Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Scan date: 16-7-2015 18:58:30
- ===================================================================================================
- | Domain: http://africandos.com/login.php/
- | Server: cloudflare-nginx
- | IP: 104.27.135.74
- ===================================================================================================
- ===================================================================================================
- | Looking for Drupal plugins/modules
- |
- ===================================================================================================
- | WEB SERVICES
- |
- ===================================================================================================
- | FAVICON.ICO
- |
- ===================================================================================================
- | ERROR INFORMATION
- |
- | Just a moment... Please turn JavaScript on and reload the page. Checking your browser before accessing africandos.com. This process is automatic. Your browser will redirect to your requested content shortly. Please allow up to 5 seconds… DDoS protection by CloudFlare Ray ID: 206225a2055a21aa
- | Just a moment... Please turn JavaScript on and reload the page. Checking your browser before accessing africandos.com. This process is automatic. Your browser will redirect to your requested content shortly. Please allow up to 5 seconds… DDoS protection by CloudFlare Ray ID: 206225a2256421aa
- ===================================================================================================
- | TYPE ERROR
- |
- ===================================================================================================
- | SERVER MOBILE
- |
- | index page reqested with an Iphone UserAgent is diferent then with a regular UserAgent. This Host may have a mobile site
- ===================================================================================================
- | LANGUAGE
- |
- | lang="en-US"
- ===================================================================================================
- | INTERESTING STRINGS IN HTML
- |
- ===================================================================================================
- | WHOIS
- |
- |
- |
- | Whois Server Version 2.0
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- | Domain Name: AFRICANDOS.COM
- |
- | Registrar: GODADDY.COM, LLC
- |
- | Sponsoring Registrar IANA ID: 146
- |
- | Whois Server: whois.godaddy.com
- |
- | Referral URL: http://registrar.godaddy.com
- |
- | Name Server: COCO.NS.CLOUDFLARE.COM
- |
- | Name Server: CODY.NS.CLOUDFLARE.COM
- |
- | Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
- |
- | Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
- |
- | Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
- |
- | Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
- |
- | Updated Date: 02-jul-2015
- |
- | Creation Date: 02-jul-2015
- |
- | Expiration Date: 02-jul-2016
- |
- |
- |
- | >>> Last update of whois database: Wed, 15 Jul 2015 02:48:06 GMT <<<
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- | Registrars.
- |
- |
- |
- | For more information on Whois status codes, please visit
- |
- | https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en.
- |
- | Domain Name: africandos.com
- |
- | Registry Domain ID: 1943886870_DOMAIN_COM-VRSN
- |
- | Registrar WHOIS Server: whois.godaddy.com
- |
- | Registrar URL: http://www.godaddy.com
- |
- | Update Date: 2015-07-02T03:02:45Z
- |
- | Creation Date: 2015-07-02T03:02:45Z
- |
- | Registrar Registration Expiration Date: 2016-07-02T03:02:45Z
- |
- | Registrar: GoDaddy.com, LLC
- |
- | Registrar IANA ID: 146
- |
- | Registrar Abuse Contact Email: abuse@godaddy.com
- |
- | Registrar Abuse Contact Phone: +1.4806242505
- |
- | Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
- |
- | Domain Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
- |
- | Domain Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
- |
- | Domain Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
- |
- | Registry Registrant ID:
- |
- | Registrant Name: Edman Manny
- |
- | Registrant Organization:
- |
- | Registrant Street: 3224 Metz Lane
- |
- | Registrant City: boston
- |
- | Registrant State/Province: Massachusetts
- |
- | Registrant Postal Code: 02210
- |
- | Registrant Country: United States
- |
- | Registrant Phone: +1.8575595557
- |
- | Registrant Phone Ext:
- |
- | Registrant Fax:
- |
- | Registrant Fax Ext:
- |
- | Registrant Email: edmanistheman90@aol.com
- |
- | Registry Admin ID:
- |
- | Admin Name: Edman Manny
- |
- | Admin Organization:
- |
- | Admin Street: 3224 Metz Lane
- |
- | Admin City: boston
- |
- | Admin State/Province: Massachusetts
- |
- | Admin Postal Code: 02210
- |
- | Admin Country: United States
- |
- | Admin Phone: +1.8575595557
- |
- | Admin Phone Ext:
- |
- | Admin Fax:
- |
- | Admin Fax Ext:
- |
- | Admin Email: edmanistheman90@aol.com
- |
- | Registry Tech ID:
- |
- | Tech Name: Edman Manny
- |
- | Tech Organization:
- |
- | Tech Street: 3224 Metz Lane
- |
- | Tech City: boston
- |
- | Tech State/Province: Massachusetts
- |
- | Tech Postal Code: 02210
- |
- | Tech Country: United States
- |
- | Tech Phone: +1.8575595557
- |
- | Tech Phone Ext:
- |
- | Tech Fax:
- |
- | Tech Fax Ext:
- |
- | Tech Email: edmanistheman90@aol.com
- |
- | Name Server: COCO.NS.CLOUDFLARE.COM
- |
- | Name Server: CODY.NS.CLOUDFLARE.COM
- |
- | DNSSEC: unsigned
- |
- | URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
- |
- | >>> Last update of WHOIS database: 2015-07-15T02:00:00Z <<<
- |
- |
- |
- | For more information on Whois status codes, please visit https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en
- |
- |
- |
- ===================================================================================================
- | BANNER GRABBING:
- | Refresh: 8;URL=/cdn-cgi/l/chk_jschl?pass=1436928497.25-lesErXkst4
- ===================================================================================================
- ===================================================================================================
- | PING
- |
- | PING africandos.com (104.27.135.74) 56(84) bytes of data.
- | 64 bytes from 104.27.135.74: icmp_req=1 ttl=128 time=8.21 ms
- | 64 bytes from 104.27.135.74: icmp_req=2 ttl=128 time=8.85 ms
- | 64 bytes from 104.27.135.74: icmp_req=3 ttl=128 time=7.90 ms
- |
- | --- africandos.com ping statistics ---
- | 3 packets transmitted, 3 received, 0% packet loss, time 3025ms
- | rtt min/avg/max/mdev = 7.909/8.326/8.857/0.395 ms
- ===================================================================================================
- | TRACEROUTE
- |
- | traceroute to africandos.com (104.27.135.74), 30 hops max, 60 byte packets
- | 1 192.168.56.2 (192.168.56.2) 0.743 ms 0.197 ms 0.077 ms
- | 2 * * *
- | 3 * * *
- | 4 * * *
- | 5 * * *
- | 6 * * *
- | 7 * * *
- | 8 * * *
- | 9 * * *
- | 10 * * *
- | 11 * * *
- | 12 * * *
- | 13 * * *
- | 14 * * *
- | 15 * * *
- | 16 * * *
- | 17 * * *
- | 18 * * *
- | 19 * * *
- | 20 * * *
- | 21 * * *
- | 22 * * *
- | 23 * * *
- | 24 * * *
- | 25 * * *
- | 26 * * *
- | 27 * * *
- | 28 * * *
- | 29 * * *
- | 30 * * *
- ===================================================================================================
- | NSLOOKUP
- |
- | Server: 192.168.56.2
- | Address: 192.168.56.2#53
- |
- | Non-authoritative answer:
- | *** Can't find africandos.com: No answer
- | Authoritative answers can be found from:
- | africandos.com
- | origin = coco.ns.cloudflare.com
- | mail addr = dns.cloudflare.com
- | serial = 2018779323
- | refresh = 10000
- | retry = 2400
- | expire = 604800
- | minimum = 3600
- | africandos.com nameserver = cody.ns.cloudflare.com.
- | africandos.com nameserver = coco.ns.cloudflare.com.
- | Name: africandos.com
- | Address: 104.27.135.74
- | Address: 104.27.134.74
- | ;; connection timed out; no servers could be reached
- ===================================================================================================
- | NMAP
- |
- ####################################
- # Uniscan project #
- # http://uniscan.sourceforge.net/ #
- ####################################
- V. 6.2
- Scan date: 16-7-2015 19:0:43
- ===================================================================================================
- | Domain: http://africandos.com/login.php/
- | Server: cloudflare-nginx
- | IP: 104.27.135.74
- ===================================================================================================
- ===================================================================================================
- | Looking for Drupal plugins/modules
- |
- ===================================================================================================
- | WEB SERVICES
- |
- ===================================================================================================
- | FAVICON.ICO
- |
- |
- | Starting Nmap 6.47 ( http://nmap.org ) at 2015-07-16 18:59 UTC
- | NSE: Loaded 118 scripts for scanning.
- | NSE: Script Pre-scanning.
- | Initiating Ping Scan at 18:59
- | Scanning africandos.com (104.27.135.74) [4 ports]
- | Completed Ping Scan at 18:59, 0.06s elapsed (1 total hosts)
- | Initiating Parallel DNS resolution of 1 host. at 18:59
- | Completed Parallel DNS resolution of 1 host. at 18:59, 0.04s elapsed
- | Initiating SYN Stealth Scan at 18:59
- | Scanning africandos.com (104.27.135.74) [1000 ports]
- | Discovered open port 80/tcp on 104.27.135.74
- | Discovered open port 443/tcp on 104.27.135.74
- | Discovered open port 554/tcp on 104.27.135.74
- | Discovered open port 8080/tcp on 104.27.135.74
- | Discovered open port 8443/tcp on 104.27.135.74
- | Discovered open port 7070/tcp on 104.27.135.74
- | Completed SYN Stealth Scan at 18:59, 5.24s elapsed (1000 total ports)
- | Initiating Service scan at 18:59
- | Scanning 6 services on africandos.com (104.27.135.74)
- | Completed Service scan at 18:59, 5.01s elapsed (6 services on 1 host)
- | Initiating OS detection (try #1) against africandos.com (104.27.135.74)
- | Initiating Traceroute at 18:59
- | Completed Traceroute at 18:59, 9.08s elapsed
- | NSE: Script scanning 104.27.135.74.
- | Initiating NSE at 18:59
- | Completed NSE at 19:00, 54.08s elapsed
- | Nmap scan report for africandos.com (104.27.135.74)
- | Host is up (0.020s latency).
- | Other addresses for africandos.com (not scanned): 104.27.134.74
- | Not shown: 994 filtered ports
- | PORT STATE SERVICE VERSION
- | 80/tcp open http?
- | 443/tcp open https?
- | |_http-title: 400 The plain HTTP request was sent to HTTPS port
- | | ssl-cert: Subject: commonName=sni101300.cloudflaressl.com
- | | Issuer: commonName=COMODO ECC Domain Validation Secure Server CA 2/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
- | | Public Key type: ec
- | | Public Key bits: 256
- | | Not valid before: 2015-07-02T00:00:00+00:00
- | | Not valid after: 2016-04-01T23:59:59+00:00
- | | MD5: 698f b29f dd8e 69d7 7f04 b2ae c9db b605
- | |_SHA-1: 03b3 a825 bf92 6630 b784 0e3f 8e21 b36c a765 1850
- | 554/tcp open rtsp?
- | 7070/tcp open realserver?
- | 8080/tcp open http-proxy?
- | 8443/tcp open https-alt?
- | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- | Device type: specialized|WAP|phone
- | Running: iPXE 1.X, Linksys Linux 2.4.X, Linux 2.6.X, Sony Ericsson embedded
- | OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linksys:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6 cpe:/h:sonyericsson:u8i_vivaz
- | OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
- |
- | TRACEROUTE (using port 80/tcp)
- | HOP RTT ADDRESS
- | 1 ... 30
- |
- | NSE: Script Post-scanning.
- | Read data files from: /usr/bin/../share/nmap
- | OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- | Nmap done: 1 IP address (1 host up) scanned in 78.66 seconds
- | Raw packets sent: 2163 (97.792KB) | Rcvd: 8 (344B)
- ===================================================================================================
- |
- | Directory check:
- | Skipped because http://africandos.com/login.php/uniscan98/ did not return the code 404
- ===================================================================================================
- |
- | File check:
- | Skipped because http://africandos.com/login.php/uniscan686/ did not return the code 404
- ===================================================================================================
- |
- | Check robots.txt:
- |
- | Check sitemap.xml:
- ===================================================================================================
- |
- | Crawler Started:
- | Plugin name: FCKeditor upload test v.1 Loaded.
- | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
- | Plugin name: Upload Form Detect v.1.1 Loaded.
- | Plugin name: Code Disclosure v.1.1 Loaded.
- | Plugin name: E-mail Detection v.1.1 Loaded.
- | Plugin name: External Host Detect v.1.2 Loaded.
- | Plugin name: phpinfo() Disclosure v.1 Loaded.
- | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
- ===================================================================================================
- | ERROR INFORMATION
- |
- | Just a moment... Please turn JavaScript on and reload the page. Checking your browser before accessing africandos.com. This process is automatic. Your browser will redirect to your requested content shortly. Please allow up to 5 seconds… DDoS protection by CloudFlare Ray ID: 206228e95a3b1852
- | Just a moment... Please turn JavaScript on and reload the page. Checking your browser before accessing africandos.com. This process is automatic. Your browser will redirect to your requested content shortly. Please allow up to 5 seconds… DDoS protection by CloudFlare Ray ID: 206228e96a3e1852
- ===================================================================================================
- | TYPE ERROR
- |
- ===================================================================================================
- | SERVER MOBILE
- |
- | index page reqested with an Iphone UserAgent is diferent then with a regular UserAgent. This Host may have a mobile site
- ===================================================================================================
- | LANGUAGE
- |
- | lang="en-US"
- ===================================================================================================
- | INTERESTING STRINGS IN HTML
- |
- ===================================================================================================
- | WHOIS
- |
- |
- |
- | Whois Server Version 2.0
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- | Domain Name: AFRICANDOS.COM
- |
- | Registrar: GODADDY.COM, LLC
- |
- | Sponsoring Registrar IANA ID: 146
- |
- | Whois Server: whois.godaddy.com
- |
- | Referral URL: http://registrar.godaddy.com
- |
- | Name Server: COCO.NS.CLOUDFLARE.COM
- |
- | Name Server: CODY.NS.CLOUDFLARE.COM
- |
- | Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
- |
- | Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
- |
- | Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
- |
- | Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
- |
- | Updated Date: 02-jul-2015
- |
- | Creation Date: 02-jul-2015
- |
- | Expiration Date: 02-jul-2016
- |
- |
- |
- | >>> Last update of whois database: Wed, 15 Jul 2015 02:50:22 GMT <<<
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- |
- | Registrars.
- |
- |
- |
- | For more information on Whois status codes, please visit
- |
- | https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en.
- |
- | Domain Name: africandos.com
- |
- | Registry Domain ID: 1943886870_DOMAIN_COM-VRSN
- |
- | Registrar WHOIS Server: whois.godaddy.com
- |
- | Registrar URL: http://www.godaddy.com
- |
- | Update Date: 2015-07-02T03:02:45Z
- |
- | Creation Date: 2015-07-02T03:02:45Z
- |
- | Registrar Registration Expiration Date: 2016-07-02T03:02:45Z
- |
- | Registrar: GoDaddy.com, LLC
- |
- | Registrar IANA ID: 146
- |
- | Registrar Abuse Contact Email: abuse@godaddy.com
- |
- | Registrar Abuse Contact Phone: +1.4806242505
- |
- | Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
- |
- | Domain Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
- |
- | Domain Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
- |
- | Domain Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
- |
- | Registry Registrant ID:
- |
- | Registrant Name: Edman Manny
- |
- | Registrant Organization:
- |
- | Registrant Street: 3224 Metz Lane
- |
- | Registrant City: boston
- |
- | Registrant State/Province: Massachusetts
- |
- | Registrant Postal Code: 02210
- |
- | Registrant Country: United States
- |
- | Registrant Phone: +1.8575595557
- |
- | Registrant Phone Ext:
- |
- | Registrant Fax:
- |
- | Registrant Fax Ext:
- |
- | Registrant Email: edmanistheman90@aol.com
- |
- | Registry Admin ID:
- |
- | Admin Name: Edman Manny
- |
- | Admin Organization:
- |
- | Admin Street: 3224 Metz Lane
- |
- | Admin City: boston
- |
- | Admin State/Province: Massachusetts
- |
- | Admin Postal Code: 02210
- |
- | Admin Country: United States
- |
- | Admin Phone: +1.8575595557
- |
- | Admin Phone Ext:
- |
- | Admin Fax:
- |
- | Admin Fax Ext:
- |
- | Admin Email: edmanistheman90@aol.com
- |
- | Registry Tech ID:
- |
- | Tech Name: Edman Manny
- |
- | Tech Organization:
- |
- | Tech Street: 3224 Metz Lane
- |
- | Tech City: boston
- |
- | Tech State/Province: Massachusetts
- |
- | Tech Postal Code: 02210
- |
- | Tech Country: United States
- |
- | Tech Phone: +1.8575595557
- |
- | Tech Phone Ext:
- |
- | Tech Fax:
- |
- | Tech Fax Ext:
- |
- | Tech Email: edmanistheman90@aol.com
- |
- | Name Server: COCO.NS.CLOUDFLARE.COM
- |
- | Name Server: CODY.NS.CLOUDFLARE.COM
- |
- | DNSSEC: unsigned
- |
- | URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
- |
- | >>> Last update of WHOIS database: 2015-07-15T02:00:00Z <<<
- |
- |
- |
- | For more information on Whois status codes, please visit https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en
- |
- |
- |
- ===================================================================================================
- | BANNER GRABBING:
- | Refresh: 8;URL=/cdn-cgi/l/chk_jschl?pass=1436928643.232-iYKFGw/ciL
- ===================================================================================================
- ===================================================================================================
- | PING
- |
- | [+] Crawling finished, 1 URL's found!
- |
- | FCKeditor File Upload:
- |
- | Timthumb:
- |
- | File Upload Forms:
- |
- | Source Code Disclosure:
- |
- | E-mails:
- |
- | External hosts:
- |
- | PHPinfo() Disclosure:
- |
- | Web Backdoors:
- |
- | Ignored Files:
- ===================================================================================================
- | Dynamic tests:
- | Plugin name: Learning New Directories v.1.2 Loaded.
- | Plugin name: FCKedior tests v.1.1 Loaded.
- | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
- | Plugin name: Find Backup Files v.1.2 Loaded.
- | Plugin name: Blind SQL-injection tests v.1.3 Loaded.
- | Plugin name: Local File Include tests v.1.1 Loaded.
- | Plugin name: PHP CGI Argument Injection v.1.1 Loaded.
- | Plugin name: Remote Command Execution tests v.1.1 Loaded.
- | Plugin name: Remote File Include tests v.1.2 Loaded.
- | Plugin name: SQL-injection tests v.1.2 Loaded.
- | Plugin name: Cross-Site Scripting tests v.1.2 Loaded.
- | Plugin name: Web Shell Finder v.1.3 Loaded.
- | [+] 0 New directories added
- |
- |
- | FCKeditor tests:
- | Skipped because http://africandos.com/testing123 did not return the code 404
- |
- |
- | Timthumb < 1.33 vulnerability:
- | PING africandos.com (104.27.135.74) 56(84) bytes of data.
- | 64 bytes from 104.27.135.74: icmp_req=1 ttl=128 time=7.71 ms
- | 64 bytes from 104.27.135.74: icmp_req=2 ttl=128 time=7.37 ms
- | 64 bytes from 104.27.135.74: icmp_req=3 ttl=128 time=7.67 ms
- | 64 bytes from 104.27.135.74: icmp_req=4 ttl=128 time=7.67 ms
- |
- | --- africandos.com ping statistics ---
- | 4 packets transmitted, 4 received, 0% packet loss, time 3006ms
- | rtt min/avg/max/mdev = 7.376/7.610/7.715/0.136 ms
- ===================================================================================================
- | TRACEROUTE
- |
- |
- |
- | Backup Files:
- | Skipped because http://africandos.com/testing123 did not return the code 404
- |
- |
- | Blind SQL Injection:
- |
- |
- | Local File Include:
- |
- |
- | PHP CGI Argument Injection:
- |
- |
- | Remote Command Execution:
- |
- |
- | Remote File Include:
- |
- |
- | SQL Injection:
- |
- |
- | Cross-Site Scripting (XSS):
- |
- |
- | Web Shell Finder:
- ===================================================================================================
- | Static tests:
- | Plugin name: Local File Include tests v.1.1 Loaded.
- | Plugin name: Remote Command Execution tests v.1.1 Loaded.
- | Plugin name: Remote File Include tests v.1.1 Loaded.
- |
- |
- | Local File Include:
- | traceroute to africandos.com (104.27.135.74), 30 hops max, 60 byte packets
- | 1 192.168.56.2 (192.168.56.2) 0.123 ms 0.079 ms 0.075 ms
- | 2 * * *
- | 3 * * *
- | 4 * * *
- | 5 * * *
- | 6 * * *
- | 7 * * *
- | 8 * * *
- | 9 * * *
- | 10 * * *
- | 11 * * *
- | 12 * * *
- | 13 * * *
- | 14 * * *
- | 15 * * *
- | 16 * * *
- | 17 * * *
- | 18 * * *
- | 19 * * *
- | 20 * * *
- | 21 * * *
- | 22 * * *
- | 23 * * *
- | 24 * * *
- | 25 * * *
- | 26 * * *
- | 27 * * *
- | 28 * * *
- | 29 * * *
- | 30 * * *
- ===================================================================================================
- | NSLOOKUP
- |
- | Server: 192.168.56.2
- | Address: 192.168.56.2#53
- |
- | Non-authoritative answer:
- | *** Can't find africandos.com: No answer
- | Authoritative answers can be found from:
- | africandos.com
- | origin = coco.ns.cloudflare.com
- | mail addr = dns.cloudflare.com
- | serial = 2018779323
- | refresh = 10000
- | retry = 2400
- | expire = 604800
- | minimum = 3600
- | africandos.com nameserver = cody.ns.cloudflare.com.
- | africandos.com nameserver = coco.ns.cloudflare.com.
- | Name: africandos.com
- | Address: 104.27.135.74
- | Address: 104.27.134.74
- | ;; connection timed out; no servers could be reached
- ===================================================================================================
- | NMAP
- |
- |
- |
- | Remote Command Execution:
- |
- |
- | Remote File Include:
- |
- | Starting Nmap 6.47 ( http://nmap.org ) at 2015-07-16 19:01 UTC
- | NSE: Loaded 118 scripts for scanning.
- | NSE: Script Pre-scanning.
- | Initiating Ping Scan at 19:01
- | Scanning africandos.com (104.27.135.74) [4 ports]
- | Completed Ping Scan at 19:01, 0.07s elapsed (1 total hosts)
- | Initiating Parallel DNS resolution of 1 host. at 19:01
- | Completed Parallel DNS resolution of 1 host. at 19:01, 0.04s elapsed
- | Initiating SYN Stealth Scan at 19:01
- | Scanning africandos.com (104.27.135.74) [1000 ports]
- | Discovered open port 80/tcp on 104.27.135.74
- | Discovered open port 554/tcp on 104.27.135.74
- | Discovered open port 8080/tcp on 104.27.135.74
- | Discovered open port 443/tcp on 104.27.135.74
- | SYN Stealth Scan Timing: About 37.73% done; ETC: 19:03 (0:00:51 remaining)
- | SYN Stealth Scan Timing: About 38.77% done; ETC: 19:04 (0:01:36 remaining)
- | Increasing send delay for 104.27.135.74 from 0 to 5 due to 11 out of 25 dropped probes since last increase.
- | SYN Stealth Scan Timing: About 66.57% done; ETC: 19:04 (0:00:50 remaining)
- | Discovered open port 7070/tcp on 104.27.135.74
- | Discovered open port 8443/tcp on 104.27.135.74
- | Completed SYN Stealth Scan at 19:03, 106.47s elapsed (1000 total ports)
- | Initiating Service scan at 19:03
- | Scanning 6 services on africandos.com (104.27.135.74)
- | Completed Service scan at 19:05, 132.28s elapsed (6 services on 1 host)
- | Initiating OS detection (try #1) against africandos.com (104.27.135.74)
- | Retrying OS detection (try #2) against africandos.com (104.27.135.74)
- | Initiating Traceroute at 19:05
- | Completed Traceroute at 19:05, 0.02s elapsed
- | Initiating Parallel DNS resolution of 2 hosts. at 19:05
- | Completed Parallel DNS resolution of 2 hosts. at 19:05, 0.05s elapsed
- | NSE: Script scanning 104.27.135.74.
- | Initiating NSE at 19:05
- | Completed NSE at 19:06, 30.60s elapsed
- | Nmap scan report for africandos.com (104.27.135.74)
- | Host is up (0.0020s latency).
- | Other addresses for africandos.com (not scanned): 104.27.134.74
- | Not shown: 975 filtered ports
- | PORT STATE SERVICE VERSION
- | 80/tcp open http cloudflare-nginx
- | |_http-methods: No Allow or Public header in OPTIONS response (status code 503)
- | |_http-title: Just a moment...
- | 301/tcp closed unknown
- | 366/tcp closed odmr
- | 443/tcp open ssl/http cloudflare-nginx
- | |_http-methods: No Allow or Public header in OPTIONS response (status code 503)
- | |_http-title: Just a moment...
- | | ssl-cert: Subject: commonName=sni101300.cloudflaressl.com
- | | Issuer: commonName=COMODO ECC Domain Validation Secure Server CA 2/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
- | | Public Key type: ec
- | | Public Key bits: 256
- | | Not valid before: 2015-07-02T00:00:00+00:00
- | | Not valid after: 2016-04-01T23:59:59+00:00
- | | MD5: 698f b29f dd8e 69d7 7f04 b2ae c9db b605
- | |_SHA-1: 03b3 a825 bf92 6630 b784 0e3f 8e21 b36c a765 1850
- | 458/tcp closed appleqtc
- | 554/tcp open rtsp?
- | 714/tcp closed iris-xpcs
- | 765/tcp closed webster
- | 1972/tcp closed intersys-cache
- | 2161/tcp closed apc-agent
- | 2500/tcp closed rtsserv
- | 3013/tcp closed gilatskysurfer
- | 4003/tcp closed pxc-splr-ft
- | 5080/tcp closed onscreen
- | 6106/tcp closed isdninfo
- | 7070/tcp open realserver?
- | 7402/tcp closed rtps-dd-mt
- | 8007/tcp closed ajp12
- | 8080/tcp open http cloudflare-nginx
- | |_http-methods: No Allow or Public header in OPTIONS response (status code 503)
- | |_http-title: Just a moment...
- | 8181/tcp closed unknown
- | 8443/tcp open http cloudflare-nginx
- | |_http-methods: No Allow or Public header in OPTIONS response (status code 400)
- | |_http-title: 400 The plain HTTP request was sent to HTTPS port
- | | ssl-cert: Subject: commonName=sni101300.cloudflaressl.com
- | | Issuer: commonName=COMODO ECC Domain Validation Secure Server CA 2/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
- | | Public Key type: ec
- | | Public Key bits: 256
- | | Not valid before: 2015-07-02T00:00:00+00:00
- | | Not valid after: 2016-04-01T23:59:59+00:00
- | | MD5: 698f b29f dd8e 69d7 7f04 b2ae c9db b605
- | |_SHA-1: 03b3 a825 bf92 6630 b784 0e3f 8e21 b36c a765 1850
- | 9103/tcp closed jetdirect
- | 9998/tcp closed distinct32
- | 16018/tcp closed unknown
- | 35500/tcp closed unknown
- | Device type: general purpose|storage-misc
- | Running (JUST GUESSING): Linux 2.4.X|3.X (95%), Microsoft Windows 7|XP (91%), BlueArc embedded (87%)
- | OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:3 cpe:/o:microsoft:windows_7:::enterprise cpe:/o:microsoft:windows_xp::sp3 cpe:/h:bluearc:titan_2100
- | Aggressive OS guesses: DD-WRT v24-sp2 (Linux 2.4.37) (95%), Linux 3.2 (95%), Microsoft Windows 7 Enterprise (91%), Microsoft Windows XP SP3 (91%), BlueArc Titan 2100 NAS device (87%)
- | No exact OS matches for host (test conditions non-ideal).
- | Network Distance: 2 hops
- | TCP Sequence Prediction: Difficulty=260 (Good luck!)
- | IP ID Sequence Generation: Busy server or unknown class
- |
- | TRACEROUTE (using port 80/tcp)
- | HOP RTT ADDRESS
- | 1 0.06 ms 192.168.56.2
- | 2 0.06 ms 104.27.135.74
- |
- | NSE: Script Post-scanning.
- | Read data files from: /usr/bin/../share/nmap
- | OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- | Nmap done: 1 IP address (1 host up) scanned in 275.03 seconds
- | Raw packets sent: 3070 (138.320KB) | Rcvd: 1885 (266.616KB)
- ===================================================================================================
- |
- | Directory check:
- | Skipped because http://africandos.com/login.php/uniscan904/ did not return the code 404
- ===================================================================================================
- |
- | File check:
- | Skipped because http://africandos.com/login.php/uniscan635/ did not return the code 404
- ===================================================================================================
- |
- | Check robots.txt:
- |
- | Check sitemap.xml:
- ===================================================================================================
- |
- | Crawler Started:
- | Plugin name: FCKeditor upload test v.1 Loaded.
- | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
- | Plugin name: Upload Form Detect v.1.1 Loaded.
- | Plugin name: Code Disclosure v.1.1 Loaded.
- | Plugin name: E-mail Detection v.1.1 Loaded.
- | Plugin name: External Host Detect v.1.2 Loaded.
- | Plugin name: phpinfo() Disclosure v.1 Loaded.
- | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
- | [+] Crawling finished, 1 URL's found!
- |
- | FCKeditor File Upload:
- |
- | Timthumb:
- |
- | File Upload Forms:
- |
- | Source Code Disclosure:
- |
- | E-mails:
- |
- | External hosts:
- |
- | PHPinfo() Disclosure:
- |
- | Web Backdoors:
- |
- | Ignored Files:
- ===================================================================================================
- | Dynamic tests:
- | Plugin name: Learning New Directories v.1.2 Loaded.
- | Plugin name: FCKedior tests v.1.1 Loaded.
- | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
- | Plugin name: Find Backup Files v.1.2 Loaded.
- | Plugin name: Blind SQL-injection tests v.1.3 Loaded.
- | Plugin name: Local File Include tests v.1.1 Loaded.
- | Plugin name: PHP CGI Argument Injection v.1.1 Loaded.
- | Plugin name: Remote Command Execution tests v.1.1 Loaded.
- | Plugin name: Remote File Include tests v.1.2 Loaded.
- | Plugin name: SQL-injection tests v.1.2 Loaded.
- | Plugin name: Cross-Site Scripting tests v.1.2 Loaded.
- | Plugin name: Web Shell Finder v.1.3 Loaded.
- | [+] 0 New directories added
- |
- |
- | FCKeditor tests:
- | Skipped because http://africandos.com/testing123 did not return the code 404
- |
- |
- | Timthumb < 1.33 vulnerability:
- |
- |
- | Backup Files:
- | Skipped because http://africandos.com/testing123 did not return the code 404
- |
- |
- | Blind SQL Injection:
- |
- |
- | Local File Include:
- |
- |
- | PHP CGI Argument Injection:
- |
- |
- | Remote Command Execution:
- |
- |
- | Remote File Include:
- |
- |
- | SQL Injection:
- |
- |
- | Cross-Site Scripting (XSS):
- |
- |
- | Web Shell Finder:
- ===================================================================================================
- | Static tests:
- | Plugin name: Local File Include tests v.1.1 Loaded.
- | Plugin name: Remote Command Execution tests v.1.1 Loaded.
- | Plugin name: Remote File Include tests v.1.1 Loaded.
- |
- |
- | Local File Include:
- |
- |
- | Remote Command Execution:
- |
- |
- | Remote File Include:
- ===================================================================================================
- | Stress tests:
- | Plugin name: Mini Stress Test v.1.1 Loaded.
- |
- |
- | Mini Stress Test:
- | Looking for best cost:
- | Using a as target
- ===================================================================================================
- | Stress tests:
- | Plugin name: Mini Stress Test v.1.1 Loaded.
- |
- |
- | Mini Stress Test:
- | Looking for best cost:
- | Using a as target
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement