141.8.226.59
  306. [*] A alsomod-iea.biz.pw 141.8.226.59
  307. [*] A alsomod-iea.org.pw 141.8.226.59
  308. [*] CNAME alsomod-iea.biz.ps biz.ps
  309. [*] A biz.ps 144.76.162.245
  310. [*] A alsomod-iea.net.ro 69.64.52.127
  311. [*] A alsomod-iea.org.re 217.70.184.38
  312. [*] CNAME alsomod-iea.co.ro now.co.ro
  313. [*] A now.co.ro 185.27.255.9
  314. [*] A alsomod-iea.com.ru 178.210.89.119
  315. [*] A alsomod-iea.biz.se 185.53.179.6
  316. [*] CNAME alsomod-iea.net.se 773147.parkingcrew.net
  317. [*] A 773147.parkingcrew.net 185.53.179.29
  318. [*] A alsomod-iea.co.sl 91.195.240.135
  319. [*] A alsomod-iea.com.sr 143.95.106.249
  320. [*] A alsomod-iea.biz.st 91.121.28.115
  321. [*] A alsomod-iea.co.su 72.52.4.122
  322. [*] A alsomod-iea.biz.tc 64.136.20.39
  323. [*] A alsomod-iea.biz.tf 85.236.153.18
  324. [*] A alsomod-iea.net.tf 188.40.70.29
  325. [*] A alsomod-iea.net.tf 188.40.117.12
  326. [*] A alsomod-iea.net.tf 188.40.70.27
  327. [*] A alsomod-iea.co.tl 208.100.40.202
  328. [*] A alsomod-iea.co.to 175.118.124.44
  329. [*] A alsomod-iea.co.tv 31.186.25.163
  330. [*] A alsomod-iea.biz.tv 72.52.4.122
  331. [*] A alsomod-iea.org.tv 72.52.4.122
  332. [*] CNAME alsomod-iea.biz.uz biz.uz
  333. [*] A biz.uz 144.76.162.245
  334. [*] A alsomod-iea.vg 88.198.29.97
  335. [*] A alsomod-iea.co.vg 88.198.29.97
  336. [*] A alsomod-iea.com.vg 88.198.29.97
  337. [*] A alsomod-iea.net.vg 166.62.28.147
  338. [*] A alsomod-iea.biz.vg 89.31.143.20
  339. [*] A alsomod-iea.com.ws 202.4.48.211
  340. [*] A alsomod-iea.ws 64.70.19.203
  341. [*] A alsomod-iea.net.ws 202.4.48.211
  342. [*] A alsomod-iea.biz.ws 184.168.221.104
  343. [*] A alsomod-iea.org.ws 202.4.48.211
  344. #
  345. # ARIN WHOIS data and services are subject to the Terms of Use
  346. # available at: https://www.arin.net/whois_tou.html
  347. #
  348. # If you see inaccuracies in the results, please report at
  349. # https://www.arin.net/public/whoisinaccuracy/index.xhtml
  350. #
  351.  
  352.  
  353. #
  354. # The following results may also be obtained via:
  355. # https://whois.arin.net/rest/nets;q=104.27.132.197?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
  356. #
  357.  
  358. NetRange: 104.16.0.0 - 104.31.255.255
  359. CIDR: 104.16.0.0/12
  360. NetName: CLOUDFLARENET
  361. NetHandle: NET-104-16-0-0-1
  362. Parent: NET104 (NET-104-0-0-0-0)
  363. NetType: Direct Assignment
  364. OriginAS: AS13335
  365. Organization: Cloudflare, Inc. (CLOUD14)
  366. RegDate: 2014-03-28
  367. Updated: 2017-02-17
  368. Comment: All Cloudflare abuse reporting can be done via https://www.cloudflare.com/abuse
  369. Ref: https://whois.arin.net/rest/net/NET-104-16-0-0-1
  370.  
  371.  
  372.  
  373. OrgName: Cloudflare, Inc.
  374. OrgId: CLOUD14
  375. Address: 101 Townsend Street
  376. City: San Francisco
  377. StateProv: CA
  378. PostalCode: 94107
  379. Country: US
  380. RegDate: 2010-07-09
  381. Updated: 2017-02-17
  382. Comment: All Cloudflare abuse reporting can be done via https://www.cloudflare.com/abuse
  383. Ref: https://whois.arin.net/rest/org/CLOUD14
  384.  
  385.  
  386. OrgTechHandle: ADMIN2521-ARIN
  387. OrgTechName: Admin
  388. OrgTechPhone: +1-650-319-8930
  389. OrgTechEmail: rir@cloudflare.com
  390. OrgTechRef: https://whois.arin.net/rest/poc/ADMIN2521-ARIN
  391.  
  392. OrgNOCHandle: NOC11962-ARIN
  393. OrgNOCName: NOC
  394. OrgNOCPhone: +1-650-319-8930
  395. OrgNOCEmail: noc@cloudflare.com
  396. OrgNOCRef: https://whois.arin.net/rest/poc/NOC11962-ARIN
  397.  
  398. OrgAbuseHandle: ABUSE2916-ARIN
  399. OrgAbuseName: Abuse
  400. OrgAbusePhone: +1-650-319-8930
  401. OrgAbuseEmail: abuse@cloudflare.com
  402. OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE2916-ARIN
  403.  
  404. RAbuseHandle: ABUSE2916-ARIN
  405. RAbuseName: Abuse
  406. RAbusePhone: +1-650-319-8930
  407. RAbuseEmail: abuse@cloudflare.com
  408. RAbuseRef: https://whois.arin.net/rest/poc/ABUSE2916-ARIN
  409.  
  410. RTechHandle: ADMIN2521-ARIN
  411. RTechName: Admin
  412. RTechPhone: +1-650-319-8930
  413. RTechEmail: rir@cloudflare.com
  414. RTechRef: https://whois.arin.net/rest/poc/ADMIN2521-ARIN
  415.  
  416. RNOCHandle: NOC11962-ARIN
  417. RNOCName: NOC
  418. RNOCPhone: +1-650-319-8930
  419. RNOCEmail: noc@cloudflare.com
  420. RNOCRef: https://whois.arin.net/rest/poc/NOC11962-ARIN
  421.  
  422.  
  423. #
  424. # ARIN WHOIS data and services are subject to the Terms of Use
  425. # available at: https://www.arin.net/whois_tou.html
  426. #
  427. # If you see inaccuracies in the results, please report at
  428. # https://www.arin.net/public/whoisinaccuracy/index.xhtml
  429. #[92m + -- ----------------------------=[Running Nslookup]=------------------------ -- +
  430. Server: 192.168.1.254
  431. Address: 192.168.1.254#53
  432.  
  433. Non-authoritative answer:
  434. Name: alsomod-iea.info
  435. Address: 104.27.132.197
  436. Name: alsomod-iea.info
  437. Address: 104.27.133.197
  438.  
  439. alsomod-iea.info has address 104.27.133.197
  440. alsomod-iea.info has address 104.27.132.197
  441.  + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
  442.  
  443. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  444.  
  445. [+] Target is alsomod-iea.info
  446. [+] Loading modules.
  447. [+] Following modules are loaded:
  448. [x] [1] ping:icmp_ping - ICMP echo discovery module
  449. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  450. [x] [3] ping:udp_ping - UDP-based ping discovery module
  451. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  452. [x] [5] infogather:portscan - TCP and UDP PortScanner
  453. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  454. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  455. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  456. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  457. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  458. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  459. [x] [12] fingerprint:smb - SMB fingerprinting module
  460. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  461. [+] 13 modules registered
  462. [+] Initializing scan engine
  463. [+] Running scan engine
  464. [-] ping:tcp_ping module: no closed/open TCP ports known on 104.27.132.197. Module test failed
  465. [-] ping:udp_ping module: no closed/open UDP ports known on 104.27.132.197. Module test failed
  466. [-] No distance calculation. 104.27.132.197 appears to be dead or no ports known
  467. [+] Host: 104.27.132.197 is up (Guess probability: 50%)
  468. [+] Target: 104.27.132.197 is alive. Round-Trip Time: 3.05165 sec
  469. [+] Selected safe Round-Trip Time value is: 6.10331 sec
  470. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  471. [-] fingerprint:smb need either TCP port 139 or 445 to run
  472. [+] Primary guess:
  473. [+] Host 104.27.132.197 Running OS: (Guess probability: 100%)
  474. [+] Other guesses:
  475. [+] Host 104.27.132.197 Running OS: À¢^ŠlU (Guess probability: 91%)
  476. [+] Host 104.27.132.197 Running OS: (Guess probability: 91%)
  477. [+] Host 104.27.132.197 Running OS: (Guess probability: 91%)
  478. [+] Host 104.27.132.197 Running OS: À¢^ŠlU (Guess probability: 91%)
  479. [+] Host 104.27.132.197 Running OS: À¢^ŠlU (Guess probability: 91%)
  480. [+] Host 104.27.132.197 Running OS: À¢^ŠlU (Guess probability: 91%)
  481. [+] Host 104.27.132.197 Running OS: À¢^ŠlU (Guess probability: 91%)
  482. [+] Host 104.27.132.197 Running OS: (Guess probability: 91%)
  483. [+] Host 104.27.132.197 Running OS: (Guess probability: 91%)
  484. [+] Cleaning up scan engine
  485. [+] Modules deinitialized
  486. [+] Execution completed.
  487.  + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
  488. Domain Name: ALSOMOD-IEA.INFO
  489. Registry Domain ID: D503300000017088517-LRMS
  490. Registrar WHOIS Server:
  491. Registrar URL: www.ilovewww.com
  492. Updated Date: 2017-07-18T11:54:10Z
  493. Creation Date: 2016-08-13T03:32:43Z
  494. Registry Expiry Date: 2019-08-13T03:32:43Z
  495. Registrar Registration Expiration Date:
  496. Registrar: Shinjiru MSC Sdn Bhd
  497. Registrar IANA ID: 1741
  498. Registrar Abuse Contact Email:
  499. Registrar Abuse Contact Phone:
  500. Reseller:
  501. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  502. Registry Registrant ID: C172339866-LRMS
  503. Registrant Name: adil madani
  504. Registrant Organization: nunn.asia
  505. Registrant Street: doha
  506. Registrant City: doha
  507. Registrant State/Province: doha
  508. Registrant Postal Code: 6669
  509. Registrant Country: QA
  510. Registrant Phone: +974.55653730
  511. Registrant Phone Ext:
  512. Registrant Fax:
  513. Registrant Fax Ext:
  514. Registrant Email: adilmadani@yahoo.com
  515. Registry Admin ID: C172339867-LRMS
  516. Admin Name: adil madani
  517. Admin Organization: nunn.asia
  518. Admin Street: doha
  519. Admin City: doha
  520. Admin State/Province: doha
  521. Admin Postal Code: 6669
  522. Admin Country: QA
  523. Admin Phone: +974.55653730
  524. Admin Phone Ext:
  525. Admin Fax:
  526. Admin Fax Ext:
  527. Admin Email: adilmadani@yahoo.com
  528. Registry Tech ID: C172339868-LRMS
  529. Tech Name: adil madani
  530. Tech Organization: nunn.asia
  531. Tech Street: doha
  532. Tech City: doha
  533. Tech State/Province: doha
  534. Tech Postal Code: 6669
  535. Tech Country: QA
  536. Tech Phone: +974.55653730
  537. Tech Phone Ext:
  538. Tech Fax:
  539. Tech Fax Ext:
  540. Tech Email: adilmadani@yahoo.com
  541. Registry Billing ID: C172339869-LRMS
  542. Billing Name: adil madani
  543. Billing Organization: nunn.asia
  544. Billing Street: doha
  545. Billing City: doha
  546. Billing State/Province: doha
  547. Billing Postal Code: 6669
  548. Billing Country: QA
  549. Billing Phone: +974.55653730
  550. Billing Phone Ext:
  551. Billing Fax:
  552. Billing Fax Ext:
  553. Billing Email: adilmadani@yahoo.com
  554. Name Server: ZARA.NS.CLOUDFLARE.COM
  555. Name Server: LLOYD.NS.CLOUDFLARE.COM
  556. DNSSEC: unsigned
  557. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  558. >>> Last update of WHOIS database: 2017-10-19T09:14:00Z <<<
  559.  
  560. For more information on Whois status codes, please visit https://icann.org/epp
  561.  
  562. Access to AFILIAS WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Afilias registry database. The data in this record is provided by Afilias Limited for informational purposes only, and Afilias does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Afilias reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.
  563.  + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
  564.  
  565. *******************************************************************
  566. * *
  567. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  568. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  569. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  570. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  571. * *
  572. * TheHarvester Ver. 2.7 *
  573. * Coded by Christian Martorella *
  574. * Edge-Security Research *
  575. * cmartorella@edge-security.com *
  576. *******************************************************************
  577.  
  578.  
  579. [-] Searching in Bing:
  580. Searching 50 results...
  581. Searching 100 results...
  582.  
  583.  
  584. [+] Emails found:
  585. ------------------
  586. No emails found
  587.  
  588. [+] Hosts found in search engines:
  589. ------------------------------------
  590. [-] Resolving hostnames IPs...
  591. 104.27.133.197:www.alsomod-iea.info
  592.  + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
  593.  
  594. ; <<>> DiG 9.10.3-P4-Debian <<>> -x alsomod-iea.info
  595. ;; global options: +cmd
  596. ;; Got answer:
  597. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1512
  598. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  599.  
  600. ;; OPT PSEUDOSECTION:
  601. ; EDNS: version: 0, flags:; udp: 4096
  602. ;; QUESTION SECTION:
  603. ;info.alsomod-iea.in-addr.arpa. IN PTR
  604.  
  605. ;; AUTHORITY SECTION:
  606. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017043288 1800 900 604800 3600
  607.  
  608. ;; Query time: 37 msec
  609. ;; SERVER: 192.168.1.254#53(192.168.1.254)
  610. ;; WHEN: Thu Oct 19 05:15:20 EDT 2017
  611. ;; MSG SIZE rcvd: 126
  612.  
  613. dnsenum VERSION:1.2.4
  614. 
  615. ----- alsomod-iea.info -----
  616. 
  617.  
  618. Host's addresses:
  619. __________________
  620.  
  621. alsomod-iea.info. 233 IN A 104.27.133.197
  622. alsomod-iea.info. 233 IN A 104.27.132.197
  623. 
  624.  
  625. Name Servers:
  626. ______________
  627.  
  628. lloyd.ns.cloudflare.com. 86400 IN A 173.245.59.197
  629. zara.ns.cloudflare.com. 82114 IN A 173.245.58.148
  630. 
  631.  
  632. Mail (MX) Servers:
  633. ___________________
  634.  
  635. 
  636.  
  637. Trying Zone Transfers and getting Bind Versions:
  638. _________________________________________________
  639.  
  640. 
  641. Trying Zone Transfer for alsomod-iea.info on lloyd.ns.cloudflare.com ...
  642.  
  643. Trying Zone Transfer for alsomod-iea.info on zara.ns.cloudflare.com ...
  644.  
  645. brute force file not specified, bay.
  646.  + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
  647. 
  648. ____ _ _ _ _ _____
  649. / ___| _ _| |__ | (_)___| |_|___ / _ __
  650. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  651. ___) | |_| | |_) | | \__ \ |_ ___) | |
  652. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  653.  
  654. # Coded By Ahmed Aboul-Ela - @aboul3la
  655.  
  656. [-] Enumerating subdomains now for alsomod-iea.info
  657. [-] verbosity is enabled, will show the subdomains results in realtime
  658. [-] Searching now in Baidu..
  659. [-] Searching now in Yahoo..
  660. [-] Searching now in Google..
  661. [-] Searching now in Bing..
  662. [-] Searching now in Ask..
  663. [-] Searching now in Netcraft..
  664. [-] Searching now in DNSdumpster..
  665. [-] Searching now in Virustotal..
  666. [-] Searching now in ThreatCrowd..
  667. [-] Searching now in SSL Certificates..
  668. [-] Searching now in PassiveDNS..
  669. Virustotal: www.alsomod-iea.info
  670. [-] Saving results to file: /usr/share/sniper/loot/domains/domains-alsomod-iea.info.txt
  671. [-] Total Unique Subdomains Found: 1
  672. www.alsomod-iea.info
  673.  
  674.  ╔═╗╩═╗╔╩╗╔═╗╩ ╩
  675.  ║ ╠╩╝ ║ ╚═╗╠═╣
  676.  ╚═╝╩╚═ ╩o╚═╝╩ ╩
  677.  + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
  678. 
  679. *.alsomod-iea.info
  680.  [+] Domains saved to: /usr/share/sniper/loot/domains/domains-alsomod-iea.info-full.txt
  681. 
  682.  + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
  683.  + -- ----------------------------=[Checking Email Security]=----------------- -- +
  684.  
  685.  + -- ----------------------------=[Pinging host]=---------------------------- -- +
  686. PING alsomod-iea.info (104.27.132.197) 56(84) bytes of data.
  687. 64 bytes from 104.27.132.197 (104.27.132.197): icmp_seq=1 ttl=58 time=114 ms
  688.  
  689. --- alsomod-iea.info ping statistics ---
  690. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  691. rtt min/avg/max/mdev = 114.808/114.808/114.808/0.000 ms
  692.  
  693.  + -- ----------------------------=[Running TCP port scan]=------------------- -- +
  694.  
  695. Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-19 05:15 EDT
  696. Nmap scan report for alsomod-iea.info (104.27.133.197)
  697. Host is up (0.12s latency).
  698. Other addresses for alsomod-iea.info (not scanned): 104.27.132.197
  699. Not shown: 45 filtered ports
  700. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  701. PORT STATE SERVICE
  702. 80/tcp open http
  703. 443/tcp open https
  704. 8080/tcp open http-proxy
  705. 8443/tcp open https-alt
  706.  
  707. Nmap done: 1 IP address (1 host up) scanned in 15.52 seconds
  708.  
  709.  + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
  710.  + -- --=[Port 21 closed... skipping.
  711.  + -- --=[Port 22 closed... skipping.
  712.  + -- --=[Port 23 closed... skipping.
  713.  + -- --=[Port 25 closed... skipping.
  714.  + -- --=[Port 53 closed... skipping.
  715.  + -- --=[Port 79 closed... skipping.
  716.  + -- --=[Port 80 opened... running tests...
  717.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  718.  
  719. ^ ^
  720. _ __ _ ____ _ __ _ _ ____
  721. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  722. | V V // o // _/ | V V // 0 // 0 // _/
  723. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  724. <
  725. ...'
  726.  
  727. WAFW00F - Web Application Firewall Detection Tool
  728.  
  729. By Sandro Gauci && Wendel G. Henrique
  730.  
  731. Checking http://alsomod-iea.info
  732. The site http://alsomod-iea.info is behind a CloudFlare
  733. Number of requests: 1
  734.  
  735.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  736. http://alsomod-iea.info [200 OK] CloudFlare, Cookies[__cfduid], Country[UNITED STATES][US], HTML5, HTTPServer[cloudflare-nginx], HttpOnly[__cfduid], IP[104.27.132.197], JQuery, MetaGenerator[WordPress 4.8.2], PHP[5.5.38][alsomodcom][/home/alsomodcom/public_html/wp-content/themes/jarida__/panel/category-options.php], Script[text/javascript], Title[مجلة الصمود الإسلامية &#8211; مجلة إسلامية ؎هرية يصدرها المركز الإعلامي لإمارة أفغانستان الإسلامية], UncommonHeaders[link,cf-ray], WordPress[4.8.2], X-Powered-By[PHP/5.5.38], X-UA-Compatible[IE=edge]
  737.  
  738.  __ ______ _____ 
  739.  \ \/ / ___|_ _|
  740.  \ /\___ \ | | 
  741.  / \ ___) || | 
  742.  /_/\_|____/ |_| 
  743.  
  744. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  745. + -- --=[Target: alsomod-iea.info:80
  746. + -- --=[Site not vulnerable to Cross-Site Tracing!
  747. + -- --=[Site not vulnerable to Host Header Injection!
  748. + -- --=[Site vulnerable to Cross-Frame Scripting!
  749. + -- --=[Site vulnerable to Clickjacking!
  750.  
  751. HTTP/1.1 405 Not Allowed
  752. Date: Thu, 19 Oct 2017 09:16:29 GMT
  753. Content-Type: text/html
  754. Content-Length: 177
  755. Connection: close
  756. Server: -nginx
  757. CF-RAY: -
  758.  
  759. <html>
  760. <head><title>405 Not Allowed</title></head>
  761. <body bgcolor="white">
  762. <center><h1>405 Not Allowed</h1></center>
  763. <hr><center>cloudflare-nginx</center>
  764. </body>
  765. </html>
  766. 
  767. HTTP/1.1 200 OK
  768. Date: Thu, 19 Oct 2017 09:16:30 GMT
  769. Content-Type: text/html; charset=UTF-8
  770. Transfer-Encoding: chunked
  771. Connection: keep-alive
  772. Set-Cookie: __cfduid=dcc01985920efea2ee1271b952f0da8e11508404589; expires=Fri, 19-Oct-18 09:16:29 GMT; path=/; domain=.alsomod-iea.info; HttpOnly
  773. X-Powered-By: PHP/5.5.38
  774. Link: <http://www.alsomood.com/index.php?rest_route=/>; rel="https://api.w.org/"
  775. Server: cloudflare-nginx
  776. CF-RAY: 3b02a38e96986950-CDG
  777.  
  778. 2cb
  779. <!DOCTYPE html>
  780. <html dir="rtl" lang="ar" prefix="og: http://ogp.me/ns#">
  781. <head>
  782. <meta charset="UTF-8" />
  783. <script type="text/javascript">
  784. //<![CDATA[
  785. window.__cfRocketOptions = {byc:0,p:0,petok:"9b5661c07428359146dc472963b24be7ec4c6c4b-1508404590-1800"};
  786. //]]>
  787. </script>
  788. <script type="text/javascript" src="https://ajax.cloudflare.com/cdn-cgi/scripts/78d64697/cloudflare-static/rocket.min.js"></script>
  789. <link rel="profile" href="http://gmpg.org/xfn/11" />
  790. <link rel="pingback" href="http://www.alsomood.com/xmlrpc.php" />
  791. <title>مجلة الصمود الإسÙ
  792.  
  793.  
  794.  
  795.  + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
  796. + -- --=[Checking if X-Content options are enabled on alsomod-iea.info... 
  797.  
  798. + -- --=[Checking if X-Frame options are enabled on alsomod-iea.info... 
  799.  
  800. + -- --=[Checking if X-XSS-Protection header is enabled on alsomod-iea.info... 
  801.  
  802. + -- --=[Checking HTTP methods on alsomod-iea.info... 
  803.  
  804. + -- --=[Checking if TRACE method is enabled on alsomod-iea.info... 
  805.  
  806. + -- --=[Checking for META tags on alsomod-iea.info... 
  807. <p class="post-meta">
  808. <p class="post-meta">
  809. <p class="post-meta">
  810. <p class="post-meta">
  811. <p class="post-meta">
  812. <p class="post-meta">
  813. <p class="post-meta">
  814. <p class="post-meta">
  815. <p class="post-meta">
  816. <p class="post-meta">
  817.  
  818. + -- --=[Checking for open proxy on alsomod-iea.info... 
  819. </div><!-- /#cf-wrapper -->
  820.  
  821. <script type="text/javascript">
  822. window._cf_translation = {};
  823.  
  824.  
  825. </script>
  826.  
  827. </body>
  828. </html>
  829.  
  830. + -- --=[Enumerating software on alsomod-iea.info... 
  831. X-Powered-By: PHP/5.5.38
  832. Link: <http://www.alsomood.com/index.php?rest_route=/>; rel="https://api.w.org/"
  833. Server: cloudflare-nginx
  834.  
  835. + -- --=[Checking if Strict-Transport-Security is enabled on alsomod-iea.info... 
  836.  
  837. + -- --=[Checking for Flash cross-domain policy on alsomod-iea.info... 
  838. require.paths.backbone =
  839. require.paths.underscore =
  840. require.paths.handlebars =
  841. require.paths.jquery = '/cdn-cgi/se/javascripts';
  842.  
  843. require(['smarterror']);
  844. });
  845. </script>
  846. </body>
  847. </html>
  848.  
  849. + -- --=[Checking for Silverlight cross-domain policy on alsomod-iea.info... 
  850. require.paths.backbone =
  851. require.paths.underscore =
  852. require.paths.handlebars =
  853. require.paths.jquery = '/cdn-cgi/se/javascripts';
  854.  
  855. require(['smarterror']);
  856. });
  857. </script>
  858. </body>
  859. </html>
  860.  
  861. + -- --=[Checking for HTML5 cross-origin resource sharing on alsomod-iea.info... 
  862.  
  863. + -- --=[Retrieving robots.txt on alsomod-iea.info... 
  864. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  865. <html><head>
  866. <title>404 Not Found</title>
  867. </head><body>
  868. <h1>Not Found</h1>
  869. <p>The requested URL /robots.txt was not found on this server.</p>
  870. <p>Additionally, a 404 Not Found
  871. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  872. </body></html>
  873.  
  874. + -- --=[Retrieving sitemap.xml on alsomod-iea.info... 
  875. require.paths.backbone =
  876. require.paths.underscore =
  877. require.paths.handlebars =
  878. require.paths.jquery = '/cdn-cgi/se/javascripts';
  879.  
  880. require(['smarterror']);
  881. });
  882. </script>
  883. </body>
  884. </html>
  885.  
  886. + -- --=[Checking cookie attributes on alsomod-iea.info... 
  887. Set-Cookie: __cfduid=d55ed560eafeafc6bc87bc307c1bc40771508404608; expires=Fri, 19-Oct-18 09:16:48 GMT; path=/; domain=.alsomod-iea.info; HttpOnly
  888.  
  889. + -- --=[Checking for ASP.NET Detailed Errors on alsomod-iea.info... 
  890. try{if (!window.CloudFlare) {var CloudFlare=[{verbose:0,p:0,byc:0,owlid:"cf",bag2:1,mirage2:0,oracle:0,paths:{cloudflare:"https://ajax.cloudflare.com/cdn-cgi/nexp/dok3v=9eecb7db59/","cloudflare-static": "https://ajax.cloudflare.com/cdn-cgi/scripts/78d64697/"},atok:"42ad2f161cb67605632d82b1a84abc73",petok:"dd9111220107fc785e688511dc02f1b42467101d-1508404609-1800",zone:"alsomod-iea.info"}];CloudFlare.push({"apps":{"smarterror":{"swiftype":{"engine_id":"alsomod-iea-dot-info","engine_key":"xGgay5XGy3hbqijGh9nQ","enabled":1}}}});!function(a,b){a=document.createElement("script"),b=document.getElementsByTagName("script")[0],a.async=!0,a.src="https://ajax.cloudflare.com/cdn-cgi/nexp/dok3v=c37cbdadf2/cloudflare.min.js",b.parentNode.insertBefore(a,b)}()}}catch(e){};
  891. <div class="smart-error">
  892. <p>SmartErrors powered by <span><a rel="nofollow" href="https://www.cloudflare.com/5xx-error-landing?utm_source=smart_error">Cloudflare</a></span><span><a rel="nofollow" href="https://www.cloudflare.com/security-policy">Privacy policy</a></span></p>
  893. require.paths.smarterror =
  894. require(['smarterror']);
  895. try{if (!window.CloudFlare) {var CloudFlare=[{verbose:0,p:0,byc:0,owlid:"cf",bag2:1,mirage2:0,oracle:0,paths:{cloudflare:"https://ajax.cloudflare.com/cdn-cgi/nexp/dok3v=9eecb7db59/","cloudflare-static": "https://ajax.cloudflare.com/cdn-cgi/scripts/78d64697/"},atok:"42ad2f161cb67605632d82b1a84abc73",petok:"dd9111220107fc785e688511dc02f1b42467101d-1508404609-1800",zone:"alsomod-iea.info"}];CloudFlare.push({"apps":{"smarterror":{"swiftype":{"engine_id":"alsomod-iea-dot-info","engine_key":"xGgay5XGy3hbqijGh9nQ","enabled":1}}}});!function(a,b){a=document.createElement("script"),b=document.getElementsByTagName("script")[0],a.async=!0,a.src="https://ajax.cloudflare.com/cdn-cgi/nexp/dok3v=c37cbdadf2/cloudflare.min.js",b.parentNode.insertBefore(a,b)}()}}catch(e){};
  896. <div class="smart-error">
  897. <p>SmartErrors powered by <span><a rel="nofollow" href="https://www.cloudflare.com/5xx-error-landing?utm_source=smart_error">Cloudflare</a></span><span><a rel="nofollow" href="https://www.cloudflare.com/security-policy">Privacy policy</a></span></p>
  898. require.paths.smarterror =
  899. require(['smarterror']);
  900.  
  901. 
  902.  + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
  903. - Nikto v2.1.6
  904. ---------------------------------------------------------------------------
  905. + Target IP: 104.27.133.197
  906. + Target Hostname: alsomod-iea.info
  907. + Target Port: 80
  908. + Start Time: 2017-10-19 05:16:50 (GMT-4)
  909. ---------------------------------------------------------------------------
  910. + Server: cloudflare-nginx
  911. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  912. + Uncommon header 'cf-ray' found, with contents: 3b02a412636c3c23-CDG
  913. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  914. + All CGI directories 'found', use '-C none' to test none
  915. + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
  916. + 26097 requests: 0 error(s) and 3 item(s) reported on remote host
  917. + End Time: 2017-10-19 07:12:18 (GMT-4) (6928 seconds)
  918. ---------------------------------------------------------------------------
  919. + 1 host(s) tested
  920.  + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
  921. [+] Screenshot saved to /usr/share/sniper/loot/screenshots/alsomod-iea.info-port80.jpg
  922.  + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +
  923.  + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +
  924.  
  925.  _____  .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
  926.  (_____) 01 01N. C 01 C 01 .01. 01  01 Yb 01 .01.
  927.  (() ()) 01 C YCb C 01 C 01 ,C9 01  01 dP 01 ,C9
  928.  \ /  01 C .CN. C 01 C 0101dC9 01  01'''bg. 0101dC9
  929.  \ /  01 C .01.C 01 C 01 YC. 01 ,  01 .Y 01 YC.
  930.  /=\  01 C Y01 YC. ,C 01 .Cb. 01 ,C  01 ,9 01 .Cb.
  931.  [___]  .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
  932.  
  933. __[ ! ] Neither war between hackers, nor peace for the system.
  934. __[ ! ] http://blog.inurl.com.br
  935. __[ ! ] http://fb.com/InurlBrasil
  936. __[ ! ] http://twitter.com/@googleinurl
  937. __[ ! ] http://github.com/googleinurl
  938. __[ ! ] Current PHP version::[ 7.0.22-3 ]
  939. __[ ! ] Current script owner::[ root ]
  940. __[ ! ] Current uname::[ Linux Kali 4.13.0-kali1-amd64 #1 SMP Debian 4.13.4-2kali1 (2017-10-16) x86_64 ]
  941. __[ ! ] Current pwd::[ /usr/share/sniper ]
  942. __[ ! ] Help: php inurlbr.php --help
  943. ------------------------------------------------------------------------------------------------------------------------
  944.  
  945. [ ! ] Starting SCANNER INURLBR 2.1 at [19-10-2017 07:13:17]
  946. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  947. It is the end user's responsibility to obey all applicable local, state and federal laws.
  948. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  949.  
  950. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-alsomod-iea.info.txt ]
  951. [ INFO ][ DORK ]::[ site:alsomod-iea.info ]
  952. [ INFO ][ SEARCHING ]:: {
  953. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.to ]
  954.  
  955. [ INFO ][ SEARCHING ]:: 
  956. -[:::]
  957. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  958.  
  959. [ INFO ][ SEARCHING ]:: 
  960. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  961. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.fj ID: 010479943387663786936:wjwf2xkhfmq ]
  962.  
  963. [ INFO ][ SEARCHING ]:: 
  964. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  965.  
  966. [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
  967.  
  968. 
  969.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  970. |_[ + ] [ 0 / 100 ]-[07:13:31] [ - ] 
  971. |_[ + ] Target:: [ http://alsomod-iea.info/ ]
  972. |_[ + ] Exploit:: 
  973. |_[ + ] Information Server:: , , IP::0 
  974. |_[ + ] More details:: 
  975. |_[ + ] Found:: UNIDENTIFIED
  976. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  977. 
  978.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  979. |_[ + ] [ 1 / 100 ]-[07:13:41] [ - ] 
  980. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14398 ]
  981. |_[ + ] Exploit:: 
  982. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  983. |_[ + ] More details::  / - / , ISP: 
  984. |_[ + ] Found:: UNIDENTIFIED
  985. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 434 bytes received
  986. 
  987.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  988. |_[ + ] [ 2 / 100 ]-[07:13:45] [ - ] 
  989. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14195 ]
  990. |_[ + ] Exploit:: 
  991. |_[ + ] Information Server:: , , IP::0 
  992. |_[ + ] More details:: 
  993. |_[ + ] Found:: UNIDENTIFIED
  994. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  995. 
  996.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  997. |_[ + ] [ 3 / 100 ]-[07:13:49] [ - ] 
  998. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=1175 ]
  999. |_[ + ] Exploit:: 
  1000. |_[ + ] Information Server:: , , IP::0 
  1001. |_[ + ] More details:: 
  1002. |_[ + ] Found:: UNIDENTIFIED
  1003. |_[ + ] ERROR CONECTION:: Failed to connect to www.alsomod-iea.info port 80: Connection timed out
  1004. 
  1005.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1006. |_[ + ] [ 4 / 100 ]-[07:13:53] [ - ] 
  1007. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17047 ]
  1008. |_[ + ] Exploit:: 
  1009. |_[ + ] Information Server:: , , IP::0 
  1010. |_[ + ] More details:: 
  1011. |_[ + ] Found:: UNIDENTIFIED
  1012. |_[ + ] ERROR CONECTION:: Failed to connect to www.alsomod-iea.info port 80: Connection timed out
  1013. 
  1014.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1015. |_[ + ] [ 5 / 100 ]-[07:13:56] [ - ] 
  1016. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17469 ]
  1017. |_[ + ] Exploit:: 
  1018. |_[ + ] Information Server:: , , IP::0 
  1019. |_[ + ] More details:: 
  1020. |_[ + ] Found:: UNIDENTIFIED
  1021. |_[ + ] ERROR CONECTION:: Failed to connect to www.alsomod-iea.info port 80: Connection timed out
  1022. 
  1023.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1024. |_[ + ] [ 6 / 100 ]-[07:14:00] [ - ] 
  1025. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12249 ]
  1026. |_[ + ] Exploit:: 
  1027. |_[ + ] Information Server:: , , IP::0 
  1028. |_[ + ] More details:: 
  1029. |_[ + ] Found:: UNIDENTIFIED
  1030. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  1031. 
  1032.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1033. |_[ + ] [ 7 / 100 ]-[07:14:04] [ - ] 
  1034. |_[ + ] Target:: [ http://alsomod-iea.info/?p=2654 ]
  1035. |_[ + ] Exploit:: 
  1036. |_[ + ] Information Server:: , , IP::0 
  1037. |_[ + ] More details:: 
  1038. |_[ + ] Found:: UNIDENTIFIED
  1039. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  1040. 
  1041.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1042. |_[ + ] [ 8 / 100 ]-[07:14:08] [ - ] 
  1043. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12130 ]
  1044. |_[ + ] Exploit:: 
  1045. |_[ + ] Information Server:: , , IP::0 
  1046. |_[ + ] More details:: 
  1047. |_[ + ] Found:: UNIDENTIFIED
  1048. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  1049. 
  1050.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1051. |_[ + ] [ 9 / 100 ]-[07:14:11] [ - ] 
  1052. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14625 ]
  1053. |_[ + ] Exploit:: 
  1054. |_[ + ] Information Server:: , , IP::0 
  1055. |_[ + ] More details:: 
  1056. |_[ + ] Found:: UNIDENTIFIED
  1057. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  1058. 
  1059.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1060. |_[ + ] [ 10 / 100 ]-[07:14:15] [ - ] 
  1061. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=16901 ]
  1062. |_[ + ] Exploit:: 
  1063. |_[ + ] Information Server:: , , IP::0 
  1064. |_[ + ] More details:: 
  1065. |_[ + ] Found:: UNIDENTIFIED
  1066. |_[ + ] ERROR CONECTION:: Failed to connect to www.alsomod-iea.info port 80: Connection timed out
  1067. 
  1068.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1069. |_[ + ] [ 11 / 100 ]-[07:14:19] [ - ] 
  1070. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=9084 ]
  1071. |_[ + ] Exploit:: 
  1072. |_[ + ] Information Server:: , , IP::0 
  1073. |_[ + ] More details:: 
  1074. |_[ + ] Found:: UNIDENTIFIED
  1075. |_[ + ] ERROR CONECTION:: Failed to connect to www.alsomod-iea.info port 80: Connection timed out
  1076. 
  1077.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1078. |_[ + ] [ 12 / 100 ]-[07:14:23] [ - ] 
  1079. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=111 ]
  1080. |_[ + ] Exploit:: 
  1081. |_[ + ] Information Server:: , , IP::0 
  1082. |_[ + ] More details:: 
  1083. |_[ + ] Found:: UNIDENTIFIED
  1084. |_[ + ] ERROR CONECTION:: Failed to connect to www.alsomod-iea.info port 80: Connection timed out
  1085. 
  1086.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1087. |_[ + ] [ 13 / 100 ]-[07:14:26] [ - ] 
  1088. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13168 ]
  1089. |_[ + ] Exploit:: 
  1090. |_[ + ] Information Server:: , , IP::0 
  1091. |_[ + ] More details:: 
  1092. |_[ + ] Found:: UNIDENTIFIED
  1093. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  1094. 
  1095.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1096. |_[ + ] [ 14 / 100 ]-[07:14:36] [ - ] 
  1097. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12734 ]
  1098. |_[ + ] Exploit:: 
  1099. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1100. |_[ + ] More details::  / - / , ISP: 
  1101. |_[ + ] Found:: UNIDENTIFIED
  1102. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 37461 bytes received
  1103. 
  1104.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1105. |_[ + ] [ 15 / 100 ]-[07:14:40] [ - ] 
  1106. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12031 ]
  1107. |_[ + ] Exploit:: 
  1108. |_[ + ] Information Server:: , , IP::0 
  1109. |_[ + ] More details:: 
  1110. |_[ + ] Found:: UNIDENTIFIED
  1111. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  1112. 
  1113.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1114. |_[ + ] [ 16 / 100 ]-[07:14:44] [ - ] 
  1115. |_[ + ] Target:: [ http://alsomod-iea.info/?p=11430 ]
  1116. |_[ + ] Exploit:: 
  1117. |_[ + ] Information Server:: , , IP::0 
  1118. |_[ + ] More details:: 
  1119. |_[ + ] Found:: UNIDENTIFIED
  1120. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  1121. 
  1122.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1123. |_[ + ] [ 17 / 100 ]-[07:14:48] [ - ] 
  1124. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12319 ]
  1125. |_[ + ] Exploit:: 
  1126. |_[ + ] Information Server:: , , IP::0 
  1127. |_[ + ] More details:: 
  1128. |_[ + ] Found:: UNIDENTIFIED
  1129. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  1130. 
  1131.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1132. |_[ + ] [ 18 / 100 ]-[07:14:51] [ - ] 
  1133. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14160 ]
  1134. |_[ + ] Exploit:: 
  1135. |_[ + ] Information Server:: , , IP::0 
  1136. |_[ + ] More details:: 
  1137. |_[ + ] Found:: UNIDENTIFIED
  1138. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  1139. 
  1140.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1141. |_[ + ] [ 19 / 100 ]-[07:14:55] [ - ] 
  1142. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13837 ]
  1143. |_[ + ] Exploit:: 
  1144. |_[ + ] Information Server:: , , IP::0 
  1145. |_[ + ] More details:: 
  1146. |_[ + ] Found:: UNIDENTIFIED
  1147. |_[ + ] ERROR CONECTION:: Failed to connect to alsomod-iea.info port 80: Connection timed out
  1148. 
  1149.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1150. |_[ + ] [ 20 / 100 ]-[07:15:05] [ - ] 
  1151. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13976 ]
  1152. |_[ + ] Exploit:: 
  1153. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1154. |_[ + ] More details::  / - / , ISP: 
  1155. |_[ + ] Found:: UNIDENTIFIED
  1156. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 40910 bytes received
  1157. 
  1158.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1159. |_[ + ] [ 21 / 100 ]-[07:15:10] [ - ] 
  1160. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13629 ]
  1161. |_[ + ] Exploit:: 
  1162. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1163. |_[ + ] More details::  / - / , ISP: 
  1164. |_[ + ] Found:: UNIDENTIFIED
  1165. 
  1166.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1167. |_[ + ] [ 22 / 100 ]-[07:15:15] [ - ] 
  1168. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=12732 ]
  1169. |_[ + ] Exploit:: 
  1170. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1171. |_[ + ] More details::  / - / , ISP: 
  1172. |_[ + ] Found:: UNIDENTIFIED
  1173. 
  1174.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1175. |_[ + ] [ 23 / 100 ]-[07:15:25] [ - ] 
  1176. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12244 ]
  1177. |_[ + ] Exploit:: 
  1178. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1179. |_[ + ] More details::  / - / , ISP: 
  1180. |_[ + ] Found:: UNIDENTIFIED
  1181. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 35259 bytes received
  1182. 
  1183.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1184. |_[ + ] [ 24 / 100 ]-[07:15:30] [ - ] 
  1185. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17325 ]
  1186. |_[ + ] Exploit:: 
  1187. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1188. |_[ + ] More details::  / - / , ISP: 
  1189. |_[ + ] Found:: UNIDENTIFIED
  1190. 
  1191.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1192. |_[ + ] [ 25 / 100 ]-[07:15:35] [ - ] 
  1193. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=1083 ]
  1194. |_[ + ] Exploit:: 
  1195. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1196. |_[ + ] More details::  / - / , ISP: 
  1197. |_[ + ] Found:: UNIDENTIFIED
  1198. 
  1199.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1200. |_[ + ] [ 26 / 100 ]-[07:15:40] [ - ] 
  1201. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=15578 ]
  1202. |_[ + ] Exploit:: 
  1203. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1204. |_[ + ] More details::  / - / , ISP: 
  1205. |_[ + ] Found:: UNIDENTIFIED
  1206. 
  1207.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1208. |_[ + ] [ 27 / 100 ]-[07:15:45] [ - ] 
  1209. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=11850 ]
  1210. |_[ + ] Exploit:: 
  1211. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1212. |_[ + ] More details::  / - / , ISP: 
  1213. |_[ + ] Found:: UNIDENTIFIED
  1214. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70553 bytes received
  1215. 
  1216.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1217. |_[ + ] [ 28 / 100 ]-[07:15:50] [ - ] 
  1218. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17049 ]
  1219. |_[ + ] Exploit:: 
  1220. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1221. |_[ + ] More details::  / - / , ISP: 
  1222. |_[ + ] Found:: UNIDENTIFIED
  1223. 
  1224.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1225. |_[ + ] [ 29 / 100 ]-[07:15:55] [ - ] 
  1226. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13122 ]
  1227. |_[ + ] Exploit:: 
  1228. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1229. |_[ + ] More details::  / - / , ISP: 
  1230. |_[ + ] Found:: UNIDENTIFIED
  1231. 
  1232.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1233. |_[ + ] [ 30 / 100 ]-[07:15:59] [ - ] 
  1234. |_[ + ] Target:: [ http://alsomod-iea.info/?p=11971 ]
  1235. |_[ + ] Exploit:: 
  1236. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1237. |_[ + ] More details::  / - / , ISP: 
  1238. |_[ + ] Found:: UNIDENTIFIED
  1239. 
  1240.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1241. |_[ + ] [ 31 / 100 ]-[07:16:09] [ - ] 
  1242. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12459 ]
  1243. |_[ + ] Exploit:: 
  1244. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1245. |_[ + ] More details::  / - / , ISP: 
  1246. |_[ + ] Found:: UNIDENTIFIED
  1247. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70186 bytes received
  1248. 
  1249.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1250. |_[ + ] [ 32 / 100 ]-[07:16:14] [ - ] 
  1251. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=14979 ]
  1252. |_[ + ] Exploit:: 
  1253. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1254. |_[ + ] More details::  / - / , ISP: 
  1255. |_[ + ] Found:: UNIDENTIFIED
  1256. 
  1257.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1258. |_[ + ] [ 33 / 100 ]-[07:16:21] [ - ] 
  1259. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17610 ]
  1260. |_[ + ] Exploit:: 
  1261. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1262. |_[ + ] More details::  / - / , ISP: 
  1263. |_[ + ] Found:: UNIDENTIFIED
  1264. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70985 bytes received
  1265. 
  1266.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1267. |_[ + ] [ 34 / 100 ]-[07:16:26] [ - ] 
  1268. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=14963 ]
  1269. |_[ + ] Exploit:: 
  1270. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1271. |_[ + ] More details::  / - / , ISP: 
  1272. |_[ + ] Found:: UNIDENTIFIED
  1273. 
  1274.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1275. |_[ + ] [ 35 / 100 ]-[07:16:33] [ - ] 
  1276. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=18013 ]
  1277. |_[ + ] Exploit:: 
  1278. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1279. |_[ + ] More details::  / - / , ISP: 
  1280. |_[ + ] Found:: UNIDENTIFIED
  1281. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 69501 bytes received
  1282. 
  1283.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1284. |_[ + ] [ 36 / 100 ]-[07:16:38] [ - ] 
  1285. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14686 ]
  1286. |_[ + ] Exploit:: 
  1287. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1288. |_[ + ] More details::  / - / , ISP: 
  1289. |_[ + ] Found:: UNIDENTIFIED
  1290. 
  1291.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1292. |_[ + ] [ 37 / 100 ]-[07:16:44] [ - ] 
  1293. |_[ + ] Target:: [ http://alsomod-iea.info/?p=11370 ]
  1294. |_[ + ] Exploit:: 
  1295. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1296. |_[ + ] More details::  / - / , ISP: 
  1297. |_[ + ] Found:: UNIDENTIFIED
  1298. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70663 bytes received
  1299. 
  1300.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1301. |_[ + ] [ 38 / 100 ]-[07:16:48] [ - ] 
  1302. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=5039 ]
  1303. |_[ + ] Exploit:: 
  1304. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1305. |_[ + ] More details::  / - / , ISP: 
  1306. |_[ + ] Found:: UNIDENTIFIED
  1307. 
  1308.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1309. |_[ + ] [ 39 / 100 ]-[07:16:55] [ - ] 
  1310. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17835 ]
  1311. |_[ + ] Exploit:: 
  1312. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1313. |_[ + ] More details::  / - / , ISP: 
  1314. |_[ + ] Found:: UNIDENTIFIED
  1315. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70792 bytes received
  1316. 
  1317.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1318. |_[ + ] [ 40 / 100 ]-[07:17:00] [ - ] 
  1319. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17265 ]
  1320. |_[ + ] Exploit:: 
  1321. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1322. |_[ + ] More details::  / - / , ISP: 
  1323. |_[ + ] Found:: UNIDENTIFIED
  1324. 
  1325.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1326. |_[ + ] [ 41 / 100 ]-[07:17:06] [ - ] 
  1327. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13459 ]
  1328. |_[ + ] Exploit:: 
  1329. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1330. |_[ + ] More details::  / - / , ISP: 
  1331. |_[ + ] Found:: UNIDENTIFIED
  1332. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70627 bytes received
  1333. 
  1334.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1335. |_[ + ] [ 42 / 100 ]-[07:17:11] [ - ] 
  1336. |_[ + ] Target:: [ http://alsomod-iea.info/?p=11266 ]
  1337. |_[ + ] Exploit:: 
  1338. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1339. |_[ + ] More details::  / - / , ISP: 
  1340. |_[ + ] Found:: UNIDENTIFIED
  1341. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 69546 bytes received
  1342. 
  1343.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1344. |_[ + ] [ 43 / 100 ]-[07:17:19] [ - ] 
  1345. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14044 ]
  1346. |_[ + ] Exploit:: 
  1347. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1348. |_[ + ] More details::  / - / , ISP: 
  1349. |_[ + ] Found:: UNIDENTIFIED
  1350. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 58149 bytes received
  1351. 
  1352.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1353. |_[ + ] [ 44 / 100 ]-[07:17:24] [ - ] 
  1354. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17573 ]
  1355. |_[ + ] Exploit:: 
  1356. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1357. |_[ + ] More details::  / - / , ISP: 
  1358. |_[ + ] Found:: UNIDENTIFIED
  1359. 
  1360.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1361. |_[ + ] [ 45 / 100 ]-[07:17:28] [ - ] 
  1362. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=3476 ]
  1363. |_[ + ] Exploit:: 
  1364. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1365. |_[ + ] More details::  / - / , ISP: 
  1366. |_[ + ] Found:: UNIDENTIFIED
  1367. 
  1368.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1369. |_[ + ] [ 46 / 100 ]-[07:17:34] [ - ] 
  1370. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17910 ]
  1371. |_[ + ] Exploit:: 
  1372. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1373. |_[ + ] More details::  / - / , ISP: 
  1374. |_[ + ] Found:: UNIDENTIFIED
  1375. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70639 bytes received
  1376. 
  1377.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1378. |_[ + ] [ 47 / 100 ]-[07:17:38] [ - ] 
  1379. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=11903 ]
  1380. |_[ + ] Exploit:: 
  1381. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1382. |_[ + ] More details::  / - / , ISP: 
  1383. |_[ + ] Found:: UNIDENTIFIED
  1384. 
  1385.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1386. |_[ + ] [ 48 / 100 ]-[07:17:43] [ - ] 
  1387. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17088 ]
  1388. |_[ + ] Exploit:: 
  1389. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1390. |_[ + ] More details::  / - / , ISP: 
  1391. |_[ + ] Found:: UNIDENTIFIED
  1392. 
  1393.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1394. |_[ + ] [ 49 / 100 ]-[07:17:48] [ - ] 
  1395. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12492 ]
  1396. |_[ + ] Exploit:: 
  1397. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1398. |_[ + ] More details::  / - / , ISP: 
  1399. |_[ + ] Found:: UNIDENTIFIED
  1400. 
  1401.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1402. |_[ + ] [ 50 / 100 ]-[07:17:54] [ - ] 
  1403. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17419 ]
  1404. |_[ + ] Exploit:: 
  1405. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1406. |_[ + ] More details::  / - / , ISP: 
  1407. |_[ + ] Found:: UNIDENTIFIED
  1408. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 54261 bytes received
  1409. 
  1410.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1411. |_[ + ] [ 51 / 100 ]-[07:18:02] [ - ] 
  1412. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=16904 ]
  1413. |_[ + ] Exploit:: 
  1414. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1415. |_[ + ] More details::  / - / , ISP: 
  1416. |_[ + ] Found:: UNIDENTIFIED
  1417. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70013 bytes received
  1418. 
  1419.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1420. |_[ + ] [ 52 / 100 ]-[07:18:07] [ - ] 
  1421. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17618 ]
  1422. |_[ + ] Exploit:: 
  1423. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1424. |_[ + ] More details::  / - / , ISP: 
  1425. |_[ + ] Found:: UNIDENTIFIED
  1426. 
  1427.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1428. |_[ + ] [ 53 / 100 ]-[07:18:11] [ - ] 
  1429. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17946 ]
  1430. |_[ + ] Exploit:: 
  1431. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1432. |_[ + ] More details::  / - / , ISP: 
  1433. |_[ + ] Found:: UNIDENTIFIED
  1434. 
  1435.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1436. |_[ + ] [ 54 / 100 ]-[07:18:16] [ - ] 
  1437. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=16927 ]
  1438. |_[ + ] Exploit:: 
  1439. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1440. |_[ + ] More details::  / - / , ISP: 
  1441. |_[ + ] Found:: UNIDENTIFIED
  1442. 
  1443.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1444. |_[ + ] [ 55 / 100 ]-[07:18:21] [ - ] 
  1445. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14724 ]
  1446. |_[ + ] Exploit:: 
  1447. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1448. |_[ + ] More details::  / - / , ISP: 
  1449. |_[ + ] Found:: UNIDENTIFIED
  1450. 
  1451.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1452. |_[ + ] [ 56 / 100 ]-[07:18:25] [ - ] 
  1453. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12035 ]
  1454. |_[ + ] Exploit:: 
  1455. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1456. |_[ + ] More details::  / - / , ISP: 
  1457. |_[ + ] Found:: UNIDENTIFIED
  1458. 
  1459.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1460. |_[ + ] [ 57 / 100 ]-[07:18:30] [ - ] 
  1461. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14183 ]
  1462. |_[ + ] Exploit:: 
  1463. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1464. |_[ + ] More details::  / - / , ISP: 
  1465. |_[ + ] Found:: UNIDENTIFIED
  1466. 
  1467.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1468. |_[ + ] [ 58 / 100 ]-[07:18:40] [ - ] 
  1469. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12411 ]
  1470. |_[ + ] Exploit:: 
  1471. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1472. |_[ + ] More details::  / - / , ISP: 
  1473. |_[ + ] Found:: UNIDENTIFIED
  1474. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70385 bytes received
  1475. 
  1476.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1477. |_[ + ] [ 59 / 100 ]-[07:18:45] [ - ] 
  1478. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=15176 ]
  1479. |_[ + ] Exploit:: 
  1480. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1481. |_[ + ] More details::  / - / , ISP: 
  1482. |_[ + ] Found:: UNIDENTIFIED
  1483. 
  1484.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1485. |_[ + ] [ 60 / 100 ]-[07:18:50] [ - ] 
  1486. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=13336 ]
  1487. |_[ + ] Exploit:: 
  1488. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1489. |_[ + ] More details::  / - / , ISP: 
  1490. |_[ + ] Found:: UNIDENTIFIED
  1491. 
  1492.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1493. |_[ + ] [ 61 / 100 ]-[07:18:55] [ - ] 
  1494. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12579 ]
  1495. |_[ + ] Exploit:: 
  1496. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1497. |_[ + ] More details::  / - / , ISP: 
  1498. |_[ + ] Found:: UNIDENTIFIED
  1499. 
  1500.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1501. |_[ + ] [ 62 / 100 ]-[07:18:59] [ - ] 
  1502. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=7062 ]
  1503. |_[ + ] Exploit:: 
  1504. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1505. |_[ + ] More details::  / - / , ISP: 
  1506. |_[ + ] Found:: UNIDENTIFIED
  1507. 
  1508.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1509. |_[ + ] [ 63 / 100 ]-[07:19:07] [ - ] 
  1510. |_[ + ] Target:: [ http://www.alsomod-iea.info/?s5_responsive_switch_wwwalsomodieainfo=0 ]
  1511. |_[ + ] Exploit:: 
  1512. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1513. |_[ + ] More details::  / - / , ISP: 
  1514. |_[ + ] Found:: UNIDENTIFIED
  1515. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 64070 bytes received
  1516. 
  1517.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1518. |_[ + ] [ 64 / 100 ]-[07:19:13] [ - ] 
  1519. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14700 ]
  1520. |_[ + ] Exploit:: 
  1521. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1522. |_[ + ] More details::  / - / , ISP: 
  1523. |_[ + ] Found:: UNIDENTIFIED
  1524. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 71005 bytes received
  1525. 
  1526.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1527. |_[ + ] [ 65 / 100 ]-[07:19:18] [ - ] 
  1528. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=14944 ]
  1529. |_[ + ] Exploit:: 
  1530. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1531. |_[ + ] More details::  / - / , ISP: 
  1532. |_[ + ] Found:: UNIDENTIFIED
  1533. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70257 bytes received
  1534. 
  1535.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1536. |_[ + ] [ 66 / 100 ]-[07:19:24] [ - ] 
  1537. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12131 ]
  1538. |_[ + ] Exploit:: 
  1539. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1540. |_[ + ] More details::  / - / , ISP: 
  1541. |_[ + ] Found:: UNIDENTIFIED
  1542. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 69324 bytes received
  1543. 
  1544.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1545. |_[ + ] [ 67 / 100 ]-[07:19:30] [ - ] 
  1546. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17797 ]
  1547. |_[ + ] Exploit:: 
  1548. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1549. |_[ + ] More details::  / - / , ISP: 
  1550. |_[ + ] Found:: UNIDENTIFIED
  1551. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70521 bytes received
  1552. 
  1553.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1554. |_[ + ] [ 68 / 100 ]-[07:19:35] [ - ] 
  1555. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17256 ]
  1556. |_[ + ] Exploit:: 
  1557. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1558. |_[ + ] More details::  / - / , ISP: 
  1559. |_[ + ] Found:: UNIDENTIFIED
  1560. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 62450 bytes received
  1561. 
  1562.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1563. |_[ + ] [ 69 / 100 ]-[07:19:39] [ - ] 
  1564. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14614 ]
  1565. |_[ + ] Exploit:: 
  1566. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1567. |_[ + ] More details::  / - / , ISP: 
  1568. |_[ + ] Found:: UNIDENTIFIED
  1569. 
  1570.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1571. |_[ + ] [ 70 / 100 ]-[07:19:44] [ - ] 
  1572. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13820 ]
  1573. |_[ + ] Exploit:: 
  1574. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1575. |_[ + ] More details::  / - / , ISP: 
  1576. |_[ + ] Found:: UNIDENTIFIED
  1577. 
  1578.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1579. |_[ + ] [ 71 / 100 ]-[07:19:45] [ - ] 
  1580. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=18027 ]
  1581. |_[ + ] Exploit:: 
  1582. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: cloudflare-nginx , IP:104.27.133.197:80 
  1583. |_[ + ] More details::  / - / , ISP: 
  1584. |_[ + ] Found:: UNIDENTIFIED
  1585. 
  1586.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1587. |_[ + ] [ 72 / 100 ]-[07:19:49] [ - ] 
  1588. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14201 ]
  1589. |_[ + ] Exploit:: 
  1590. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1591. |_[ + ] More details::  / - / , ISP: 
  1592. |_[ + ] Found:: UNIDENTIFIED
  1593. 
  1594.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1595. |_[ + ] [ 73 / 100 ]-[07:19:54] [ - ] 
  1596. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=2662 ]
  1597. |_[ + ] Exploit:: 
  1598. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1599. |_[ + ] More details::  / - / , ISP: 
  1600. |_[ + ] Found:: UNIDENTIFIED
  1601. 
  1602.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1603. |_[ + ] [ 74 / 100 ]-[07:19:59] [ - ] 
  1604. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17985 ]
  1605. |_[ + ] Exploit:: 
  1606. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1607. |_[ + ] More details::  / - / , ISP: 
  1608. |_[ + ] Found:: UNIDENTIFIED
  1609. 
  1610.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1611. |_[ + ] [ 75 / 100 ]-[07:20:04] [ - ] 
  1612. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=15781 ]
  1613. |_[ + ] Exploit:: 
  1614. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1615. |_[ + ] More details::  / - / , ISP: 
  1616. |_[ + ] Found:: UNIDENTIFIED
  1617. 
  1618.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1619. |_[ + ] [ 76 / 100 ]-[07:20:08] [ - ] 
  1620. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13333 ]
  1621. |_[ + ] Exploit:: 
  1622. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1623. |_[ + ] More details::  / - / , ISP: 
  1624. |_[ + ] Found:: UNIDENTIFIED
  1625. 
  1626.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1627. |_[ + ] [ 77 / 100 ]-[07:20:14] [ - ] 
  1628. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13119 ]
  1629. |_[ + ] Exploit:: 
  1630. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1631. |_[ + ] More details::  / - / , ISP: 
  1632. |_[ + ] Found:: UNIDENTIFIED
  1633. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70220 bytes received
  1634. 
  1635.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1636. |_[ + ] [ 78 / 100 ]-[07:20:18] [ - ] 
  1637. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=7549 ]
  1638. |_[ + ] Exploit:: 
  1639. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1640. |_[ + ] More details::  / - / , ISP: 
  1641. |_[ + ] Found:: UNIDENTIFIED
  1642. 
  1643.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1644. |_[ + ] [ 79 / 100 ]-[07:20:25] [ - ] 
  1645. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14072 ]
  1646. |_[ + ] Exploit:: 
  1647. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1648. |_[ + ] More details::  / - / , ISP: 
  1649. |_[ + ] Found:: UNIDENTIFIED
  1650. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 72099 bytes received
  1651. 
  1652.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1653. |_[ + ] [ 80 / 100 ]-[07:20:29] [ - ] 
  1654. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12498 ]
  1655. |_[ + ] Exploit:: 
  1656. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1657. |_[ + ] More details::  / - / , ISP: 
  1658. |_[ + ] Found:: UNIDENTIFIED
  1659. 
  1660.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1661. |_[ + ] [ 81 / 100 ]-[07:20:34] [ - ] 
  1662. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14432 ]
  1663. |_[ + ] Exploit:: 
  1664. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1665. |_[ + ] More details::  / - / , ISP: 
  1666. |_[ + ] Found:: UNIDENTIFIED
  1667. 
  1668.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1669. |_[ + ] [ 82 / 100 ]-[07:20:38] [ - ] 
  1670. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13909 ]
  1671. |_[ + ] Exploit:: 
  1672. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1673. |_[ + ] More details::  / - / , ISP: 
  1674. |_[ + ] Found:: UNIDENTIFIED
  1675. 
  1676.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1677. |_[ + ] [ 83 / 100 ]-[07:20:43] [ - ] 
  1678. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17980 ]
  1679. |_[ + ] Exploit:: 
  1680. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1681. |_[ + ] More details::  / - / , ISP: 
  1682. |_[ + ] Found:: UNIDENTIFIED
  1683. 
  1684.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1685. |_[ + ] [ 84 / 100 ]-[07:20:49] [ - ] 
  1686. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12756 ]
  1687. |_[ + ] Exploit:: 
  1688. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1689. |_[ + ] More details::  / - / , ISP: 
  1690. |_[ + ] Found:: UNIDENTIFIED
  1691. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 54097 bytes received
  1692. 
  1693.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1694. |_[ + ] [ 85 / 100 ]-[07:20:54] [ - ] 
  1695. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17473 ]
  1696. |_[ + ] Exploit:: 
  1697. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1698. |_[ + ] More details::  / - / , ISP: 
  1699. |_[ + ] Found:: UNIDENTIFIED
  1700. 
  1701.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1702. |_[ + ] [ 86 / 100 ]-[07:21:01] [ - ] 
  1703. |_[ + ] Target:: [ http://alsomod-iea.info/?p=11258 ]
  1704. |_[ + ] Exploit:: 
  1705. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1706. |_[ + ] More details::  / - / , ISP: 
  1707. |_[ + ] Found:: UNIDENTIFIED
  1708. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 24500 bytes received
  1709. 
  1710.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1711. |_[ + ] [ 87 / 100 ]-[07:21:07] [ - ] 
  1712. |_[ + ] Target:: [ http://alsomod-iea.info/?p=12651 ]
  1713. |_[ + ] Exploit:: 
  1714. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1715. |_[ + ] More details::  / - / , ISP: 
  1716. |_[ + ] Found:: UNIDENTIFIED
  1717. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 63659 bytes received
  1718. 
  1719.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1720. |_[ + ] [ 88 / 100 ]-[07:21:12] [ - ] 
  1721. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13853 ]
  1722. |_[ + ] Exploit:: 
  1723. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1724. |_[ + ] More details::  / - / , ISP: 
  1725. |_[ + ] Found:: UNIDENTIFIED
  1726. 
  1727.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1728. |_[ + ] [ 89 / 100 ]-[07:21:18] [ - ] 
  1729. |_[ + ] Target:: [ http://alsomod-iea.info/?p=11672 ]
  1730. |_[ + ] Exploit:: 
  1731. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1732. |_[ + ] More details::  / - / , ISP: 
  1733. |_[ + ] Found:: UNIDENTIFIED
  1734. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 70378 bytes received
  1735. 
  1736.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1737. |_[ + ] [ 90 / 100 ]-[07:21:23] [ - ] 
  1738. |_[ + ] Target:: [ http://alsomod-iea.info/?p=14392 ]
  1739. |_[ + ] Exploit:: 
  1740. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1741. |_[ + ] More details::  / - / , ISP: 
  1742. |_[ + ] Found:: UNIDENTIFIED
  1743. 
  1744.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1745. |_[ + ] [ 91 / 100 ]-[07:21:28] [ - ] 
  1746. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=3061 ]
  1747. |_[ + ] Exploit:: 
  1748. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1749. |_[ + ] More details::  / - / , ISP: 
  1750. |_[ + ] Found:: UNIDENTIFIED
  1751. 
  1752.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1753. |_[ + ] [ 92 / 100 ]-[07:21:33] [ - ] 
  1754. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17730 ]
  1755. |_[ + ] Exploit:: 
  1756. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1757. |_[ + ] More details::  / - / , ISP: 
  1758. |_[ + ] Found:: UNIDENTIFIED
  1759. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 69333 bytes received
  1760. 
  1761.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1762. |_[ + ] [ 93 / 100 ]-[07:21:37] [ - ] 
  1763. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13402 ]
  1764. |_[ + ] Exploit:: 
  1765. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1766. |_[ + ] More details::  / - / , ISP: 
  1767. |_[ + ] Found:: UNIDENTIFIED
  1768. 
  1769.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1770. |_[ + ] [ 94 / 100 ]-[07:21:42] [ - ] 
  1771. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=15809 ]
  1772. |_[ + ] Exploit:: 
  1773. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1774. |_[ + ] More details::  / - / , ISP: 
  1775. |_[ + ] Found:: UNIDENTIFIED
  1776. 
  1777.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1778. |_[ + ] [ 95 / 100 ]-[07:21:46] [ - ] 
  1779. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=3907 ]
  1780. |_[ + ] Exploit:: 
  1781. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.132.197:80 
  1782. |_[ + ] More details::  / - / , ISP: 
  1783. |_[ + ] Found:: UNIDENTIFIED
  1784. 
  1785.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1786. |_[ + ] [ 96 / 100 ]-[07:21:51] [ - ] 
  1787. |_[ + ] Target:: [ http://alsomod-iea.info/?p=13650 ]
  1788. |_[ + ] Exploit:: 
  1789. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1790. |_[ + ] More details::  / - / , ISP: 
  1791. |_[ + ] Found:: UNIDENTIFIED
  1792. 
  1793.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1794. |_[ + ] [ 97 / 100 ]-[07:21:58] [ - ] 
  1795. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=15635 ]
  1796. |_[ + ] Exploit:: 
  1797. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1798. |_[ + ] More details::  / - / , ISP: 
  1799. |_[ + ] Found:: UNIDENTIFIED
  1800. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 41107 bytes received
  1801. 
  1802.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1803. |_[ + ] [ 98 / 100 ]-[07:22:03] [ - ] 
  1804. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=17445 ]
  1805. |_[ + ] Exploit:: 
  1806. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1807. |_[ + ] More details::  / - / , ISP: 
  1808. |_[ + ] Found:: UNIDENTIFIED
  1809. 
  1810.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1811. |_[ + ] [ 99 / 100 ]-[07:22:08] [ - ] 
  1812. |_[ + ] Target:: [ http://www.alsomod-iea.info/?p=14991 ]
  1813. |_[ + ] Exploit:: 
  1814. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.5.38, IP:104.27.133.197:80 
  1815. |_[ + ] More details::  / - / , ISP: 
  1816. |_[ + ] Found:: UNIDENTIFIED
  1817.  
  1818. [ INFO ] [ Shutting down ]
  1819. [ INFO ] [ End of process INURLBR at [19-10-2017 07:22:08]
  1820. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  1821. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-alsomod-iea.info.txt ]
  1822. |_________________________________________________________________________________________
  1823.  
  1824. \_________________________________________________________________________________________/
  1825.  
  1826.  + -- --=[Port 110 closed... skipping.
  1827.  + -- --=[Port 111 closed... skipping.
  1828.  + -- --=[Port 135 closed... skipping.
  1829.  + -- --=[Port 139 closed... skipping.
  1830.  + -- --=[Port 161 closed... skipping.
  1831.  + -- --=[Port 162 closed... skipping.
  1832.  + -- --=[Port 389 closed... skipping.
  1833.  + -- --=[Port 443 opened... running tests...
  1834.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  1835.  
  1836. ^ ^
  1837. _ __ _ ____ _ __ _ _ ____
  1838. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  1839. | V V // o // _/ | V V // 0 // 0 // _/
  1840. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  1841. <
  1842. ...'
  1843.  
  1844. WAFW00F - Web Application Firewall Detection Tool
  1845.  
  1846. By Sandro Gauci && Wendel G. Henrique
  1847.  
  1848. Checking https://alsomod-iea.info
  1849. The site https://alsomod-iea.info is behind a CloudFlare
  1850. Number of requests: 1
  1851.  
  1852.  + -- ----------------------------=[Checking Cloudflare]=--------------------- -- +
  1853. ____ _ _ _____ _ _
  1854. / ___| | ___ _ _ __| | ___|_ _(_) |
  1855. | | | |/ _ \| | | |/ _` | |_ / _` | | |
  1856. | |___| | (_) | |_| | (_| | _| (_| | | |
  1857. \____|_|\___/ \__,_|\__,_|_| \__,_|_|_|
  1858. v1.0.1 by m0rtem
  1859.  
  1860.  
  1861. [07:22:20] Initializing CloudFail - the date is: 19/10/2017
  1862. [07:22:20] Fetching initial information from: alsomod-iea.info...
  1863. [07:22:20] Server IP: 104.27.133.197
  1864. [07:22:20] Testing if alsomod-iea.info is on the Cloudflare network...
  1865. [07:22:20] alsomod-iea.info is part of the Cloudflare network!
  1866. [07:22:20] Testing for misconfigured DNS using dnsdumpster...
  1867. [07:22:22] [FOUND:HOST] alsomod-iea.info cloudflare-nginx 104.27.133.197 AS13335 Cloudflare Inc
  1868. [07:22:22] [FOUND:HOST] alsomod-iea.info cloudflare-nginx 104.27.132.197 AS13335 Cloudflare Inc
  1869. [07:22:22] [FOUND:HOST] alsomod-iea.info cloudflare-nginx 104.27.133.197 AS13335 Cloudflare Inc
  1870. [07:22:22] [FOUND:DNS] lloyd.ns.cloudflare.com. 173.245.59.197 AS13335 Cloudflare Inc United States
  1871. [07:22:22] [FOUND:DNS] zara.ns.cloudflare.com. 173.245.58.148 AS13335 Cloudflare Inc United States
  1872. [07:22:22] Scanning crimeflare database...
  1873. [07:22:23] Did not find anything.
  1874. [07:22:23] Scanning 2897 subdomains (subdomains.txt), please wait...
  1875. [07:22:25] 0.97% complete
  1876. [07:22:28] 1.93% complete
  1877. [07:22:30] 2.9% complete
  1878. [07:22:33] 3.87% complete
  1879. [07:22:35] 4.83% complete
  1880. [07:22:38] 5.8% complete
  1881. [07:22:40] 6.77% complete
  1882. [07:22:43] 7.73% complete
  1883. [07:22:46] 8.7% complete
  1884. [07:22:48] 9.67% complete
  1885. [07:22:51] 10.63% complete
  1886. [07:22:53] 11.6% complete
  1887. [07:22:56] 12.56% complete
  1888. [07:22:59] 13.53% complete
  1889. [07:23:02] 14.5% complete
  1890. [07:23:04] 15.46% complete
  1891. [07:23:07] 16.43% complete
  1892. [07:23:10] 17.4% complete
  1893. [07:23:13] 18.36% complete
  1894. [07:23:16] 19.33% complete
  1895. [07:23:18] 20.3% complete
  1896. [07:23:21] 21.26% complete
  1897. [07:23:23] 22.23% complete
  1898. [07:23:26] 23.2% complete
  1899. [07:23:29] 24.16% complete
  1900. [07:23:31] 25.13% complete
  1901. [07:23:34] 26.1% complete
  1902. [07:23:36] 27.06% complete
  1903. [07:23:39] 28.03% complete
  1904. [07:23:41] 29.0% complete
  1905. [07:23:44] 29.96% complete
  1906. [07:23:47] 30.93% complete
  1907. [07:23:50] 31.9% complete
  1908. [07:23:53] 32.86% complete
  1909. [07:23:56] 33.83% complete
  1910. [07:23:58] 34.79% complete
  1911. [07:24:01] 35.76% complete
  1912. [07:24:04] 36.73% complete
  1913. [07:24:07] 37.69% complete
  1914. [07:24:09] 38.66% complete
  1915. [07:24:12] 39.63% complete
  1916. [07:24:14] 40.59% complete
  1917. [07:24:17] 41.56% complete
  1918. [07:24:20] 42.53% complete
  1919. [07:24:22] 43.49% complete
  1920. [07:24:25] 44.46% complete
  1921. [07:24:28] 45.43% complete
  1922. [07:24:31] 46.39% complete
  1923. [07:24:34] 47.36% complete
  1924. [07:24:36] 48.33% complete
  1925. [07:24:39] 49.29% complete
  1926. [07:24:41] 50.26% complete
  1927. [07:24:45] 51.23% complete
  1928. [07:24:47] 52.19% complete
  1929. [07:24:50] 53.16% complete
  1930. [07:24:52] 54.12% complete
  1931. [07:24:55] 55.09% complete
  1932. [07:24:57] 56.06% complete
  1933. [07:25:00] 57.02% complete
  1934. [07:25:03] 57.99% complete
  1935. [07:25:06] 58.96% complete
  1936. [07:25:08] 59.92% complete
  1937. [07:25:12] 60.89% complete
  1938. [07:25:15] 61.86% complete
  1939. [07:25:17] 62.82% complete
  1940. [07:25:20] 63.79% complete
  1941. [07:25:23] 64.76% complete
  1942. [07:25:26] 65.72% complete
  1943. [07:25:28] 66.69% complete
  1944. [07:25:31] 67.66% complete
  1945. [07:25:34] 68.62% complete
  1946. [07:25:36] 69.59% complete
  1947. [07:25:39] 70.56% complete
  1948. [07:25:41] 71.52% complete
  1949. [07:25:44] 72.49% complete
  1950. [07:25:48] 73.46% complete
  1951. [07:25:50] 74.42% complete
  1952. [07:25:53] 75.39% complete
  1953. [07:25:55] 76.35% complete
  1954. [07:25:58] 77.32% complete
  1955. [07:26:01] 78.29% complete
  1956. [07:26:03] 79.25% complete
  1957. [07:26:06] 80.22% complete
  1958. [07:26:09] 81.19% complete
  1959. [07:26:11] 82.15% complete
  1960. [07:26:14] 83.12% complete
  1961. [07:26:17] 84.09% complete
  1962. [07:26:19] 85.05% complete
  1963. [07:26:22] 86.02% complete
  1964. [07:26:24] 86.99% complete
  1965. [07:26:27] 87.95% complete
  1966. [07:26:30] 88.92% complete
  1967. [07:26:32] 89.89% complete
  1968. [07:26:35] 90.85% complete
  1969. [07:26:38] 91.82% complete
  1970. [07:26:40] 92.79% complete
  1971. [07:26:43] 93.75% complete
  1972. [07:26:45] 94.72% complete
  1973. [07:26:49] [FOUND:SUBDOMAIN] www.alsomod-iea.info ON CLOUDFLARE NETWORK!
  1974. [07:26:50] 95.69% complete
  1975. [07:26:53] 96.65% complete
  1976. [07:26:55] 97.62% complete
  1977. [07:26:58] 98.58% complete
  1978. [07:27:01] 99.55% complete
  1979. [07:27:02] Scanning finished, we did not find anything sorry...
  1980.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  1981. https://alsomod-iea.info [200 OK] CloudFlare, Cookies[__cfduid], Country[UNITED STATES][US], HTML5, HTTPServer[cloudflare-nginx], HttpOnly[__cfduid], IP[104.27.133.197], JQuery, MetaGenerator[WordPress 4.8.2], PHP[5.5.38][alsomodcom][/home/alsomodcom/public_html/wp-content/themes/jarida__/panel/category-options.php], Script[text/javascript], Title[مجلة الصمود الإسلامية &#8211; مجلة إسلامية ؎هرية يصدرها المركز الإعلامي لإمارة أفغانستان الإسلامية], UncommonHeaders[link,cf-ray], WordPress[4.8.2], X-Powered-By[PHP/5.5.38], X-UA-Compatible[IE=edge]
  1982.  
  1983.  + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
  1984.  
  1985.  
  1986.  
  1987. AVAILABLE PLUGINS
  1988. -----------------
  1989.  
  1990. PluginChromeSha1Deprecation
  1991. PluginHeartbleed
  1992. PluginSessionResumption
  1993. PluginHSTS
  1994. PluginSessionRenegotiation
  1995. PluginCertInfo
  1996. PluginOpenSSLCipherSuites
  1997. PluginCompression
  1998.  
  1999.  
  2000.  
  2001. CHECKING HOST(S) AVAILABILITY
  2002. -----------------------------
  2003.  
  2004. alsomod-iea.info:443 => 104.27.132.197:443
  2005.  
  2006.  
  2007.  
  2008. SCAN RESULTS FOR ALSOMOD-IEA.INFO:443 - 104.27.132.197:443
  2009. ----------------------------------------------------------
  2010.  
  2011. * Deflate Compression:
  2012. OK - Compression disabled
  2013.  
  2014. * Session Renegotiation:
  2015. Client-initiated Renegotiations: OK - Rejected
  2016. Secure Renegotiation: OK - Supported
  2017.  
  2018. * Certificate - Content:
  2019. SHA1 Fingerprint: 3fc13ed9b4222758a158ddfdd8011373c033e6b0
  2020. Common Name: sni81162.cloudflaressl.com
  2021. Issuer: COMODO ECC Domain Validation Secure Server CA 2
  2022. Serial Number: B0280CC0718ACC4E21FEBAB0EC5C97AB
  2023. Not Before: Oct 19 00:00:00 2017 GMT
  2024. Not After: Apr 27 23:59:59 2018 GMT
  2025. Signature Algorithm: ecdsa-with-SHA256
  2026. Public Key Algorithm: id-ecPublicKey
  2027. Key Size: 256 bit
  2028. X509v3 Subject Alternative Name: {'DNS': ['sni81162.cloudflaressl.com', '*.17luoliao.com', '*.52aipai.com', '*.7infinite.com', '*.9191porn.com', '*.aipai3.com', '*.alemarah-english.org', '*.alsomod-iea.info', '*.azamm.org', '*.barnabascompany.com', '*.conquer-x.com', '*.diapsalmata.com', '*.discerningthedrift.com', '*.evocatusco.com', '*.hd-mo-tube.ru', '*.islam-iea.net', '*.kadikoyfirmalar.tk', '*.kokeikyo.ml', '*.kootbook.cf', '*.mujali.com', '*.serveropenr.cf', '*.vbaddict.altervista.org', '*.xiaav.in', '*.youreviewer.cf', '17luoliao.com', '52aipai.com', '7infinite.com', '9191porn.com', 'aipai3.com', 'alemarah-english.org', 'alsomod-iea.info', 'azamm.org', 'barnabascompany.com', 'conquer-x.com', 'diapsalmata.com', 'discerningthedrift.com', 'evocatusco.com', 'hd-mo-tube.ru', 'islam-iea.net', 'kadikoyfirmalar.tk', 'kokeikyo.ml', 'kootbook.cf', 'mujali.com', 'serveropenr.cf', 'vbaddict.altervista.org', 'xiaav.in', 'youreviewer.cf']}
  2029.  
  2030. * Certificate - Trust:
  2031. Hostname Validation: OK - Subject Alternative Name matches
  2032. Google CA Store (09/2015): OK - Certificate is trusted
  2033. Java 6 CA Store (Update 65): OK - Certificate is trusted
  2034. Microsoft CA Store (09/2015): OK - Certificate is trusted
  2035. Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
  2036. Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
  2037. Certificate Chain Received: ['sni81162.cloudflaressl.com', 'COMODO ECC Domain Validation Secure Server CA 2', 'COMODO ECC Certification Authority']
  2038.  
  2039. * Certificate - OCSP Stapling:
  2040. OCSP Response Status: successful
  2041. Validation w/ Mozilla's CA Store: OK - Response is trusted
  2042. Responder Id: 40096167F0BC83714FDE12082C6FD4D42B763D96
  2043. Cert Status: good
  2044. Cert Serial Number: B0280CC0718ACC4E21FEBAB0EC5C97AB
  2045. This Update: Oct 19 01:59:03 2017 GMT
  2046. Next Update: Oct 26 01:59:03 2017 GMT
  2047.  
  2048. * SSLV2 Cipher Suites:
  2049. Server rejected all cipher suites.
  2050.  
  2051. * SSLV3 Cipher Suites:
  2052. Server rejected all cipher suites.
  2053.  
  2054. * Session Resumption:
  2055. With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
  2056. With TLS Session Tickets: OK - Supported
  2057.  
  2058.  
  2059.  
  2060. SCAN COMPLETED IN 9.27 S
  2061. ------------------------
  2062. Version: 1.11.10-static
  2063. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  2064. 
  2065. Testing SSL server alsomod-iea.info on port 443 using SNI name alsomod-iea.info
  2066.  
  2067. TLS Fallback SCSV:
  2068. Server does not support TLS Fallback SCSV
  2069.  
  2070. TLS renegotiation:
  2071. Secure session renegotiation supported
  2072.  
  2073. TLS Compression:
  2074. Compression disabled
  2075.  
  2076. Heartbleed:
  2077. TLS 1.2 not vulnerable to heartbleed
  2078. TLS 1.1 not vulnerable to heartbleed
  2079. TLS 1.0 not vulnerable to heartbleed
  2080.  
  2081. Supported Server Cipher(s):
  2082. Preferred TLSv1.2 256 bits ECDHE-ECDSA-CHACHA20-POLY1305 Curve P-256 DHE 256
  2083. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  2084. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  2085. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA256 Curve P-256 DHE 256
  2086. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  2087. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  2088. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA384 Curve P-256 DHE 256
  2089. Preferred TLSv1.1 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  2090. Accepted TLSv1.1 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  2091. Preferred TLSv1.0 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  2092. Accepted TLSv1.0 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  2093.  
  2094. SSL Certificate:
  2095. Signature Algorithm: ecdsa-with-SHA256
  2096. Subject: sni81162.cloudflaressl.com
  2097. Altnames: DNS:sni81162.cloudflaressl.com, DNS:*.17luoliao.com, DNS:*.52aipai.com, DNS:*.7infinite.com, DNS:*.9191porn.com, DNS:*.aipai3.com, DNS:*.alemarah-english.org, DNS:*.alsomod-iea.info, DNS:*.azamm.org, DNS:*.barnabascompany.com, DNS:*.conquer-x.com, DNS:*.diapsalmata.com, DNS:*.discerningthedrift.com, DNS:*.evocatusco.com, DNS:*.hd-mo-tube.ru, DNS:*.islam-iea.net, DNS:*.kadikoyfirmalar.tk, DNS:*.kokeikyo.ml, DNS:*.kootbook.cf, DNS:*.mujali.com, DNS:*.serveropenr.cf, DNS:*.vbaddict.altervista.org, DNS:*.xiaav.in, DNS:*.youreviewer.cf, DNS:17luoliao.com, DNS:52aipai.com, DNS:7infinite.com, DNS:9191porn.com, DNS:aipai3.com, DNS:alemarah-english.org, DNS:alsomod-iea.info, DNS:azamm.org, DNS:barnabascompany.com, DNS:conquer-x.com, DNS:diapsalmata.com, DNS:discerningthedrift.com, DNS:evocatusco.com, DNS:hd-mo-tube.ru, DNS:islam-iea.net, DNS:kadikoyfirmalar.tk, DNS:kokeikyo.ml, DNS:kootbook.cf, DNS:mujali.com, DNS:serveropenr.cf, DNS:vbaddict.altervista.org, DNS:xiaav.in, DNS:youreviewer.cf
  2098. Issuer: COMODO ECC Domain Validation Secure Server CA 2
  2099.  
  2100. Not valid before: Oct 19 00:00:00 2017 GMT
  2101. Not valid after: Apr 27 23:59:59 2018 GMT
  2102. 
  2103. ###########################################################
  2104. testssl 2.9dev from https://testssl.sh/dev/
  2105. 
  2106. This program is free software. Distribution and
  2107. modification under GPLv2 permitted.
  2108. USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
  2109.  
  2110. Please file bugs @ https://testssl.sh/bugs/
  2111. 
  2112. ###########################################################
  2113.  
  2114. Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
  2115. on Kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
  2116. (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
  2117.  
  2118.  
  2119. Testing all IPv4 addresses (port 443): 104.27.133.197 104.27.132.197
  2120. -----------------------------------------------------
  2121.  Start 2017-10-19 07:27:25 -->> 104.27.133.197:443 (alsomod-iea.info) <<--
  2122.  
  2123. further IP addresses: 104.27.132.197
  2124. rDNS (104.27.133.197): --
  2125. Service detected: HTTP
  2126.  
  2127.  
  2128.  Testing protocols via sockets except SPDY+HTTP2 
  2129.  
  2130.  SSLv2 not offered (OK)
  2131.  SSLv3 not offered (OK)
  2132.  TLS 1 offered
  2133.  TLS 1.1 offered
  2134.  TLS 1.2 offered (OK)
  2135.  SPDY/NPN h2, spdy/3.1, http/1.1 (advertised)
  2136.  HTTP2/ALPN h2, spdy/3.1, http/1.1 (offered)
  2137.  
  2138.  Testing ~standard cipher categories 
  2139.  
  2140.  NULL ciphers (no encryption) not offered (OK)
  2141.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  2142.  Export ciphers (w/o ADH+NULL) not offered (OK)
  2143.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  2144.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  2145.  Triple DES Ciphers (Medium) not offered (OK)
  2146.  High encryption (AES+Camellia, no AEAD) offered (OK)
  2147.  Strong encryption (AEAD ciphers) offered (OK)
  2148.  
  2149.  
  2150.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  2151.  
  2152.  PFS is offered (OK) ECDHE-ECDSA-CHACHA20-POLY1305-OLD
  2153. ECDHE-ECDSA-AES256-GCM-SHA384
  2154. ECDHE-ECDSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA
  2155. ECDHE-ECDSA-CHACHA20-POLY1305
  2156. ECDHE-ECDSA-AES128-GCM-SHA256
  2157. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA
  2158.  Elliptic curves offered: secp224r1 prime256v1 secp384r1 secp521r1 X25519
  2159.  
  2160.  
  2161.  Testing server preferences 
  2162.  
  2163.  Has server cipher order? yes (OK)
  2164.  Negotiated protocol TLSv1.2
  2165.  Negotiated cipher ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  2166.  Cipher order
  2167. TLSv1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  2168. TLSv1.1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  2169. TLSv1.2: ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-CHACHA20-POLY1305
  2170. ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA
  2171. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384
  2172. ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-AES256-SHA384
  2173.  
  2174.  
  2175.  Testing server defaults (Server Hello) 
  2176.  
  2177.  TLS extensions (standard) "renegotiation info/#65281" "server name/#0"
  2178. "session ticket/#35" "status request/#5"
  2179. "next protocol/#13172" "EC point formats/#11"
  2180. "extended master secret/#23"
  2181. "signed certificate timestamps/#18"
  2182. "application layer protocol negotiation/#16"
  2183.  Session Ticket RFC 5077 hint 64799 seconds, session tickets keys seems to be rotated < daily
  2184.  SSL Session ID support yes
  2185.  Session Resumption Tickets: yes, ID: yes
  2186.  TLS clock skew -1 sec from localtime
  2187.  Signature Algorithm ECDSA with SHA256
  2188.  Server key size ECDSA 256 bits
  2189.  Fingerprint / Serial SHA1 3FC13ED9B4222758A158DDFDD8011373C033E6B0 / B0280CC0718ACC4E21FEBAB0EC5C97AB
  2190. SHA256 CEF6D9A908EF321159FF34CD117966314B10FB6F64290F722878B3229EE4CDB6
  2191.  Common Name (CN) sni81162.cloudflaressl.com (request w/o SNI didn't succeed, usual for EC certificates)
  2192.  subjectAltName (SAN) sni81162.cloudflaressl.com *.17luoliao.com
  2193. *.52aipai.com *.7infinite.com *.9191porn.com
  2194. *.aipai3.com *.alemarah-english.org
  2195. *.alsomod-iea.info *.azamm.org
  2196. *.barnabascompany.com *.conquer-x.com
  2197. *.diapsalmata.com *.discerningthedrift.com
  2198. *.evocatusco.com *.hd-mo-tube.ru *.islam-iea.net
  2199. *.kadikoyfirmalar.tk *.kokeikyo.ml *.kootbook.cf
  2200. *.mujali.com *.serveropenr.cf
  2201. *.vbaddict.altervista.org *.xiaav.in
  2202. *.youreviewer.cf 17luoliao.com 52aipai.com
  2203. 7infinite.com 9191porn.com aipai3.com
  2204. alemarah-english.org alsomod-iea.info azamm.org
  2205. barnabascompany.com conquer-x.com diapsalmata.com
  2206. discerningthedrift.com evocatusco.com
  2207. hd-mo-tube.ru islam-iea.net kadikoyfirmalar.tk
  2208. kokeikyo.ml kootbook.cf mujali.com serveropenr.cf
  2209. vbaddict.altervista.org xiaav.in youreviewer.cf 
  2210.  Issuer COMODO ECC Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
  2211.  Trust (hostname) Ok via SAN (SNI mandatory)
  2212.  Chain of trust Ok 
  2213.  EV cert (experimental) no
  2214.  Certificate Expiration 190 >= 60 days (2017-10-18 20:00 --> 2018-04-27 19:59 -0400)
  2215.  # of certificates provided 3
  2216.  Certificate Revocation List http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
  2217.  OCSP URI http://ocsp.comodoca4.com
  2218.  OCSP stapling offered
  2219.  OCSP must staple no
  2220.  DNS CAA RR (experimental) --
  2221.  Certificate Transparency yes (TLS extension)
  2222.  
  2223.  
  2224.  Testing HTTP header response @ "/" 
  2225.  
  2226.  HTTP Status Code  200 OK
  2227.  HTTP clock skew +2 (± 1.5) sec from localtime
  2228.  Strict Transport Security --
  2229.  Public Key Pinning --
  2230.  Server banner cloudflare-nginx
  2231.  Application banner X-Powered-By(B: PHP/5(B.5(B.3(B8(B
  2232.  Cookie(s) 1 issued: NOT secure, 1/1 HttpOnly
  2233.  Security headers --
  2234.  Reverse Proxy banner --
  2235.  
  2236.  
  2237.  Testing vulnerabilities 
  2238.  
  2239.  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
  2240.  CCS (CVE-2014-0224) not vulnerable (OK)
  2241.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), no session tickets
  2242.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  2243.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  2244.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  2245.  BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
  2246. Can be ignored for static pages or if no secrets in the page
  2247.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  2248.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  2249.  SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
  2250.  FREAK (CVE-2015-0204) not vulnerable (OK)
  2251.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  2252. no RSA certificate, thus certificate can't be used with SSLv2 elsewhere
  2253.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  2254.  BEAST (CVE-2011-3389) TLS1: ECDHE-ECDSA-AES128-SHA
  2255. ECDHE-ECDSA-AES256-SHA 
  2256. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  2257.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  2258.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  2259.  
  2260.  
  2261.  Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  2262.  
  2263. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  2264. -----------------------------------------------------------------------------------------------------------------------------
  2265. xcc14 ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256_OLD
  2266. xc02c ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  2267. xc024 ECDHE-ECDSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
  2268. xc00a ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  2269. xcca9 ECDHE-ECDSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
  2270. xc02b ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  2271. xc023 ECDHE-ECDSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  2272. xc009 ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  2273.  
  2274.  
  2275.  Running client simulations via sockets 
  2276.  
  2277. Android 2.3.7 No connection
  2278. Android 4.1.1 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2279. Android 4.3 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2280. Android 4.4.2 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2281. Android 5.0.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  2282. Android 6.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  2283. Android 7.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 253 bit ECDH (X25519)
  2284. Chrome 51 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 253 bit ECDH (X25519)
  2285. Chrome 57 Win 7 No connection
  2286. Firefox 49 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2287. Firefox 53 Win 7 No connection
  2288. IE 6 XP No connection
  2289. IE 7 Vista TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2290. IE 8 XP No connection
  2291. IE 8 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2292. IE 11 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2293. IE 11 Win 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2294. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2295. IE 11 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2296. Edge 13 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2297. Edge 13 Win Phone 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2298. Opera 17 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2299. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2300. Safari 7 iOS 7.1 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2301. Safari 9 OS X 10.11 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2302. Safari 10 OS X 10.12 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2303. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2304. Tor 17.0.9 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2305. Java 6u45 No connection
  2306. Java 7u25 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2307. Java 8u31 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2308. OpenSSL 1.0.1l TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2309. OpenSSL 1.0.2e TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2310.  
  2311.  Done 2017-10-19 07:30:31 [ 188s] -->> 104.27.133.197:443 (alsomod-iea.info) <<--
  2312.  
  2313. -----------------------------------------------------
  2314.  Start 2017-10-19 07:30:32 -->> 104.27.132.197:443 (alsomod-iea.info) <<--
  2315.  
  2316. further IP addresses: 104.27.133.197
  2317. rDNS (104.27.132.197): --
  2318. Service detected: HTTP
  2319.  
  2320.  
  2321.  Testing protocols via sockets except SPDY+HTTP2 
  2322.  
  2323.  SSLv2 not offered (OK)
  2324.  SSLv3 not offered (OK)
  2325.  TLS 1 offered
  2326.  TLS 1.1 offered
  2327.  TLS 1.2 offered (OK)
  2328.  SPDY/NPN h2, spdy/3.1, http/1.1 (advertised)
  2329.  HTTP2/ALPN h2, spdy/3.1, http/1.1 (offered)
  2330.  
  2331.  Testing ~standard cipher categories 
  2332.  
  2333.  NULL ciphers (no encryption) not offered (OK)
  2334.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  2335.  Export ciphers (w/o ADH+NULL) not offered (OK)
  2336.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  2337.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  2338.  Triple DES Ciphers (Medium) not offered (OK)
  2339.  High encryption (AES+Camellia, no AEAD) offered (OK)
  2340.  Strong encryption (AEAD ciphers) offered (OK)
  2341.  
  2342.  
  2343.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  2344.  
  2345.  PFS is offered (OK) ECDHE-ECDSA-CHACHA20-POLY1305-OLD
  2346. ECDHE-ECDSA-AES256-GCM-SHA384
  2347. ECDHE-ECDSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA
  2348. ECDHE-ECDSA-CHACHA20-POLY1305
  2349. ECDHE-ECDSA-AES128-GCM-SHA256
  2350. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA
  2351.  Elliptic curves offered: secp224r1 prime256v1 secp384r1 secp521r1 X25519
  2352.  
  2353.  
  2354.  Testing server preferences 
  2355.  
  2356.  Has server cipher order? yes (OK)
  2357.  Negotiated protocol TLSv1.2
  2358.  Negotiated cipher ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  2359.  Cipher order
  2360. TLSv1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  2361. TLSv1.1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  2362. TLSv1.2: ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-CHACHA20-POLY1305
  2363. ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA
  2364. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384
  2365. ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-AES256-SHA384
  2366.  
  2367.  
  2368.  Testing server defaults (Server Hello) 
  2369.  
  2370.  TLS extensions (standard) "renegotiation info/#65281" "server name/#0"
  2371. "session ticket/#35" "status request/#5"
  2372. "next protocol/#13172" "EC point formats/#11"
  2373. "extended master secret/#23"
  2374. "signed certificate timestamps/#18"
  2375. "application layer protocol negotiation/#16"
  2376.  Session Ticket RFC 5077 hint 64800 seconds, session tickets keys seems to be rotated < daily
  2377.  SSL Session ID support yes
  2378.  Session Resumption Tickets: yes, ID: yes
  2379.  TLS clock skew -1 sec from localtime
  2380.  Signature Algorithm ECDSA with SHA256
  2381.  Server key size ECDSA 256 bits
  2382.  Fingerprint / Serial SHA1 3FC13ED9B4222758A158DDFDD8011373C033E6B0 / B0280CC0718ACC4E21FEBAB0EC5C97AB
  2383. SHA256 CEF6D9A908EF321159FF34CD117966314B10FB6F64290F722878B3229EE4CDB6
  2384.  Common Name (CN) sni81162.cloudflaressl.com (request w/o SNI didn't succeed, usual for EC certificates)
  2385.  subjectAltName (SAN) sni81162.cloudflaressl.com *.17luoliao.com
  2386. *.52aipai.com *.7infinite.com *.9191porn.com
  2387. *.aipai3.com *.alemarah-english.org
  2388. *.alsomod-iea.info *.azamm.org
  2389. *.barnabascompany.com *.conquer-x.com
  2390. *.diapsalmata.com *.discerningthedrift.com
  2391. *.evocatusco.com *.hd-mo-tube.ru *.islam-iea.net
  2392. *.kadikoyfirmalar.tk *.kokeikyo.ml *.kootbook.cf
  2393. *.mujali.com *.serveropenr.cf
  2394. *.vbaddict.altervista.org *.xiaav.in
  2395. *.youreviewer.cf 17luoliao.com 52aipai.com
  2396. 7infinite.com 9191porn.com aipai3.com
  2397. alemarah-english.org alsomod-iea.info azamm.org
  2398. barnabascompany.com conquer-x.com diapsalmata.com
  2399. discerningthedrift.com evocatusco.com
  2400. hd-mo-tube.ru islam-iea.net kadikoyfirmalar.tk
  2401. kokeikyo.ml kootbook.cf mujali.com serveropenr.cf
  2402. vbaddict.altervista.org xiaav.in youreviewer.cf 
  2403.  Issuer COMODO ECC Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
  2404.  Trust (hostname) Ok via SAN (SNI mandatory)
  2405.  Chain of trust Ok 
  2406.  EV cert (experimental) no
  2407.  Certificate Expiration 190 >= 60 days (2017-10-18 20:00 --> 2018-04-27 19:59 -0400)
  2408.  # of certificates provided 3
  2409.  Certificate Revocation List http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
  2410.  OCSP URI http://ocsp.comodoca4.com
  2411.  OCSP stapling offered
  2412.  OCSP must staple no
  2413.  DNS CAA RR (experimental) --
  2414.  Certificate Transparency yes (TLS extension)
  2415.  
  2416.  
  2417.  Testing HTTP header response @ "/" 
  2418.  
  2419.  HTTP Status Code  200 OK
  2420.  HTTP clock skew +1 (± 1.5) sec from localtime
  2421.  Strict Transport Security --
  2422.  Public Key Pinning --
  2423.  Server banner cloudflare-nginx
  2424.  Application banner X-Powered-By(B: PHP/5(B.5(B.3(B8(B
  2425.  Cookie(s) 1 issued: NOT secure, 1/1 HttpOnly
  2426.  Security headers --
  2427.  Reverse Proxy banner --
  2428.  
  2429.  
  2430.  Testing vulnerabilities 
  2431.  
  2432.  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
  2433.  CCS (CVE-2014-0224) not vulnerable (OK)
  2434.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), no session tickets
  2435.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  2436.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  2437.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  2438.  BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
  2439. Can be ignored for static pages or if no secrets in the page
  2440.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  2441.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  2442.  SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
  2443.  FREAK (CVE-2015-0204) not vulnerable (OK)
  2444.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  2445. no RSA certificate, thus certificate can't be used with SSLv2 elsewhere
  2446.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  2447.  BEAST (CVE-2011-3389) TLS1: ECDHE-ECDSA-AES128-SHA
  2448. ECDHE-ECDSA-AES256-SHA 
  2449. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  2450.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  2451.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  2452.  
  2453.  
  2454.  Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  2455.  
  2456. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  2457. -----------------------------------------------------------------------------------------------------------------------------
  2458. xcc14 ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256_OLD
  2459. xc02c ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  2460. xc024 ECDHE-ECDSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
  2461. xc00a ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  2462. xcca9 ECDHE-ECDSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
  2463. xc02b ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  2464. xc023 ECDHE-ECDSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  2465. xc009 ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  2466.  
  2467.  
  2468.  Running client simulations via sockets 
  2469.  
  2470. Android 2.3.7 No connection
  2471. Android 4.1.1 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2472. Android 4.3 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2473. Android 4.4.2 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2474. Android 5.0.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  2475. Android 6.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  2476. Android 7.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 253 bit ECDH (X25519)
  2477. Chrome 51 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 253 bit ECDH (X25519)
  2478. Chrome 57 Win 7 No connection
  2479. Firefox 49 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2480. Firefox 53 Win 7 No connection
  2481. IE 6 XP No connection
  2482. IE 7 Vista TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2483. IE 8 XP No connection
  2484. IE 8 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2485. IE 11 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2486. IE 11 Win 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2487. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2488. IE 11 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2489. Edge 13 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2490. Edge 13 Win Phone 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2491. Opera 17 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2492. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2493. Safari 7 iOS 7.1 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2494. Safari 9 OS X 10.11 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2495. Safari 10 OS X 10.12 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2496. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2497. Tor 17.0.9 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2498. Java 6u45 No connection
  2499. Java 7u25 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2500. Java 8u31 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2501. OpenSSL 1.0.1l TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2502. OpenSSL 1.0.2e TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2503.  
  2504.  Done 2017-10-19 07:33:54 [ 391s] -->> 104.27.132.197:443 (alsomod-iea.info) <<--
  2505.  
  2506. -----------------------------------------------------
  2507. Done testing now all IP addresses (on port 443): 104.27.133.197 104.27.132.197
  2508. #######################################################################################################################################
  2509. Hostname mrkzgulfup.com ISP Unknown
  2510. Continent Unknown Flag
  2511. US
  2512. Country United States Country Code US
  2513. Region Unknown Local time 19 Oct 2017 06:31 CDT
  2514. City Unknown Latitude 37.751
  2515. IP Address (IPv6) 2400:cb00:2048:1::681c:aa2 Longitude -97.822
  2516. ####################################################################################################################################### #OPISIS Anonymous JTSEC full recon #1
  2517.  
  2518.  
  2519.  
  2520. [i] Scanning Site: http://mrkzgulfup.com
  2521.  
  2522.  
  2523.  
  2524. B A S I C I N F O
  2525. ====================
  2526.  
  2527.  
  2528. [+] Site Title: مركز الخليج , لـ رفع الصور , و رفع الملفات , الخليج , مركز تحميل الصور , gulfup , تحميل الصور ,رفع صور, مركز رفع, مركز تحميل الخليج, mrkzgulfup , مركز رفع الخليج
  2529. [+] IP address: 104.28.11.162
  2530. [+] Web Server: cloudflare-nginx
  2531. [+] CMS: Could Not Detect
  2532. [+] Cloudflare: Detected
  2533. [+] Robots File: Could NOT Find robots.txt!
  2534.  
  2535.  
  2536.  
  2537.  
  2538. W H O I S L O O K U P
  2539. ========================
  2540.  
  2541. Domain Name: MRKZGULFUP.COM
  2542. Registry Domain ID: 2085216549_DOMAIN_COM-VRSN
  2543. Registrar WHOIS Server: whois.godaddy.com
  2544. Registrar URL: http://www.godaddy.com
  2545. Updated Date: 2016-12-27T13:55:30Z
  2546. Creation Date: 2016-12-27T13:44:53Z
  2547. Registry Expiry Date: 2017-12-27T13:44:53Z
  2548. Registrar: GoDaddy.com, LLC
  2549. Registrar IANA ID: 146
  2550. Registrar Abuse Contact Email: abuse@godaddy.com
  2551. Registrar Abuse Contact Phone: 480-624-2505
  2552. Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
  2553. Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
  2554. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  2555. Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
  2556. Name Server: ARAGORN.NS.CLOUDFLARE.COM
  2557. Name Server: MELISSA.NS.CLOUDFLARE.COM
  2558. DNSSEC: unsigned
  2559. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  2560. >>> Last update of whois database: 2017-10-19T11:34:03Z <<<
  2561.  
  2562. For more information on Whois status codes, please visit https://icann.org/epp
  2563.  
  2564. NOTICE: The expiration date displayed in this record is the date the
  2565. registrar's sponsorship of the domain name registration in the registry is
  2566. currently set to expire. This date does not necessarily reflect the expiration
  2567. date of the domain name registrant's agreement with the sponsoring
  2568. registrar. Users may consult the sponsoring registrar's Whois database to
  2569. view the registrar's reported date of expiration for this registration.
  2570.  
  2571.  
  2572. The Registry database contains ONLY .COM, .NET, .EDU domains and
  2573. Registrars.
  2574.  
  2575.  
  2576.  
  2577.  
  2578. G E O I P L O O K U P
  2579. =========================
  2580.  
  2581. [i] IP Address: 104.28.11.162
  2582. [i] Country: US
  2583. [i] State: N/A
  2584. [i] City: N/A
  2585. [i] Latitude: 37.750999
  2586. [i] Longitude: -97.821999
  2587.  
  2588.  
  2589.  
  2590.  
  2591. H T T P H E A D E R S
  2592. =======================
  2593.  
  2594.  
  2595. [i] HTTP/1.1 200 OK
  2596. [i] Date: Thu, 19 Oct 2017 11:34:28 GMT
  2597. [i] Content-Type: text/html; charset=UTF-8
  2598. [i] Connection: close
  2599. [i] Set-Cookie: __cfduid=d02504b2360b55eecc91a8215fb5ccbef1508412868; expires=Fri, 19-Oct-18 11:34:28 GMT; path=/; domain=.mrkzgulfup.com; HttpOnly
  2600. [i] Vary: Accept-Encoding
  2601. [i] X-Powered-By: PHP/5.3.29
  2602. [i] Cache-Control: private, no-cache="set-cookie"
  2603. [i] Expires: 0
  2604. [i] Pragma: no-cache
  2605. [i] x-frame-options: SAMEORIGIN
  2606. [i] x-xss-protection: 1; mode=block
  2607. [i] Set-Cookie: sid=UmoYHs0B0WQ0HxCpefvYmMDJVDb; expires=Sat, 21-Oct-2017 11:34:26 GMT; path=/
  2608. [i] X-Cache: HIT from Backend
  2609. [i] Server: cloudflare-nginx
  2610. [i] CF-RAY: 3b036da9911a926c-EWR
  2611.  
  2612.  
  2613.  
  2614.  
  2615. D N S L O O K U P
  2616. ===================
  2617.  
  2618. mrkzgulfup.com. 290 IN A 104.28.10.162
  2619. mrkzgulfup.com. 290 IN A 104.28.11.162
  2620. mrkzgulfup.com. 3789 IN HINFO "ANY obsoleted" "See draft-ietf-dnsop-refuse-any"
  2621. mrkzgulfup.com. 290 IN AAAA 2400:cb00:2048:1::681c:aa2
  2622. mrkzgulfup.com. 290 IN AAAA 2400:cb00:2048:1::681c:ba2
  2623.  
  2624.  
  2625.  
  2626.  
  2627. S U B N E T C A L C U L A T I O N
  2628. ====================================
  2629.  
  2630. Address = 2400:cb00:2048:1::681c:ba2
  2631. Network = 2400:cb00:2048:1::681c:ba2 / 128
  2632. Netmask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
  2633. Wildcard Mask = ::
  2634. Hosts Bits = 0
  2635. Max. Hosts = 0 (2^0 - 1)
  2636. Host Range = { 2400:cb00:2048:1::681c:ba3 - 2400:cb00:2048:1::681c:ba2 }
  2637.  
  2638.  
  2639.  
  2640. N M A P P O R T S C A N
  2641. ============================
  2642.  
  2643.  
  2644. Starting Nmap 7.01 ( https://nmap.org ) at 2017-10-19 11:34 UTC
  2645. Nmap scan report for mrkzgulfup.com (104.28.10.162)
  2646. Host is up (0.0074s latency).
  2647. Other addresses for mrkzgulfup.com (not scanned): 104.28.11.162 2400:cb00:2048:1::681c:ba2 2400:cb00:2048:1::681c:aa2
  2648. PORT STATE SERVICE VERSION
  2649. 21/tcp filtered ftp
  2650. 22/tcp filtered ssh
  2651. 23/tcp filtered telnet
  2652. 25/tcp filtered smtp
  2653. 80/tcp open http Cloudflare nginx
  2654. 110/tcp filtered pop3
  2655. 143/tcp filtered imap
  2656. 443/tcp open ssl/http Cloudflare nginx
  2657. 445/tcp filtered microsoft-ds
  2658. 3389/tcp filtered ms-wbt-server
  2659.  
  2660. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2661. Nmap done: 1 IP address (1 host up) scanned in 13.91 seconds
  2662.  
  2663.  
  2664.  
  2665. S U B - D O M A I N F I N D E R
  2666. ==================================
  2667.  
  2668.  
  2669. [i] Total Subdomains Found : 2
  2670.  
  2671. [+] Subdomain: mrkzgulfup.com
  2672. [-] IP: 104.28.10.162
  2673.  
  2674. [+] Subdomain: mrkzgulfup.com
  2675. [-] IP: 104.28.11.162
  2676. [*] Performing TLD Brute force Enumeration against mrkzgulfup.com
  2677. [*] The operation could take up to: 00:01:07
  2678. [*] A mrkzgulfup.biz.af 5.45.75.45
  2679. [*] A mrkzgulfup.co.asia 91.195.240.135
  2680. [*] CNAME mrkzgulfup.biz.at free.biz.at
  2681. [*] A free.biz.at 216.92.134.29
  2682. [*] A mrkzgulfup.org.aw 142.4.20.12
  2683. [*] A mrkzgulfup.com.ax 185.55.85.123
  2684. [*] A mrkzgulfup.org.ax 185.55.85.123
  2685. [*] A mrkzgulfup.co.ba 176.9.45.78
  2686. [*] A mrkzgulfup.com.ba 195.222.33.180
  2687. [*] A mrkzgulfup.com.be 95.173.170.166
  2688. [*] A mrkzgulfup.biz.by 71.18.52.2
  2689. [*] A mrkzgulfup.biz.bz 199.59.242.150
  2690. [*] A mrkzgulfup.net.cc 54.252.89.206
  2691. [*] A mrkzgulfup.com.cc 54.252.107.64
  2692. [*] A mrkzgulfup.co.cc 175.126.123.219
  2693. [*] A mrkzgulfup.org.ch 72.52.4.122
  2694. [*] A mrkzgulfup.biz.cl 185.53.178.8
  2695. [*] A mrkzgulfup.com 104.28.10.162
  2696. [*] A mrkzgulfup.com 104.28.11.162
  2697. [*] AAAA mrkzgulfup.com 2400:cb00:2048:1::681c:ba2
  2698. [*] AAAA mrkzgulfup.com 2400:cb00:2048:1::681c:aa2
  2699. [*] A mrkzgulfup.net.com 199.59.242.150
  2700. [*] A mrkzgulfup.com.com 52.33.196.199
  2701. [*] A mrkzgulfup.co.com 173.192.115.17
  2702. [*] A mrkzgulfup.org.com 23.23.86.44
  2703. [*] CNAME mrkzgulfup.biz.cm i.cns.cm
  2704. [*] A i.cns.cm 118.184.56.30
  2705. [*] A mrkzgulfup.biz.cr 72.52.4.122
  2706. [*] A mrkzgulfup.co.cm 85.25.140.105
  2707. [*] A mrkzgulfup.net.cm 85.25.140.105
  2708. [*] A mrkzgulfup.biz.cx 72.52.4.122
  2709. [*] A mrkzgulfup.com.cz 62.109.128.30
  2710. [*] A mrkzgulfup.net.cz 80.250.24.177
  2711. [*] A mrkzgulfup.com.de 50.56.68.37
  2712. [*] CNAME mrkzgulfup.org.de www.org.de
  2713. [*] A www.org.de 78.47.128.8
  2714. [*] CNAME mrkzgulfup.co.de co.de
  2715. [*] A co.de 144.76.162.245
  2716. [*] A mrkzgulfup.biz.cz 185.53.179.7
  2717. [*] A mrkzgulfup.net.eu 78.46.90.98
  2718. [*] A mrkzgulfup.org.eu 78.46.90.98
  2719. [*] A mrkzgulfup.biz.fi 185.55.85.123
  2720. [*] A mrkzgulfup.fm 173.230.131.38
  2721. [*] A mrkzgulfup.biz.fm 173.230.131.38
  2722. [*] A mrkzgulfup.org.fr 149.202.133.35
  2723. [*] A mrkzgulfup.biz.gl 72.52.4.122
  2724. [*] CNAME mrkzgulfup.co.gp co.gp
  2725. [*] A co.gp 144.76.162.245
  2726. [*] A mrkzgulfup.co.hn 208.100.40.203
  2727. [*] CNAME mrkzgulfup.net.hr net.hr
  2728. [*] A net.hr 192.0.78.25
  2729. [*] A net.hr 192.0.78.24
  2730. [*] A mrkzgulfup.co.ht 72.52.4.122
  2731. [*] CNAME mrkzgulfup.biz.hn parkmydomain.vhostgo.com
  2732. [*] CNAME parkmydomain.vhostgo.com westuser.dopa.com
  2733. [*] A westuser.dopa.com 107.186.245.119
  2734. [*] A mrkzgulfup.co.jobs 50.17.193.222
  2735. [*] A mrkzgulfup.biz.jobs 50.19.241.165
  2736. [*] A mrkzgulfup.net.jobs 50.19.241.165
  2737. [*] A mrkzgulfup.com.jobs 50.19.241.165
  2738. [*] A mrkzgulfup.org.jobs 50.19.241.165
  2739. [*] A mrkzgulfup.la 173.230.141.80
  2740. [*] CNAME mrkzgulfup.biz.li 712936.parkingcrew.net
  2741. [*] A 712936.parkingcrew.net 185.53.179.29
  2742. [*] A mrkzgulfup.biz.lu 195.26.5.2
  2743. [*] A mrkzgulfup.biz.ly 64.136.20.39
  2744. [*] A mrkzgulfup.biz.md 72.52.4.122
  2745. [*] A mrkzgulfup.co.mk 87.76.31.211
  2746. [*] A mrkzgulfup.co.mobi 54.225.105.179
  2747. [*] A mrkzgulfup.biz.my 202.190.174.44
  2748. [*] A mrkzgulfup.co.net 188.166.216.219
  2749. [*] A mrkzgulfup.net.net 52.50.81.210
  2750. [*] A mrkzgulfup.org.net 23.23.86.44
  2751. [*] A mrkzgulfup.co.nl 37.97.184.204
  2752. [*] A mrkzgulfup.com.nl 83.98.157.102
  2753. [*] A mrkzgulfup.net.nl 83.98.157.102
  2754. [*] A mrkzgulfup.co.nr 208.100.40.202
  2755. [*] A mrkzgulfup.net.nu 199.102.76.78
  2756. [*] A mrkzgulfup.org.nu 80.92.84.139
  2757. [*] CNAME mrkzgulfup.co.nu co.nu
  2758. [*] A co.nu 144.76.162.245
  2759. [*] CNAME mrkzgulfup.com.nu com.nu
  2760. [*] A com.nu 144.76.162.245
  2761. [*] A mrkzgulfup.com.org 23.23.86.44
  2762. [*] CNAME mrkzgulfup.net.org pewtrusts.org
  2763. [*] A pewtrusts.org 204.74.99.100
  2764. [*] A mrkzgulfup.ph 45.79.222.138
  2765. [*] A mrkzgulfup.co.ph 45.79.222.138
  2766. [*] A mrkzgulfup.com.ph 45.79.222.138
  2767. [*] A mrkzgulfup.net.ph 45.79.222.138
  2768. [*] A mrkzgulfup.org.ph 45.79.222.138
  2769. [*] A mrkzgulfup.co.pl 212.91.6.55
  2770. [*] A mrkzgulfup.org.pm 208.73.211.165
  2771. [*] A mrkzgulfup.org.pm 208.73.211.177
  2772. [*] A mrkzgulfup.org.pm 208.73.210.217
  2773. [*] A mrkzgulfup.org.pm 208.73.210.202
  2774. [*] A mrkzgulfup.co.ps 66.96.132.56
  2775. [*] A mrkzgulfup.co.pt 194.107.127.52
  2776. [*] A mrkzgulfup.pw 141.8.226.58
  2777. [*] A mrkzgulfup.co.pw 141.8.226.59
  2778. [*] A mrkzgulfup.net.pw 141.8.226.59
  2779. [*] A mrkzgulfup.biz.pw 141.8.226.59
  2780. [*] A mrkzgulfup.org.pw 141.8.226.59
  2781. [*] CNAME mrkzgulfup.biz.ps biz.ps
  2782. [*] A biz.ps 144.76.162.245
  2783. [*] A mrkzgulfup.org.re 217.70.184.38
  2784. [*] A mrkzgulfup.net.ro 69.64.52.127
  2785. [*] CNAME mrkzgulfup.co.ro now.co.ro
  2786. [*] A now.co.ro 185.27.255.9
  2787. [*] A mrkzgulfup.com.ru 178.210.89.119
  2788. [*] CNAME mrkzgulfup.net.se 773147.parkingcrew.net
  2789. [*] A 773147.parkingcrew.net 185.53.179.29
  2790. [*] A mrkzgulfup.biz.se 185.53.179.6
  2791. [*] A mrkzgulfup.co.sl 91.195.240.135
  2792. [*] A mrkzgulfup.com.sr 143.95.106.249
  2793. [*] A mrkzgulfup.biz.st 91.121.28.115
  2794. [*] A mrkzgulfup.co.su 72.52.4.122
  2795. [*] A mrkzgulfup.biz.tc 64.136.20.39
  2796. [*] A mrkzgulfup.biz.tf 85.236.153.18
  2797. [*] A mrkzgulfup.net.tf 188.40.70.29
  2798. [*] A mrkzgulfup.net.tf 188.40.70.27
  2799. [*] A mrkzgulfup.net.tf 188.40.117.12
  2800. [*] A mrkzgulfup.co.tl 208.100.40.202
  2801. [*] A mrkzgulfup.co.to 175.118.124.44
  2802. [*] A mrkzgulfup.co.tv 31.186.25.163
  2803. [*] A mrkzgulfup.biz.tv 72.52.4.122
  2804. [*] A mrkzgulfup.org.tv 72.52.4.122
  2805. [*] CNAME mrkzgulfup.biz.uz biz.uz
  2806. [*] A biz.uz 144.76.162.245
  2807. [*] A mrkzgulfup.vg 88.198.29.97
  2808. [*] A mrkzgulfup.co.vg 88.198.29.97
  2809. [*] A mrkzgulfup.com.vg 88.198.29.97
  2810. [*] A mrkzgulfup.net.vg 166.62.28.147
  2811. [*] A mrkzgulfup.biz.vg 89.31.143.20
  2812. [*] A mrkzgulfup.ws 64.70.19.203
  2813. [*] A mrkzgulfup.com.ws 202.4.48.211
  2814. [*] A mrkzgulfup.biz.ws 184.168.221.104
  2815. [*] A mrkzgulfup.net.ws 202.4.48.211
  2816. [*] A mrkzgulfup.org.ws 202.4.48.211
  2817. [*] CNAME mrkzgulfup.co.vu cname.codotvu.com
  2818. [*] A cname.codotvu.com 23.20.16.197
  2819.  
  2820. #
  2821. # ARIN WHOIS data and services are subject to the Terms of Use
  2822. # available at: https://www.arin.net/whois_tou.html
  2823. #
  2824. # If you see inaccuracies in the results, please report at
  2825. # https://www.arin.net/public/whoisinaccuracy/index.xhtml
  2826. #
  2827.  
  2828.  
  2829. #
  2830. # The following results may also be obtained via:
  2831. # https://whois.arin.net/rest/nets;q=104.28.11.162?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
  2832. #
  2833.  
  2834. NetRange: 104.16.0.0 - 104.31.255.255
  2835. CIDR: 104.16.0.0/12
  2836. NetName: CLOUDFLARENET
  2837. NetHandle: NET-104-16-0-0-1
  2838. Parent: NET104 (NET-104-0-0-0-0)
  2839. NetType: Direct Assignment
  2840. OriginAS: AS13335
  2841. Organization: Cloudflare, Inc. (CLOUD14)
  2842. RegDate: 2014-03-28
  2843. Updated: 2017-02-17
  2844. Comment: All Cloudflare abuse reporting can be done via https://www.cloudflare.com/abuse
  2845. Ref: https://whois.arin.net/rest/net/NET-104-16-0-0-1
  2846.  
  2847.  
  2848.  
  2849. OrgName: Cloudflare, Inc.
  2850. OrgId: CLOUD14
  2851. Address: 101 Townsend Street
  2852. City: San Francisco
  2853. StateProv: CA
  2854. PostalCode: 94107
  2855. Country: US
  2856. RegDate: 2010-07-09
  2857. Updated: 2017-02-17
  2858. Comment: All Cloudflare abuse reporting can be done via https://www.cloudflare.com/abuse
  2859. Ref: https://whois.arin.net/rest/org/CLOUD14
  2860.  
  2861.  
  2862. OrgAbuseHandle: ABUSE2916-ARIN
  2863. OrgAbuseName: Abuse
  2864. OrgAbusePhone: +1-650-319-8930
  2865. OrgAbuseEmail: abuse@cloudflare.com
  2866. OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE2916-ARIN
  2867.  
  2868. OrgNOCHandle: NOC11962-ARIN
  2869. OrgNOCName: NOC
  2870. OrgNOCPhone: +1-650-319-8930
  2871. OrgNOCEmail: noc@cloudflare.com
  2872. OrgNOCRef: https://whois.arin.net/rest/poc/NOC11962-ARIN
  2873.  
  2874. OrgTechHandle: ADMIN2521-ARIN
  2875. OrgTechName: Admin
  2876. OrgTechPhone: +1-650-319-8930
  2877. OrgTechEmail: rir@cloudflare.com
  2878. OrgTechRef: https://whois.arin.net/rest/poc/ADMIN2521-ARIN
  2879.  
  2880. RNOCHandle: NOC11962-ARIN
  2881. RNOCName: NOC
  2882. RNOCPhone: +1-650-319-8930
  2883. RNOCEmail: noc@cloudflare.com
  2884. RNOCRef: https://whois.arin.net/rest/poc/NOC11962-ARIN
  2885.  
  2886. RAbuseHandle: ABUSE2916-ARIN
  2887. RAbuseName: Abuse
  2888. RAbusePhone: +1-650-319-8930
  2889. RAbuseEmail: abuse@cloudflare.com
  2890. RAbuseRef: https://whois.arin.net/rest/poc/ABUSE2916-ARIN
  2891.  
  2892. RTechHandle: ADMIN2521-ARIN
  2893. RTechName: Admin
  2894. RTechPhone: +1-650-319-8930
  2895. RTechEmail: rir@cloudflare.com
  2896. RTechRef: https://whois.arin.net/rest/poc/ADMIN2521-ARIN
  2897.  
  2898.  
  2899. #
  2900. # ARIN WHOIS data and services are subject to the Terms of Use
  2901. # available at: https://www.arin.net/whois_tou.html
  2902. #
  2903. # If you see inaccuracies in the results, please report at
  2904. # https://www.arin.net/public/whoisinaccuracy/index.xhtml
  2905. #[92m + -- ----------------------------=[Running Nslookup]=------------------------ -- +
  2906. Server: 192.168.1.254
  2907. Address: 192.168.1.254#53
  2908.  
  2909. Non-authoritative answer:
  2910. Name: mrkzgulfup.com
  2911. Address: 104.28.10.162
  2912. Name: mrkzgulfup.com
  2913. Address: 104.28.11.162
  2914.  
  2915. mrkzgulfup.com has address 104.28.11.162
  2916. mrkzgulfup.com has address 104.28.10.162
  2917. mrkzgulfup.com has IPv6 address 2400:cb00:2048:1::681c:ba2
  2918. mrkzgulfup.com has IPv6 address 2400:cb00:2048:1::681c:aa2
  2919. mrkzgulfup.com mail is handled by 10 mailstore1.secureserver.net.
  2920. mrkzgulfup.com mail is handled by 0 smtp.secureserver.net.
  2921.  + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
  2922.  
  2923. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  2924.  
  2925. [+] Target is mrkzgulfup.com
  2926. [+] Loading modules.
  2927. [+] Following modules are loaded:
  2928. [x] [1] ping:icmp_ping - ICMP echo discovery module
  2929. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  2930. [x] [3] ping:udp_ping - UDP-based ping discovery module
  2931. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  2932. [x] [5] infogather:portscan - TCP and UDP PortScanner
  2933. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  2934. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  2935. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  2936. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  2937. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  2938. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  2939. [x] [12] fingerprint:smb - SMB fingerprinting module
  2940. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  2941. [+] 13 modules registered
  2942. [+] Initializing scan engine
  2943. [+] Running scan engine
  2944. [-] ping:tcp_ping module: no closed/open TCP ports known on 104.28.10.162. Module test failed
  2945. [-] ping:udp_ping module: no closed/open UDP ports known on 104.28.10.162. Module test failed
  2946. [-] No distance calculation. 104.28.10.162 appears to be dead or no ports known
  2947. [+] Host: 104.28.10.162 is up (Guess probability: 50%)
  2948. [+] Target: 104.28.10.162 is alive. Round-Trip Time: 0.51554 sec
  2949. [+] Selected safe Round-Trip Time value is: 1.03108 sec
  2950. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  2951. [-] fingerprint:smb need either TCP port 139 or 445 to run
  2952. [+] Primary guess:
  2953. [+] Host 104.28.10.162 Running OS: (Guess probability: 100%)
  2954. [+] Other guesses:
  2955. [+] Host 104.28.10.162 Running OS: À¢*”~U (Guess probability: 91%)
  2956. [+] Host 104.28.10.162 Running OS: (Guess probability: 91%)
  2957. [+] Host 104.28.10.162 Running OS: (Guess probability: 91%)
  2958. [+] Host 104.28.10.162 Running OS: À¢*”~U (Guess probability: 91%)
  2959. [+] Host 104.28.10.162 Running OS: À¢*”~U (Guess probability: 91%)
  2960. [+] Host 104.28.10.162 Running OS: À¢*”~U (Guess probability: 91%)
  2961. [+] Host 104.28.10.162 Running OS: À¢*”~U (Guess probability: 91%)
  2962. [+] Host 104.28.10.162 Running OS: (Guess probability: 91%)
  2963. [+] Host 104.28.10.162 Running OS: (Guess probability: 91%)
  2964. [+] Cleaning up scan engine
  2965. [+] Modules deinitialized
  2966. [+] Execution completed.
  2967.  + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
  2968. Domain Name: MRKZGULFUP.COM
  2969. Registry Domain ID: 2085216549_DOMAIN_COM-VRSN
  2970. Registrar WHOIS Server: whois.godaddy.com
  2971. Registrar URL: http://www.godaddy.com
  2972. Updated Date: 2016-12-27T13:55:30Z
  2973. Creation Date: 2016-12-27T13:44:53Z
  2974. Registry Expiry Date: 2017-12-27T13:44:53Z
  2975. Registrar: GoDaddy.com, LLC
  2976. Registrar IANA ID: 146
  2977. Registrar Abuse Contact Email: abuse@godaddy.com
  2978. Registrar Abuse Contact Phone: 480-624-2505
  2979. Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
  2980. Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
  2981. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  2982. Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
  2983. Name Server: ARAGORN.NS.CLOUDFLARE.COM
  2984. Name Server: MELISSA.NS.CLOUDFLARE.COM
  2985. DNSSEC: unsigned
  2986. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  2987. >>> Last update of whois database: 2017-10-19T12:23:19Z <<<
  2988.  
  2989. For more information on Whois status codes, please visit https://icann.org/epp
  2990.  
  2991. NOTICE: The expiration date displayed in this record is the date the
  2992. registrar's sponsorship of the domain name registration in the registry is
  2993. currently set to expire. This date does not necessarily reflect the expiration
  2994. date of the domain name registrant's agreement with the sponsoring
  2995. registrar. Users may consult the sponsoring registrar's Whois database to
  2996. view the registrar's reported date of expiration for this registration.
  2997.  
  2998. TERMS OF USE: You are not authorized to access or query our Whois
  2999. database through the use of electronic processes that are high-volume and
  3000. automated except as reasonably necessary to register domain names or
  3001. modify existing registrations; the Data in VeriSign Global Registry
  3002. Services' ("VeriSign") Whois database is provided by VeriSign for
  3003. information purposes only, and to assist persons in obtaining information
  3004. about or related to a domain name registration record. VeriSign does not
  3005. guarantee its accuracy. By submitting a Whois query, you agree to abide
  3006. by the following terms of use: You agree that you may use this Data only
  3007. for lawful purposes and that under no circumstances will you use this Data
  3008. to: (1) allow, enable, or otherwise support the transmission of mass
  3009. unsolicited, commercial advertising or solicitations via e-mail, telephone,
  3010. or facsimile; or (2) enable high volume, automated, electronic processes
  3011. that apply to VeriSign (or its computer systems). The compilation,
  3012. repackaging, dissemination or other use of this Data is expressly
  3013. prohibited without the prior written consent of VeriSign. You agree not to
  3014. use electronic processes that are automated and high-volume to access or
  3015. query the Whois database except as reasonably necessary to register
  3016. domain names or modify existing registrations. VeriSign reserves the right
  3017. to restrict your access to the Whois database in its sole discretion to ensure
  3018. operational stability. VeriSign may restrict or terminate your access to the
  3019. Whois database for failure to abide by these terms of use. VeriSign
  3020. reserves the right to modify these terms at any time.
  3021.  
  3022. The Registry database contains ONLY .COM, .NET, .EDU domains and
  3023. Registrars.
  3024. Domain Name: mrkzgulfup.com
  3025. Registrar URL: http://www.godaddy.com
  3026. Registrant Name: Abdulaali Alzahrani
  3027. Registrant Organization:
  3028. Name Server: ARAGORN.NS.CLOUDFLARE.COM
  3029. Name Server: MELISSA.NS.CLOUDFLARE.COM
  3030. DNSSEC: unsigned
  3031.  
  3032. For complete domain details go to:
  3033. http://who.godaddy.com/whoischeck.aspx?domain=mrkzgulfup.com
  3034.  
  3035. The data contained in GoDaddy.com, LLC's WhoIs database,
  3036. while believed by the company to be reliable, is provided "as is"
  3037. with no guarantee or warranties regarding its accuracy. This
  3038. information is provided for the sole purpose of assisting you
  3039. in obtaining information about domain name registration records.
  3040. Any use of this data for any other purpose is expressly forbidden without the prior written
  3041. permission of GoDaddy.com, LLC. By submitting an inquiry,
  3042. you agree to these terms of usage and limitations of warranty. In particular,
  3043. you agree not to use this data to allow, enable, or otherwise make possible,
  3044. dissemination or collection of this data, in part or in its entirety, for any
  3045. purpose, such as the transmission of unsolicited advertising and
  3046. and solicitations of any kind, including spam. You further agree
  3047. not to use this data to enable high volume, automated or robotic electronic
  3048. processes designed to collect or compile this data for any purpose,
  3049. including mining this data for your own personal or commercial purposes.
  3050.  
  3051. Please note: the registrant of the domain name is specified
  3052. in the "registrant" section. In most cases, GoDaddy.com, LLC
  3053. is not the registrant of domain names listed in this database.
  3054.  + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
  3055.  
  3056. *******************************************************************
  3057. * *
  3058. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  3059. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  3060. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  3061. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  3062. * *
  3063. * TheHarvester Ver. 2.7 *
  3064. * Coded by Christian Martorella *
  3065. * Edge-Security Research *
  3066. * cmartorella@edge-security.com *
  3067. *******************************************************************
  3068.  
  3069.  
  3070. [-] Searching in Bing:
  3071. Searching 50 results...
  3072. Searching 100 results...
  3073.  
  3074.  
  3075. [+] Emails found:
  3076. ------------------
  3077. No emails found
  3078.  
  3079. [+] Hosts found in search engines:
  3080. ------------------------------------
  3081. No hosts found
  3082.  + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
  3083.  
  3084. ; <<>> DiG 9.10.3-P4-Debian <<>> -x mrkzgulfup.com
  3085. ;; global options: +cmd
  3086. ;; Got answer:
  3087. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16057
  3088. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  3089.  
  3090. ;; OPT PSEUDOSECTION:
  3091. ; EDNS: version: 0, flags:; udp: 4096
  3092. ;; QUESTION SECTION:
  3093. ;com.mrkzgulfup.in-addr.arpa. IN PTR
  3094.  
  3095. ;; AUTHORITY SECTION:
  3096. in-addr.arpa. 643 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017043288 1800 900 604800 3600
  3097.  
  3098. ;; Query time: 9 msec
  3099. ;; SERVER: 192.168.1.254#53(192.168.1.254)
  3100. ;; WHEN: Thu Oct 19 08:23:45 EDT 2017
  3101. ;; MSG SIZE rcvd: 124
  3102.  
  3103. dnsenum VERSION:1.2.4
  3104. 
  3105. ----- mrkzgulfup.com -----
  3106. 
  3107.  
  3108. Host's addresses:
  3109. __________________
  3110.  
  3111. mrkzgulfup.com. 85 IN A 104.28.11.162
  3112. mrkzgulfup.com. 85 IN A 104.28.10.162
  3113. 
  3114.  
  3115. Name Servers:
  3116. ______________
  3117.  
  3118. aragorn.ns.cloudflare.com. 83442 IN A 173.245.59.67
  3119. melissa.ns.cloudflare.com. 68460 IN A 173.245.58.199
  3120. 
  3121.  
  3122. Mail (MX) Servers:
  3123. ___________________
  3124.  
  3125. smtp.secureserver.net. 60 IN A 68.178.213.203
  3126. smtp.secureserver.net. 60 IN A 72.167.238.29
  3127. smtp.secureserver.net. 60 IN A 68.178.213.37
  3128. mailstore1.secureserver.net. 60 IN A 68.178.213.243
  3129. mailstore1.secureserver.net. 60 IN A 68.178.213.244
  3130. mailstore1.secureserver.net. 60 IN A 72.167.238.32
  3131. 
  3132.  
  3133. Trying Zone Transfers and getting Bind Versions:
  3134. _________________________________________________
  3135.  
  3136. 
  3137. Trying Zone Transfer for mrkzgulfup.com on aragorn.ns.cloudflare.com ...
  3138.  
  3139. Trying Zone Transfer for mrkzgulfup.com on melissa.ns.cloudflare.com ...
  3140.  
  3141. brute force file not specified, bay.
  3142.  + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
  3143. 
  3144. ____ _ _ _ _ _____
  3145. / ___| _ _| |__ | (_)___| |_|___ / _ __
  3146. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  3147. ___) | |_| | |_) | | \__ \ |_ ___) | |
  3148. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  3149.  
  3150. # Coded By Ahmed Aboul-Ela - @aboul3la
  3151.  
  3152. [-] Enumerating subdomains now for mrkzgulfup.com
  3153. [-] verbosity is enabled, will show the subdomains results in realtime
  3154. [-] Searching now in Baidu..
  3155. [-] Searching now in Yahoo..
  3156. [-] Searching now in Google..
  3157. [-] Searching now in Bing..
  3158. [-] Searching now in Ask..
  3159. [-] Searching now in Netcraft..
  3160. [-] Searching now in DNSdumpster..
  3161. [-] Searching now in Virustotal..
  3162. [-] Searching now in ThreatCrowd..
  3163. [-] Searching now in SSL Certificates..
  3164. [-] Searching now in PassiveDNS..
  3165. Virustotal: www.mrkzgulfup.com
  3166. Yahoo: www.mrkzgulfup.com
  3167. [-] Saving results to file: /usr/share/sniper/loot/domains/domains-mrkzgulfup.com.txt
  3168. [-] Total Unique Subdomains Found: 1
  3169. www.mrkzgulfup.com
  3170.  
  3171.  ╔═╗╩═╗╔╩╗╔═╗╩ ╩
  3172.  ║ ╠╩╝ ║ ╚═╗╠═╣
  3173.  ╚═╝╩╚═ ╩o╚═╝╩ ╩
  3174.  + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
  3175. 
  3176. *.mrkzgulfup.com
  3177.  [+] Domains saved to: /usr/share/sniper/loot/domains/domains-mrkzgulfup.com-full.txt
  3178. 
  3179.  + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
  3180.  + -- ----------------------------=[Checking Email Security]=----------------- -- +
  3181.  
  3182.  + -- ----------------------------=[Pinging host]=---------------------------- -- +
  3183. PING mrkzgulfup.com(2400:cb00:2048:1::681c:aa2 (2400:cb00:2048:1::681c:aa2)) 56 data bytes
  3184. 64 bytes from 2400:cb00:2048:1::681c:aa2 (2400:cb00:2048:1::681c:aa2): icmp_seq=1 ttl=60 time=30.1 ms
  3185.  
  3186. --- mrkzgulfup.com ping statistics ---
  3187. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  3188. rtt min/avg/max/mdev = 30.123/30.123/30.123/0.000 ms
  3189.  
  3190.  + -- ----------------------------=[Running TCP port scan]=------------------- -- +
  3191.  
  3192. Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-19 08:24 EDT
  3193. Nmap scan report for mrkzgulfup.com (104.28.11.162)
  3194. Host is up (0.12s latency).
  3195. Other addresses for mrkzgulfup.com (not scanned): 2400:cb00:2048:1::681c:ba2 2400:cb00:2048:1::681c:aa2 104.28.10.162
  3196. Not shown: 45 filtered ports
  3197. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  3198. PORT STATE SERVICE
  3199. 80/tcp open http
  3200. 443/tcp open https
  3201. 8080/tcp open http-proxy
  3202. 8443/tcp open https-alt
  3203.  
  3204. Nmap done: 1 IP address (1 host up) scanned in 15.98 seconds
  3205.  
  3206.  + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
  3207.  + -- --=[Port 21 closed... skipping.
  3208.  + -- --=[Port 22 closed... skipping.
  3209.  + -- --=[Port 23 closed... skipping.
  3210.  + -- --=[Port 25 closed... skipping.
  3211.  + -- --=[Port 53 closed... skipping.
  3212.  + -- --=[Port 79 closed... skipping.
  3213.  + -- --=[Port 80 opened... running tests...
  3214.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  3215.  
  3216. ^ ^
  3217. _ __ _ ____ _ __ _ _ ____
  3218. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  3219. | V V // o // _/ | V V // 0 // 0 // _/
  3220. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  3221. <
  3222. ...'
  3223.  
  3224. WAFW00F - Web Application Firewall Detection Tool
  3225.  
  3226. By Sandro Gauci && Wendel G. Henrique
  3227.  
  3228. Checking http://mrkzgulfup.com
  3229. The site http://mrkzgulfup.com is behind a CloudFlare
  3230. Number of requests: 1
  3231.  
  3232.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  3233. http://mrkzgulfup.com [200 OK] CloudFlare, Cookies[__cfduid,sid], Country[UNITED STATES][US], HTTPServer[cloudflare-nginx], HttpOnly[__cfduid], IP[104.28.10.162], JQuery[1.12.0], PHP[5.3.29], PoweredBy[Kleeja,kleeja,kleeja,], Script[text/javascript], Title[مركز الخليج , لـ رفع الصور , و رفع الملفات , الخليج , مركز تحميل الصور , gulfup , تحميل الصور ,رفع صور, مركز رفع, مركز تحميل الخليج, mrkzgulfup , مركز رفع الخليج], UncommonHeaders[cf-ray], X-Cache[Backend], X-Frame-Options[SAMEORIGIN], X-Powered-By[PHP/5.3.29], X-UA-Compatible[IE=EmulateIE7], X-XSS-Protection[1; mode=block]
  3234.  
  3235.  __ ______ _____ 
  3236.  \ \/ / ___|_ _|
  3237.  \ /\___ \ | | 
  3238.  / \ ___) || | 
  3239.  /_/\_|____/ |_| 
  3240.  
  3241. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  3242. + -- --=[Target: mrkzgulfup.com:80
  3243. + -- --=[Site not vulnerable to Cross-Site Tracing!
  3244. + -- --=[Site not vulnerable to Host Header Injection!
  3245.  
  3246.  + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
  3247. + -- --=[Checking if X-Content options are enabled on mrkzgulfup.com... 
  3248.  
  3249. + -- --=[Checking if X-Frame options are enabled on mrkzgulfup.com... 
  3250. x-frame-options: SAMEORIGIN
  3251.  
  3252. + -- --=[Checking if X-XSS-Protection header is enabled on mrkzgulfup.com... 
  3253. x-xss-protection: 1; mode=block
  3254.  
  3255. + -- --=[Checking HTTP methods on mrkzgulfup.com... 
  3256.  
  3257. + -- --=[Checking if TRACE method is enabled on mrkzgulfup.com... 
  3258.  
  3259. + -- --=[Checking for META tags on mrkzgulfup.com... 
  3260. <meta name="google-site-verification" content="Sdk3UKKvplhoGQDcknaWm-iCUfPPHuwKAvnbaeogynM" />
  3261. <meta name="description" content="مركز الخليج gulfup - مركز تحميل الصور والملفات مدى الحياة يقدم لكم خدمة تحميل جميع أنواع الملفات ويدعم الرفع المتعدد والجوال ؚ؎كل مجانى." />
  3262. <meta name="keywords" content="مركز تحميل الصور, تحميل الصور, تحميل, مركز, مركز رفع الملفات, رفع الملفات, مركز رفع, رفع الصور, مركز رفع الصور, مركز الخليج, مركز تحميل الخليج, مركز تحميل, الخليج, مركز تحميل صور, تحميل صور, مركز تحميل الملفات, تحميل الملفات, مركز تحميل الصور والملفات" />
  3263. <meta name="alexaVerifyID" content="ur4VID-yP6k-WsZzZrAa73hGUxE"/>
  3264. <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
  3265. <meta http-equiv="Content-Language" content="ar-sa" />
  3266. <meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" />
  3267. <meta name="copyrights" content="Powered by Kleeja || kleeja.com" />
  3268. <meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;" />
  3269. <!-- metatags.info/all_meta_tags -->
  3270.  
  3271. + -- --=[Checking for open proxy on mrkzgulfup.com... 
  3272. </div><!-- /#cf-wrapper -->
  3273.  
  3274. <script type="text/javascript">
  3275. window._cf_translation = {};
  3276.  
  3277.  
  3278. </script>
  3279.  
  3280. </body>
  3281. </html>
  3282.  
  3283. + -- --=[Enumerating software on mrkzgulfup.com... 
  3284. X-Powered-By: PHP/5.3.29
  3285. Server: cloudflare-nginx
  3286.  
  3287. + -- --=[Checking if Strict-Transport-Security is enabled on mrkzgulfup.com... 
  3288.  
  3289. + -- --=[Checking for Flash cross-domain policy on mrkzgulfup.com... 
  3290. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  3291. <html><head>
  3292. <title>404 Not Found</title>
  3293. </head><body>
  3294. <h1>Not Found</h1>
  3295. <p>The requested URL /crossdomain.xml was not found on this server.</p>
  3296. <p>Additionally, a 404 Not Found
  3297. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  3298. </body></html>
  3299.  
  3300. + -- --=[Checking for Silverlight cross-domain policy on mrkzgulfup.com... 
  3301. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  3302. <html><head>
  3303. <title>404 Not Found</title>
  3304. </head><body>
  3305. <h1>Not Found</h1>
  3306. <p>The requested URL /clientaccesspolicy.xml was not found on this server.</p>
  3307. <p>Additionally, a 404 Not Found
  3308. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  3309. </body></html>
  3310.  
  3311. + -- --=[Checking for HTML5 cross-origin resource sharing on mrkzgulfup.com... 
  3312.  
  3313. + -- --=[Retrieving robots.txt on mrkzgulfup.com... 
  3314. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  3315. <html><head>
  3316. <title>404 Not Found</title>
  3317. </head><body>
  3318. <h1>Not Found</h1>
  3319. <p>The requested URL /robots.txt was not found on this server.</p>
  3320. <p>Additionally, a 404 Not Found
  3321. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  3322. </body></html>
  3323.  
  3324. + -- --=[Retrieving sitemap.xml on mrkzgulfup.com... 
  3325. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  3326. <html><head>
  3327. <title>404 Not Found</title>
  3328. </head><body>
  3329. <h1>Not Found</h1>
  3330. <p>The requested URL /sitemap.xml was not found on this server.</p>
  3331. <p>Additionally, a 404 Not Found
  3332. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  3333. </body></html>
  3334.  
  3335. + -- --=[Checking cookie attributes on mrkzgulfup.com... 
  3336. Set-Cookie: __cfduid=dee086834959f243efc39c2ecc92bd9e31508415878; expires=Fri, 19-Oct-18 12:24:38 GMT; path=/; domain=.mrkzgulfup.com; HttpOnly
  3337. Set-Cookie: sid=5q6xXb-8vHgQKPWKsbEwFDBlxq1; expires=Sat, 21-Oct-2017 12:24:36 GMT; path=/
  3338.  
  3339. + -- --=[Checking for ASP.NET Detailed Errors on mrkzgulfup.com... 
  3340. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  3341. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  3342.  
  3343. 
  3344.  + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
  3345. - Nikto v2.1.6
  3346. ---------------------------------------------------------------------------
  3347. + Target IP: 104.28.11.162
  3348. + Target Hostname: mrkzgulfup.com
  3349. + Target Port: 80
  3350. + Start Time: 2017-10-19 08:24:39 (GMT-4)
  3351. ---------------------------------------------------------------------------
  3352. + Server: cloudflare-nginx
  3353. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  3354. + Uncommon header 'cf-ray' found, with contents: 3b03b72f15cd14fd-CDG
  3355. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  3356. + All CGI directories 'found', use '-C none' to test none
  3357. + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
  3358. + 26097 requests: 0 error(s) and 3 item(s) reported on remote host
  3359. + End Time: 2017-10-19 10:20:08 (GMT-4) (6929 seconds)
  3360. ---------------------------------------------------------------------------
  3361. + 1 host(s) tested
  3362.  + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
  3363. [+] Screenshot saved to /usr/share/sniper/loot/screenshots/mrkzgulfup.com-port80.jpg
  3364.  + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +
  3365.  + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +
  3366.  
  3367.  _____  .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
  3368.  (_____) 01 01N. C 01 C 01 .01. 01  01 Yb 01 .01.
  3369.  (() ()) 01 C YCb C 01 C 01 ,C9 01  01 dP 01 ,C9
  3370.  \ /  01 C .CN. C 01 C 0101dC9 01  01'''bg. 0101dC9
  3371.  \ /  01 C .01.C 01 C 01 YC. 01 ,  01 .Y 01 YC.
  3372.  /=\  01 C Y01 YC. ,C 01 .Cb. 01 ,C  01 ,9 01 .Cb.
  3373.  [___]  .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
  3374.  
  3375. __[ ! ] Neither war between hackers, nor peace for the system.
  3376. __[ ! ] http://blog.inurl.com.br
  3377. __[ ! ] http://fb.com/InurlBrasil
  3378. __[ ! ] http://twitter.com/@googleinurl
  3379. __[ ! ] http://github.com/googleinurl
  3380. __[ ! ] Current PHP version::[ 7.0.22-3 ]
  3381. __[ ! ] Current script owner::[ root ]
  3382. __[ ! ] Current uname::[ Linux Kali 4.13.0-kali1-amd64 #1 SMP Debian 4.13.4-2kali1 (2017-10-16) x86_64 ]
  3383. __[ ! ] Current pwd::[ /usr/share/sniper ]
  3384. __[ ! ] Help: php inurlbr.php --help
  3385. ------------------------------------------------------------------------------------------------------------------------
  3386.  
  3387. [ ! ] Starting SCANNER INURLBR 2.1 at [19-10-2017 10:21:06]
  3388. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  3389. It is the end user's responsibility to obey all applicable local, state and federal laws.
  3390. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  3391.  
  3392. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-mrkzgulfup.com.txt ]
  3393. [ INFO ][ DORK ]::[ site:mrkzgulfup.com ]
  3394. [ INFO ][ SEARCHING ]:: {
  3395. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.th ]
  3396.  
  3397. [ INFO ][ SEARCHING ]:: 
  3398. -[:::]
  3399. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  3400.  
  3401. [ INFO ][ SEARCHING ]:: 
  3402. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  3403. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.pt ID: 013269018370076798483:wdba3dlnxqm ]
  3404.  
  3405. [ INFO ][ SEARCHING ]:: 
  3406. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  3407.  
  3408. [ INFO ][ TOTAL FOUND VALUES ]:: [ 15 ]
  3409.  
  3410. 
  3411.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3412. |_[ + ] [ 0 / 15 ]-[10:21:20] [ - ] 
  3413. |_[ + ] Target:: [ http://mrkzgulfup.com/ ]
  3414. |_[ + ] Exploit:: 
  3415. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3416. |_[ + ] More details:: 
  3417. |_[ + ] Found:: UNIDENTIFIED
  3418. 
  3419.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3420. |_[ + ] [ 1 / 15 ]-[10:21:20] [ - ] 
  3421. |_[ + ] Target:: [ http://mrkzgulfup.com/go.php?go=rules ]
  3422. |_[ + ] Exploit:: 
  3423. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3424. |_[ + ] More details:: 
  3425. |_[ + ] Found:: UNIDENTIFIED
  3426. 
  3427.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3428. |_[ + ] [ 2 / 15 ]-[10:21:21] [ - ] 
  3429. |_[ + ] Target:: [ http://mrkzgulfup.com/go.php?go=guide ]
  3430. |_[ + ] Exploit:: 
  3431. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3432. |_[ + ] More details:: 
  3433. |_[ + ] Found:: UNIDENTIFIED
  3434. 
  3435.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3436. |_[ + ] [ 3 / 15 ]-[10:21:21] [ - ] 
  3437. |_[ + ] Target:: [ http://mrkzgulfup.com/do.php?id=414 ]
  3438. |_[ + ] Exploit:: 
  3439. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3440. |_[ + ] More details:: 
  3441. |_[ + ] Found:: UNIDENTIFIED
  3442. 
  3443.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3444. |_[ + ] [ 4 / 15 ]-[10:21:21] [ - ] 
  3445. |_[ + ] Target:: [ http://mrkzgulfup.com/do.php?id=6346 ]
  3446. |_[ + ] Exploit:: 
  3447. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3448. |_[ + ] More details:: 
  3449. |_[ + ] Found:: UNIDENTIFIED
  3450. 
  3451.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3452. |_[ + ] [ 5 / 15 ]-[10:21:21] [ - ] 
  3453. |_[ + ] Target:: [ http://mrkzgulfup.com/do.php?down=23446 ]
  3454. |_[ + ] Exploit:: 
  3455. |_[ + ] Information Server:: HTTP/1.1 302 Moved Temporarily, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3456. |_[ + ] More details:: 
  3457. |_[ + ] Found:: UNIDENTIFIED
  3458. 
  3459.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3460. |_[ + ] [ 6 / 15 ]-[10:21:22] [ - ] 
  3461. |_[ + ] Target:: [ http://mrkzgulfup.com/go.php?go=stats ]
  3462. |_[ + ] Exploit:: 
  3463. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3464. |_[ + ] More details:: 
  3465. |_[ + ] Found:: UNIDENTIFIED
  3466. 
  3467.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3468. |_[ + ] [ 7 / 15 ]-[10:21:22] [ - ] 
  3469. |_[ + ] Target:: [ http://mrkzgulfup.com/ucp.php?go=login ]
  3470. |_[ + ] Exploit:: 
  3471. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3472. |_[ + ] More details:: 
  3473. |_[ + ] Found:: UNIDENTIFIED
  3474. 
  3475.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3476. |_[ + ] [ 8 / 15 ]-[10:21:22] [ - ] 
  3477. |_[ + ] Target:: [ http://mrkzgulfup.com/ucp.php?go=register ]
  3478. |_[ + ] Exploit:: 
  3479. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3480. |_[ + ] More details:: 
  3481. |_[ + ] Found:: UNIDENTIFIED
  3482. 
  3483.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3484. |_[ + ] [ 9 / 15 ]-[10:21:23] [ - ] 
  3485. |_[ + ] Target:: [ http://mrkzgulfup.com/go.php?go=call ]
  3486. |_[ + ] Exploit:: 
  3487. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3488. |_[ + ] More details:: 
  3489. |_[ + ] Found:: UNIDENTIFIED
  3490. 
  3491.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3492. |_[ + ] [ 10 / 15 ]-[10:21:23] [ - ] 
  3493. |_[ + ] Target:: [ http://mrkzgulfup.com/ucp.php?go=fileuser&id=218 ]
  3494. |_[ + ] Exploit:: 
  3495. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3496. |_[ + ] More details:: 
  3497. |_[ + ] Found:: UNIDENTIFIED
  3498. 
  3499.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3500. |_[ + ] [ 11 / 15 ]-[10:21:23] [ - ] 
  3501. |_[ + ] Target:: [ http://mrkzgulfup.com/go.php?go=report&id=22054 ]
  3502. |_[ + ] Exploit:: 
  3503. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3504. |_[ + ] More details:: 
  3505. |_[ + ] Found:: UNIDENTIFIED
  3506. 
  3507.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3508. |_[ + ] [ 12 / 15 ]-[10:21:24] [ - ] 
  3509. |_[ + ] Target:: [ http://mrkzgulfup.com/go.php?go=report&id=21428 ]
  3510. |_[ + ] Exploit:: 
  3511. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3512. |_[ + ] More details:: 
  3513. |_[ + ] Found:: UNIDENTIFIED
  3514. 
  3515.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3516. |_[ + ] [ 13 / 15 ]-[10:21:24] [ - ] 
  3517. |_[ + ] Target:: [ http://mrkzgulfup.com/do.php?down=6996 ]
  3518. |_[ + ] Exploit:: 
  3519. |_[ + ] Information Server:: HTTP/1.1 302 Moved Temporarily, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3520. |_[ + ] More details:: 
  3521. |_[ + ] Found:: UNIDENTIFIED
  3522. 
  3523.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3524. |_[ + ] [ 14 / 15 ]-[10:21:24] [ - ] 
  3525. |_[ + ] Target:: [ http://mrkzgulfup.com/do.php?down=414 ]
  3526. |_[ + ] Exploit:: 
  3527. |_[ + ] Information Server:: HTTP/1.1 302 Moved Temporarily, Server: cloudflare-nginx X-Powered-By: PHP/5.3.29, IP:2400:cb00:2048:1::681c:aa2:80 
  3528. |_[ + ] More details:: 
  3529. |_[ + ] Found:: UNIDENTIFIED
  3530.  
  3531. [ INFO ] [ Shutting down ]
  3532. [ INFO ] [ End of process INURLBR at [19-10-2017 10:21:24]
  3533. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  3534. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-mrkzgulfup.com.txt ]
  3535. |_________________________________________________________________________________________
  3536.  
  3537. \_________________________________________________________________________________________/
  3538.  
  3539.  + -- --=[Port 110 closed... skipping.
  3540.  + -- --=[Port 111 closed... skipping.
  3541.  + -- --=[Port 135 closed... skipping.
  3542.  + -- --=[Port 139 closed... skipping.
  3543.  + -- --=[Port 161 closed... skipping.
  3544.  + -- --=[Port 162 closed... skipping.
  3545.  + -- --=[Port 389 closed... skipping.
  3546.  + -- --=[Port 443 opened... running tests...
  3547.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  3548.  
  3549. ^ ^
  3550. _ __ _ ____ _ __ _ _ ____
  3551. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  3552. | V V // o // _/ | V V // 0 // 0 // _/
  3553. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  3554. <
  3555. ...'
  3556.  
  3557. WAFW00F - Web Application Firewall Detection Tool
  3558.  
  3559. By Sandro Gauci && Wendel G. Henrique
  3560.  
  3561. Checking https://mrkzgulfup.com
  3562. The site https://mrkzgulfup.com is behind a CloudFlare
  3563. Number of requests: 1
  3564.  
  3565.  + -- ----------------------------=[Checking Cloudflare]=--------------------- -- +
  3566. ____ _ _ _____ _ _
  3567. / ___| | ___ _ _ __| | ___|_ _(_) |
  3568. | | | |/ _ \| | | |/ _` | |_ / _` | | |
  3569. | |___| | (_) | |_| | (_| | _| (_| | | |
  3570. \____|_|\___/ \__,_|\__,_|_| \__,_|_|_|
  3571. v1.0.1 by m0rtem
  3572.  
  3573.  
  3574. [10:21:27] Initializing CloudFail - the date is: 19/10/2017
  3575. [10:21:27] Fetching initial information from: mrkzgulfup.com...
  3576. [10:21:27] Server IP: 104.28.10.162
  3577. [10:21:27] Testing if mrkzgulfup.com is on the Cloudflare network...
  3578. [10:21:27] mrkzgulfup.com is part of the Cloudflare network!
  3579. [10:21:27] Testing for misconfigured DNS using dnsdumpster...
  3580. [10:21:29] [FOUND:HOST] mrkzgulfup.com cloudflare-nginx 104.28.11.162 AS13335 Cloudflare Inc
  3581. [10:21:29] [FOUND:HOST] mrkzgulfup.com cloudflare-nginx 104.28.10.162 AS13335 Cloudflare Inc
  3582. [10:21:29] [FOUND:HOST] mrkzgulfup.com cloudflare-nginx 104.28.11.162 AS13335 Cloudflare Inc
  3583. [10:21:29] [FOUND:DNS] aragorn.ns.cloudflare.com. 173.245.59.67 AS13335 Cloudflare Inc United States
  3584. [10:21:29] [FOUND:DNS] melissa.ns.cloudflare.com. 173.245.58.199 AS13335 Cloudflare Inc United States
  3585. [10:21:29] [FOUND:MX] 68.178.213.243 AS26496 GoDaddy.com, LLC 10 mailstore1.secureserver.net.
  3586. [10:21:29] [FOUND:MX] 72.167.238.29 AS26496 GoDaddy.com, LLC 0 smtp.secureserver.net.
  3587. [10:21:29] Scanning crimeflare database...
  3588. [10:21:30] [FOUND:IP] 62.210.139.211
  3589. [10:21:30] [FOUND:IP] 62.210.82.68
  3590. [10:21:30] Scanning 2897 subdomains (subdomains.txt), please wait...
  3591. [10:21:32] 0.97% complete
  3592. [10:21:34] 1.93% complete
  3593. [10:21:36] 2.9% complete
  3594. [10:21:39] 3.87% complete
  3595. [10:21:41] 4.83% complete
  3596. [10:21:43] 5.8% complete
  3597. [10:21:45] 6.77% complete
  3598. [10:21:48] 7.73% complete
  3599. [10:21:50] 8.7% complete
  3600. [10:21:53] 9.67% complete
  3601. [10:21:55] 10.63% complete
  3602. [10:21:58] 11.6% complete
  3603. [10:22:00] 12.56% complete
  3604. [10:22:02] 13.53% complete
  3605. [10:22:05] 14.5% complete
  3606. [10:22:07] 15.46% complete
  3607. [10:22:10] 16.43% complete
  3608. [10:22:12] 17.4% complete
  3609. [10:22:14] 18.36% complete
  3610. [10:22:17] 19.33% complete
  3611. [10:22:19] 20.3% complete
  3612. [10:22:22] 21.26% complete
  3613. [10:22:24] 22.23% complete
  3614. [10:22:27] 23.2% complete
  3615. [10:22:29] 24.16% complete
  3616. [10:22:31] 25.13% complete
  3617. [10:22:34] 26.1% complete
  3618. [10:22:39] [FOUND:SUBDOMAIN] email.mrkzgulfup.com IP: 173.201.193.20 HTTP: 200
  3619. [10:22:40] 27.06% complete
  3620. [10:22:43] 28.03% complete
  3621. [10:22:46] 29.0% complete
  3622. [10:22:48] 29.96% complete
  3623. [10:22:50] [FOUND:SUBDOMAIN] ftp.mrkzgulfup.com IP: 62.210.139.211 HTTP: 200
  3624. [10:22:50] 30.93% complete
  3625. [10:22:53] 31.9% complete
  3626. [10:22:55] 32.86% complete
  3627. [10:22:57] 33.83% complete
  3628. [10:23:01] 34.79% complete
  3629. [10:23:04] 35.76% complete
  3630. [10:23:07] 36.73% complete
  3631. [10:23:09] 37.69% complete
  3632. [10:23:12] 38.66% complete
  3633. [10:23:15] 39.63% complete
  3634. [10:23:18] 40.59% complete
  3635. [10:23:21] 41.56% complete
  3636. [10:23:24] 42.53% complete
  3637. [10:23:26] 43.49% complete
  3638. [10:23:29] 44.46% complete
  3639. [10:23:32] 45.43% complete
  3640. [10:23:35] 46.39% complete
  3641. [10:23:37] 47.36% complete
  3642. [10:23:40] 48.33% complete
  3643. [10:23:44] 49.29% complete
  3644. [10:23:47] 50.26% complete
  3645. [10:23:49] 51.23% complete
  3646. [10:23:52] 52.19% complete
  3647. [10:23:55] 53.16% complete
  3648. [10:23:58] 54.12% complete
  3649. [10:24:00] 55.09% complete
  3650. [10:24:03] 56.06% complete
  3651. [10:24:06] 57.02% complete
  3652. [10:24:09] 57.99% complete
  3653. [10:24:12] 58.96% complete
  3654. [10:24:14] 59.92% complete
  3655. [10:24:17] 60.89% complete
  3656. [10:24:20] 61.86% complete
  3657. [10:24:23] 62.82% complete
  3658. [10:24:25] 63.79% complete
  3659. [10:24:28] 64.76% complete
  3660. [10:24:31] 65.72% complete
  3661. [10:24:33] 66.69% complete
  3662. [10:24:36] 67.66% complete
  3663. [10:24:40] 68.62% complete
  3664. [10:24:43] 69.59% complete
  3665. [10:24:46] 70.56% complete
  3666. [10:24:49] 71.52% complete
  3667. [10:24:52] 72.49% complete
  3668. [10:24:54] 73.46% complete
  3669. [10:24:57] 74.42% complete
  3670. [10:25:00] 75.39% complete
  3671. [10:25:03] 76.35% complete
  3672. [10:25:05] 77.32% complete
  3673. [10:25:08] 78.29% complete
  3674. [10:25:11] 79.25% complete
  3675. [10:25:14] 80.22% complete
  3676. [10:25:16] 81.19% complete
  3677. [10:25:19] 82.15% complete
  3678. [10:25:22] 83.12% complete
  3679. [10:25:25] 84.09% complete
  3680. [10:25:27] 85.05% complete
  3681. [10:25:30] 86.02% complete
  3682. [10:25:33] 86.99% complete
  3683. [10:25:36] 87.95% complete
  3684. [10:25:38] 88.92% complete
  3685. [10:25:41] 89.89% complete
  3686. [10:25:44] 90.85% complete
  3687. [10:25:47] 91.82% complete
  3688. [10:25:50] 92.79% complete
  3689. [10:25:53] 93.75% complete
  3690. [10:25:55] 94.72% complete
  3691. [10:25:57] [FOUND:SUBDOMAIN] www.mrkzgulfup.com ON CLOUDFLARE NETWORK!
  3692. [10:25:58] 95.69% complete
  3693. [10:26:01] 96.65% complete
  3694. [10:26:04] 97.62% complete
  3695. [10:26:06] 98.58% complete
  3696. [10:26:09] 99.55% complete
  3697. [10:26:11] Scanning finished...
  3698.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  3699. https://mrkzgulfup.com [200 OK] CloudFlare, Cookies[__cfduid,sid], Country[UNITED STATES][US], HTTPServer[cloudflare-nginx], HttpOnly[__cfduid], IP[104.28.10.162], JQuery[1.12.0], PHP[5.3.29], PoweredBy[Kleeja,kleeja,kleeja,], Script[text/javascript], Title[مركز الخليج , لـ رفع الصور , و رفع الملفات , الخليج , مركز تحميل الصور , gulfup , تحميل الصور ,رفع صور, مركز رفع, مركز تحميل الخليج, mrkzgulfup , مركز رفع الخليج], UncommonHeaders[cf-ray], X-Cache[Backend], X-Frame-Options[SAMEORIGIN], X-Powered-By[PHP/5.3.29], X-UA-Compatible[IE=EmulateIE7], X-XSS-Protection[1; mode=block]
  3700.  
  3701.  + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
  3702.  
  3703.  
  3704.  
  3705. AVAILABLE PLUGINS
  3706. -----------------
  3707.  
  3708. PluginChromeSha1Deprecation
  3709. PluginHeartbleed
  3710. PluginSessionResumption
  3711. PluginHSTS
  3712. PluginSessionRenegotiation
  3713. PluginCertInfo
  3714. PluginOpenSSLCipherSuites
  3715. PluginCompression
  3716.  
  3717.  
  3718.  
  3719. CHECKING HOST(S) AVAILABILITY
  3720. -----------------------------
  3721.  
  3722. mrkzgulfup.com:443 => 2400:cb00:2048:1::681c:aa2:443
  3723.  
  3724.  
  3725.  
  3726. SCAN RESULTS FOR MRKZGULFUP.COM:443 - 2400:CB00:2048:1::681C:AA2:443
  3727. --------------------------------------------------------------------
  3728.  
  3729. * Deflate Compression:
  3730. OK - Compression disabled
  3731.  
  3732. * Session Renegotiation:
  3733. Client-initiated Renegotiations: OK - Rejected
  3734. Secure Renegotiation: OK - Supported
  3735.  
  3736. * Certificate - Content:
  3737. SHA1 Fingerprint: 1826190bf27c0ff426372870f8bf7c46e9fd219e
  3738. Common Name: sni88269.cloudflaressl.com
  3739. Issuer: COMODO ECC Domain Validation Secure Server CA 2
  3740. Serial Number: 99A215D544A0FB87D93ED28C104CCD70
  3741. Not Before: Oct 17 00:00:00 2017 GMT
  3742. Not After: Apr 25 23:59:59 2018 GMT
  3743. Signature Algorithm: ecdsa-with-SHA256
  3744. Public Key Algorithm: id-ecPublicKey
  3745. Key Size: 256 bit
  3746. X509v3 Subject Alternative Name: {'DNS': ['sni88269.cloudflaressl.com', '*.a7zan.net', '*.apivhu.tk', '*.aupload.net', '*.bestcleaningproducts.ca', '*.campagihosea.tk', '*.chohjikan.net', '*.espautomotive.co.uk', '*.gulfup.co', '*.kolkm.com', '*.leeblubaugh.club', '*.lillo85.altervista.org', '*.lubosmaly.eu', '*.mareadvice.ml', '*.markazalkhaleej.com', '*.mercadoautoimport.com', '*.mingtro.online', '*.mrkzgulfup.com', '*.relibfn.ga', '*.scoobyworld.uk', '*.se-ev.ru', '*.smillmesto.online', '*.unsaaf.tk', '*.xn----zmcphmg2jlbc7d.com', 'a7zan.net', 'apivhu.tk', 'aupload.net', 'bestcleaningproducts.ca', 'campagihosea.tk', 'chohjikan.net', 'espautomotive.co.uk', 'gulfup.co', 'kolkm.com', 'leeblubaugh.club', 'lillo85.altervista.org', 'lubosmaly.eu', 'mareadvice.ml', 'markazalkhaleej.com', 'mercadoautoimport.com', 'mingtro.online', 'mrkzgulfup.com', 'relibfn.ga', 'scoobyworld.uk', 'se-ev.ru', 'smillmesto.online', 'unsaaf.tk', 'xn----zmcphmg2jlbc7d.com']}
  3747.  
  3748. * Certificate - Trust:
  3749. Hostname Validation: OK - Subject Alternative Name matches
  3750. Google CA Store (09/2015): OK - Certificate is trusted
  3751. Java 6 CA Store (Update 65): OK - Certificate is trusted
  3752. Microsoft CA Store (09/2015): OK - Certificate is trusted
  3753. Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
  3754. Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
  3755. Certificate Chain Received: ['sni88269.cloudflaressl.com', 'COMODO ECC Domain Validation Secure Server CA 2', 'COMODO ECC Certification Authority']
  3756.  
  3757. * Certificate - OCSP Stapling:
  3758. OCSP Response Status: successful
  3759. Validation w/ Mozilla's CA Store: OK - Response is trusted
  3760. Responder Id: 40096167F0BC83714FDE12082C6FD4D42B763D96
  3761. Cert Status: good
  3762. Cert Serial Number: 99A215D544A0FB87D93ED28C104CCD70
  3763. This Update: Oct 17 03:36:22 2017 GMT
  3764. Next Update: Oct 24 03:36:22 2017 GMT
  3765.  
  3766. * Session Resumption:
  3767. With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
  3768. With TLS Session Tickets: OK - Supported
  3769.  
  3770. * SSLV2 Cipher Suites:
  3771. Server rejected all cipher suites.
  3772.  
  3773. * SSLV3 Cipher Suites:
  3774. Server rejected all cipher suites.
  3775.  
  3776.  
  3777.  
  3778. SCAN COMPLETED IN 0.71 S
  3779. ------------------------
  3780. Version: 1.11.10-static
  3781. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  3782. 
  3783. Testing SSL server mrkzgulfup.com on port 443 using SNI name mrkzgulfup.com
  3784.  
  3785. TLS Fallback SCSV:
  3786. Server does not support TLS Fallback SCSV
  3787.  
  3788. TLS renegotiation:
  3789. Secure session renegotiation supported
  3790.  
  3791. TLS Compression:
  3792. Compression disabled
  3793.  
  3794. Heartbleed:
  3795. TLS 1.2 not vulnerable to heartbleed
  3796. TLS 1.1 not vulnerable to heartbleed
  3797. TLS 1.0 not vulnerable to heartbleed
  3798.  
  3799. Supported Server Cipher(s):
  3800. Preferred TLSv1.2 256 bits ECDHE-ECDSA-CHACHA20-POLY1305 Curve P-256 DHE 256
  3801. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  3802. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  3803. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA256 Curve P-256 DHE 256
  3804. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  3805. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  3806. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA384 Curve P-256 DHE 256
  3807. Preferred TLSv1.1 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  3808. Accepted TLSv1.1 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  3809. Preferred TLSv1.0 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  3810. Accepted TLSv1.0 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  3811.  
  3812. SSL Certificate:
  3813. Signature Algorithm: ecdsa-with-SHA256
  3814. Subject: sni88269.cloudflaressl.com
  3815. Altnames: DNS:sni88269.cloudflaressl.com, DNS:*.a7zan.net, DNS:*.apivhu.tk, DNS:*.aupload.net, DNS:*.bestcleaningproducts.ca, DNS:*.campagihosea.tk, DNS:*.chohjikan.net, DNS:*.espautomotive.co.uk, DNS:*.gulfup.co, DNS:*.kolkm.com, DNS:*.leeblubaugh.club, DNS:*.lillo85.altervista.org, DNS:*.lubosmaly.eu, DNS:*.mareadvice.ml, DNS:*.markazalkhaleej.com, DNS:*.mercadoautoimport.com, DNS:*.mingtro.online, DNS:*.mrkzgulfup.com, DNS:*.relibfn.ga, DNS:*.scoobyworld.uk, DNS:*.se-ev.ru, DNS:*.smillmesto.online, DNS:*.unsaaf.tk, DNS:*.xn----zmcphmg2jlbc7d.com, DNS:a7zan.net, DNS:apivhu.tk, DNS:aupload.net, DNS:bestcleaningproducts.ca, DNS:campagihosea.tk, DNS:chohjikan.net, DNS:espautomotive.co.uk, DNS:gulfup.co, DNS:kolkm.com, DNS:leeblubaugh.club, DNS:lillo85.altervista.org, DNS:lubosmaly.eu, DNS:mareadvice.ml, DNS:markazalkhaleej.com, DNS:mercadoautoimport.com, DNS:mingtro.online, DNS:mrkzgulfup.com, DNS:relibfn.ga, DNS:scoobyworld.uk, DNS:se-ev.ru, DNS:smillmesto.online, DNS:unsaaf.tk, DNS:xn----zmcphmg2jlbc7d.com
  3816. Issuer: COMODO ECC Domain Validation Secure Server CA 2
  3817.  
  3818. Not valid before: Oct 17 00:00:00 2017 GMT
  3819. Not valid after: Apr 25 23:59:59 2018 GMT
  3820. 
  3821. ###########################################################
  3822. testssl 2.9dev from https://testssl.sh/dev/
  3823. 
  3824. This program is free software. Distribution and
  3825. modification under GPLv2 permitted.
  3826. USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
  3827.  
  3828. Please file bugs @ https://testssl.sh/bugs/
  3829. 
  3830. ###########################################################
  3831.  
  3832. Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
  3833. on Kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
  3834. (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
  3835.  
  3836.  
  3837. Testing all IPv4 addresses (port 443): 104.28.10.162 104.28.11.162
  3838. -----------------------------------------------------
  3839.  Start 2017-10-19 10:26:17 -->> 104.28.10.162:443 (mrkzgulfup.com) <<--
  3840.  
  3841. further IP addresses: 104.28.11.162 2400:cb00:2048:1::681c:aa2
  3842. 2400:cb00:2048:1::681c:ba2
  3843. rDNS (104.28.10.162): --
  3844. Service detected: HTTP
  3845.  
  3846.  
  3847.  Testing protocols via sockets except SPDY+HTTP2 
  3848.  
  3849.  SSLv2 not offered (OK)
  3850.  SSLv3 not offered (OK)
  3851.  TLS 1 offered
  3852.  TLS 1.1 offered
  3853.  TLS 1.2 offered (OK)
  3854.  SPDY/NPN h2, spdy/3.1, http/1.1 (advertised)
  3855.  HTTP2/ALPN h2, spdy/3.1, http/1.1 (offered)
  3856.  
  3857.  Testing ~standard cipher categories 
  3858.  
  3859.  NULL ciphers (no encryption) not offered (OK)
  3860.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  3861.  Export ciphers (w/o ADH+NULL) not offered (OK)
  3862.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  3863.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  3864.  Triple DES Ciphers (Medium) not offered (OK)
  3865.  High encryption (AES+Camellia, no AEAD) offered (OK)
  3866.  Strong encryption (AEAD ciphers) offered (OK)
  3867.  
  3868.  
  3869.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  3870.  
  3871.  PFS is offered (OK) ECDHE-ECDSA-CHACHA20-POLY1305-OLD
  3872. ECDHE-ECDSA-AES256-GCM-SHA384
  3873. ECDHE-ECDSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA
  3874. ECDHE-ECDSA-CHACHA20-POLY1305
  3875. ECDHE-ECDSA-AES128-GCM-SHA256
  3876. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA
  3877.  Elliptic curves offered: secp224r1 prime256v1 secp384r1 secp521r1 X25519
  3878.  
  3879.  
  3880.  Testing server preferences 
  3881.  
  3882.  Has server cipher order? yes (OK)
  3883.  Negotiated protocol TLSv1.2
  3884.  Negotiated cipher ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  3885.  Cipher order
  3886. TLSv1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  3887. TLSv1.1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  3888. TLSv1.2: ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-CHACHA20-POLY1305
  3889. ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA
  3890. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384
  3891. ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-AES256-SHA384
  3892.  
  3893.  
  3894.  Testing server defaults (Server Hello) 
  3895.  
  3896.  TLS extensions (standard) "renegotiation info/#65281" "server name/#0"
  3897. "session ticket/#35" "status request/#5"
  3898. "next protocol/#13172" "EC point formats/#11"
  3899. "extended master secret/#23"
  3900. "signed certificate timestamps/#18"
  3901. "application layer protocol negotiation/#16"
  3902.  Session Ticket RFC 5077 hint 64799 seconds, session tickets keys seems to be rotated < daily
  3903.  SSL Session ID support yes
  3904.  Session Resumption Tickets: yes, ID: yes
  3905.  TLS clock skew -1 sec from localtime
  3906.  Signature Algorithm ECDSA with SHA256
  3907.  Server key size ECDSA 256 bits
  3908.  Fingerprint / Serial SHA1 1826190BF27C0FF426372870F8BF7C46E9FD219E / 99A215D544A0FB87D93ED28C104CCD70
  3909. SHA256 9B1C26F5D271641BBC66C50185008F5AA66DEC02B432B1891A39974574FC7A04
  3910.  Common Name (CN) sni88269.cloudflaressl.com (request w/o SNI didn't succeed, usual for EC certificates)
  3911.  subjectAltName (SAN) sni88269.cloudflaressl.com *.a7zan.net
  3912. *.apivhu.tk *.aupload.net
  3913. *.bestcleaningproducts.ca *.campagihosea.tk
  3914. *.chohjikan.net *.espautomotive.co.uk *.gulfup.co
  3915. *.kolkm.com *.leeblubaugh.club
  3916. *.lillo85.altervista.org *.lubosmaly.eu
  3917. *.mareadvice.ml *.markazalkhaleej.com
  3918. *.mercadoautoimport.com *.mingtro.online
  3919. *.mrkzgulfup.com *.relibfn.ga *.scoobyworld.uk
  3920. *.se-ev.ru *.smillmesto.online *.unsaaf.tk
  3921. *.xn----zmcphmg2jlbc7d.com a7zan.net apivhu.tk
  3922. aupload.net bestcleaningproducts.ca
  3923. campagihosea.tk chohjikan.net espautomotive.co.uk
  3924. gulfup.co kolkm.com leeblubaugh.club
  3925. lillo85.altervista.org lubosmaly.eu mareadvice.ml
  3926. markazalkhaleej.com mercadoautoimport.com
  3927. mingtro.online mrkzgulfup.com relibfn.ga
  3928. scoobyworld.uk se-ev.ru smillmesto.online
  3929. unsaaf.tk xn----zmcphmg2jlbc7d.com 
  3930.  Issuer COMODO ECC Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
  3931.  Trust (hostname) Ok via SAN (SNI mandatory)
  3932.  Chain of trust Ok 
  3933.  EV cert (experimental) no
  3934.  Certificate Expiration 188 >= 60 days (2017-10-16 20:00 --> 2018-04-25 19:59 -0400)
  3935.  # of certificates provided 3
  3936.  Certificate Revocation List http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
  3937.  OCSP URI http://ocsp.comodoca4.com
  3938.  OCSP stapling offered
  3939.  OCSP must staple no
  3940.  DNS CAA RR (experimental) --
  3941.  Certificate Transparency yes (TLS extension)
  3942.  
  3943.  
  3944.  Testing HTTP header response @ "/" 
  3945.  
  3946.  HTTP Status Code  200 OK
  3947.  HTTP clock skew -1 sec from localtime
  3948.  Strict Transport Security --
  3949.  Public Key Pinning --
  3950.  Server banner cloudflare-nginx
  3951.  Application banner X-Powered-By(B: PHP/5(B.3(B.2(B9(B
  3952.  Cookie(s) 2 issued: NONE secure, 1/2 HttpOnly
  3953.  Security headers X-Frame-Options SAMEORIGIN
  3954. X-XSS-Protection 1; mode=block
  3955.  Reverse Proxy banner X-Cache(B: HIT from Backend
  3956.  
  3957.  
  3958.  Testing vulnerabilities 
  3959.  
  3960.  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
  3961.  CCS (CVE-2014-0224) not vulnerable (OK)
  3962.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), no session tickets
  3963.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  3964.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  3965.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  3966.  BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
  3967. Can be ignored for static pages or if no secrets in the page
  3968.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  3969.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  3970.  SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
  3971.  FREAK (CVE-2015-0204) not vulnerable (OK)
  3972.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  3973. no RSA certificate, thus certificate can't be used with SSLv2 elsewhere
  3974.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  3975.  BEAST (CVE-2011-3389) TLS1: ECDHE-ECDSA-AES128-SHA
  3976. ECDHE-ECDSA-AES256-SHA 
  3977. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  3978.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  3979.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  3980.  
  3981.  
  3982.  Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  3983.  
  3984. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  3985. -----------------------------------------------------------------------------------------------------------------------------
  3986. xcc14 ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256_OLD
  3987. xc02c ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  3988. xc024 ECDHE-ECDSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
  3989. xc00a ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  3990. xcca9 ECDHE-ECDSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
  3991. xc02b ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  3992. xc023 ECDHE-ECDSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  3993. xc009 ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  3994.  
  3995.  
  3996.  Running client simulations via sockets 
  3997.  
  3998. Android 2.3.7 No connection
  3999. Android 4.1.1 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4000. Android 4.3 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4001. Android 4.4.2 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4002. Android 5.0.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  4003. Android 6.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  4004. Android 7.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 253 bit ECDH (X25519)
  4005. Chrome 51 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 253 bit ECDH (X25519)
  4006. Chrome 57 Win 7 No connection
  4007. Firefox 49 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4008. Firefox 53 Win 7 No connection
  4009. IE 6 XP No connection
  4010. IE 7 Vista TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4011. IE 8 XP No connection
  4012. IE 8 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4013. IE 11 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4014. IE 11 Win 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4015. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4016. IE 11 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4017. Edge 13 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4018. Edge 13 Win Phone 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4019. Opera 17 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4020. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4021. Safari 7 iOS 7.1 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4022. Safari 9 OS X 10.11 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4023. Safari 10 OS X 10.12 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4024. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4025. Tor 17.0.9 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4026. Java 6u45 No connection
  4027. Java 7u25 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4028. Java 8u31 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4029. OpenSSL 1.0.1l TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4030. OpenSSL 1.0.2e TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4031.  
  4032.  Done 2017-10-19 10:29:15 [ 180s] -->> 104.28.10.162:443 (mrkzgulfup.com) <<--
  4033.  
  4034. -----------------------------------------------------
  4035.  Start 2017-10-19 10:29:15 -->> 104.28.11.162:443 (mrkzgulfup.com) <<--
  4036.  
  4037. further IP addresses: 104.28.10.162 2400:cb00:2048:1::681c:aa2
  4038. 2400:cb00:2048:1::681c:ba2
  4039. rDNS (104.28.11.162): --
  4040. Service detected: HTTP
  4041.  
  4042.  
  4043.  Testing protocols via sockets except SPDY+HTTP2 
  4044.  
  4045.  SSLv2 not offered (OK)
  4046.  SSLv3 not offered (OK)
  4047.  TLS 1 offered
  4048.  TLS 1.1 offered
  4049.  TLS 1.2 offered (OK)
  4050.  SPDY/NPN h2, spdy/3.1, http/1.1 (advertised)
  4051.  HTTP2/ALPN h2, spdy/3.1, http/1.1 (offered)
  4052.  
  4053.  Testing ~standard cipher categories 
  4054.  
  4055.  NULL ciphers (no encryption) not offered (OK)
  4056.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  4057.  Export ciphers (w/o ADH+NULL) not offered (OK)
  4058.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  4059.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  4060.  Triple DES Ciphers (Medium) not offered (OK)
  4061.  High encryption (AES+Camellia, no AEAD) offered (OK)
  4062.  Strong encryption (AEAD ciphers) offered (OK)
  4063.  
  4064.  
  4065.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  4066.  
  4067.  PFS is offered (OK) ECDHE-ECDSA-CHACHA20-POLY1305-OLD
  4068. ECDHE-ECDSA-AES256-GCM-SHA384
  4069. ECDHE-ECDSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA
  4070. ECDHE-ECDSA-CHACHA20-POLY1305
  4071. ECDHE-ECDSA-AES128-GCM-SHA256
  4072. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA
  4073.  Elliptic curves offered: secp224r1 prime256v1 secp384r1 secp521r1 X25519
  4074.  
  4075.  
  4076.  Testing server preferences 
  4077.  
  4078.  Has server cipher order? yes (OK)
  4079.  Negotiated protocol TLSv1.2
  4080.  Negotiated cipher ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  4081.  Cipher order
  4082. TLSv1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  4083. TLSv1.1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  4084. TLSv1.2: ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-CHACHA20-POLY1305
  4085. ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA
  4086. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384
  4087. ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-AES256-SHA384
  4088.  
  4089.  
  4090.  Testing server defaults (Server Hello) 
  4091.  
  4092.  TLS extensions (standard) "renegotiation info/#65281" "server name/#0"
  4093. "session ticket/#35" "status request/#5"
  4094. "next protocol/#13172" "EC point formats/#11"
  4095. "extended master secret/#23"
  4096. "signed certificate timestamps/#18"
  4097. "application layer protocol negotiation/#16"
  4098.  Session Ticket RFC 5077 hint 64800 seconds, session tickets keys seems to be rotated < daily
  4099.  SSL Session ID support yes
  4100.  Session Resumption Tickets: yes, ID: yes
  4101.  TLS clock skew -1 sec from localtime
  4102.  Signature Algorithm ECDSA with SHA256
  4103.  Server key size ECDSA 256 bits
  4104.  Fingerprint / Serial SHA1 1826190BF27C0FF426372870F8BF7C46E9FD219E / 99A215D544A0FB87D93ED28C104CCD70
  4105. SHA256 9B1C26F5D271641BBC66C50185008F5AA66DEC02B432B1891A39974574FC7A04
  4106.  Common Name (CN) sni88269.cloudflaressl.com (request w/o SNI didn't succeed, usual for EC certificates)
  4107.  subjectAltName (SAN) sni88269.cloudflaressl.com *.a7zan.net
  4108. *.apivhu.tk *.aupload.net
  4109. *.bestcleaningproducts.ca *.campagihosea.tk
  4110. *.chohjikan.net *.espautomotive.co.uk *.gulfup.co
  4111. *.kolkm.com *.leeblubaugh.club
  4112. *.lillo85.altervista.org *.lubosmaly.eu
  4113. *.mareadvice.ml *.markazalkhaleej.com
  4114. *.mercadoautoimport.com *.mingtro.online
  4115. *.mrkzgulfup.com *.relibfn.ga *.scoobyworld.uk
  4116. *.se-ev.ru *.smillmesto.online *.unsaaf.tk
  4117. *.xn----zmcphmg2jlbc7d.com a7zan.net apivhu.tk
  4118. aupload.net bestcleaningproducts.ca
  4119. campagihosea.tk chohjikan.net espautomotive.co.uk
  4120. gulfup.co kolkm.com leeblubaugh.club
  4121. lillo85.altervista.org lubosmaly.eu mareadvice.ml
  4122. markazalkhaleej.com mercadoautoimport.com
  4123. mingtro.online mrkzgulfup.com relibfn.ga
  4124. scoobyworld.uk se-ev.ru smillmesto.online
  4125. unsaaf.tk xn----zmcphmg2jlbc7d.com 
  4126.  Issuer COMODO ECC Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
  4127.  Trust (hostname) Ok via SAN (SNI mandatory)
  4128.  Chain of trust Ok 
  4129.  EV cert (experimental) no
  4130.  Certificate Expiration 188 >= 60 days (2017-10-16 20:00 --> 2018-04-25 19:59 -0400)
  4131.  # of certificates provided 3
  4132.  Certificate Revocation List http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
  4133.  OCSP URI http://ocsp.comodoca4.com
  4134.  OCSP stapling offered
  4135.  OCSP must staple no
  4136.  DNS CAA RR (experimental) --
  4137.  Certificate Transparency yes (TLS extension)
  4138.  
  4139.  
  4140.  Testing HTTP header response @ "/" 
  4141.  
  4142.  HTTP Status Code  200 OK
  4143.  HTTP clock skew -2 sec from localtime
  4144.  Strict Transport Security --
  4145.  Public Key Pinning --
  4146.  Server banner cloudflare-nginx
  4147.  Application banner X-Powered-By(B: PHP/5(B.3(B.2(B9(B
  4148.  Cookie(s) 2 issued: NONE secure, 1/2 HttpOnly
  4149.  Security headers X-Frame-Options SAMEORIGIN
  4150. X-XSS-Protection 1; mode=block
  4151.  Reverse Proxy banner X-Cache(B: HIT from Backend
  4152.  
  4153.  
  4154.  Testing vulnerabilities 
  4155.  
  4156.  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
  4157.  CCS (CVE-2014-0224) not vulnerable (OK)
  4158.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), no session tickets
  4159.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  4160.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  4161.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  4162.  BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
  4163. Can be ignored for static pages or if no secrets in the page
  4164.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  4165.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  4166.  SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
  4167.  FREAK (CVE-2015-0204) not vulnerable (OK)
  4168.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  4169. no RSA certificate, thus certificate can't be used with SSLv2 elsewhere
  4170.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  4171.  BEAST (CVE-2011-3389) TLS1: ECDHE-ECDSA-AES128-SHA
  4172. ECDHE-ECDSA-AES256-SHA 
  4173. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  4174.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  4175.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  4176.  
  4177.  
  4178.  Testing 359 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  4179.  
  4180. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  4181. -----------------------------------------------------------------------------------------------------------------------------
  4182. xcc14 ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256_OLD
  4183. xc02c ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  4184. xc024 ECDHE-ECDSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
  4185. xc00a ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  4186. xcca9 ECDHE-ECDSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
  4187. xc02b ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  4188. xc023 ECDHE-ECDSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  4189. xc009 ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  4190.  
  4191.  
  4192.  Running client simulations via sockets 
  4193.  
  4194. Android 2.3.7 No connection
  4195. Android 4.1.1 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4196. Android 4.3 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4197. Android 4.4.2 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4198. Android 5.0.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  4199. Android 6.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  4200. Android 7.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 253 bit ECDH (X25519)
  4201. Chrome 51 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 253 bit ECDH (X25519)
  4202. Chrome 57 Win 7 No connection
  4203. Firefox 49 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4204. Firefox 53 Win 7 No connection
  4205. IE 6 XP No connection
  4206. IE 7 Vista TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4207. IE 8 XP No connection
  4208. IE 8 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4209. IE 11 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4210. IE 11 Win 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4211. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4212. IE 11 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4213. Edge 13 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4214. Edge 13 Win Phone 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4215. Opera 17 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4216. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4217. Safari 7 iOS 7.1 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4218. Safari 9 OS X 10.11 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4219. Safari 10 OS X 10.12 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4220. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4221. Tor 17.0.9 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4222. Java 6u45 No connection
  4223. Java 7u25 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4224. Java 8u31 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4225. OpenSSL 1.0.1l TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4226. OpenSSL 1.0.2e TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4227.  
  4228.  Done 2017-10-19 10:32:08 [ 353s] -->> 104.28.11.162:443 (mrkzgulfup.com) <<--
  4229.  
  4230. -----------------------------------------------------
  4231. Done testing now all IP addresses (on port 443): 104.28.10.162 104.28.11.162
  4232.  
  4233. + -- --=[MÄŚŚBĻËËĐ V20160303 BÅž 1Ņ3 @ ĊŖÖŎĐŚȞÏËĻĐ - https://crowdshield.com
  4234. + -- --=[Scan Complete!
  4235.  + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
  4236. + -- --=[Checking if X-Content options are enabled on mrkzgulfup.com... 
  4237.  
  4238. + -- --=[Checking if X-Frame options are enabled on mrkzgulfup.com... 
  4239. x-frame-options: SAMEORIGIN
  4240.  
  4241. + -- --=[Checking if X-XSS-Protection header is enabled on mrkzgulfup.com... 
  4242. x-xss-protection: 1; mode=block
  4243.  
  4244. + -- --=[Checking HTTP methods on mrkzgulfup.com... 
  4245.  
  4246. + -- --=[Checking if TRACE method is enabled on mrkzgulfup.com... 
  4247.  
  4248. + -- --=[Checking for META tags on mrkzgulfup.com... 
  4249. <meta name="google-site-verification" content="Sdk3UKKvplhoGQDcknaWm-iCUfPPHuwKAvnbaeogynM" />
  4250. <meta name="description" content="مركز الخليج gulfup - مركز تحميل الصور والملفات مدى الحياة يقدم لكم خدمة تحميل جميع أنواع الملفات ويدعم الرفع المتعدد والجوال ؚ؎كل مجانى." />
  4251. <meta name="keywords" content="مركز تحميل الصور, تحميل الصور, تحميل, مركز, مركز رفع الملفات, رفع الملفات, مركز رفع, رفع الصور, مركز رفع الصور, مركز الخليج, مركز تحميل الخليج, مركز تحميل, الخليج, مركز تحميل صور, تحميل صور, مركز تحميل الملفات, تحميل الملفات, مركز تحميل الصور والملفات" />
  4252. <meta name="alexaVerifyID" content="ur4VID-yP6k-WsZzZrAa73hGUxE"/>
  4253. <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
  4254. <meta http-equiv="Content-Language" content="ar-sa" />
  4255. <meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" />
  4256. <meta name="copyrights" content="Powered by Kleeja || kleeja.com" />
  4257. <meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;" />
  4258. <!-- metatags.info/all_meta_tags -->
  4259.  
  4260. + -- --=[Checking for open proxy on mrkzgulfup.com... 
  4261.  
  4262. + -- --=[Enumerating software on mrkzgulfup.com... 
  4263. x-powered-by: PHP/5.3.29
  4264. server: cloudflare-nginx
  4265.  
  4266. + -- --=[Checking if Strict-Transport-Security is enabled on mrkzgulfup.com... 
  4267.  
  4268. + -- --=[Checking for Flash cross-domain policy on mrkzgulfup.com... 
  4269. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  4270. <html><head>
  4271. <title>404 Not Found</title>
  4272. </head><body>
  4273. <h1>Not Found</h1>
  4274. <p>The requested URL /crossdomain.xml was not found on this server.</p>
  4275. <p>Additionally, a 404 Not Found
  4276. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  4277. </body></html>
  4278.  
  4279. + -- --=[Checking for Silverlight cross-domain policy on mrkzgulfup.com... 
  4280. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  4281. <html><head>
  4282. <title>404 Not Found</title>
  4283. </head><body>
  4284. <h1>Not Found</h1>
  4285. <p>The requested URL /clientaccesspolicy.xml was not found on this server.</p>
  4286. <p>Additionally, a 404 Not Found
  4287. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  4288. </body></html>
  4289.  
  4290. + -- --=[Checking for HTML5 cross-origin resource sharing on mrkzgulfup.com... 
  4291.  
  4292. + -- --=[Retrieving robots.txt on mrkzgulfup.com... 
  4293. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  4294. <html><head>
  4295. <title>404 Not Found</title>
  4296. </head><body>
  4297. <h1>Not Found</h1>
  4298. <p>The requested URL /robots.txt was not found on this server.</p>
  4299. <p>Additionally, a 404 Not Found
  4300. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  4301. </body></html>
  4302.  
  4303. + -- --=[Retrieving sitemap.xml on mrkzgulfup.com... 
  4304. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  4305. <html><head>
  4306. <title>404 Not Found</title>
  4307. </head><body>
  4308. <h1>Not Found</h1>
  4309. <p>The requested URL /sitemap.xml was not found on this server.</p>
  4310. <p>Additionally, a 404 Not Found
  4311. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  4312. </body></html>
  4313.  
  4314. + -- --=[Checking cookie attributes on mrkzgulfup.com... 
  4315. set-cookie: __cfduid=d87aae32967e0f1ed72c156c48fcfaab41508423533; expires=Fri, 19-Oct-18 14:32:13 GMT; path=/; domain=.mrkzgulfup.com; HttpOnly
  4316. set-cookie: sid=TcuxaEIbNDsPVxIHOPEP4Gv5G37; expires=Sat, 21-Oct-2017 14:32:12 GMT; path=/
  4317.  
  4318. + -- --=[Checking for ASP.NET Detailed Errors on mrkzgulfup.com... 
  4319. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  4320. error was encountered while trying to use an ErrorDocument to handle the request.</p>
  4321.  
  4322. 
  4323.  + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
  4324. - Nikto v2.1.6
  4325. ---------------------------------------------------------------------------
  4326. + Target IP: 104.28.11.162
  4327. + Target Hostname: mrkzgulfup.com
  4328. + Target Port: 443
  4329. ---------------------------------------------------------------------------
  4330. + SSL Info: Subject: /OU=Domain Control Validated/OU=PositiveSSL Multi-Domain/CN=sni88269.cloudflaressl.com
  4331. Ciphers: ECDHE-ECDSA-CHACHA20-POLY1305
  4332. Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
  4333. + Start Time: 2017-10-19 10:32:15 (GMT-4)
  4334. ---------------------------------------------------------------------------
  4335. + Server: cloudflare-nginx
  4336. + Cookie __cfduid created without the secure flag
  4337. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  4338. + Uncommon header 'cf-ray' found, with contents: 3b0472186d5d9272-EWR
  4339. + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
  4340. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  4341. + All CGI directories 'found', use '-C none' to test none
  4342. + Scan terminated: 20 error(s) and 5 item(s) reported on remote host
  4343. + End Time: 2017-10-19 10:33:06 (GMT-4) (51 seconds)
  4344. ---------------------------------------------------------------------------
  4345. + 1 host(s) tested
  4346.  + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
  4347. [+] Screenshot saved to /usr/share/sniper/loot/screenshots/mrkzgulfup.com-port443.jpg
  4348.  + -- --=[Port 445 closed... skipping.
  4349.  + -- --=[Port 512 closed... skipping.
  4350.  + -- --=[Port 513 closed... skipping.
  4351.  + -- --=[Port 514 closed... skipping.
  4352.  + -- --=[Port 623 closed... skipping.
  4353.  + -- --=[Port 624 closed... skipping.
  4354.  + -- --=[Port 1099 closed... skipping.
  4355.  + -- --=[Port 1433 closed... skipping.
  4356.  + -- --=[Port 2049 closed... skipping.
  4357.  + -- --=[Port 2121 closed... skipping.
  4358.  + -- --=[Port 3306 closed... skipping.
  4359.  + -- --=[Port 3310 closed... skipping.
  4360.  + -- --=[Port 3128 closed... skipping.
  4361.  + -- --=[Port 3389 closed... skipping.
  4362.  + -- --=[Port 3632 closed... skipping.
  4363.  + -- --=[Port 4443 closed... skipping.
  4364.  + -- --=[Port 5432 closed... skipping.
  4365.  + -- --=[Port 5800 closed... skipping.
  4366.  + -- --=[Port 5900 closed... skipping.
  4367.  + -- --=[Port 5984 closed... skipping.
  4368.  + -- --=[Port 6000 closed... skipping.
  4369.  + -- --=[Port 6667 closed... skipping.
  4370.  + -- --=[Port 8000 closed... skipping.
  4371.  + -- --=[Port 8100 closed... skipping.
  4372.  + -- --=[Port 8080 opened... running tests...
  4373.  
  4374. ^ ^
  4375. _ __ _ ____ _ __ _ _ ____
  4376. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  4377. | V V // o // _/ | V V // 0 // 0 // _/
  4378. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  4379. <
  4380. ...'
  4381.  
  4382. WAFW00F - Web Application Firewall Detection Tool
  4383.  
  4384. By Sandro Gauci && Wendel G. Henrique
  4385.  
  4386. Checking http://mrkzgulfup.com:8080
  4387. The site http://mrkzgulfup.com:8080 is behind a CloudFlare
  4388. Number of requests: 1
  4389.  
  4390. http://mrkzgulfup.com:8080 [521 Unassigned] CloudFlare, Cookies[__cfduid], Country[UNITED STATES][US], HTML5, HTTPServer[cloudflare-nginx], HttpOnly[__cfduid], IP[104.28.11.162], JQuery, Script[text/javascript], Title[mrkzgulfup.com | 521: Web server is down], UncommonHeaders[cf-ray], X-Frame-Options[SAMEORIGIN], X-UA-Compatible[IE=Edge]
  4391.  
  4392.  
  4393.  __ ______ _____ 
  4394.  \ \/ / ___|_ _|
  4395.  \ /\___ \ | | 
  4396.  / \ ___) || | 
  4397.  /_/\_|____/ |_| 
  4398.  
  4399. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  4400. + -- --=[Target: mrkzgulfup.com:8080
  4401. + -- --=[Site not vulnerable to Cross-Site Tracing!
  4402. + -- --=[Site not vulnerable to Host Header Injection!
  4403. + -- --=[Site not vulnerable to Cross-Frame Scripting!
  4404. + -- --=[Site not vulnerable to Clickjacking!
  4405.  
  4406. HTTP/1.1 405 Not Allowed
  4407. Date: Thu, 19 Oct 2017 14:33:28 GMT
  4408. Content-Type: text/html
  4409. Content-Length: 177
  4410. Connection: close
  4411. Server: -nginx
  4412. CF-RAY: -
  4413.  
  4414. <html>
  4415. <head><title>405 Not Allowed</title></head>
  4416. <body bgcolor="white">
  4417. <center><h1>405 Not Allowed</h1></center>
  4418. <hr><center>cloudflare-nginx</center>
  4419. </body>
  4420. </html>
  4421. 
  4422. HTTP/1.1 521 Origin Down
  4423. Date: Thu, 19 Oct 2017 14:33:28 GMT
  4424. Content-Type: text/html; charset=UTF-8
  4425. Transfer-Encoding: chunked
  4426. Connection: keep-alive
  4427. Set-Cookie: __cfduid=d9ff9e51928060940ce415925d0958d8f1508423608; expires=Fri, 19-Oct-18 14:33:28 GMT; path=/; domain=.mrkzgulfup.com; HttpOnly
  4428. Expires: Thu, 01 Jan 1970 00:00:01 GMT
  4429. Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
  4430. Pragma: no-cache
  4431. X-Frame-Options: SAMEORIGIN
  4432. Server: cloudflare-nginx
  4433. CF-RAY: 3b0473e223ee6908-CDG
  4434.  
  4435. 1638
  4436. <!DOCTYPE html>
  4437. <!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->
  4438. <!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->
  4439. <!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->
  4440. <!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]-->
  4441. <head>
  4442. <meta http-equiv="refresh" content="0">
  4443.  
  4444. <meta http-equiv="set-cookie" content="cf_use_ob=8080; expires=Thu, 19-Oct-17 14:33:58 GMT; path=/">
  4445.  
  4446. <meta http-equiv="set-cookie"
  4447.  
  4448.  
  4449. Version: 1.11.10-static
  4450. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  4451. 
  4452. Testing SSL server mrkzgulfup.com on port 8080 using SNI name mrkzgulfup.com
  4453.  
  4454. TLS Fallback SCSV:
  4455. Server does not support TLS Fallback SCSV
  4456.  
  4457. TLS renegotiation:
  4458. Session renegotiation not supported
  4459.  
  4460. TLS Compression:
  4461. Compression disabled
  4462.  
  4463. Heartbleed:
  4464. TLS 1.2 not vulnerable to heartbleed
  4465. TLS 1.1 not vulnerable to heartbleed
  4466. TLS 1.0 not vulnerable to heartbleed
  4467.  
  4468. Supported Server Cipher(s):
  4469. #######################################################################################################################################
  4470. #OPISIS Anonymous JTSEC full recon #1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement