Advertisement
Wave

#OpPedoChat iamgay.us VULNS

Jul 15th, 2012
2,748
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.25 KB | None | 0 0
  1. Twitter -; @WaveAnonops
  2. _____________________________________________________________________________________________
  3. Host's addresses:
  4. iamgay.us
  5. 28800 IN A 64.20.55.150
  6. Name Servers:
  7. ns4.xxx-server.biz 14400 IN A 64.20.55.147
  8. ns.xxx-server.biz 14400 IN A 92.48.84.196
  9. ns3.xxx-server.biz 14400 IN A 64.20.55.146
  10.  
  11. Mail (MX) Servers:
  12. iamgay.us 28790 IN A 64.20.55.150
  13.  
  14. Trying Zone Transfer for iamgay.us on ns.xxx-server.biz ...
  15. iamgay.us 86400 IN SOA
  16. iamgay.us 28800 IN MX
  17. iamgay.us 86400 IN NS
  18. iamgay.us 86400 IN NS
  19. iamgay.us 86400 IN NS
  20. iamgay.us 28800 IN A 64.20.55.150
  21. ftp.iamgay.us 28800 IN CNAME
  22. localhost.iamgay.us 28800 IN A 127.0.0.1
  23. mail.iamgay.us 28800 IN CNAME
  24. www.iamgay.us 28800 IN CNAME
  25.  
  26. ns.xxx-server.biz Bind Version:
  27. 9.6.-ESV-R3
  28. ______________________________________________________________________________________________
  29. Discovered open port 110/tcp on 64.20.55.150
  30. Discovered open port 25/tcp on 64.20.55.150
  31. Discovered open port 22/tcp on 64.20.55.150
  32. Discovered open port 21/tcp on 64.20.55.150
  33. Discovered open port 993/tcp on 64.20.55.150
  34. Discovered open port 3306/tcp on 64.20.55.150
  35. Discovered open port 995/tcp on 64.20.55.150
  36. Discovered open port 53/tcp on 64.20.55.150
  37. Discovered open port 80/tcp on 64.20.55.150
  38. Discovered open port 143/tcp on 64.20.55.150
  39. Discovered open port 443/tcp on 64.20.55.150
  40. Discovered open port 465/tcp on 64.20.55.150
  41. Discovered open port 26/tcp on 64.20.55.150
  42. ______________________________________________________________________________________________
  43. PORT STATE SERVICE VERSION
  44. 21/tcp open ftp PureFTPd
  45. |_ftp-anon: Anonymous FTP login allowed
  46. 22/tcp open ssh OpenSSH 5.8p2_hpn13v11 (FreeBSD 20110503; protocol 2.0)
  47. 25/tcp open smtp Exim smtpd 4.77
  48. 26/tcp open smtp Exim smtpd 4.77
  49. 53/tcp open domain ISC BIND NSD 3.2.10
  50. 80/tcp open tcpwrapped
  51. 110/tcp open pop3 Dovecot pop3d
  52. 143/tcp open imap Dovecot imapd
  53. 443/tcp open tcpwrapped
  54. 465/tcp open ssl/smtp Exim smtpd 4.77
  55. 993/tcp open ssl/imap Dovecot imapd
  56. 995/tcp open ssl/pop3 Dovecot pop3d
  57. 1720/tcp filtered H.323/Q.931
  58. 3306/tcp open mysql MySQL 5.5.20-log
  59. | mysql-info: Protocol: 10
  60. | Version: 5.5.20-log
  61. Service Info: OS: FreeBSD
  62. ______________________________________________________________________________________________
  63.  
  64.  
  65. ________________________________________________________________________________________________
  66. <ROOT>
  67. <SiteVulList>
  68. <VulRow>
  69. <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi?l=botlink</ReferURL>
  70. <Parameter>l=botlink</Parameter>
  71. <Type>String</Type>
  72. <KWordActionURL>function</KWordActionURL>
  73. <Vulnerability>URL SQL INJECTION</Vulnerability>
  74. </VulRow>
  75. <VulRow>
  76. <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi^l=botlink</ReferURL>
  77. <Parameter>l=botlink</Parameter>
  78. <Type>String</Type>
  79. <KWordActionURL>floor</KWordActionURL>
  80. <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
  81. </VulRow>
  82. <VulRow>
  83. <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi?id=377&amp;l=toplist&amp;trade=http://www.gayica.net</ReferURL>
  84. <Parameter>trade=http://www.gayica.net</Parameter>
  85. <Type>String</Type>
  86. <KWordActionURL>naked</KWordActionURL>
  87. <Vulnerability>URL SQL INJECTION</Vulnerability>
  88. </VulRow>
  89. <VulRow>
  90. <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi?id=377&amp;l=toplist^trade=http://www.gayica.net</ReferURL>
  91. <Parameter>trade=http://www.gayica.net</Parameter>
  92. <Type>String</Type>
  93. <KWordActionURL>XMLHttpRequest</KWordActionURL>
  94. <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
  95. </VulRow>
  96. <VulRow>
  97. <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi?l=toplist&amp;trade=http://twinkspix.com/&amp;id=420</ReferURL>
  98. <Parameter>id=420</Parameter>
  99. <Type>String</Type>
  100. <KWordActionURL>action</KWordActionURL>
  101. <Vulnerability>URL SQL INJECTION</Vulnerability>
  102. </VulRow>
  103. <VulRow>
  104. <ReferURL>http://iamgay.us/cgi-bin/atx/out.cgi?l=toplist&amp;trade=http://twinkspix.com/^id=420</ReferURL>
  105. <Parameter>id=420</Parameter>
  106. <Type>Integer</Type>
  107. <KWordActionURL>typeof</KWordActionURL>
  108. <Vulnerability>COOKIE SQL INJECTION</Vulnerability>
  109. </VulRow>
  110. </SiteVulList>
  111. </ROOT>
  112. ________________________________________________________________________________________________
  113. #We are Anonymous
  114. #We are Legion
  115. #We do not Forgive
  116. #We do not forget
  117. #Expect us
  118. #OpPedoChat
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement