Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- Nom de l'hôte 14lp.site FAI Cloudflare, Inc.
- Continent Amérique du Nord Drapeau
- US
- Pays Etats-Unis d'Amérique Code du pays US
- Région Caroline du Nord Heure locale 21 Sep 2018 10:07 EDT
- Ville Columbus Code Postal 28722
- Adresse IP (IPv6) 2400:cb00:2048:1::ac40:a902 Latitude 35.222
- Longitude -82.069
- #######################################################################################################################################
- [+] Site analysis: 14lp.site
- [+] CloudFlare IP is 2400:cb00:2048:1::ac40:a802
- [+] Real IP is 93.170.123.74
- [+] Hostname: k.hd.site
- [+] City: Moscow
- [+] Region: RU
- [+] Location: 55.7522,37.6156
- [+] Organization:AS48666 MAROSNET Telecommunication Company LLC
- [+] Email: x9c@93.170.123.74 (93.170.123.74)
- [+] Email: '@93.170.123.74 (93.170.123.74)
- [+] Email: pixel-1537540766628981-web-@93.170.123.74 (93.170.123.74)
- #######################################################################################################################################
- HostIP:93.170.123.74
- HostName:k.hd.site
- Gathered Inet-whois information for 93.170.123.74
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 93.170.123.0 - 93.170.123.255
- netname: TIME-HOST-NET
- descr: PE Gornostay Mikhailo Ivanovich
- country: UA
- org: ORG-PGMI1-RIPE
- admin-c: APGM3-RIPE
- tech-c: APGM3-RIPE
- status: ASSIGNED PA
- mnt-by: RIPE-DB-MNT
- mnt-lower: RIPE-DB-MNT
- mnt-domains: RIPE-DB-MNT
- mnt-routes: RIPE-DB-MNT
- mnt-routes: MAROSNET-MNT
- created: 2014-07-07T17:49:43Z
- last-modified: 2016-11-25T12:28:05Z
- source: RIPE
- organisation: ORG-PGMI1-RIPE
- org-name: PE Gornostay Mikhailo Ivanovich
- org-type: OTHER
- phone: +380636641299
- address: 32 Ivana Pulyuya st., Lviv, Ukraine
- admin-c: APGM3-RIPE
- tech-c: APGM3-RIPE
- abuse-c: APGM3-RIPE
- mnt-ref: RIPE-DB-MNT
- mnt-by: RIPE-DB-MNT
- created: 2014-07-07T17:49:43Z
- last-modified: 2017-10-30T14:48:49Z
- source: RIPE # Filtered
- role: PE Gornostay Mikhailo Ivanovich NOC
- address: 32 Ivana Pulyuya st., Lviv, Ukraine
- phone: +380636641299
- admin-c: MIG29-RIPE
- tech-c: MIG29-RIPE
- nic-hdl: APGM3-RIPE
- abuse-mailbox: admin@time-host.net
- mnt-by: RIPE-DB-MNT
- created: 2014-07-07T17:49:43Z
- last-modified: 2016-11-25T14:17:23Z
- source: RIPE # Filtered
- % Information related to '93.170.123.0/24AS48666'
- route: 93.170.123.0/24
- descr: Client's network
- descr: Moscow, Russia
- descr: http://www.marosnet.ru/
- origin: AS48666
- mnt-by: MAROSNET-MNT
- created: 2015-12-04T22:48:51Z
- last-modified: 2015-12-04T22:48:51Z
- source: RIPE
- % This query was served by the RIPE Database Query Service version 1.92.6 (ANGUS)
- Gathered Inic-whois information for k.hd.site
- ---------------------------------------------------------------------------------------------------------------------------------------
- Error: Unable to connect - Invalid Host
- ERROR: Connection to InicWhois Server site.whois-servers.net failed
- close error
- Gathered Netcraft information for k.hd.site
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for k.hd.site
- Netcraft.com Information gathered
- Gathered Subdomain information for k.hd.site
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 possible subdomain(s) for host k.hd.site, Searched 0 pages containing 0 results
- Gathered E-Mail information for k.hd.site
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host k.hd.site, Searched 0 pages containing 0 results
- Gathered TCP Port information for 93.170.123.74
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 22/tcp open
- 80/tcp open
- Portscan Finished: Scanned 150 ports, 140 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: http://93.170.123.74
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: Welcome to nginx!
- [+] IP address: 93.170.123.74
- [+] Web Server: nginx/1.14.0
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Could NOT Find robots.txt!
- W H O I S L O O K U P
- =======================================================================================================================================
- % This is the RIPE Database query service.
- % The objects are in RPSL format.
- %
- % The RIPE Database is subject to Terms and Conditions.
- % See http://www.ripe.net/db/support/db-terms-conditions.pdf
- %ERROR:201: access denied for 13.68.211.181
- %
- % Queries from your IP address have passed the daily limit of controlled objects.
- % Access from your host has been temporarily denied.
- % For more information, see
- % http://www.ripe.net/data-tools/db/faq/faq-db/why-did-you-receive-the-error-201-access-denied
- % This query was served by the RIPE Database Query Service version 1.92.6 (WAGYU)
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 93.170.123.74
- [i] Country: CZ
- [i] State: N/A
- [i] City: N/A
- [i] Latitude: 50.084801
- [i] Longitude: 14.411200
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Server: nginx/1.14.0
- [i] Date: Fri, 21 Sep 2018 14:17:32 GMT
- [i] Content-Type: text/html
- [i] Content-Length: 612
- [i] Last-Modified: Tue, 17 Apr 2018 15:22:36 GMT
- [i] Connection: close
- [i] ETag: "5ad6113c-264"
- [i] Accept-Ranges: bytes
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 93.170.123.74
- Network = 93.170.123.74 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 93.170.123.74 - 93.170.123.74 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2018-09-21 14:17 UTC
- Nmap scan report for k.hd.site (93.170.123.74)
- Host is up (0.12s latency).
- PORT STATE SERVICE
- 21/tcp closed ftp
- 22/tcp open ssh
- 23/tcp closed telnet
- 80/tcp open http
- 110/tcp closed pop3
- 143/tcp closed imap
- 443/tcp closed https
- 3389/tcp closed ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds
- #######################################################################################################################################
- [?] Enter the target: 93.170.123.74
- [!] IP Address : 93.170.123.74
- [!] Server: nginx/1.14.0
- [+] Clickjacking protection is not in place.
- [+] Operating System : Ubuntu
- [!] 93.170.123.74 doesn't seem to use a CMS
- [+] Honeypot Probabilty: 30%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for 93.170.123.74
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/93.170.123.74
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp closed ftp
- 22/tcp open ssh
- 23/tcp closed telnet
- 80/tcp open http
- 110/tcp closed pop3
- 143/tcp closed imap
- 443/tcp closed https
- 3389/tcp closed ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 4.36 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- ######################################################################################################################################
- Start: 2018-09-21T14:19:59+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.201 0.0% 3 2.0 1.4 1.0 2.0 0.5
- 2.|-- 45.79.12.4 0.0% 3 0.8 0.8 0.5 1.2 0.3
- 3.|-- dls-b22-link.telia.net 0.0% 3 1.0 1.0 1.0 1.0 0.0
- 4.|-- atl-b22-link.telia.net 0.0% 3 19.5 19.3 19.1 19.5 0.2
- 5.|-- ash-bb4-link.telia.net 0.0% 3 158.5 158.7 158.5 158.9 0.2
- 6.|-- nyk-bb4-link.telia.net 0.0% 3 153.2 153.7 153.2 154.6 0.8
- 7.|-- kbn-bb4-link.telia.net 0.0% 3 159.5 158.8 158.2 159.5 0.6
- 8.|-- s-bb4-link.telia.net 0.0% 3 153.9 153.9 153.9 154.0 0.1
- 9.|-- mow-b4-link.telia.net 0.0% 3 157.6 157.6 157.4 157.7 0.1
- 10.|-- marosnet.msk.cloud-ix.net 0.0% 3 169.8 169.6 169.3 169.8 0.2
- 11.|-- 94.142.138.40 0.0% 3 171.5 170.7 170.2 171.5 0.7
- 12.|-- srv02.ovz-ssd.time-host.net 0.0% 3 165.8 165.6 165.2 165.8 0.4
- 13.|-- k.hd.site 0.0% 3 173.6 173.7 173.6 173.8 0.1
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-21 10:18 EDT
- Nmap scan report for k.hd.site (93.170.123.74)
- Host is up (0.50s latency).
- Not shown: 468 closed ports, 6 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 22/tcp open ssh
- 80/tcp open http
- Nmap done: 1 IP address (1 host up) scanned in 7.60 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-21 10:18 EDT
- Nmap scan report for k.hd.site (93.170.123.74)
- Host is up.
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp open|filtered netbios-ns
- 138/udp open|filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- + -- --=[Port 21 closed... skipping.
- + -- --=[Port 22 opened... running tests...
- modes/normal.sh: ligne 258 : [: trop d'arguments
- # general
- (gen) banner: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.10
- (gen) software: OpenSSH 6.6.1p1
- (gen) compatibility: OpenSSH 6.5-6.6, Dropbear SSH 2013.62+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (key) ssh-ed25519 -- [info] available since OpenSSH 6.5
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
- (enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
- (enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
- `- [info] default cipher since OpenSSH 6.9.
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 2.1.0
- (enc) rijndael-cbc@lysator.liu.se -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- # message authentication code algorithms
- (mac) hmac-md5-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 6.2
- (mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
- (mac) hmac-ripemd160-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [info] available since OpenSSH 6.2
- (mac) hmac-sha1-96-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) hmac-md5-96-etm@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 6.2
- (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 6.2
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.5.0
- (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.1.0
- (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
- (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0
- # algorithm recommendations (for OpenSSH 6.6.1)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
- (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
- (rec) -ssh-dss -- key algorithm to remove
- (rec) -arcfour -- enc algorithm to remove
- (rec) -rijndael-cbc@lysator.liu.se -- enc algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -arcfour256 -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -arcfour128 -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-sha2-512 -- mac algorithm to remove
- (rec) -hmac-md5-96 -- mac algorithm to remove
- (rec) -hmac-md5-etm@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1-96-etm@openssh.com -- mac algorithm to remove
- (rec) -hmac-ripemd160-etm@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5-96-etm@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha2-256 -- mac algorithm to remove
- (rec) -hmac-ripemd160 -- mac algorithm to remove
- (rec) -umac-128@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1-96 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5 -- mac algorithm to remove
- (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- (rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
- (rec) -umac-64-etm@openssh.com -- mac algorithm to remove
- backup is a valid user!
- mail is a valid user!
- nobody is a valid user!
- postfix is a valid user!
- root is a valid user!
- sys is a valid user!
- www-data is a valid user!
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-21 10:19 EDT
- Nmap scan report for k.hd.site (93.170.123.74)
- Host is up (0.086s latency).
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: firewall|general purpose
- Running: Linux 2.4.X|2.6.X, ISS embedded
- OS CPE: cpe:/o:linux:linux_kernel:2.4.18 cpe:/h:iss:proventia_gx3002 cpe:/o:linux:linux_kernel:2.6.22
- OS details: ISS Proventia GX3002 firewall (Linux 2.4.18), Linux 2.6.22 (Debian 4.0)
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 ... 30
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 11.68 seconds
- .:okOOOkdc' 'cdkOOOko:.
- .xOOOOOOOOOOOOc cOOOOOOOOOOOOx.
- :OOOOOOOOOOOOOOOk, ,kOOOOOOOOOOOOOOO:
- 'OOOOOOOOOkkkkOOOOO: :OOOOOOOOOOOOOOOOOO'
- oOOOOOOOO.MMMM.oOOOOoOOOOl.MMMM,OOOOOOOOo
- dOOOOOOOO.MMMMMM.cOOOOOc.MMMMMM,OOOOOOOOx
- lOOOOOOOO.MMMMMMMMM;d;MMMMMMMMM,OOOOOOOOl
- .OOOOOOOO.MMM.;MMMMMMMMMMM;MMMM,OOOOOOOO.
- cOOOOOOO.MMM.OOc.MMMMM'oOO.MMM,OOOOOOOc
- oOOOOOO.MMM.OOOO.MMM:OOOO.MMM,OOOOOOo
- lOOOOO.MMM.OOOO.MMM:OOOO.MMM,OOOOOl
- ;OOOO'MMM.OOOO.MMM:OOOO.MMM;OOOO;
- .dOOo'WM.OOOOocccxOOOO.MX'xOOd.
- ,kOl'M.OOOOOOOOOOOOO.M'dOk,
- :kk;.OOOOOOOOOOOOO.;Ok:
- ;kOOOOOOOOOOOOOOOk:
- ,xOOOOOOOOOOOx,
- .lOOOOOOOl.
- ,dOd,
- .
- =[ metasploit v4.17.13-dev ]
- + -- --=[ 1808 exploits - 1028 auxiliary - 313 post ]
- + -- --=[ 539 payloads - 42 encoders - 10 nops ]
- + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- USER_FILE => /brutex/wordlists/simple-users.txt
- RHOSTS => 93.170.123.74
- RHOST => 93.170.123.74
- [+] 93.170.123.74:22 - SSH server version: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.10 ( service.version=6.6.1p1 openssh.comment=Ubuntu-2ubuntu2.10 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.cpe23=cpe:/a:openbsd:openssh:{service.version} os.vendor=Ubuntu os.device=General os.family=Linux os.product=Linux os.version=14.04 os.cpe23=cpe:/o:canonical:ubuntu_linux:14.04 service.protocol=ssh fingerprint_db=ssh.banner )
- [*] 93.170.123.74:22 - Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE.
- [-] Auxiliary failed: Msf::OptionValidateError The following options failed to validate: USER_FILE, KEY_FILE.
- [+] 93.170.123.74:22 - SSH server version: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.10 ( service.version=6.6.1p1 openssh.comment=Ubuntu-2ubuntu2.10 service.vendor=OpenBSD service.family=OpenSSH service.product=OpenSSH service.cpe23=cpe:/a:openbsd:openssh:{service.version} os.vendor=Ubuntu os.device=General os.family=Linux os.product=Linux os.version=14.04 os.cpe23=cpe:/o:canonical:ubuntu_linux:14.04 service.protocol=ssh fingerprint_db=ssh.banner )
- [*] 93.170.123.74:22 - Scanned 1 of 1 hosts (100% complete)
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://93.170.123.74
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 14
- #######################################################################################################################################
- http://93.170.123.74 [200 OK] Country[CZECH REPUBLIC][CZ], HTML5, HTTPServer[nginx/1.14.0], IP[93.170.123.74], Title[Welcome to nginx!], nginx[1.14.0]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://93.170.123.74...
- __________________ SITE INFO __________________
- IP Title
- 93.170.123.74 Welcome to nginx!
- ___________________ VERSION ___________________
- Name Versions Type
- nginx 1.14.0 Platform
- _______________________________________________
- Time: 101.3 sec Urls: 599 Fingerprints: 40401
- #######################################################################################################################################
- Anonymous JTSEC #OpDeathEathers full Recon #13
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement