Advertisement
Guest User

Untitled

a guest
Nov 19th, 2015
1,541
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.93 KB | None | 0 0
  1. By AnonData
  2. #opParis
  3. Like, share and Follow for more.
  4.  
  5. Websites Will be defaced after Data collections are complete!
  6. ---------------------------------------------------------------------------
  7.  
  8. Target[1]
  9.  
  10. ---------------------------------------------------------------------------
  11. + Target IP: 104.18.58.100 [IPTrace:- US, CA, California, San Francisco, 94107, 37.769699, -122.393303, 807, 415]
  12. + Target Hostname: jaishalislam.com
  13. + Target Port: 80
  14. ---------------------------------------------------------------------------
  15. Administrative Contact Information
  16. Registrant Name: islam army
  17. Registrant Organization: islam army
  18. Registrant Street: Turkey
  19. Registrant City: Turkey
  20. Registrant State/Province: istanbol
  21. Registrant Postal Code: 0000
  22. Registrant Country: TR
  23. Registrant Phone: +90.5357242870
  24. Registrant Phone Ext:
  25. Registrant Fax: +90.5357242870
  26. Registrant Fax Ext:
  27. Registrant Email: islam-army.com@gmail.com
  28. Registry Admin ID:
  29. Admin Name: islam army
  30. ---------------------------------------------------------------------------
  31. + Server: cloudflare-nginx
  32. + Uncommon header 'x-frame-options' found, with contents: SAMEORIGIN
  33. + Uncommon header 'cf-ray' found, with contents: 2471e63f7cf60491-CDG
  34. + Cookie __cfduid created without the httponly flag
  35. + No CGI Directories found
  36. + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
  37. + 6544 items checked: 0 error(s) and 3 item(s) reported on remote host
  38. ---------------------------------------------------------------------------
  39.  
  40. Target [2]
  41.  
  42. ---------------------------------------------------------------------------
  43. + Target IP: 104.27.162.228 [IPTrace:- CA, California, San Francisco, 94107, 37.769699, -122.393303, 807, 415]
  44. + Target Hostname: alfath.org
  45. + Target Port: 80
  46. + Start Time: 2015-11-18 08:39:58 (GMT0)
  47. ---------------------------------------------------------------------------
  48. Administrative Contact Information: Protected By - WhoisGuard Protected
  49. ---------------------------------------------------------------------------
  50. [+] robots.txt available under: 'http://alfath.org/robots.txt'
  51. [!] Full Path Disclosure (FPD) in 'http://alfath.org/wp-includes/rss-functions.php': /home/alfath/public_html/wp-includes/rss-functions.php
  52. [+] Interesting header: CF-RAY: 247b29373ef0024a-CDG
  53. [+] Interesting header: SERVER: cloudflare-nginx
  54. [+] Interesting header: X-CACHE: MISS
  55. [+] XML-RPC Interface available under: http://alfath.org/xmlrpc.php
  56. [!] Upload directory has directory listing enabled: http://alfath.org/wp-content/uploads/
  57. [+] WordPress version 4.3.1 identified from advanced fingerprinting
  58. [+] WordPress theme in use: alfathmedia2 - v1.3
  59. [+] Name: alfathmedia2 - v1.3
  60. | Location: http://alfath.org/wp-content/themes/alfathmedia2/
  61. | Readme: http://alfath.org/wp-content/themes/alfathmedia2/readme.txt
  62. | Style URL: http://alfath.org/wp-content/themes/alfathmedia2/style.css
  63. | Theme Name: AlfathMedia
  64. | Theme URI: http://alfath.org/
  65. | Description: Temporary Template.
  66. | Author: Mushab Ibn Umair
  67. | Author URI: http://alfath.org/
  68. [+] Enumerating plugins from passive detection ...
  69. | 3 plugins found:
  70. [+] Name: contact-form-7 - v4.2.2
  71. | Location: http://alfath.org/wp-content/plugins/contact-form-7/
  72. | Readme: http://alfath.org/wp-content/plugins/contact-form-7/readme.txt
  73. [!] The version is out of date, the latest version is 4.3
  74. [!] Directory listing is enabled: http://alfath.org/wp-content/plugins/contact-form-7/
  75. [+] Name: responsive-lightbox - v1.6.1
  76. | Location: http://alfath.org/wp-content/plugins/responsive-lightbox/
  77. | Readme: http://alfath.org/wp-content/plugins/responsive-lightbox/readme.txt
  78. [!] The version is out of date, the latest version is 1.6.5
  79. [+] Name: wp-pagenavi - v2.88
  80. | Latest version: 2.88 (up to date)
  81. | Location: http://alfath.org/wp-content/plugins/wp-pagenavi/
  82. | Readme: http://alfath.org/wp-content/plugins/wp-pagenavi/readme.txt
  83. [!] Directory listing is enabled: http://alfath.org/wp-content/plugins/wp-pagenavi/
  84. ---------------------------------------------------------------------------
  85. + Server: cloudflare-nginx
  86. + Uncommon header 'cf-ray' found, with contents: 24725e2ed18d0c11-AMS
  87. + Uncommon header 'x-frame-options' found, with contents: SAMEORIGIN
  88. + Cookie __cfduid created without the httponly flag
  89. + No CGI Directories found
  90. + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
  91. + 6544 items checked: 0 error(s) and 3 item(s) reported on remote host
  92. ---------------------------------------------------------------------------
  93.  
  94. Target[3]
  95.  
  96. ---------------------------------------------------------------------------
  97. + Target IP: 192.0.78.12 [IPTrace:- US, CA, California, San Francisco, 94110, 37.748402, -122.415604, 807, 415]
  98. + Target Hostname: millahibrahim.wordpress.com
  99. + Target Admin Page
  100. + Target Port: 80
  101. + Start Time: 2015-11-18 09:42:50 (GMT0)
  102. ---------------------------------------------------------------------------
  103. Administrative Contact Information: Protected By - WhoisGuard Protected
  104. ---------------------------------------------------------------------------
  105. [+] Interesting header: SERVER: nginx
  106. [+] Interesting header: X-AC: 1.fra _dca
  107. [+] This site has 'Must Use Plugins' (http://codex.wordpress.org/Must_Use_Plugins)
  108. [+] XML-RPC Interface available under: http://millahibrahim.wordpress.com/xmlrpc.php
  109. ---------------------------------------------------------------------------
  110. + Server: nginx
  111. + The anti-clickjacking X-Frame-Options header is not present.
  112. + Uncommon header 'x-ac' found, with contents: 1.fra _dca
  113. + Root page / redirects to: https://millahibrahim.wordpress.com/
  114. + No CGI Directories found
  115. + Server leaks inodes via ETags, header found with file /, fields: 0x56442a12 0x4d1
  116. + 6544 items checked: 7 error(s) and 3 item(s) reported on remote host
  117. ---------------------------------------------------------------------------
  118.  
  119. Target[4]
  120.  
  121. ---------------------------------------------------------------------------
  122. + Target IP: 104.27.169.67 [IPTrace:- US, CA, California, San Francisco, 94107, 37.769699, -122.393303, 807, 415]
  123. + Target Hostname: shoutussalam.co
  124. + Admin Page http://shoutussalam.co/wp_login & http://shoutussalam.co/admin
  125. + Target Port: 80
  126. + Start Time: 2015-11-18 10:20:36 (GMT0)
  127. ---------------------------------------------------------------------------
  128. Administrative Contact Information: Protected By - WhoisGuard Protected
  129. ---------------------------------------------------------------------------
  130. [+] robots.txt available under: 'http://shoutussalam.co/robots.txt'
  131. [+] Interesting header: CF-RAY: 247b1f32ba172762-FRA
  132. [+] Interesting header: SERVER: cloudflare-nginx
  133. [+] Interesting header: X-POWERED-BY: EasyEngine 3.0.5
  134. [+] This site has 'Must Use Plugins' (http://codex.wordpress.org/Must_Use_Plugins)
  135. [+] XML-RPC Interface available under: http://shoutussalam.co/xmlrpc.php
  136. [+] Enumerating plugins from passive detection ...
  137. | 4 plugins found:
  138.  
  139. [+] Name: jetpack
  140. | Latest version: 3.8.0
  141. | Location: http://shoutussalam.co/wp-content/plugins/jetpack/
  142. | Changelog: http://shoutussalam.co/wp-content/plugins/jetpack/changelog.txt
  143.  
  144.  
  145. [!] Title: Jetpack <= 2.9.2 - class.jetpack.php XML-RPC Access Control Bypass
  146.  
  147. [!] Title: Jetpack by WordPress.com 3.0-3.4.2 - Cross-Site Scripting (XSS)
  148.  
  149. [!] Title: Jetpack <= 3.5.2 - Unauthenticated DOM Cross-Site Scripting (XSS)
  150.  
  151. [!] Title: Jetpack <= 3.7.0 - Stored Cross-Site Scripting (XSS)
  152.  
  153. [!] Title: Jetpack <= 3.7.0 - Information Disclosure
  154.  
  155. [+] Name: wp-to-twitter
  156. | Latest version: 3.1.8
  157. | Location: http://shoutussalam.co/wp-content/plugins/wp-to-twitter/
  158. | Changelog: http://shoutussalam.co/wp-content/plugins/wp-to-twitter/changelog.txt
  159.  
  160. [+] Name: wptouch-pro-3
  161. | Location: http://shoutussalam.co/wp-content/plugins/wptouch-pro-3/
  162. [!] An error_log file has been found: http://shoutussalam.co/wp-content/plugins/wptouch-pro-3/error_log
  163.  
  164. [+] Name: w3-total-cache
  165. | Latest version: 0.9.4.1
  166. | Location: http://shoutussalam.co/wp-content/plugins/w3-total-cache/
  167.  
  168. [!] Title: W3 Total Cache 0.9.2.4 - Username and Hash Extract
  169.  
  170. [!] Title: W3 Total Cache - Remote Code Execution
  171.  
  172. [!] Title: W3 Total Cache 0.9.4 - Edge Mode Enabling CSRF
  173.  
  174. [!] Title: W3 Total Cache <= 0.9.4 - Cross-Site Request Forgery (CSRF)
  175.  
  176. [!] Title: W3 Total Cache <= 0.9.4 - Debug Mode XSS
  177. ---------------------------------------------------------------------------
  178. + Server: cloudflare-nginx
  179. + Uncommon header 'cf-ray' found, with contents: 2472f199c2b00c89-AMS
  180. + Uncommon header 'x-frame-options' found, with contents: SAMEORIGIN
  181. + Cookie __cfduid created without the httponly flag
  182. + No CGI Directories found (use '-C all' to force check all possible dirs)
  183. + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
  184. + Uncommon header 'x-pingback' found, with contents: http://shoutussalam.co/xmlrpc.php
  185. + Retrieved x-powered-by header: EasyEngine 3.0.5
  186. + 6544 items checked: 24 error(s) and 5 item(s) reported on remote host
  187. + End Time: 2015-11-18 12:10:42 (GMT0) (6606 seconds)
  188. ---------------------------------------------------------------------------
  189.  
  190. Target[5]
  191.  
  192. ---------------------------------------------------------------------------
  193. + Target IP: 192.99.109.25[IPTrace:- CA, QC, Quebec, Montréal, H3A, 45.504002, -73.574699, 0, 0]
  194. + Target Hostname: zad-muslim.com
  195. + Target Port: 80
  196. + Start Time: 2015-11-19 01:25:09 (GMT0)
  197. + Twitter @zadmuslam
  198. ---------------------------------------------------------------------------
  199. Registry Registrant ID:
  200. Registrant Name: Ahmad Rimawi
  201. Registrant Organization:
  202. Registrant Street: Qatar
  203. Registrant Street: Qatar
  204. Registrant City: Qatar
  205. Registrant State/Province: Qatar
  206. Registrant Postal Code: 00970
  207. Registrant Country: Qatar
  208. Registrant Phone: +63.2564485
  209. Registrant Phone Ext:
  210. Registrant Fax Ext:
  211. Registrant Email: eng.rimawi@gmail.com
  212. ---------------------------------------------------------------------------
  213. + Server: Apache
  214. + Retrieved x-powered-by header: PHP/5.4.34
  215. + The anti-clickjacking X-Frame-Options header is not present.
  216. + No CGI Directories found (use '-C all' to force check all possible dirs)
  217. + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
  218. + DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details.
  219. + OSVDB-12184: /index.php/index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
  220. + OSVDB-12184: /index.php/some.php?=PHPE9568F36-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
  221. + OSVDB-12184: /index.php/some.php?=PHPE9568F34-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
  222. + OSVDB-12184: /index.php/some.php?=PHPE9568F35-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
  223. + OSVDB-4231: /index.php/7IiQI.xml: Coccoon from Apache-XML project reveals file system path in error messages.
  224. + 6544 items checked: 3 error(s) and 9 item(s) reported on remote host
  225. + End Time: 2015-11-19 02:25:52 (GMT0) (3643 seconds)
  226. ---------------------------------------------------------------------------
  227.  
  228. Target[6]
  229.  
  230. ---------------------------------------------------------------------------
  231. + Target IP: 162.159.244.119 [IPTrace:- CA, California, San Francisco, 94107, 37.769699, -122.393303, 807, 415]
  232. + Target Hostname: www.mnbr.info
  233. + Target Port: 443
  234. + Start Time: 2015-11-19 02:59:16 (GMT0)
  235.  
  236. ---------------------------------------------------------------------------
  237. Registrant Contact Information: WhoisGuard Protected
  238. ---------------------------------------------------------------------------
  239. + Server: cloudflare-nginx
  240. + The anti-clickjacking X-Frame-Options header is not present.
  241. + No CGI Directories found (use '-C all' to force check all possible dirs)
  242. + 6544 items checked: 0 error(s) and 1 item(s) reported on remote host
  243. + End Time: 2015-11-19 03:24:45 (GMT0) (1529 seconds)
  244. ---------------------------------------------------------------------------
  245. + Target IP: 192.0.78.12
  246. + Target Hostname: ismailabduljabbaralbrazili.wordpress.com
  247. + Admin Page: https://ismailabduljabbaralbrazili.wordpress.com/wp-login.php & https://ismailabduljabbaralbrazili.wordpress.com/wp-admin/
  248. + Target Port: 443
  249. + Start Time: 2015-11-19 09:15:21 (GMT0)
  250. ---------------------------------------------------------------------------
  251. Registrant Contact Information: WhoisGuard Protected
  252. ---------------------------------------------------------------------------
  253. [+] WordPress theme in use: pub
  254.  
  255. [+] Name: pub
  256. | Location: http://ismailabduljabbaralbrazili.wordpress.com/wp-content/themes/pub/
  257. | Style URL: http://ismailabduljabbaralbrazili.wordpress.com/wp-content/themes/pub/style.css
  258. | Referenced style.css: https://s0.wp.com/wp-content/themes/pub/twentytwelve/style.css
  259. ---------------------------------------------------------------------------
  260. + Server: nginx
  261. + The anti-clickjacking X-Frame-Options header is not present.
  262. + Uncommon header 'x-ac' found, with contents: 1.fra
  263. + No CGI Directories found (use '-C all' to force check all possible dirs)
  264. + Server leaks inodes via ETags, header found with file ., fields: 0x5644f323 0x4d1
  265. ---------------------------------------------------------------------------
  266.  
  267. Target[7]
  268.  
  269. ---------------------------------------------------------------------------
  270. + Target IP: 66.155.38.250[IPTrace:- US, GA, Georgia, Atlanta, 30303, 33.751598, -84.391502, 524, 404]
  271. + Target Hostname: jihadology.net
  272. + Admin Page http://jihadology.net/wp-login.php
  273. + Target Port: 80
  274. + Start Time: 2015-11-19 09:40:32 (GMT0)
  275. ---------------------------------------------------------------------------
  276. Registrant Contact Information:
  277. Registry Registrant ID:
  278. Registrant Name: Registration Private
  279. Registrant Organization: Domains By Proxy, LLC
  280. Registrant Street: DomainsByProxy.com
  281. Registrant Street: 14747 N Northsight Blvd Suite 111, PMB 309
  282. Registrant City: Scottsdale
  283. Registrant State/Province: Arizona
  284. Registrant Postal Code: 85260
  285. Registrant Country: United States
  286. Registrant Phone: +1.4806242599
  287. Registrant Phone Ext:
  288. Registrant Fax: +1.4806242598
  289. Registrant Fax Ext:
  290. Registrant Email: Email JIHADOLOGY.NET@domainsbyproxy.com
  291. ---------------------------------------------------------------------------
  292. [+] robots.txt available under: 'http://jihadology.net/robots.txt'
  293. [+] Interesting entry from robots.txt: http://jihadology.net/next/
  294. [+] Interesting entry from robots.txt: http://jihadology.net/mshots/v1/
  295. [+] Interesting entry from robots.txt: http://jihadology.net/activate/
  296. [+] Interesting entry from robots.txt: http://jihadology.net/public.api/
  297. [+] Interesting entry from robots.txt: http://jihadology.net/cgi-bin/
  298. [+] Interesting header: LINK: <http://wp.me/RpVP>; rel=shortlink
  299. [+] Interesting header: SERVER: nginx
  300. [+] Interesting header: X-HACKER: If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header.
  301. [+] Interesting header: X-SHARD: 57
  302. [+] This site has 'Must Use Plugins' (http://codex.wordpress.org/Must_Use_Plugins)
  303. [+] XML-RPC Interface available under: http://jihadology.net/xmlrpc.php
  304. [+] Enumerating plugins from passive detection ...
  305. | 1 plugin found:
  306.  
  307. [+] Name: ie-sitemode
  308. | Location: http://jihadology.net/wp-content/plugins/ie-sitemode/
  309. ---------------------------------------------------------------------------
  310.  
  311. Target[8]
  312.  
  313.  
  314. ---------------------------------------------------------------------------
  315. + Target IP: 192.0.78.13[IPTrace:- US, CA, California, San Francisco, 94110, 37.748402, -122.415604, 807, 415]
  316. + Target Hostname: azelin.wordpress.com
  317. + Target Port: 80
  318. + Start Time: 2015-11-19 11:19:09 (GMT0)
  319. ---------------------------------------------------------------------------
  320. Registrant Contact Information: WhoisGuard Protected
  321. ---------------------------------------------------------------------------
  322. [+] Interesting header: SERVER: nginx
  323. [+] Interesting header: X-AC: 1.ams _dca
  324. [+] This site has 'Must Use Plugins' (http://codex.wordpress.org/Must_Use_Plugins)
  325. [+] XML-RPC Interface available under: http://azelin.wordpress.com/xmlrpc.php
  326. ---------------------------------------------------------------------------
  327. + Server: nginx
  328. + The anti-clickjacking X-Frame-Options header is not present.
  329. + Uncommon header 'x-pingback' found, with contents: http://jihadology.net/xmlrpc.php
  330. + Uncommon header 'x-nananana' found, with contents: Batcache
  331. + Uncommon header 'link' found, with contents: <http://wp.me/RpVP>; rel=shortlink
  332. + Uncommon header 'x-shard' found, with contents: 57
  333. + Uncommon header 'x-hacker' found, with contents: If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header.
  334. + File/dir '/wp-login.php' in robots.txt returned a non-forbidden or redirect HTTP code (302)
  335. + "robots.txt" contains 7 entries which should be manually viewed.
  336. + DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details.
  337. + OSVDB-9392: /userinfo.php?uid=1;: Xoops portal gives detailed error messages including SQL syntax and may allow an exploit.
  338. + OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  339. + OSVDB-3931: /myphpnuke/links.php?op=MostPopular&ratenum=[script]alert(document.cookie);[/script]&ratetype=percent: myphpnuke is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  340. + /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  341. + /modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  342. + OSVDB-4598: /members.asp?SF=%22;}alert(223344);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  343. + OSVDB-2946: /forum_members.asp?find=%22;}alert(9823);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  344. + OSVDB-38019: /?mod=<script>alert(document.cookie)</script>&op=browse: Sage 1.0b3 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  345. + OSVDB-3092: /sitemap.xml: This gives a nice listing of the site content.
  346. + OSVDB-10944: /cgi-bin/: text goes here
  347. ---------------------------------------------------------------------------
  348. + Server banner has changed from 'nginx' to 'squid' which may suggest a WAF, load balancer or proxy is in place
  349. + Uncommon header 'x-squid-error' found, with contents: ERR_ZERO_SIZE_OBJECT 0
  350. + Server leaks inodes via ETags, header found with file /read/rss?forum=nonexistant&rev=0.92, fields: 0xc8c7428c3b3576e6aaa1ee0c3f1d7551
  351. + /wordpress/: A Wordpress installation was found.
  352. + 6544 items checked: 80 error(s) and 22 item(s) reported on remote host
  353. + End Time: 2015-11-19 20:12:55 (GMT0) (16085 seconds)
  354. ---------------------------------------------------------------------------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement