Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- By AnonData
- #opParis
- Like, share and Follow for more.
- Websites Will be defaced after Data collections are complete!
- ---------------------------------------------------------------------------
- Target[1]
- ---------------------------------------------------------------------------
- + Target IP: 104.18.58.100 [IPTrace:- US, CA, California, San Francisco, 94107, 37.769699, -122.393303, 807, 415]
- + Target Hostname: jaishalislam.com
- + Target Port: 80
- ---------------------------------------------------------------------------
- Administrative Contact Information
- Registrant Name: islam army
- Registrant Organization: islam army
- Registrant Street: Turkey
- Registrant City: Turkey
- Registrant State/Province: istanbol
- Registrant Postal Code: 0000
- Registrant Country: TR
- Registrant Phone: +90.5357242870
- Registrant Phone Ext:
- Registrant Fax: +90.5357242870
- Registrant Fax Ext:
- Registrant Email: islam-army.com@gmail.com
- Registry Admin ID:
- Admin Name: islam army
- ---------------------------------------------------------------------------
- + Server: cloudflare-nginx
- + Uncommon header 'x-frame-options' found, with contents: SAMEORIGIN
- + Uncommon header 'cf-ray' found, with contents: 2471e63f7cf60491-CDG
- + Cookie __cfduid created without the httponly flag
- + No CGI Directories found
- + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
- + 6544 items checked: 0 error(s) and 3 item(s) reported on remote host
- ---------------------------------------------------------------------------
- Target [2]
- ---------------------------------------------------------------------------
- + Target IP: 104.27.162.228 [IPTrace:- CA, California, San Francisco, 94107, 37.769699, -122.393303, 807, 415]
- + Target Hostname: alfath.org
- + Target Port: 80
- + Start Time: 2015-11-18 08:39:58 (GMT0)
- ---------------------------------------------------------------------------
- Administrative Contact Information: Protected By - WhoisGuard Protected
- ---------------------------------------------------------------------------
- [+] robots.txt available under: 'http://alfath.org/robots.txt'
- [!] Full Path Disclosure (FPD) in 'http://alfath.org/wp-includes/rss-functions.php': /home/alfath/public_html/wp-includes/rss-functions.php
- [+] Interesting header: CF-RAY: 247b29373ef0024a-CDG
- [+] Interesting header: SERVER: cloudflare-nginx
- [+] Interesting header: X-CACHE: MISS
- [+] XML-RPC Interface available under: http://alfath.org/xmlrpc.php
- [!] Upload directory has directory listing enabled: http://alfath.org/wp-content/uploads/
- [+] WordPress version 4.3.1 identified from advanced fingerprinting
- [+] WordPress theme in use: alfathmedia2 - v1.3
- [+] Name: alfathmedia2 - v1.3
- | Location: http://alfath.org/wp-content/themes/alfathmedia2/
- | Readme: http://alfath.org/wp-content/themes/alfathmedia2/readme.txt
- | Style URL: http://alfath.org/wp-content/themes/alfathmedia2/style.css
- | Theme Name: AlfathMedia
- | Theme URI: http://alfath.org/
- | Description: Temporary Template.
- | Author: Mushab Ibn Umair
- | Author URI: http://alfath.org/
- [+] Enumerating plugins from passive detection ...
- | 3 plugins found:
- [+] Name: contact-form-7 - v4.2.2
- | Location: http://alfath.org/wp-content/plugins/contact-form-7/
- | Readme: http://alfath.org/wp-content/plugins/contact-form-7/readme.txt
- [!] The version is out of date, the latest version is 4.3
- [!] Directory listing is enabled: http://alfath.org/wp-content/plugins/contact-form-7/
- [+] Name: responsive-lightbox - v1.6.1
- | Location: http://alfath.org/wp-content/plugins/responsive-lightbox/
- | Readme: http://alfath.org/wp-content/plugins/responsive-lightbox/readme.txt
- [!] The version is out of date, the latest version is 1.6.5
- [+] Name: wp-pagenavi - v2.88
- | Latest version: 2.88 (up to date)
- | Location: http://alfath.org/wp-content/plugins/wp-pagenavi/
- | Readme: http://alfath.org/wp-content/plugins/wp-pagenavi/readme.txt
- [!] Directory listing is enabled: http://alfath.org/wp-content/plugins/wp-pagenavi/
- ---------------------------------------------------------------------------
- + Server: cloudflare-nginx
- + Uncommon header 'cf-ray' found, with contents: 24725e2ed18d0c11-AMS
- + Uncommon header 'x-frame-options' found, with contents: SAMEORIGIN
- + Cookie __cfduid created without the httponly flag
- + No CGI Directories found
- + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
- + 6544 items checked: 0 error(s) and 3 item(s) reported on remote host
- ---------------------------------------------------------------------------
- Target[3]
- ---------------------------------------------------------------------------
- + Target IP: 192.0.78.12 [IPTrace:- US, CA, California, San Francisco, 94110, 37.748402, -122.415604, 807, 415]
- + Target Hostname: millahibrahim.wordpress.com
- + Target Admin Page
- + Target Port: 80
- + Start Time: 2015-11-18 09:42:50 (GMT0)
- ---------------------------------------------------------------------------
- Administrative Contact Information: Protected By - WhoisGuard Protected
- ---------------------------------------------------------------------------
- [+] Interesting header: SERVER: nginx
- [+] Interesting header: X-AC: 1.fra _dca
- [+] This site has 'Must Use Plugins' (http://codex.wordpress.org/Must_Use_Plugins)
- [+] XML-RPC Interface available under: http://millahibrahim.wordpress.com/xmlrpc.php
- ---------------------------------------------------------------------------
- + Server: nginx
- + The anti-clickjacking X-Frame-Options header is not present.
- + Uncommon header 'x-ac' found, with contents: 1.fra _dca
- + Root page / redirects to: https://millahibrahim.wordpress.com/
- + No CGI Directories found
- + Server leaks inodes via ETags, header found with file /, fields: 0x56442a12 0x4d1
- + 6544 items checked: 7 error(s) and 3 item(s) reported on remote host
- ---------------------------------------------------------------------------
- Target[4]
- ---------------------------------------------------------------------------
- + Target IP: 104.27.169.67 [IPTrace:- US, CA, California, San Francisco, 94107, 37.769699, -122.393303, 807, 415]
- + Target Hostname: shoutussalam.co
- + Admin Page http://shoutussalam.co/wp_login & http://shoutussalam.co/admin
- + Target Port: 80
- + Start Time: 2015-11-18 10:20:36 (GMT0)
- ---------------------------------------------------------------------------
- Administrative Contact Information: Protected By - WhoisGuard Protected
- ---------------------------------------------------------------------------
- [+] robots.txt available under: 'http://shoutussalam.co/robots.txt'
- [+] Interesting header: CF-RAY: 247b1f32ba172762-FRA
- [+] Interesting header: SERVER: cloudflare-nginx
- [+] Interesting header: X-POWERED-BY: EasyEngine 3.0.5
- [+] This site has 'Must Use Plugins' (http://codex.wordpress.org/Must_Use_Plugins)
- [+] XML-RPC Interface available under: http://shoutussalam.co/xmlrpc.php
- [+] Enumerating plugins from passive detection ...
- | 4 plugins found:
- [+] Name: jetpack
- | Latest version: 3.8.0
- | Location: http://shoutussalam.co/wp-content/plugins/jetpack/
- | Changelog: http://shoutussalam.co/wp-content/plugins/jetpack/changelog.txt
- [!] Title: Jetpack <= 2.9.2 - class.jetpack.php XML-RPC Access Control Bypass
- [!] Title: Jetpack by WordPress.com 3.0-3.4.2 - Cross-Site Scripting (XSS)
- [!] Title: Jetpack <= 3.5.2 - Unauthenticated DOM Cross-Site Scripting (XSS)
- [!] Title: Jetpack <= 3.7.0 - Stored Cross-Site Scripting (XSS)
- [!] Title: Jetpack <= 3.7.0 - Information Disclosure
- [+] Name: wp-to-twitter
- | Latest version: 3.1.8
- | Location: http://shoutussalam.co/wp-content/plugins/wp-to-twitter/
- | Changelog: http://shoutussalam.co/wp-content/plugins/wp-to-twitter/changelog.txt
- [+] Name: wptouch-pro-3
- | Location: http://shoutussalam.co/wp-content/plugins/wptouch-pro-3/
- [!] An error_log file has been found: http://shoutussalam.co/wp-content/plugins/wptouch-pro-3/error_log
- [+] Name: w3-total-cache
- | Latest version: 0.9.4.1
- | Location: http://shoutussalam.co/wp-content/plugins/w3-total-cache/
- [!] Title: W3 Total Cache 0.9.2.4 - Username and Hash Extract
- [!] Title: W3 Total Cache - Remote Code Execution
- [!] Title: W3 Total Cache 0.9.4 - Edge Mode Enabling CSRF
- [!] Title: W3 Total Cache <= 0.9.4 - Cross-Site Request Forgery (CSRF)
- [!] Title: W3 Total Cache <= 0.9.4 - Debug Mode XSS
- ---------------------------------------------------------------------------
- + Server: cloudflare-nginx
- + Uncommon header 'cf-ray' found, with contents: 2472f199c2b00c89-AMS
- + Uncommon header 'x-frame-options' found, with contents: SAMEORIGIN
- + Cookie __cfduid created without the httponly flag
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
- + Uncommon header 'x-pingback' found, with contents: http://shoutussalam.co/xmlrpc.php
- + Retrieved x-powered-by header: EasyEngine 3.0.5
- + 6544 items checked: 24 error(s) and 5 item(s) reported on remote host
- + End Time: 2015-11-18 12:10:42 (GMT0) (6606 seconds)
- ---------------------------------------------------------------------------
- Target[5]
- ---------------------------------------------------------------------------
- + Target IP: 192.99.109.25[IPTrace:- CA, QC, Quebec, Montréal, H3A, 45.504002, -73.574699, 0, 0]
- + Target Hostname: zad-muslim.com
- + Target Port: 80
- + Start Time: 2015-11-19 01:25:09 (GMT0)
- + Twitter @zadmuslam
- ---------------------------------------------------------------------------
- Registry Registrant ID:
- Registrant Name: Ahmad Rimawi
- Registrant Organization:
- Registrant Street: Qatar
- Registrant Street: Qatar
- Registrant City: Qatar
- Registrant State/Province: Qatar
- Registrant Postal Code: 00970
- Registrant Country: Qatar
- Registrant Phone: +63.2564485
- Registrant Phone Ext:
- Registrant Fax Ext:
- Registrant Email: eng.rimawi@gmail.com
- ---------------------------------------------------------------------------
- + Server: Apache
- + Retrieved x-powered-by header: PHP/5.4.34
- + The anti-clickjacking X-Frame-Options header is not present.
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
- + DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details.
- + OSVDB-12184: /index.php/index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
- + OSVDB-12184: /index.php/some.php?=PHPE9568F36-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
- + OSVDB-12184: /index.php/some.php?=PHPE9568F34-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
- + OSVDB-12184: /index.php/some.php?=PHPE9568F35-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
- + OSVDB-4231: /index.php/7IiQI.xml: Coccoon from Apache-XML project reveals file system path in error messages.
- + 6544 items checked: 3 error(s) and 9 item(s) reported on remote host
- + End Time: 2015-11-19 02:25:52 (GMT0) (3643 seconds)
- ---------------------------------------------------------------------------
- Target[6]
- ---------------------------------------------------------------------------
- + Target IP: 162.159.244.119 [IPTrace:- CA, California, San Francisco, 94107, 37.769699, -122.393303, 807, 415]
- + Target Hostname: www.mnbr.info
- + Target Port: 443
- + Start Time: 2015-11-19 02:59:16 (GMT0)
- ---------------------------------------------------------------------------
- Registrant Contact Information: WhoisGuard Protected
- ---------------------------------------------------------------------------
- + Server: cloudflare-nginx
- + The anti-clickjacking X-Frame-Options header is not present.
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + 6544 items checked: 0 error(s) and 1 item(s) reported on remote host
- + End Time: 2015-11-19 03:24:45 (GMT0) (1529 seconds)
- ---------------------------------------------------------------------------
- + Target IP: 192.0.78.12
- + Target Hostname: ismailabduljabbaralbrazili.wordpress.com
- + Admin Page: https://ismailabduljabbaralbrazili.wordpress.com/wp-login.php & https://ismailabduljabbaralbrazili.wordpress.com/wp-admin/
- + Target Port: 443
- + Start Time: 2015-11-19 09:15:21 (GMT0)
- ---------------------------------------------------------------------------
- Registrant Contact Information: WhoisGuard Protected
- ---------------------------------------------------------------------------
- [+] WordPress theme in use: pub
- [+] Name: pub
- | Location: http://ismailabduljabbaralbrazili.wordpress.com/wp-content/themes/pub/
- | Style URL: http://ismailabduljabbaralbrazili.wordpress.com/wp-content/themes/pub/style.css
- | Referenced style.css: https://s0.wp.com/wp-content/themes/pub/twentytwelve/style.css
- ---------------------------------------------------------------------------
- + Server: nginx
- + The anti-clickjacking X-Frame-Options header is not present.
- + Uncommon header 'x-ac' found, with contents: 1.fra
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Server leaks inodes via ETags, header found with file ., fields: 0x5644f323 0x4d1
- ---------------------------------------------------------------------------
- Target[7]
- ---------------------------------------------------------------------------
- + Target IP: 66.155.38.250[IPTrace:- US, GA, Georgia, Atlanta, 30303, 33.751598, -84.391502, 524, 404]
- + Target Hostname: jihadology.net
- + Admin Page http://jihadology.net/wp-login.php
- + Target Port: 80
- + Start Time: 2015-11-19 09:40:32 (GMT0)
- ---------------------------------------------------------------------------
- Registrant Contact Information:
- Registry Registrant ID:
- Registrant Name: Registration Private
- Registrant Organization: Domains By Proxy, LLC
- Registrant Street: DomainsByProxy.com
- Registrant Street: 14747 N Northsight Blvd Suite 111, PMB 309
- Registrant City: Scottsdale
- Registrant State/Province: Arizona
- Registrant Postal Code: 85260
- Registrant Country: United States
- Registrant Phone: +1.4806242599
- Registrant Phone Ext:
- Registrant Fax: +1.4806242598
- Registrant Fax Ext:
- Registrant Email: Email JIHADOLOGY.NET@domainsbyproxy.com
- ---------------------------------------------------------------------------
- [+] robots.txt available under: 'http://jihadology.net/robots.txt'
- [+] Interesting entry from robots.txt: http://jihadology.net/next/
- [+] Interesting entry from robots.txt: http://jihadology.net/mshots/v1/
- [+] Interesting entry from robots.txt: http://jihadology.net/activate/
- [+] Interesting entry from robots.txt: http://jihadology.net/public.api/
- [+] Interesting entry from robots.txt: http://jihadology.net/cgi-bin/
- [+] Interesting header: LINK: <http://wp.me/RpVP>; rel=shortlink
- [+] Interesting header: SERVER: nginx
- [+] Interesting header: X-HACKER: If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header.
- [+] Interesting header: X-SHARD: 57
- [+] This site has 'Must Use Plugins' (http://codex.wordpress.org/Must_Use_Plugins)
- [+] XML-RPC Interface available under: http://jihadology.net/xmlrpc.php
- [+] Enumerating plugins from passive detection ...
- | 1 plugin found:
- [+] Name: ie-sitemode
- | Location: http://jihadology.net/wp-content/plugins/ie-sitemode/
- ---------------------------------------------------------------------------
- Target[8]
- ---------------------------------------------------------------------------
- + Target IP: 192.0.78.13[IPTrace:- US, CA, California, San Francisco, 94110, 37.748402, -122.415604, 807, 415]
- + Target Hostname: azelin.wordpress.com
- + Target Port: 80
- + Start Time: 2015-11-19 11:19:09 (GMT0)
- ---------------------------------------------------------------------------
- Registrant Contact Information: WhoisGuard Protected
- ---------------------------------------------------------------------------
- [+] Interesting header: SERVER: nginx
- [+] Interesting header: X-AC: 1.ams _dca
- [+] This site has 'Must Use Plugins' (http://codex.wordpress.org/Must_Use_Plugins)
- [+] XML-RPC Interface available under: http://azelin.wordpress.com/xmlrpc.php
- ---------------------------------------------------------------------------
- + Server: nginx
- + The anti-clickjacking X-Frame-Options header is not present.
- + Uncommon header 'x-pingback' found, with contents: http://jihadology.net/xmlrpc.php
- + Uncommon header 'x-nananana' found, with contents: Batcache
- + Uncommon header 'link' found, with contents: <http://wp.me/RpVP>; rel=shortlink
- + Uncommon header 'x-shard' found, with contents: 57
- + Uncommon header 'x-hacker' found, with contents: If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header.
- + File/dir '/wp-login.php' in robots.txt returned a non-forbidden or redirect HTTP code (302)
- + "robots.txt" contains 7 entries which should be manually viewed.
- + DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details.
- + OSVDB-9392: /userinfo.php?uid=1;: Xoops portal gives detailed error messages including SQL syntax and may allow an exploit.
- + OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-3931: /myphpnuke/links.php?op=MostPopular&ratenum=[script]alert(document.cookie);[/script]&ratetype=percent: myphpnuke is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-4598: /members.asp?SF=%22;}alert(223344);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2946: /forum_members.asp?find=%22;}alert(9823);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-38019: /?mod=<script>alert(document.cookie)</script>&op=browse: Sage 1.0b3 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-3092: /sitemap.xml: This gives a nice listing of the site content.
- + OSVDB-10944: /cgi-bin/: text goes here
- ---------------------------------------------------------------------------
- + Server banner has changed from 'nginx' to 'squid' which may suggest a WAF, load balancer or proxy is in place
- + Uncommon header 'x-squid-error' found, with contents: ERR_ZERO_SIZE_OBJECT 0
- + Server leaks inodes via ETags, header found with file /read/rss?forum=nonexistant&rev=0.92, fields: 0xc8c7428c3b3576e6aaa1ee0c3f1d7551
- + /wordpress/: A Wordpress installation was found.
- + 6544 items checked: 80 error(s) and 22 item(s) reported on remote host
- + End Time: 2015-11-19 20:12:55 (GMT0) (16085 seconds)
- ---------------------------------------------------------------------------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement