Advertisement
Guest User

#OPBeast JTSEC Anonymous #24

a guest
Oct 23rd, 2017
2,573
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 296.12 KB | None | 0 0
  1. #######################################################################################################################################
  2. Hostname www.getdogsex.com ISP FranTech Solutions (AS53667)
  3. Continent North America Flag
  4. US
  5. Country United States Country Code US (USA)
  6. Region NV Local time 22 Oct 2017 21:14 PDT
  7. Metropolis* Las Vegas Postal Code 89101
  8. City Las Vegas Latitude 36.175
  9. IP Address 209.141.38.134 Longitude -115.137
  10. ######################################################################################################################################
  11. [i] Scanning Site: http://getdogsex.com
  12.  
  13.  
  14.  
  15. B A S I C I N F O
  16. ====================
  17.  
  18.  
  19. [+] Site Title: Get dog sex
  20. [+] IP address: 185.181.102.198
  21. [+] Web Server: nginx/1.10.3 (Ubuntu)
  22. [+] CMS: Could Not Detect
  23. [+] Cloudflare: Not Detected
  24. [+] Robots File: Could NOT Find robots.txt!
  25.  
  26.  
  27.  
  28.  
  29. W H O I S L O O K U P
  30. ========================
  31.  
  32. Domain Name: GETDOGSEX.COM
  33. Registry Domain ID: 1828816506_DOMAIN_COM-VRSN
  34. Registrar WHOIS Server: whois.namesilo.com
  35. Registrar URL: http://www.namesilo.com
  36. Updated Date: 2017-09-23T09:15:02Z
  37. Creation Date: 2013-09-25T10:49:30Z
  38. Registry Expiry Date: 2018-09-25T10:49:30Z
  39. Registrar: NameSilo, LLC
  40. Registrar IANA ID: 1479
  41. Registrar Abuse Contact Email: abuse@namesilo.com
  42. Registrar Abuse Contact Phone: +1.4805240066
  43. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  44. Name Server: NS1.GREYBISON.COM
  45. Name Server: NS2.GREYBISON.COM
  46. DNSSEC: unsigned
  47. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  48. >>> Last update of whois database: 2017-10-23T04:19:14Z <<<
  49.  
  50. For more information on Whois status codes, please visit https://icann.org/epp
  51.  
  52. NOTICE: The expiration date displayed in this record is the date the
  53. registrar's sponsorship of the domain name registration in the registry is
  54. currently set to expire. This date does not necessarily reflect the expiration
  55. date of the domain name registrant's agreement with the sponsoring
  56. registrar. Users may consult the sponsoring registrar's Whois database to
  57. view the registrar's reported date of expiration for this registration.
  58.  
  59.  
  60. The Registry database contains ONLY .COM, .NET, .EDU domains and
  61. Registrars.
  62.  
  63.  
  64.  
  65.  
  66. G E O I P L O O K U P
  67. =========================
  68.  
  69. [i] IP Address: 185.165.168.153
  70. [i] Country: SC
  71. [i] State: N/A
  72. [i] City: N/A
  73. [i] Latitude: -4.583300
  74. [i] Longitude: 55.666698
  75.  
  76.  
  77.  
  78.  
  79. H T T P H E A D E R S
  80. =======================
  81.  
  82.  
  83. [i] HTTP/1.1 200 OK
  84. [i] Server: nginx/1.10.3 (Ubuntu)
  85. [i] Date: Mon, 23 Oct 2017 04:19:28 GMT
  86. [i] Content-Type: text/html; charset=utf-8
  87. [i] Content-Length: 429886
  88. [i] Connection: close
  89. [i] Status: 200 OK
  90. [i] X-Powered-By: Express
  91. [i] Cache-Control: no-cache, no-store, must-revalidate
  92. [i] ETag: W/"68f3e-z9MpyhgMA/yjpP4XNg63nLQlhX8"
  93. [i] Pragma: no-cache
  94. [i] Expires: 0
  95. [i] Set-Cookie: connect.sid=s%3AC7TEcUMmLzIrSG1WWIgGntUQgMzJ1GPu.VRx9fHhy35nKpIMzusIz1dfCe8FhEAh4LJRqc5r2ego; Path=/; Expires=Mon, 30 Oct 2017 04:19:28 GMT; HttpOnly
  96. [i] Set-Cookie: _passenger_route=2122608685; Path=/
  97. [i] X-Powered-By: Phusion Passenger 5.1.11
  98. [i] X-Proxy-Cache: MISS
  99.  
  100.  
  101.  
  102.  
  103. D N S L O O K U P
  104. ===================
  105.  
  106. getdogsex.com. 86376 IN A 185.62.190.188
  107. getdogsex.com. 86376 IN A 185.181.102.198
  108. getdogsex.com. 86376 IN A 198.251.80.112
  109. getdogsex.com. 86376 IN A 46.166.173.125
  110. getdogsex.com. 86376 IN A 198.251.89.87
  111. getdogsex.com. 86376 IN A 209.141.38.134
  112. getdogsex.com. 86376 IN A 94.156.189.106
  113. getdogsex.com. 86376 IN A 95.153.31.209
  114. getdogsex.com. 86376 IN A 185.11.146.211
  115. getdogsex.com. 86376 IN A 185.165.168.153
  116. getdogsex.com. 86400 IN NS ns1.greybison.com.
  117. getdogsex.com. 86400 IN NS ns2.greybison.com.
  118. getdogsex.com. 86400 IN SOA ns1.greybison.com. hostmaster.greybison.com. 2017102301 28800 7200 1209600 86400
  119.  
  120.  
  121.  
  122.  
  123. S U B N E T C A L C U L A T I O N
  124. ====================================
  125.  
  126. Address = 185.11.146.211
  127. Network = 185.11.146.211 / 32
  128. Netmask = 255.255.255.255
  129. Broadcast = not needed on Point-to-Point links
  130. Wildcard Mask = 0.0.0.0
  131. Hosts Bits = 0
  132. Max. Hosts = 1 (2^0 - 0)
  133. Host Range = { 185.11.146.211 - 185.11.146.211 }
  134.  
  135.  
  136.  
  137. N M A P P O R T S C A N
  138. ============================
  139.  
  140.  
  141. Starting Nmap 7.01 ( https://nmap.org ) at 2017-10-23 04:19 UTC
  142. Nmap scan report for getdogsex.com (185.11.146.211)
  143. Host is up (0.083s latency).
  144. Other addresses for getdogsex.com (not scanned): 185.165.168.153 185.62.190.188 185.181.102.198 198.251.80.112 46.166.173.125 198.251.89.87 209.141.38.134 94.156.189.106 95.153.31.209
  145. rDNS record for 185.11.146.211: r12.greybison.com
  146. PORT STATE SERVICE VERSION
  147. 21/tcp filtered ftp
  148. 22/tcp filtered ssh
  149. 23/tcp filtered telnet
  150. 25/tcp filtered smtp
  151. 80/tcp open http nginx 1.10.3 (Ubuntu)
  152. 110/tcp filtered pop3
  153. 143/tcp filtered imap
  154. 443/tcp filtered https
  155. 445/tcp filtered microsoft-ds
  156. 3389/tcp filtered ms-wbt-server
  157. Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
  158.  
  159. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  160. Nmap done: 1 IP address (1 host up) scanned in 8.66 seconds
  161.  
  162.  
  163.  
  164. S U B - D O M A I N F I N D E R
  165. ==================================
  166.  
  167.  
  168. [i] Total Subdomains Found : 10
  169.  
  170. [+] Subdomain: getdogsex.com
  171. [-] IP: 185.165.168.153
  172.  
  173. [+] Subdomain: getdogsex.com
  174. [-] IP: 185.62.190.188
  175.  
  176. [+] Subdomain: getdogsex.com
  177. [-] IP: 198.251.80.112
  178.  
  179. [+] Subdomain: getdogsex.com
  180. [-] IP: 94.156.189.106
  181.  
  182. [+] Subdomain: getdogsex.com
  183. [-] IP: 185.11.146.211
  184.  
  185. [+] Subdomain: getdogsex.com
  186. [-] IP: 185.181.102.198
  187.  
  188. [+] Subdomain: getdogsex.com
  189. [-] IP: 198.251.89.87
  190.  
  191. [+] Subdomain: getdogsex.com
  192. [-] IP: 209.141.38.134
  193.  
  194. [+] Subdomain: getdogsex.com
  195. [-] IP: 46.166.173.125
  196.  
  197. [+] Subdomain: getdogsex.com
  198. [-] IP: 95.153.31.209
  199. % This is the RIPE Database query service.
  200. % The objects are in RPSL format.
  201. %
  202. % The RIPE Database is subject to Terms and Conditions.
  203. % See http://www.ripe.net/db/support/db-terms-conditions.pdf
  204.  
  205. % Note: this output has been filtered.
  206. % To receive output for a database update, use the "-B" flag.
  207.  
  208. % Information related to '185.181.100.0 - 185.181.103.255'
  209.  
  210. % Abuse contact for '185.181.100.0 - 185.181.103.255' is 'abuse@m247.ro'
  211.  
  212. inetnum: 185.181.100.0 - 185.181.103.255
  213. netname: RO-M247EUROPE-20161209
  214. country: RO
  215. org: ORG-MES8-RIPE
  216. admin-c: AS38520-RIPE
  217. tech-c: AS38520-RIPE
  218. status: ALLOCATED PA
  219. mnt-by: RIPE-NCC-HM-MNT
  220. mnt-by: M247-EU-MNT
  221. mnt-domains: M247-EU-MNT
  222. created: 2016-12-09T13:20:52Z
  223. last-modified: 2016-12-09T16:00:50Z
  224. source: RIPE
  225.  
  226. organisation: ORG-MES8-RIPE
  227. org-name: M247 Europe SRL
  228. org-type: LIR
  229. address: Sos. Fabrica de Glucoza, Nr 11B, Sector 2
  230. address: 020331
  231. address: Bucharest
  232. address: ROMANIA
  233. admin-c: AS38520-RIPE
  234. tech-c: AS38520-RIPE
  235. abuse-c: AR38608-RIPE
  236. mnt-ref: M247-EU-MNT
  237. mnt-by: RIPE-NCC-HM-MNT
  238. mnt-by: M247-EU-MNT
  239. created: 2016-12-08T16:08:37Z
  240. last-modified: 2016-12-09T13:23:50Z
  241. source: RIPE # Filtered
  242. phone: +40310800700
  243.  
  244. person: Alin Stefanescu
  245. address: Sos. Fabrica de Glucoza, Nr 11B, Sector 2
  246. address: 020331
  247. address: Bucharest
  248. address: ROMANIA
  249. phone: +40310800700
  250. nic-hdl: AS38520-RIPE
  251. mnt-by: M247-EU-MNT
  252. created: 2016-12-08T16:08:36Z
  253. last-modified: 2016-12-08T16:08:36Z
  254. source: RIPE
  255.  
  256. % Information related to '185.181.102.0/23AS9009'
  257.  
  258. route: 185.181.102.0/23
  259. descr: M247 Europe
  260. origin: AS9009
  261. mnt-by: M247-EU-MNT
  262. created: 2016-12-09T15:31:47Z
  263. last-modified: 2016-12-09T15:31:47Z
  264. source: RIPE
  265.  
  266. % This query was served by the RIPE Database Query Service version 1.90 (HEREFORD)
  267. [*] Performing TLD Brute force Enumeration against 185.181.102.198
  268. [*] The operation could take up to: 00:01:07
  269. [*] A 185.biz.af 5.45.75.45
  270. [*] CNAME 185.am num1.dcoin.co
  271. [*] A num1.dcoin.co 104.160.171.93
  272. [*] A 185.at 52.0.217.44
  273. [*] A 185.co.asia 91.195.240.135
  274. [*] CNAME 185.biz.at free.biz.at
  275. [*] A free.biz.at 216.92.134.29
  276. [*] A 185.com.au 27.124.118.252
  277. [*] A 185.net.au 203.170.80.250
  278. [*] A 185.org.aw 142.4.20.12
  279. [*] A 185.com.ax 185.55.85.123
  280. [*] A 185.org.ax 185.55.85.123
  281. [*] A 185.co.ba 176.9.45.78
  282. [*] A 185.com.ba 195.222.33.180
  283. [*] A 185.com.be 95.173.170.166
  284. [*] A 185.be 188.93.153.90
  285. [*] A 185.biz.by 71.18.52.2
  286. [*] A 185.biz.bz 199.59.242.150
  287. [*] A 185.ca 185.53.178.8
  288. [*] A 185.by 185.66.70.12
  289. [*] A 185.net.cc 54.252.89.206
  290. [*] A 185.com.cc 54.252.107.64
  291. [*] A 185.co.cc 175.126.123.219
  292. [*] A 185.org.ch 72.52.4.122
  293. [*] A 185.bz 8.8.8.8
  294. [*] A 185.co.cm 85.25.140.105
  295. [*] A 185.biz.cl 185.53.178.8
  296. [*] A 185.net.cm 85.25.140.105
  297. [*] A 185.cn 115.159.71.66
  298. [*] A 185.com.cn 115.159.71.66
  299. [*] CNAME 185.cm cm.cmsms.com
  300. [*] A cm.cmsms.com 113.10.149.42
  301. [*] CNAME 185.net.cn cs.ename.net
  302. [*] A cs.ename.net 203.78.142.12
  303. [*] CNAME 185.biz.cm i.cns.cm
  304. [*] A i.cns.cm 118.184.56.30
  305. [*] A 185.com 199.59.242.150
  306. [*] A 185.com.com 52.33.196.199
  307. [*] A 185.net.com 199.59.242.150
  308. [*] A 185.co.com 173.192.115.17
  309. [*] A 185.org.com 23.23.86.44
  310. [*] CNAME 185.co 55996.com
  311. [*] A 55996.com 103.30.43.176
  312. [*] A 185.biz.cr 72.52.4.122
  313. [*] A 185.biz.cx 72.52.4.122
  314. [*] A 185.net.cz 80.250.24.177
  315. [*] A 185.biz.cz 185.53.179.7
  316. [*] A 185.com.cz 62.109.128.30
  317. [*] A 185.de 185.53.178.6
  318. [*] A 185.com.de 50.56.68.37
  319. [*] CNAME 185.co.de co.de
  320. [*] A co.de 144.76.162.245
  321. [*] CNAME 185.org.de www.org.de
  322. [*] A www.org.de 78.47.128.8
  323. [*] A 185.dk 46.30.213.65
  324. [*] A 185.es 124.248.220.28
  325. [*] A 185.eu 109.106.167.8
  326. [*] A 185.net.eu 78.46.90.98
  327. [*] A 185.org.eu 78.46.90.98
  328. [*] A 185.biz.fi 185.55.85.123
  329. [*] A 185.fm 173.230.131.38
  330. [*] A 185.biz.fm 173.230.131.38
  331. [*] A 185.fr 54.154.249.91
  332. [*] A 185.fr 52.210.123.134
  333. [*] A 185.fr 52.210.228.97
  334. [*] A 185.org.fr 149.202.133.35
  335. [*] A 185.biz.gl 72.52.4.122
  336. [*] CNAME 185.co.gp co.gp
  337. [*] A co.gp 144.76.162.245
  338. [*] A 185.gs 199.59.242.150
  339. [*] A 185.co.hn 208.100.40.203
  340. [*] CNAME 185.net.hr net.hr
  341. [*] A net.hr 192.0.78.25
  342. [*] A net.hr 192.0.78.24
  343. [*] A 185.co.ht 72.52.4.122
  344. [*] CNAME 185.biz.hn parkmydomain.vhostgo.com
  345. [*] CNAME parkmydomain.vhostgo.com westuser.dopa.com
  346. [*] A westuser.dopa.com 107.186.245.119
  347. [*] A 185.id 203.119.112.50
  348. [*] A 185.hk 104.31.178.10
  349. [*] A 185.hk 104.31.179.10
  350. [*] A 185.co.il 207.232.1.251
  351. [*] A 185.im 103.224.250.62
  352. [*] A 185.co.in 72.52.4.122
  353. [*] A 185.in 106.187.36.137
  354. [*] A 185.io 184.168.221.52
  355. [*] CNAME 185.info loveshine.gotoip2.com
  356. [*] CNAME loveshine.gotoip2.com hkvhost628.800cdn.com
  357. [*] A hkvhost628.800cdn.com 218.247.82.47
  358. [*] A 185.it 46.37.14.18
  359. [*] A 185.it 46.37.14.7
  360. [*] A 185.it 46.37.14.27
  361. [*] A 185.com.jobs 50.19.241.165
  362. [*] A 185.co.jobs 50.17.193.222
  363. [*] A 185.net.jobs 50.19.241.165
  364. [*] A 185.biz.jobs 50.19.241.165
  365. [*] A 185.org.jobs 50.19.241.165
  366. [*] A 185.jp 49.212.61.86
  367. [*] A 185.co.jp 49.212.122.170
  368. [*] A 185.kz 195.210.46.35
  369. [*] AAAA 185.kz 2a00:5da0:1000::117
  370. [*] A 185.co.kr 110.45.146.30
  371. [*] CNAME 185.biz.li 712936.parkingcrew.net
  372. [*] A 712936.parkingcrew.net 185.53.179.29
  373. [*] A 185.biz.lu 195.26.5.2
  374. [*] A 185.lv 72.52.4.121
  375. [*] A 185.biz.ly 64.136.20.39
  376. [*] A 185.biz.md 72.52.4.122
  377. [*] A 185.co.mk 87.76.31.211
  378. [*] A 185.me 183.90.186.199
  379. [*] A 185.me 183.90.185.111
  380. [*] A 185.co.mobi 54.225.105.179
  381. [*] A 185.com.mx 69.49.115.40
  382. [*] A 185.biz.my 202.190.174.44
  383. [*] A 185.co.net 188.166.216.219
  384. [*] A 185.net.net 52.50.81.210
  385. [*] A 185.net 203.124.13.216
  386. [*] A 185.org.net 23.23.86.44
  387. [*] A 185.co.nl 37.97.184.204
  388. [*] A 185.com.nl 83.98.157.102
  389. [*] A 185.net.nl 83.98.157.102
  390. [*] A 185.no 194.63.248.70
  391. [*] AAAA 185.no 2a01:5b40:0:4070::1
  392. [*] A 185.co.nr 208.100.40.202
  393. [*] A 185.nu 72.52.4.121
  394. [*] CNAME 185.co.nu co.nu
  395. [*] A co.nu 144.76.162.245
  396. [*] A 185.com.nu 144.76.162.245
  397. [*] A 185.net.nu 199.102.76.78
  398. [*] A 185.org.nu 80.92.84.139
  399. [*] A 185.co.nz 198.1.94.193
  400. [*] A 185.com.org 23.23.86.44
  401. [*] CNAME 185.net.org pewtrusts.org
  402. [*] A pewtrusts.org 204.74.99.100
  403. [*] A 185.nl 52.58.78.16
  404. [*] CNAME 185.org cs.ename.net
  405. [*] A cs.ename.net 203.78.142.12
  406. [*] A 185.pe 210.209.70.228
  407. [*] A 185.ph 45.79.222.138
  408. [*] A 185.co.ph 45.79.222.138
  409. [*] A 185.com.ph 45.79.222.138
  410. [*] A 185.net.ph 45.79.222.138
  411. [*] A 185.org.ph 45.79.222.138
  412. [*] A 185.co.pl 212.91.6.55
  413. [*] A 185.org.pm 208.73.210.217
  414. [*] A 185.org.pm 208.73.211.177
  415. [*] A 185.org.pm 208.73.210.202
  416. [*] A 185.org.pm 208.73.211.165
  417. [*] A 185.pm 72.52.4.121
  418. [*] A 185.co.ps 66.96.132.56
  419. [*] A 185.co.pt 194.107.127.52
  420. [*] CNAME 185.biz.ps biz.ps
  421. [*] A biz.ps 144.76.162.245
  422. [*] A 185.co.pw 141.8.226.59
  423. [*] A 185.net.pw 141.8.226.59
  424. [*] A 185.biz.pw 141.8.226.59
  425. [*] A 185.org.pw 141.8.226.59
  426. [*] A 185.pl 212.91.7.33
  427. [*] A 185.pl 212.91.6.58
  428. [*] CNAME 185.co.ro now.co.ro
  429. [*] A now.co.ro 185.27.255.9
  430. [*] A 185.org.re 217.70.184.38
  431. [*] A 185.net.ro 69.64.52.127
  432. [*] A 185.pw 106.184.1.114
  433. [*] A 185.ru 109.70.27.4
  434. [*] A 185.com.ru 178.210.89.119
  435. [*] A 185.biz.sb 72.52.4.122
  436. [*] A 185.biz.se 185.53.179.6
  437. [*] CNAME 185.net.se 773147.parkingcrew.net
  438. [*] A 773147.parkingcrew.net 185.53.179.29
  439. [*] A 185.co.sl 91.195.240.135
  440. [*] A 185.se 45.32.232.250
  441. [*] A 185.com.sr 143.95.106.249
  442. [*] A 185.co.su 72.52.4.122
  443. [*] A 185.biz.st 91.121.28.115
  444. [*] A 185.biz.tc 64.136.20.39
  445. [*] A 185.biz.tf 85.236.153.18
  446. [*] A 185.net.tf 188.40.70.29
  447. [*] A 185.net.tf 188.40.117.12
  448. [*] A 185.net.tf 188.40.70.27
  449. [*] A 185.tk 195.20.44.202
  450. [*] A 185.tel 52.50.143.27
  451. [*] A 185.co.tl 208.100.40.202
  452. [*] A 185.co.to 175.118.124.44
  453. [*] A 185.co.tv 31.186.25.163
  454. [*] A 185.biz.tv 72.52.4.122
  455. [*] A 185.org.tv 72.52.4.122
  456. [*] A 185.com.tw 45.40.165.9
  457. [*] A 185.co.uk 87.106.142.81
  458. [*] A 185.us 184.168.221.48
  459. [*] CNAME 185.biz.uz biz.uz
  460. [*] A biz.uz 144.76.162.245
  461. [*] A 185.vg 88.198.29.97
  462. [*] A 185.co.vg 88.198.29.97
  463. [*] A 185.com.vg 88.198.29.97
  464. [*] A 185.net.vg 166.62.28.147
  465. [*] A 185.biz.vg 89.31.143.20
  466. [*] A 185.com.ws 202.4.48.211
  467. [*] A 185.net.ws 202.4.48.211
  468. [*] A 185.org.ws 202.4.48.211
  469. [*] A 185.ws 64.70.19.34
  470. [*] A 185.biz.ws 184.168.221.104
  471. [*] A 185.co.za 129.232.190.210
  472. [*] A 185.vc 23.234.27.209
  473. [92m + -- ----------------------------=[Running Nslookup]=------------------------ -- +
  474. Server: 192.168.1.254
  475. Address: 192.168.1.254#53
  476.  
  477. Non-authoritative answer:
  478. Name: getdogsex.com
  479. Address: 198.251.80.112
  480. Name: getdogsex.com
  481. Address: 209.141.38.134
  482. Name: getdogsex.com
  483. Address: 46.166.173.125
  484. Name: getdogsex.com
  485. Address: 185.181.102.198
  486. Name: getdogsex.com
  487. Address: 94.156.189.106
  488. Name: getdogsex.com
  489. Address: 198.251.89.87
  490. Name: getdogsex.com
  491. Address: 185.11.146.211
  492. Name: getdogsex.com
  493. Address: 185.62.190.188
  494. Name: getdogsex.com
  495. Address: 185.165.168.153
  496. Name: getdogsex.com
  497. Address: 95.153.31.209
  498.  
  499. getdogsex.com has address 209.141.38.134
  500. getdogsex.com has address 46.166.173.125
  501. getdogsex.com has address 185.181.102.198
  502. getdogsex.com has address 94.156.189.106
  503. getdogsex.com has address 198.251.89.87
  504. getdogsex.com has address 185.11.146.211
  505. getdogsex.com has address 185.62.190.188
  506. getdogsex.com has address 185.165.168.153
  507. getdogsex.com has address 95.153.31.209
  508. getdogsex.com has address 198.251.80.112
  509.  + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
  510.  
  511. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  512.  
  513. [+] Target is getdogsex.com
  514. [+] Loading modules.
  515. [+] Following modules are loaded:
  516. [x] [1] ping:icmp_ping - ICMP echo discovery module
  517. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  518. [x] [3] ping:udp_ping - UDP-based ping discovery module
  519. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  520. [x] [5] infogather:portscan - TCP and UDP PortScanner
  521. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  522. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  523. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  524. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  525. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  526. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  527. [x] [12] fingerprint:smb - SMB fingerprinting module
  528. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  529. [+] 13 modules registered
  530. [+] Initializing scan engine
  531. [+] Running scan engine
  532. [-] ping:tcp_ping module: no closed/open TCP ports known on 46.166.173.125. Module test failed
  533. [-] ping:udp_ping module: no closed/open UDP ports known on 46.166.173.125. Module test failed
  534. [-] No distance calculation. 46.166.173.125 appears to be dead or no ports known
  535. [+] Host: 46.166.173.125 is up (Guess probability: 50%)
  536. [+] Target: 46.166.173.125 is alive. Round-Trip Time: 1.51937 sec
  537. [+] Selected safe Round-Trip Time value is: 3.03874 sec
  538. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  539. [-] fingerprint:smb need either TCP port 139 or 445 to run
  540. [+] Primary guess:
  541. [+] Host 46.166.173.125 Running OS: (Guess probability: 100%)
  542. [+] Other guesses:
  543. [+] Host 46.166.173.125 Running OS: À‚ÇšðU (Guess probability: 91%)
  544. [+] Host 46.166.173.125 Running OS: (Guess probability: 91%)
  545. [+] Host 46.166.173.125 Running OS: (Guess probability: 91%)
  546. [+] Host 46.166.173.125 Running OS: À‚ÇšðU (Guess probability: 91%)
  547. [+] Host 46.166.173.125 Running OS: À‚ÇšðU (Guess probability: 91%)
  548. [+] Host 46.166.173.125 Running OS: À‚ÇšðU (Guess probability: 91%)
  549. [+] Host 46.166.173.125 Running OS: À‚ÇšðU (Guess probability: 91%)
  550. [+] Host 46.166.173.125 Running OS: (Guess probability: 91%)
  551. [+] Host 46.166.173.125 Running OS: (Guess probability: 91%)
  552. [+] Cleaning up scan engine
  553. [+] Modules deinitialized
  554. [+] Execution completed.
  555.  + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
  556. Domain Name: GETDOGSEX.COM
  557. Registry Domain ID: 1828816506_DOMAIN_COM-VRSN
  558. Registrar WHOIS Server: whois.namesilo.com
  559. Registrar URL: http://www.namesilo.com
  560. Updated Date: 2017-09-23T09:15:02Z
  561. Creation Date: 2013-09-25T10:49:30Z
  562. Registry Expiry Date: 2018-09-25T10:49:30Z
  563. Registrar: NameSilo, LLC
  564. Registrar IANA ID: 1479
  565. Registrar Abuse Contact Email: abuse@namesilo.com
  566. Registrar Abuse Contact Phone: +1.4805240066
  567. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  568. Name Server: NS1.GREYBISON.COM
  569. Name Server: NS2.GREYBISON.COM
  570. DNSSEC: unsigned
  571. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  572. >>> Last update of whois database: 2017-10-23T04:18:12Z <<<
  573.  
  574. For more information on Whois status codes, please visit https://icann.org/epp
  575.  
  576. NOTICE: The expiration date displayed in this record is the date the
  577. registrar's sponsorship of the domain name registration in the registry is
  578. currently set to expire. This date does not necessarily reflect the expiration
  579. date of the domain name registrant's agreement with the sponsoring
  580. registrar. Users may consult the sponsoring registrar's Whois database to
  581. view the registrar's reported date of expiration for this registration.
  582.  
  583. TERMS OF USE: You are not authorized to access or query our Whois
  584. database through the use of electronic processes that are high-volume and
  585. automated except as reasonably necessary to register domain names or
  586. modify existing registrations; the Data in VeriSign Global Registry
  587. Services' ("VeriSign") Whois database is provided by VeriSign for
  588. information purposes only, and to assist persons in obtaining information
  589. about or related to a domain name registration record. VeriSign does not
  590. guarantee its accuracy. By submitting a Whois query, you agree to abide
  591. by the following terms of use: You agree that you may use this Data only
  592. for lawful purposes and that under no circumstances will you use this Data
  593. to: (1) allow, enable, or otherwise support the transmission of mass
  594. unsolicited, commercial advertising or solicitations via e-mail, telephone,
  595. or facsimile; or (2) enable high volume, automated, electronic processes
  596. that apply to VeriSign (or its computer systems). The compilation,
  597. repackaging, dissemination or other use of this Data is expressly
  598. prohibited without the prior written consent of VeriSign. You agree not to
  599. use electronic processes that are automated and high-volume to access or
  600. query the Whois database except as reasonably necessary to register
  601. domain names or modify existing registrations. VeriSign reserves the right
  602. to restrict your access to the Whois database in its sole discretion to ensure
  603. operational stability. VeriSign may restrict or terminate your access to the
  604. Whois database for failure to abide by these terms of use. VeriSign
  605. reserves the right to modify these terms at any time.
  606.  
  607. The Registry database contains ONLY .COM, .NET, .EDU domains and
  608. Registrars.
  609. Domain Name: getdogsex.com
  610. Registry Domain ID: 1828816506_DOMAIN_COM-VRSN
  611. Registrar WHOIS Server: whois.namesilo.com
  612. Registrar URL: https://www.namesilo.com/
  613. Updated Date: 2017-10-16
  614. Creation Date: 2013-09-25
  615. Registrar Registration Expiration Date: 2018-09-25
  616. Registrar: NameSilo, LLC
  617. Registrar IANA ID: 1479
  618. Registrar Abuse Contact Email: abuse@namesilo.com
  619. Registrar Abuse Contact Phone: +1.4805240066
  620. Status: clientTransferProhibited
  621. Registry Registrant ID:
  622. Registrant Name: Domain Administrator
  623. Registrant Organization: See PrivacyGuardian.org
  624. Registrant Street: 1928 E. Highland Ave. Ste F104 PMB# 255
  625. Registrant City: Phoenix
  626. Registrant State/Province: AZ
  627. Registrant Postal Code: 85016
  628. Registrant Country: US
  629. Registrant Phone: +1.3478717726
  630. Registrant Phone Ext:
  631. Registrant Fax:
  632. Registrant Fax Ext:
  633. Registrant Email: pw-d91001db2802f6e85e93fb7b24d915a4@privacyguardian.org
  634. Registry Admin ID:
  635. Admin Name: Domain Administrator
  636. Admin Organization: See PrivacyGuardian.org
  637. Admin Street: 1928 E. Highland Ave. Ste F104 PMB# 255
  638. Admin City: Phoenix
  639. Admin State/Province: AZ
  640. Admin Postal Code: 85016
  641. Admin Country: US
  642. Admin Phone: +1.3478717726
  643. Admin Phone Ext:
  644. Admin Fax:
  645. Admin Fax Ext:
  646. Admin Email: pw-d91001db2802f6e85e93fb7b24d915a4@privacyguardian.org
  647. Registry Tech ID:
  648. Tech Name: Domain Administrator
  649. Tech Organization: See PrivacyGuardian.org
  650. Tech Street: 1928 E. Highland Ave. Ste F104 PMB# 255
  651. Tech City: Phoenix
  652. Tech State/Province: AZ
  653. Tech Postal Code: 85016
  654. Tech Country: US
  655. Tech Phone: +1.3478717726
  656. Tech Phone Ext:
  657. Tech Fax:
  658. Tech Fax Ext:
  659. Tech Email: pw-d91001db2802f6e85e93fb7b24d915a4@privacyguardian.org
  660. Name Server: ns1.greybison.com
  661. Name Server: ns2.greybison.com
  662. DNSSEC: unsigned
  663. URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
  664. Last update of WHOIS database: 2017-10-22 21:18:25
  665.  
  666. NOTICE AND TERMS OF USE: You are not authorized to access or query our WHOIS
  667. database through the use of high-volume, automated, electronic processes. The
  668. Data in our WHOIS database is provided for information purposes only, and to
  669. assist persons in obtaining information about or related to a domain name
  670. registration record. We do not guarantee its accuracy. By submitting a WHOIS
  671. query, you agree to abide by the following terms of use: You agree that you may
  672. use this Data only for lawful purposes and that under no circumstances will you
  673. use this Data to: (1) allow, enable, or otherwise support the transmission of
  674. mass unsolicited, commercial advertising or solicitations via e-mail, telephone,
  675. or facsimile; or (2) enable high volume, automated, electronic processes that
  676. apply to us (or our computer systems). The compilation, repackaging,
  677. dissemination or other use of this Data is expressly prohibited without our
  678. prior written consent. We reserve the right to terminate your access to the
  679. WHOIS database at our sole discretion, including without limitation, for
  680. excessive querying of the WHOIS database or for failure to otherwise abide by
  681. this policy. We reserve the right to modify these terms at any time.
  682.  
  683. Domains - cheap, easy, and secure at NameSilo.com
  684.  
  685. http://www.namesilo.com
  686.  
  687. Register your domain now at www.NameSilo.com - Domains. Cheap, Fast and Secure
  688.  
  689.  
  690.  
  691.  + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
  692.  
  693. *******************************************************************
  694. * *
  695. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  696. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  697. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  698. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  699. * *
  700. * TheHarvester Ver. 2.7 *
  701. * Coded by Christian Martorella *
  702. * Edge-Security Research *
  703. * cmartorella@edge-security.com *
  704. *******************************************************************
  705.  
  706.  
  707. [-] Searching in Bing:
  708. Searching 50 results...
  709.  + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
  710.  
  711. ; <<>> DiG 9.10.3-P4-Debian <<>> -x getdogsex.com
  712. ;; global options: +cmd
  713. ;; Got answer:
  714. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7200
  715. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  716.  
  717. ;; OPT PSEUDOSECTION:
  718. ; EDNS: version: 0, flags:; udp: 4096
  719. ;; QUESTION SECTION:
  720. ;com.getdogsex.in-addr.arpa. IN PTR
  721.  
  722. ;; AUTHORITY SECTION:
  723. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017043307 1800 900 604800 3600
  724.  
  725. ;; Query time: 129 msec
  726. ;; SERVER: 192.168.1.254#53(192.168.1.254)
  727. ;; WHEN: Mon Oct 23 00:18:50 EDT 2017
  728. ;; MSG SIZE rcvd: 123
  729.  
  730. dnsenum VERSION:1.2.4
  731. 
  732. ----- getdogsex.com -----
  733. 
  734.  
  735. Host's addresses:
  736. __________________
  737.  
  738. getdogsex.com. 86183 IN A 185.11.146.211
  739. getdogsex.com. 86183 IN A 185.62.190.188
  740. getdogsex.com. 86183 IN A 185.165.168.153
  741. getdogsex.com. 86183 IN A 95.153.31.209
  742. getdogsex.com. 86183 IN A 198.251.80.112
  743. getdogsex.com. 86183 IN A 209.141.38.134
  744. getdogsex.com. 86183 IN A 46.166.173.125
  745. getdogsex.com. 86183 IN A 185.181.102.198
  746. getdogsex.com. 86183 IN A 94.156.189.106
  747. getdogsex.com. 86183 IN A 198.251.89.87
  748. 
  749.  
  750. Name Servers:
  751. ______________
  752.  
  753. ns1.greybison.com. 76454 IN A 144.217.245.219
  754. ns2.greybison.com. 76454 IN A 217.182.87.76
  755. 
  756.  
  757. Mail (MX) Servers:
  758. ___________________
  759.  
  760. 
  761.  
  762. Trying Zone Transfers and getting Bind Versions:
  763. _________________________________________________
  764.  
  765. 
  766. Trying Zone Transfer for getdogsex.com on ns1.greybison.com ...
  767.  
  768. Trying Zone Transfer for getdogsex.com on ns2.greybison.com ...
  769.  
  770. brute force file not specified, bay.
  771.  + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
  772. 
  773. ____ _ _ _ _ _____
  774. / ___| _ _| |__ | (_)___| |_|___ / _ __
  775. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  776. ___) | |_| | |_) | | \__ \ |_ ___) | |
  777. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  778.  
  779. # Coded By Ahmed Aboul-Ela - @aboul3la
  780.  
  781. [-] Enumerating subdomains now for getdogsex.com
  782. [-] verbosity is enabled, will show the subdomains results in realtime
  783. [-] Searching now in Baidu..
  784. [-] Searching now in Yahoo..
  785. [-] Searching now in Google..
  786. [-] Searching now in Bing..
  787. [-] Searching now in Ask..
  788. [-] Searching now in Netcraft..
  789. [-] Searching now in DNSdumpster..
  790. [-] Searching now in Virustotal..
  791. [-] Searching now in ThreatCrowd..
  792. [-] Searching now in SSL Certificates..
  793. [-] Searching now in PassiveDNS..
  794. ThreatCrowd: www.getdogsex.com
  795. Yahoo: www.getdogsex.com
  796. Virustotal: www.getdogsex.com
  797. Netcraft: www.getdogsex.com
  798. [-] Saving results to file: /usr/share/sniper/loot/domains/domains-getdogsex.com.txt
  799. [-] Total Unique Subdomains Found: 1
  800. www.getdogsex.com
  801.  
  802.  ╔═╗╩═╗╔╩╗╔═╗╩ ╩
  803.  ║ ╠╩╝ ║ ╚═╗╠═╣
  804.  ╚═╝╩╚═ ╩o╚═╝╩ ╩
  805.  + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
  806. 
  807.  [+] Domains saved to: /usr/share/sniper/loot/domains/domains-getdogsex.com-full.txt
  808. 
  809.  + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
  810.  + -- ----------------------------=[Checking Email Security]=----------------- -- +
  811.  
  812.  + -- ----------------------------=[Pinging host]=---------------------------- -- +
  813. PING getdogsex.com (198.251.80.112) 56(84) bytes of data.
  814. 64 bytes from r11.greybison.com (198.251.80.112): icmp_seq=1 ttl=46 time=260 ms
  815.  
  816. --- getdogsex.com ping statistics ---
  817. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  818. rtt min/avg/max/mdev = 260.327/260.327/260.327/0.000 ms
  819.  
  820.  + -- ----------------------------=[Running TCP port scan]=------------------- -- +
  821.  
  822. Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-23 00:19 EDT
  823. Nmap scan report for getdogsex.com (209.141.38.134)
  824. Host is up (0.26s latency).
  825. Other addresses for getdogsex.com (not scanned): 46.166.173.125 185.181.102.198 94.156.189.106 198.251.89.87 185.11.146.211 185.62.190.188 185.165.168.153 95.153.31.209 198.251.80.112
  826. rDNS record for 209.141.38.134: r19.greybison.com
  827. Not shown: 48 filtered ports
  828. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  829. PORT STATE SERVICE
  830. 80/tcp open http
  831.  
  832. Nmap done: 1 IP address (1 host up) scanned in 8.94 seconds
  833.  
  834.  + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
  835.  + -- --=[Port 21 closed... skipping.
  836.  + -- --=[Port 22 closed... skipping.
  837.  + -- --=[Port 23 closed... skipping.
  838.  + -- --=[Port 25 closed... skipping.
  839.  + -- --=[Port 53 closed... skipping.
  840.  + -- --=[Port 79 closed... skipping.
  841.  + -- --=[Port 80 opened... running tests...
  842.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  843.  
  844. ^ ^
  845. _ __ _ ____ _ __ _ _ ____
  846. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  847. | V V // o // _/ | V V // 0 // 0 // _/
  848. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  849. <
  850. ...'
  851.  
  852. WAFW00F - Web Application Firewall Detection Tool
  853.  
  854. By Sandro Gauci && Wendel G. Henrique
  855.  
  856. Checking http://getdogsex.com
  857.  
  858.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  859. http://getdogsex.com [200 OK] Cookies[_passenger_route,connect.sid], Country[UNITED STATES][US], Frame, Google-Analytics[Universal][UA-105798142-42], HTML5, HTTPServer[Ubuntu Linux][nginx/1.10.3 (Ubuntu)], HttpOnly[connect.sid], IP[198.251.89.87], JQuery[3.2.1], Ruby-on-Rails, Script[text/javascript,text/lazyad], Title[Get dog sex], UncommonHeaders[x-reflector-cache,x-reflector], X-Powered-By[Express, Phusion Passenger 5.1.11], nginx[1.10.3]
  860.  
  861.  __ ______ _____ 
  862.  \ \/ / ___|_ _|
  863.  \ /\___ \ | | 
  864.  / \ ___) || | 
  865.  /_/\_|____/ |_| 
  866.  
  867. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  868. + -- --=[Target: getdogsex.com:80
  869. + -- --=[Site not vulnerable to Cross-Site Tracing!
  870. + -- --=[Site not vulnerable to Host Header Injection!
  871. + -- --=[Site vulnerable to Cross-Frame Scripting!
  872. + -- --=[Site vulnerable to Clickjacking!
  873.  
  874. HTTP/1.1 405 Not Allowed
  875. Server: nginx/1.10.3 (Ubuntu)
  876. Date: Mon, 23 Oct 2017 04:20:18 GMT
  877. Content-Type: text/html
  878. Content-Length: 182
  879. Connection: close
  880.  
  881. <html>
  882. <head><title>405 Not Allowed</title></head>
  883. <body bgcolor="white">
  884. <center><h1>405 Not Allowed</h1></center>
  885. <hr><center>nginx/1.10.3 (Ubuntu)</center>
  886. </body>
  887. </html>
  888. 
  889. HTTP/1.1 200 OK
  890. Server: nginx/1.10.3 (Ubuntu)
  891. Date: Mon, 23 Oct 2017 04:20:20 GMT
  892. Content-Type: text/html; charset=utf-8
  893. Content-Length: 429886
  894. Connection: keep-alive
  895. Status: 200 OK
  896. X-Powered-By: Express
  897. Cache-Control: no-cache, no-store, must-revalidate
  898. ETag: W/"68f3e-d/XGS6OLkq2ELcfs3knfZItBl10"
  899. Pragma: no-cache
  900. Expires: 0
  901. Set-Cookie: connect.sid=s%3AJKQGUYQJLvCrCjtqqLolq4j3B6hmX-C_.p0QKnjlptcawm%2F%2FzMbDWIKtLHGkTnpzjddzosxI9D5g; Path=/; Expires=Mon, 30 Oct 2017 04:20:19 GMT; HttpOnly
  902. Set-Cookie: _passenger_route=2122608685; Path=/
  903. X-Powered-By: Phusion Passenger 5.1.11
  904. X-Reflector-Cache: MISS
  905. X-Reflector: r14.greybison.com
  906.  
  907. <!doctype html>
  908. <html lang="en">
  909. <head>
  910. <title>Get dog sex</title>
  911.  
  912. <!-- Font Awesome first -->
  913. <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.6.3/css/font-awesome.css">
  914.  
  915. <!-- Meta Here -->
  916. <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  917.  
  918. <!-- Fav Icons Fromm Google -->
  919. <link rel="apple-touch-icon" si
  920.  
  921.  
  922.  
  923.  + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
  924. + -- --=[Checking if X-Content options are enabled on getdogsex.com... 
  925.  
  926. + -- --=[Checking if X-Frame options are enabled on getdogsex.com... 
  927.  
  928. + -- --=[Checking if X-XSS-Protection header is enabled on getdogsex.com... 
  929.  
  930. + -- --=[Checking HTTP methods on getdogsex.com... 
  931. Allow: GET,HEAD
  932.  
  933. + -- --=[Checking if TRACE method is enabled on getdogsex.com... 
  934.  
  935. + -- --=[Checking for META tags on getdogsex.com... 
  936. <img data-src="http://tet.greybison.com/enzygmar/none/240x180/bf5014fc-7299.jpg" alt="Golden skinned, kinky haired girls rubs metal balls on her pussy then gets licked by lesbian lover. " class="thumb">
  937. <span class="sp">girls, metal balls, lesbian, pussy</span>
  938. <img data-src="http://tet.greybison.com/enzygmar/none/240x180/bf5014fc-7295.jpg" alt="Golden skinned, kinky haired girls rubs metal balls on her pussy then gets licked by lesbian lover. " class="thumb">
  939. <span class="sp">girls, metal balls, lesbian, pussy</span>
  940. <img data-src="http://tet.greybison.com/enzygmar/none/240x180/bf5014fc-7297.jpg" alt="Golden skinned, kinky haired girls rubs metal balls on her pussy then gets licked by lesbian lover. " class="thumb">
  941. <span class="sp">girls, metal balls, lesbian, pussy</span>
  942. <img data-src="http://tet.greybison.com/enzygmar/none/240x180/bf5014fc-7296.jpg" alt="Golden skinned, kinky haired girls rubs metal balls on her pussy then gets licked by lesbian lover. " class="thumb">
  943. <span class="sp">girls, metal balls, lesbian, pussy</span>
  944. <img data-src="http://tet.greybison.com/enzygmar/none/240x180/bf5014fc-7298.jpg" alt="Golden skinned, kinky haired girls rubs metal balls on her pussy then gets licked by lesbian lover. " class="thumb">
  945. <span class="sp">girls, metal balls, lesbian, pussy</span>
  946.  
  947. + -- --=[Checking for open proxy on getdogsex.com... 
  948. r10.greybison.com
  949.  
  950. + -- --=[Enumerating software on getdogsex.com... 
  951. Server: nginx/1.10.3 (Ubuntu)
  952. X-Powered-By: Express
  953. X-Powered-By: Phusion Passenger 5.1.11
  954.  
  955. + -- --=[Checking if Strict-Transport-Security is enabled on getdogsex.com... 
  956.  
  957. + -- --=[Checking for Flash cross-domain policy on getdogsex.com... 
  958. </p>
  959.  
  960.  
  961. </div>
  962. </div>
  963.  
  964. <!-- Le Copyright Info -->
  965. <div class="copyright">
  966. All Rights Reserved.
  967. </div>
  968.  
  969. + -- --=[Checking for Silverlight cross-domain policy on getdogsex.com... 
  970. </p>
  971.  
  972.  
  973. </div>
  974. </div>
  975.  
  976. <!-- Le Copyright Info -->
  977. <div class="copyright">
  978. All Rights Reserved.
  979. </div>
  980.  
  981. + -- --=[Checking for HTML5 cross-origin resource sharing on getdogsex.com... 
  982.  
  983. + -- --=[Retrieving robots.txt on getdogsex.com... 
  984. </p>
  985.  
  986.  
  987. </div>
  988. </div>
  989.  
  990. <!-- Le Copyright Info -->
  991. <div class="copyright">
  992. All Rights Reserved.
  993. </div>
  994.  
  995. + -- --=[Retrieving sitemap.xml on getdogsex.com... 
  996. </p>
  997.  
  998.  
  999. </div>
  1000. </div>
  1001.  
  1002. <!-- Le Copyright Info -->
  1003. <div class="copyright">
  1004. All Rights Reserved.
  1005. </div>
  1006.  
  1007. + -- --=[Checking cookie attributes on getdogsex.com... 
  1008. Set-Cookie: connect.sid=s%3ASqvhrz0QeoJ3X6rb24miTn5kz8qxtH5h.GRC1hwu45imvtj%2FjOcry3K5eRumYKJ7XJ9aU%2BGTa6r0; Path=/; Expires=Mon, 30 Oct 2017 04:20:57 GMT; HttpOnly
  1009. Set-Cookie: _passenger_route=2122608685; Path=/
  1010.  
  1011. + -- --=[Checking for ASP.NET Detailed Errors on getdogsex.com... 
  1012. <title>ERROR - 404</title>
  1013. <h2>ERROR</h2>
  1014. <h2>Sorry - you got a "Not Found" error.</h2>
  1015. <title>ERROR - 404</title>
  1016. <h2>ERROR</h2>
  1017. <h2>Sorry - you got a "Not Found" error.</h2>
  1018.  
  1019. 
  1020.  + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
  1021. - Nikto v2.1.6
  1022. ---------------------------------------------------------------------------
  1023. + Target IP: 185.11.146.211
  1024. + Target Hostname: getdogsex.com
  1025. + Target Port: 80
  1026. + Start Time: 2017-10-23 00:21:00 (GMT-4)
  1027. ---------------------------------------------------------------------------
  1028. + Server: nginx/1.10.3 (Ubuntu)
  1029. + Cookie _passenger_route created without the httponly flag
  1030. + Retrieved x-powered-by header: Phusion Passenger 5.1.11
  1031. + Server leaks inodes via ETags, header found with file /, fields: 0xW/68f3e 0xRg9VODYp7PbEQCbwKS2viE5hhmg
  1032. + The anti-clickjacking X-Frame-Options header is not present.
  1033. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  1034. + Uncommon header 'x-reflector-cache' found, with contents: MISS
  1035. + Uncommon header 'x-reflector' found, with contents: r13.greybison.com
  1036. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  1037. + No CGI Directories found (use '-C all' to force check all possible dirs)
  1038. + Allowed HTTP Methods: GET, HEAD
  1039. + 7460 requests: 12 error(s) and 9 item(s) reported on remote host
  1040. + End Time: 2017-10-23 01:38:07 (GMT-4) (4627 seconds)
  1041. ---------------------------------------------------------------------------
  1042. + 1 host(s) tested
  1043.  
  1044.  
  1045. *********************************************************************
  1046. Portions of the server's headers (nginx/1.10.3) are not in
  1047. the Nikto database or are newer than the known string. Would you like
  1048. to submit this information (*no server specific data*) to CIRT.net
  1049. for a Nikto update (or you may email to sullo@cirt.net) (y/n)?
  1050. + The anti-clickjacking X-Frame-Options header is not present.
  1051. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  1052. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  1053. + ERROR 302: Update failed, please notify sullo@cirt.net of this code.
  1054.  + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
  1055. [+] Screenshot saved to /usr/share/sniper/loot/screenshots/getdogsex.com-port80.jpg
  1056.  + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +
  1057.  + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +
  1058.  
  1059.  _____  .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
  1060.  (_____) 01 01N. C 01 C 01 .01. 01  01 Yb 01 .01.
  1061.  (() ()) 01 C YCb C 01 C 01 ,C9 01  01 dP 01 ,C9
  1062.  \ /  01 C .CN. C 01 C 0101dC9 01  01'''bg. 0101dC9
  1063.  \ /  01 C .01.C 01 C 01 YC. 01 ,  01 .Y 01 YC.
  1064.  /=\  01 C Y01 YC. ,C 01 .Cb. 01 ,C  01 ,9 01 .Cb.
  1065.  [___]  .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
  1066.  
  1067. __[ ! ] Neither war between hackers, nor peace for the system.
  1068. __[ ! ] http://blog.inurl.com.br
  1069. __[ ! ] http://fb.com/InurlBrasil
  1070. __[ ! ] http://twitter.com/@googleinurl
  1071. __[ ! ] http://github.com/googleinurl
  1072. __[ ! ] Current PHP version::[ 7.0.22-3 ]
  1073. __[ ! ] Current script owner::[ root ]
  1074. __[ ! ] Current uname::[ Linux Kali 4.13.0-kali1-amd64 #1 SMP Debian 4.13.4-2kali1 (2017-10-16) x86_64 ]
  1075. __[ ! ] Current pwd::[ /usr/share/sniper ]
  1076. __[ ! ] Help: php inurlbr.php --help
  1077. ------------------------------------------------------------------------------------------------------------------------
  1078.  
  1079. [ ! ] Starting SCANNER INURLBR 2.1 at [23-10-2017 02:05:13]
  1080. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  1081. It is the end user's responsibility to obey all applicable local, state and federal laws.
  1082. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  1083.  
  1084. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-getdogsex.com.txt ]
  1085. [ INFO ][ DORK ]::[ site:getdogsex.com ]
  1086. [ INFO ][ SEARCHING ]:: {
  1087. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.cg ]
  1088.  
  1089. [ INFO ][ SEARCHING ]:: 
  1090. -[:::]
  1091. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  1092.  
  1093. [ INFO ][ SEARCHING ]:: 
  1094. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1095. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.cf ID: 013269018370076798483:wdba3dlnxqm ]
  1096.  
  1097. [ INFO ][ SEARCHING ]:: 
  1098. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1099.  
  1100. [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
  1101.  
  1102. 
  1103.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1104. |_[ + ] [ 0 / 100 ]-[02:05:30] [ - ] 
  1105. |_[ + ] Target:: [ http://www.getdogsex.com/ ]
  1106. |_[ + ] Exploit:: 
  1107. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1108. |_[ + ] More details::  / - / , ISP: 
  1109. |_[ + ] Found:: UNIDENTIFIED
  1110. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 14244 out of 429886 bytes received
  1111. 
  1112.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1113. |_[ + ] [ 1 / 100 ]-[02:05:31] [ - ] 
  1114. |_[ + ] Target:: [ http://www.getdogsex.com/movies/wAvOstUPQ9ka5jMWhUkPcJoPyjHMWF77DaMOaCJS8S8GOtwc ]
  1115. |_[ + ] Exploit:: 
  1116. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1117. |_[ + ] More details::  / - / , ISP: 
  1118. |_[ + ] Found:: UNIDENTIFIED
  1119. 
  1120.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1121. |_[ + ] [ 2 / 100 ]-[02:05:32] [ - ] 
  1122. |_[ + ] Target:: [ http://getdogsex.com/movies/ocQt01PXUfdWGFypElN8SBm9aNLfvmmu8liY0txGwJahkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1123. |_[ + ] Exploit:: 
  1124. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1125. |_[ + ] More details::  / - / , ISP: 
  1126. |_[ + ] Found:: UNIDENTIFIED
  1127. 
  1128.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1129. |_[ + ] [ 3 / 100 ]-[02:05:33] [ - ] 
  1130. |_[ + ] Target:: [ http://www.getdogsex.com/movies/JdpDlAaMkj93xMrCYXayZrhwb-X2YC0KcUcUFAIJG2cGOtwc ]
  1131. |_[ + ] Exploit:: 
  1132. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1133. |_[ + ] More details::  / - / , ISP: 
  1134. |_[ + ] Found:: UNIDENTIFIED
  1135. 
  1136.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1137. |_[ + ] [ 4 / 100 ]-[02:05:34] [ - ] 
  1138. |_[ + ] Target:: [ http://www.getdogsex.com/movies/m8BqDu8TZxzoBg4gedcdi6gYfvcXQvLMqpZixAJce36hkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1139. |_[ + ] Exploit:: 
  1140. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1141. |_[ + ] More details::  / - / , ISP: 
  1142. |_[ + ] Found:: UNIDENTIFIED
  1143. 
  1144.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1145. |_[ + ] [ 5 / 100 ]-[02:05:35] [ - ] 
  1146. |_[ + ] Target:: [ http://www.getdogsex.com/movies/AhPvH20v_Fm2w5VMlyHvliEYXQ3LVbN9fXZEC6iRpKQGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1147. |_[ + ] Exploit:: 
  1148. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1149. |_[ + ] More details::  / - / , ISP: 
  1150. |_[ + ] Found:: UNIDENTIFIED
  1151. 
  1152.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1153. |_[ + ] [ 6 / 100 ]-[02:05:36] [ - ] 
  1154. |_[ + ] Target:: [ http://getdogsex.com/movies/UMPRIVMugqB7pP4BAlFnJRQO9KXq8qAc97tDyIDLCGsGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg ]
  1155. |_[ + ] Exploit:: 
  1156. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1157. |_[ + ] More details::  / - / , ISP: 
  1158. |_[ + ] Found:: UNIDENTIFIED
  1159. 
  1160.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1161. |_[ + ] [ 7 / 100 ]-[02:05:37] [ - ] 
  1162. |_[ + ] Target:: [ http://getdogsex.com/movies/ou-5hhd7ltsixZ5vfOYaowBuNap1OaQM4_jrAWWQ86uhkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1163. |_[ + ] Exploit:: 
  1164. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1165. |_[ + ] More details::  / - / , ISP: 
  1166. |_[ + ] Found:: UNIDENTIFIED
  1167. 
  1168.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1169. |_[ + ] [ 8 / 100 ]-[02:05:38] [ - ] 
  1170. |_[ + ] Target:: [ http://getdogsex.com/movies/iUX0w2_FruNDnG5FSkdMG319Q-iWHSzlCuoGo342KXahkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1171. |_[ + ] Exploit:: 
  1172. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1173. |_[ + ] More details::  / - / , ISP: 
  1174. |_[ + ] Found:: UNIDENTIFIED
  1175. 
  1176.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1177. |_[ + ] [ 9 / 100 ]-[02:05:39] [ - ] 
  1178. |_[ + ] Target:: [ http://www.getdogsex.com/movies/ehpkWLbCCYSm4NAAgxfNONOGmb7gxKyanGq6VvflfzEGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1179. |_[ + ] Exploit:: 
  1180. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1181. |_[ + ] More details::  / - / , ISP: 
  1182. |_[ + ] Found:: UNIDENTIFIED
  1183. 
  1184.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1185. |_[ + ] [ 10 / 100 ]-[02:05:47] [ - ] 
  1186. |_[ + ] Target:: [ http://www.getdogsex.com/?x=2936. ]
  1187. |_[ + ] Exploit:: 
  1188. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1189. |_[ + ] More details::  / - / , ISP: 
  1190. |_[ + ] Found:: UNIDENTIFIED
  1191. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 66978 out of 429886 bytes received
  1192. 
  1193.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1194. |_[ + ] [ 11 / 100 ]-[02:05:48] [ - ] 
  1195. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fd1feb3d3ade7fe3cb/597636241feb3d3ade7fe578/ ]
  1196. |_[ + ] Exploit:: 
  1197. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1198. |_[ + ] More details::  / - / , ISP: 
  1199. |_[ + ] Found:: UNIDENTIFIED
  1200. 
  1201.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1202. |_[ + ] [ 12 / 100 ]-[02:05:50] [ - ] 
  1203. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fa1feb3d3ade7fe3b1/5976361b1feb3d3ade7fe4f8/ ]
  1204. |_[ + ] Exploit:: 
  1205. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1206. |_[ + ] More details::  / - / , ISP: 
  1207. |_[ + ] Found:: UNIDENTIFIED
  1208. 
  1209.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1210. |_[ + ] [ 13 / 100 ]-[02:05:52] [ - ] 
  1211. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fc1feb3d3ade7fe3bf/597636201feb3d3ade7fe53e/ ]
  1212. |_[ + ] Exploit:: 
  1213. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1214. |_[ + ] More details::  / - / , ISP: 
  1215. |_[ + ] Found:: UNIDENTIFIED
  1216. 
  1217.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1218. |_[ + ] [ 14 / 100 ]-[02:05:53] [ - ] 
  1219. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fb1feb3d3ade7fe3b8/5976361d1feb3d3ade7fe519/ ]
  1220. |_[ + ] Exploit:: 
  1221. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1222. |_[ + ] More details::  / - / , ISP: 
  1223. |_[ + ] Found:: UNIDENTIFIED
  1224. 
  1225.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1226. |_[ + ] [ 15 / 100 ]-[02:05:55] [ - ] 
  1227. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635ff1feb3d3ade7fe3d6/597636271feb3d3ade7fe5b2/ ]
  1228. |_[ + ] Exploit:: 
  1229. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1230. |_[ + ] More details::  / - / , ISP: 
  1231. |_[ + ] Found:: UNIDENTIFIED
  1232. 
  1233.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1234. |_[ + ] [ 16 / 100 ]-[02:05:56] [ - ] 
  1235. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636071feb3d3ade7fe408/597636391feb3d3ade7fe6ad/ ]
  1236. |_[ + ] Exploit:: 
  1237. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1238. |_[ + ] More details::  / - / , ISP: 
  1239. |_[ + ] Found:: UNIDENTIFIED
  1240. 
  1241.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1242. |_[ + ] [ 17 / 100 ]-[02:05:58] [ - ] 
  1243. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fa1feb3d3ade7fe3b2/5976361c1feb3d3ade7fe4fc/ ]
  1244. |_[ + ] Exploit:: 
  1245. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1246. |_[ + ] More details::  / - / , ISP: 
  1247. |_[ + ] Found:: UNIDENTIFIED
  1248. 
  1249.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1250. |_[ + ] [ 18 / 100 ]-[02:05:59] [ - ] 
  1251. |_[ + ] Target:: [ http://www.getdogsex.com/click/5976360a1feb3d3ade7fe42a/597635f41feb3d3ade7fe388 ]
  1252. |_[ + ] Exploit:: 
  1253. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1254. |_[ + ] More details::  / - / , ISP: 
  1255. |_[ + ] Found:: UNIDENTIFIED
  1256. 
  1257.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1258. |_[ + ] [ 19 / 100 ]-[02:06:00] [ - ] 
  1259. |_[ + ] Target:: [ http://www.getdogsex.com/click/597636281feb3d3ade7fe5b7/597636001feb3d3ade7fe3d7 ]
  1260. |_[ + ] Exploit:: 
  1261. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1262. |_[ + ] More details::  / - / , ISP: 
  1263. |_[ + ] Found:: UNIDENTIFIED
  1264. 
  1265.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1266. |_[ + ] [ 20 / 100 ]-[02:06:01] [ - ] 
  1267. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636021feb3d3ade7fe3e9/5976362e1feb3d3ade7fe612/ ]
  1268. |_[ + ] Exploit:: 
  1269. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1270. |_[ + ] More details::  / - / , ISP: 
  1271. |_[ + ] Found:: UNIDENTIFIED
  1272. 
  1273.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1274. |_[ + ] [ 21 / 100 ]-[02:06:02] [ - ] 
  1275. |_[ + ] Target:: [ http://getdogsex.com/play.php?v=1r1QWfscAMbeQi9Dzx0HuAZH07YYiYrWHppX5nhfbQChkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1276. |_[ + ] Exploit:: 
  1277. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1278. |_[ + ] More details::  / - / , ISP: 
  1279. |_[ + ] Found:: UNIDENTIFIED
  1280. 
  1281.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1282. |_[ + ] [ 22 / 100 ]-[02:06:03] [ - ] 
  1283. |_[ + ] Target:: [ http://www.getdogsex.com/click/5976362c1feb3d3ade7fe5f2/597636011feb3d3ade7fe3e3 ]
  1284. |_[ + ] Exploit:: 
  1285. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1286. |_[ + ] More details::  / - / , ISP: 
  1287. |_[ + ] Found:: UNIDENTIFIED
  1288. 
  1289.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1290. |_[ + ] [ 23 / 100 ]-[02:06:05] [ - ] 
  1291. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636051feb3d3ade7fe3fe/597636361feb3d3ade7fe678/ ]
  1292. |_[ + ] Exploit:: 
  1293. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1294. |_[ + ] More details::  / - / , ISP: 
  1295. |_[ + ] Found:: UNIDENTIFIED
  1296. 
  1297.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1298. |_[ + ] [ 24 / 100 ]-[02:06:06] [ - ] 
  1299. |_[ + ] Target:: [ http://www.getdogsex.com/click/597636151feb3d3ade7fe4ab/597635f81feb3d3ade7fe3a2 ]
  1300. |_[ + ] Exploit:: 
  1301. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1302. |_[ + ] More details::  / - / , ISP: 
  1303. |_[ + ] Found:: UNIDENTIFIED
  1304. 
  1305.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1306. |_[ + ] [ 25 / 100 ]-[02:06:07] [ - ] 
  1307. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636041feb3d3ade7fe3f4/597636321feb3d3ade7fe646/ ]
  1308. |_[ + ] Exploit:: 
  1309. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1310. |_[ + ] More details::  / - / , ISP: 
  1311. |_[ + ] Found:: UNIDENTIFIED
  1312. 
  1313.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1314. |_[ + ] [ 26 / 100 ]-[02:06:09] [ - ] 
  1315. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636051feb3d3ade7fe3f9/597636341feb3d3ade7fe65f/ ]
  1316. |_[ + ] Exploit:: 
  1317. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1318. |_[ + ] More details::  / - / , ISP: 
  1319. |_[ + ] Found:: UNIDENTIFIED
  1320. 
  1321.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1322. |_[ + ] [ 27 / 100 ]-[02:06:10] [ - ] 
  1323. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636071feb3d3ade7fe409/597636391feb3d3ade7fe6af/ ]
  1324. |_[ + ] Exploit:: 
  1325. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1326. |_[ + ] More details::  / - / , ISP: 
  1327. |_[ + ] Found:: UNIDENTIFIED
  1328. 
  1329.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1330. |_[ + ] [ 28 / 100 ]-[02:06:11] [ - ] 
  1331. |_[ + ] Target:: [ http://www.getdogsex.com/click/597636391feb3d3ade7fe6a6/597636071feb3d3ade7fe407 ]
  1332. |_[ + ] Exploit:: 
  1333. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1334. |_[ + ] More details::  / - / , ISP: 
  1335. |_[ + ] Found:: UNIDENTIFIED
  1336. 
  1337.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1338. |_[ + ] [ 29 / 100 ]-[02:06:12] [ - ] 
  1339. |_[ + ] Target:: [ http://www.getdogsex.com/movies/XfcCZ6NUI9_lYMx5ieIhcfmzxz7Moohd-2p0JgeP8jMGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1340. |_[ + ] Exploit:: 
  1341. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1342. |_[ + ] More details::  / - / , ISP: 
  1343. |_[ + ] Found:: UNIDENTIFIED
  1344. 
  1345.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1346. |_[ + ] [ 30 / 100 ]-[02:06:14] [ - ] 
  1347. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636021feb3d3ade7fe3e8/5976362d1feb3d3ade7fe60a/ ]
  1348. |_[ + ] Exploit:: 
  1349. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1350. |_[ + ] More details::  / - / , ISP: 
  1351. |_[ + ] Found:: UNIDENTIFIED
  1352. 
  1353.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1354. |_[ + ] [ 31 / 100 ]-[02:06:15] [ - ] 
  1355. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635ff1feb3d3ade7fe3d2/597636271feb3d3ade7fe59d/ ]
  1356. |_[ + ] Exploit:: 
  1357. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1358. |_[ + ] More details::  / - / , ISP: 
  1359. |_[ + ] Found:: UNIDENTIFIED
  1360. 
  1361.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1362. |_[ + ] [ 32 / 100 ]-[02:06:17] [ - ] 
  1363. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636071feb3d3ade7fe40a/597636391feb3d3ade7fe6b5/ ]
  1364. |_[ + ] Exploit:: 
  1365. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1366. |_[ + ] More details::  / - / , ISP: 
  1367. |_[ + ] Found:: UNIDENTIFIED
  1368. 
  1369.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1370. |_[ + ] [ 33 / 100 ]-[02:06:18] [ - ] 
  1371. |_[ + ] Target:: [ http://www.getdogsex.com/click/5976362f1feb3d3ade7fe623/597636031feb3d3ade7fe3ed ]
  1372. |_[ + ] Exploit:: 
  1373. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1374. |_[ + ] More details::  / - / , ISP: 
  1375. |_[ + ] Found:: UNIDENTIFIED
  1376. 
  1377.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1378. |_[ + ] [ 34 / 100 ]-[02:06:19] [ - ] 
  1379. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636041feb3d3ade7fe3f7/597636341feb3d3ade7fe657/ ]
  1380. |_[ + ] Exploit:: 
  1381. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1382. |_[ + ] More details::  / - / , ISP: 
  1383. |_[ + ] Found:: UNIDENTIFIED
  1384. 
  1385.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1386. |_[ + ] [ 35 / 100 ]-[02:06:20] [ - ] 
  1387. |_[ + ] Target:: [ http://getdogsex.com/play.php?v=t2rTgNdV2_KxJEMLKeAYgKx84aZRxqG4vtwsS5VBbCuhkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1388. |_[ + ] Exploit:: 
  1389. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1390. |_[ + ] More details::  / - / , ISP: 
  1391. |_[ + ] Found:: UNIDENTIFIED
  1392. 
  1393.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1394. |_[ + ] [ 36 / 100 ]-[02:06:21] [ - ] 
  1395. |_[ + ] Target:: [ http://getdogsex.com/movies/57-3SQ3bh83GwVuS5Z7s9rYDaArCSVgjqmPK12dE5MwGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1396. |_[ + ] Exploit:: 
  1397. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1398. |_[ + ] More details::  / - / , ISP: 
  1399. |_[ + ] Found:: UNIDENTIFIED
  1400. 
  1401.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1402. |_[ + ] [ 37 / 100 ]-[02:06:23] [ - ] 
  1403. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fe1feb3d3ade7fe3cc/597636241feb3d3ade7fe57d/ ]
  1404. |_[ + ] Exploit:: 
  1405. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1406. |_[ + ] More details::  / - / , ISP: 
  1407. |_[ + ] Found:: UNIDENTIFIED
  1408. 
  1409.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1410. |_[ + ] [ 38 / 100 ]-[02:06:24] [ - ] 
  1411. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fa1feb3d3ade7fe3ac/597636191feb3d3ade7fe4e0/ ]
  1412. |_[ + ] Exploit:: 
  1413. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1414. |_[ + ] More details::  / - / , ISP: 
  1415. |_[ + ] Found:: UNIDENTIFIED
  1416. 
  1417.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1418. |_[ + ] [ 39 / 100 ]-[02:06:26] [ - ] 
  1419. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f41feb3d3ade7fe386/5976360a1feb3d3ade7fe423/ ]
  1420. |_[ + ] Exploit:: 
  1421. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1422. |_[ + ] More details::  / - / , ISP: 
  1423. |_[ + ] Found:: UNIDENTIFIED
  1424. 
  1425.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1426. |_[ + ] [ 40 / 100 ]-[02:06:27] [ - ] 
  1427. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636061feb3d3ade7fe401/597636371feb3d3ade7fe687/ ]
  1428. |_[ + ] Exploit:: 
  1429. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1430. |_[ + ] More details::  / - / , ISP: 
  1431. |_[ + ] Found:: UNIDENTIFIED
  1432. 
  1433.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1434. |_[ + ] [ 41 / 100 ]-[02:06:29] [ - ] 
  1435. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fc1feb3d3ade7fe3bc/5976361f1feb3d3ade7fe531/ ]
  1436. |_[ + ] Exploit:: 
  1437. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1438. |_[ + ] More details::  / - / , ISP: 
  1439. |_[ + ] Found:: UNIDENTIFIED
  1440. 
  1441.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1442. |_[ + ] [ 42 / 100 ]-[02:06:30] [ - ] 
  1443. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fc1feb3d3ade7fe3c2/597636211feb3d3ade7fe54d/ ]
  1444. |_[ + ] Exploit:: 
  1445. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1446. |_[ + ] More details::  / - / , ISP: 
  1447. |_[ + ] Found:: UNIDENTIFIED
  1448. 
  1449.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1450. |_[ + ] [ 43 / 100 ]-[02:06:31] [ - ] 
  1451. |_[ + ] Target:: [ http://getdogsex.com/click/597636181feb3d3ade7fe4d5/597635f91feb3d3ade7fe3aa ]
  1452. |_[ + ] Exploit:: 
  1453. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1454. |_[ + ] More details::  / - / , ISP: 
  1455. |_[ + ] Found:: UNIDENTIFIED
  1456. 
  1457.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1458. |_[ + ] [ 44 / 100 ]-[02:06:32] [ - ] 
  1459. |_[ + ] Target:: [ http://www.getdogsex.com/movies/v4cXx-zw7qZ2oir_QSsr55FRzlY9wEYJYY5pVz-vyB6hkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1460. |_[ + ] Exploit:: 
  1461. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1462. |_[ + ] More details::  / - / , ISP: 
  1463. |_[ + ] Found:: UNIDENTIFIED
  1464. 
  1465.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1466. |_[ + ] [ 45 / 100 ]-[02:06:34] [ - ] 
  1467. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636061feb3d3ade7fe406/597636391feb3d3ade7fe6a0/ ]
  1468. |_[ + ] Exploit:: 
  1469. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1470. |_[ + ] More details::  / - / , ISP: 
  1471. |_[ + ] Found:: UNIDENTIFIED
  1472. 
  1473.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1474. |_[ + ] [ 46 / 100 ]-[02:06:35] [ - ] 
  1475. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f81feb3d3ade7fe3a4/597636161feb3d3ade7fe4b6/ ]
  1476. |_[ + ] Exploit:: 
  1477. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1478. |_[ + ] More details::  / - / , ISP: 
  1479. |_[ + ] Found:: UNIDENTIFIED
  1480. 
  1481.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1482. |_[ + ] [ 47 / 100 ]-[02:06:37] [ - ] 
  1483. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636061feb3d3ade7fe402/597636381feb3d3ade7fe68e/ ]
  1484. |_[ + ] Exploit:: 
  1485. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1486. |_[ + ] More details::  / - / , ISP: 
  1487. |_[ + ] Found:: UNIDENTIFIED
  1488. 
  1489.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1490. |_[ + ] [ 48 / 100 ]-[02:06:38] [ - ] 
  1491. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636041feb3d3ade7fe3f2/597636321feb3d3ade7fe63c/ ]
  1492. |_[ + ] Exploit:: 
  1493. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1494. |_[ + ] More details::  / - / , ISP: 
  1495. |_[ + ] Found:: UNIDENTIFIED
  1496. 
  1497.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1498. |_[ + ] [ 49 / 100 ]-[02:06:39] [ - ] 
  1499. |_[ + ] Target:: [ http://www.getdogsex.com/click/5976363c1feb3d3ade7fe6da/597636091feb3d3ade7fe411 ]
  1500. |_[ + ] Exploit:: 
  1501. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1502. |_[ + ] More details::  / - / , ISP: 
  1503. |_[ + ] Found:: UNIDENTIFIED
  1504. 
  1505.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1506. |_[ + ] [ 50 / 100 ]-[02:06:41] [ - ] 
  1507. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f61feb3d3ade7fe399/597636121feb3d3ade7fe47e/ ]
  1508. |_[ + ] Exploit:: 
  1509. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1510. |_[ + ] More details::  / - / , ISP: 
  1511. |_[ + ] Found:: UNIDENTIFIED
  1512. 
  1513.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1514. |_[ + ] [ 51 / 100 ]-[02:06:42] [ - ] 
  1515. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fb1feb3d3ade7fe3b6/5976361d1feb3d3ade7fe510/ ]
  1516. |_[ + ] Exploit:: 
  1517. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1518. |_[ + ] More details::  / - / , ISP: 
  1519. |_[ + ] Found:: UNIDENTIFIED
  1520. 
  1521.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1522. |_[ + ] [ 52 / 100 ]-[02:06:44] [ - ] 
  1523. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636091feb3d3ade7fe414/5976363d1feb3d3ade7fe6e5/ ]
  1524. |_[ + ] Exploit:: 
  1525. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1526. |_[ + ] More details::  / - / , ISP: 
  1527. |_[ + ] Found:: UNIDENTIFIED
  1528. 
  1529.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1530. |_[ + ] [ 53 / 100 ]-[02:06:45] [ - ] 
  1531. |_[ + ] Target:: [ http://www.getdogsex.com/click/597636281feb3d3ade7fe5c1/597636001feb3d3ade7fe3d9 ]
  1532. |_[ + ] Exploit:: 
  1533. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1534. |_[ + ] More details::  / - / , ISP: 
  1535. |_[ + ] Found:: UNIDENTIFIED
  1536. 
  1537.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1538. |_[ + ] [ 54 / 100 ]-[02:06:46] [ - ] 
  1539. |_[ + ] Target:: [ http://www.getdogsex.com/click/597636211feb3d3ade7fe549/597635fc1feb3d3ade7fe3c1 ]
  1540. |_[ + ] Exploit:: 
  1541. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1542. |_[ + ] More details::  / - / , ISP: 
  1543. |_[ + ] Found:: UNIDENTIFIED
  1544. 
  1545.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1546. |_[ + ] [ 55 / 100 ]-[02:06:47] [ - ] 
  1547. |_[ + ] Target:: [ http://www.getdogsex.com/click/597636141feb3d3ade7fe496/597635f71feb3d3ade7fe39d ]
  1548. |_[ + ] Exploit:: 
  1549. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1550. |_[ + ] More details::  / - / , ISP: 
  1551. |_[ + ] Found:: UNIDENTIFIED
  1552. 
  1553.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1554. |_[ + ] [ 56 / 100 ]-[02:06:48] [ - ] 
  1555. |_[ + ] Target:: [ http://getdogsex.com/movies/9u0vK012wHX3hD8tXAmvwVT6IVH959Zd_Xg-_sYM_woGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1556. |_[ + ] Exploit:: 
  1557. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1558. |_[ + ] More details::  / - / , ISP: 
  1559. |_[ + ] Found:: UNIDENTIFIED
  1560. 
  1561.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1562. |_[ + ] [ 57 / 100 ]-[02:06:49] [ - ] 
  1563. |_[ + ] Target:: [ http://www.getdogsex.com/movies/ybt1jVDOzZn9h9268fOTGOGtABZ7-83yDs1nZRxdUSYGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1564. |_[ + ] Exploit:: 
  1565. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1566. |_[ + ] More details::  / - / , ISP: 
  1567. |_[ + ] Found:: UNIDENTIFIED
  1568. 
  1569.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1570. |_[ + ] [ 58 / 100 ]-[02:06:50] [ - ] 
  1571. |_[ + ] Target:: [ http://getdogsex.com/play.php?v=N3bIMjKpfIWYWgMTcI6WZiAm7Xw6jgTwFlHDwSavWvkGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1572. |_[ + ] Exploit:: 
  1573. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1574. |_[ + ] More details::  / - / , ISP: 
  1575. |_[ + ] Found:: UNIDENTIFIED
  1576. 
  1577.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1578. |_[ + ] [ 59 / 100 ]-[02:06:51] [ - ] 
  1579. |_[ + ] Target:: [ http://www.getdogsex.com/play.php?v=UozONjR5WIqMx3cS_Ax44fqXLtUcA5uYcOFFyeqvHL-hkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1580. |_[ + ] Exploit:: 
  1581. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1582. |_[ + ] More details::  / - / , ISP: 
  1583. |_[ + ] Found:: UNIDENTIFIED
  1584. 
  1585.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1586. |_[ + ] [ 60 / 100 ]-[02:06:51] [ - ] 
  1587. |_[ + ] Target:: [ http://www.getdogsex.com/movies/ztd_NW0Zzwk7m8-nLzFug694hpBGfqaKYNj-LJLkyHIGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1588. |_[ + ] Exploit:: 
  1589. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1590. |_[ + ] More details::  / - / , ISP: 
  1591. |_[ + ] Found:: UNIDENTIFIED
  1592. 
  1593.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1594. |_[ + ] [ 61 / 100 ]-[02:06:52] [ - ] 
  1595. |_[ + ] Target:: [ http://getdogsex.com/movies/1A-SnmdHbVKWpOHaUKj-FiwyAuYgrhV54PA0zCif0qkGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1596. |_[ + ] Exploit:: 
  1597. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1598. |_[ + ] More details::  / - / , ISP: 
  1599. |_[ + ] Found:: UNIDENTIFIED
  1600. 
  1601.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1602. |_[ + ] [ 62 / 100 ]-[02:07:00] [ - ] 
  1603. |_[ + ] Target:: [ http://www.getdogsex.com/?x=2255.2936 ]
  1604. |_[ + ] Exploit:: 
  1605. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1606. |_[ + ] More details::  / - / , ISP: 
  1607. |_[ + ] Found:: UNIDENTIFIED
  1608. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 66974 out of 429886 bytes received
  1609. 
  1610.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1611. |_[ + ] [ 63 / 100 ]-[02:07:10] [ - ] 
  1612. |_[ + ] Target:: [ http://www.getdogsex.com/?x=3134.2936 ]
  1613. |_[ + ] Exploit:: 
  1614. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1615. |_[ + ] More details::  / - / , ISP: 
  1616. |_[ + ] Found:: UNIDENTIFIED
  1617. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 66974 out of 429886 bytes received
  1618. 
  1619.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1620. |_[ + ] [ 64 / 100 ]-[02:07:20] [ - ] 
  1621. |_[ + ] Target:: [ http://www.getdogsex.com/?x=6071.2936. ]
  1622. |_[ + ] Exploit:: 
  1623. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1624. |_[ + ] More details::  / - / , ISP: 
  1625. |_[ + ] Found:: UNIDENTIFIED
  1626. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 65619 out of 429886 bytes received
  1627. 
  1628.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1629. |_[ + ] [ 65 / 100 ]-[02:07:21] [ - ] 
  1630. |_[ + ] Target:: [ http://getdogsex.com/play.php?v=4ALeBlhkN10jQ-QVzYn8woBfejRMTVfbL4h56ZBn2RUGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1631. |_[ + ] Exploit:: 
  1632. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1633. |_[ + ] More details::  / - / , ISP: 
  1634. |_[ + ] Found:: UNIDENTIFIED
  1635. 
  1636.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1637. |_[ + ] [ 66 / 100 ]-[02:07:22] [ - ] 
  1638. |_[ + ] Target:: [ http://getdogsex.com/play.php?v=zZkrSH34fAAtbzvEmbTPjiw8xIX-Xrok_WgLJlI5aEQGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1639. |_[ + ] Exploit:: 
  1640. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1641. |_[ + ] More details::  / - / , ISP: 
  1642. |_[ + ] Found:: UNIDENTIFIED
  1643. 
  1644.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1645. |_[ + ] [ 67 / 100 ]-[02:07:23] [ - ] 
  1646. |_[ + ] Target:: [ http://www.getdogsex.com/movies/MlZSzFlZtK-nHwDTJbAVgBFMqHPeo3bhPVU3kM7sQSGhkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1647. |_[ + ] Exploit:: 
  1648. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1649. |_[ + ] More details::  / - / , ISP: 
  1650. |_[ + ] Found:: UNIDENTIFIED
  1651. 
  1652.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1653. |_[ + ] [ 68 / 100 ]-[02:07:25] [ - ] 
  1654. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fe1feb3d3ade7fe3d0/597636261feb3d3ade7fe595/ ]
  1655. |_[ + ] Exploit:: 
  1656. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:198.251.80.112:80 
  1657. |_[ + ] More details::  / - / , ISP: 
  1658. |_[ + ] Found:: UNIDENTIFIED
  1659. 
  1660.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1661. |_[ + ] [ 69 / 100 ]-[02:07:26] [ - ] 
  1662. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f61feb3d3ade7fe394/5976360f1feb3d3ade7fe465/ ]
  1663. |_[ + ] Exploit:: 
  1664. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1665. |_[ + ] More details::  / - / , ISP: 
  1666. |_[ + ] Found:: UNIDENTIFIED
  1667. 
  1668.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1669. |_[ + ] [ 70 / 100 ]-[02:07:27] [ - ] 
  1670. |_[ + ] Target:: [ http://www.getdogsex.com/movies/izapgSdVEZDdL0wnlAsMNvEA1Qiyb6TBhOFf8GNW_OuhkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1671. |_[ + ] Exploit:: 
  1672. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1673. |_[ + ] More details::  / - / , ISP: 
  1674. |_[ + ] Found:: UNIDENTIFIED
  1675. 
  1676.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1677. |_[ + ] [ 71 / 100 ]-[02:07:28] [ - ] 
  1678. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f51feb3d3ade7fe389/5976360b1feb3d3ade7fe42f/ ]
  1679. |_[ + ] Exploit:: 
  1680. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1681. |_[ + ] More details::  / - / , ISP: 
  1682. |_[ + ] Found:: UNIDENTIFIED
  1683. 
  1684.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1685. |_[ + ] [ 72 / 100 ]-[02:07:29] [ - ] 
  1686. |_[ + ] Target:: [ http://getdogsex.com/movies/WrBsj10SpY-DlLqJyxLlkMNIrlYAUwY0eJO1VJGsURuhkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1687. |_[ + ] Exploit:: 
  1688. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:209.141.38.134:80 
  1689. |_[ + ] More details::  / - / , ISP: 
  1690. |_[ + ] Found:: UNIDENTIFIED
  1691. 
  1692.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1693. |_[ + ] [ 73 / 100 ]-[02:07:30] [ - ] 
  1694. |_[ + ] Target:: [ http://www.getdogsex.com/movies/lCpOjN0cs4pUEaf1rLQwByqP-CsHWROua5ESiJZdlBuhkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1695. |_[ + ] Exploit:: 
  1696. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1697. |_[ + ] More details::  / - / , ISP: 
  1698. |_[ + ] Found:: UNIDENTIFIED
  1699. 
  1700.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1701. |_[ + ] [ 74 / 100 ]-[02:07:31] [ - ] 
  1702. |_[ + ] Target:: [ http://www.getdogsex.com/play.php?v=ctYe_qXW6Tf25l_6nRkVd9y_iaV904-fQHXGZwXVTnahkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1703. |_[ + ] Exploit:: 
  1704. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1705. |_[ + ] More details::  / - / , ISP: 
  1706. |_[ + ] Found:: UNIDENTIFIED
  1707. 
  1708.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1709. |_[ + ] [ 75 / 100 ]-[02:07:31] [ - ] 
  1710. |_[ + ] Target:: [ http://getdogsex.com/movies/KszqRY4uztMQ2SNXEwqCTFmbNQax3DxUoupuiDgDuv0GOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1711. |_[ + ] Exploit:: 
  1712. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:185.181.102.198:80 
  1713. |_[ + ] More details::  / - / , ISP: 
  1714. |_[ + ] Found:: UNIDENTIFIED
  1715. 
  1716.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1717. |_[ + ] [ 76 / 100 ]-[02:07:33] [ - ] 
  1718. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f51feb3d3ade7fe38c/5976360c1feb3d3ade7fe43e/ ]
  1719. |_[ + ] Exploit:: 
  1720. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1721. |_[ + ] More details::  / - / , ISP: 
  1722. |_[ + ] Found:: UNIDENTIFIED
  1723. 
  1724.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1725. |_[ + ] [ 77 / 100 ]-[02:07:34] [ - ] 
  1726. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f91feb3d3ade7fe3a9/597636171feb3d3ade7fe4d0/ ]
  1727. |_[ + ] Exploit:: 
  1728. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1729. |_[ + ] More details::  / - / , ISP: 
  1730. |_[ + ] Found:: UNIDENTIFIED
  1731. 
  1732.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1733. |_[ + ] [ 78 / 100 ]-[02:07:35] [ - ] 
  1734. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fc1feb3d3ade7fe3c4/597636211feb3d3ade7fe555/ ]
  1735. |_[ + ] Exploit:: 
  1736. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1737. |_[ + ] More details::  / - / , ISP: 
  1738. |_[ + ] Found:: UNIDENTIFIED
  1739. 
  1740.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1741. |_[ + ] [ 79 / 100 ]-[02:07:37] [ - ] 
  1742. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f71feb3d3ade7fe39c/597636131feb3d3ade7fe491/ ]
  1743. |_[ + ] Exploit:: 
  1744. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1745. |_[ + ] More details::  / - / , ISP: 
  1746. |_[ + ] Found:: UNIDENTIFIED
  1747. 
  1748.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1749. |_[ + ] [ 80 / 100 ]-[02:07:38] [ - ] 
  1750. |_[ + ] Target:: [ http://www.getdogsex.com/movies/roMovpga-f5fXjVNl-8vnKbEeZsbKxWBpPxwq7b7YocGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1751. |_[ + ] Exploit:: 
  1752. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1753. |_[ + ] More details::  / - / , ISP: 
  1754. |_[ + ] Found:: UNIDENTIFIED
  1755. 
  1756.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1757. |_[ + ] [ 81 / 100 ]-[02:07:39] [ - ] 
  1758. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636051feb3d3ade7fe400/597636371feb3d3ade7fe681/ ]
  1759. |_[ + ] Exploit:: 
  1760. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1761. |_[ + ] More details::  / - / , ISP: 
  1762. |_[ + ] Found:: UNIDENTIFIED
  1763. 
  1764.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1765. |_[ + ] [ 82 / 100 ]-[02:07:40] [ - ] 
  1766. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f41feb3d3ade7fe385/597636091feb3d3ade7fe41c/ ]
  1767. |_[ + ] Exploit:: 
  1768. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1769. |_[ + ] More details::  / - / , ISP: 
  1770. |_[ + ] Found:: UNIDENTIFIED
  1771. 
  1772.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1773. |_[ + ] [ 83 / 100 ]-[02:07:41] [ - ] 
  1774. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f51feb3d3ade7fe38b/5976360c1feb3d3ade7fe439/ ]
  1775. |_[ + ] Exploit:: 
  1776. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1777. |_[ + ] More details::  / - / , ISP: 
  1778. |_[ + ] Found:: UNIDENTIFIED
  1779. 
  1780.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1781. |_[ + ] [ 84 / 100 ]-[02:07:43] [ - ] 
  1782. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636001feb3d3ade7fe3d8/597636281feb3d3ade7fe5b9/ ]
  1783. |_[ + ] Exploit:: 
  1784. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1785. |_[ + ] More details::  / - / , ISP: 
  1786. |_[ + ] Found:: UNIDENTIFIED
  1787. 
  1788.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1789. |_[ + ] [ 85 / 100 ]-[02:07:44] [ - ] 
  1790. |_[ + ] Target:: [ http://getdogsex.com/movies/GEgbts1MUFouFDIz-6co13NcqrYNvcmEUxsNmQ343kEGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1791. |_[ + ] Exploit:: 
  1792. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:185.181.102.198:80 
  1793. |_[ + ] More details::  / - / , ISP: 
  1794. |_[ + ] Found:: UNIDENTIFIED
  1795. 
  1796.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1797. |_[ + ] [ 86 / 100 ]-[02:07:44] [ - ] 
  1798. |_[ + ] Target:: [ http://getdogsex.com/click/597636271feb3d3ade7fe5a9/597635ff1feb3d3ade7fe3d4 ]
  1799. |_[ + ] Exploit:: 
  1800. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:185.181.102.198:80 
  1801. |_[ + ] More details::  / - / , ISP: 
  1802. |_[ + ] Found:: UNIDENTIFIED
  1803. 
  1804.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1805. |_[ + ] [ 87 / 100 ]-[02:07:45] [ - ] 
  1806. |_[ + ] Target:: [ http://www.getdogsex.com/click/597636141feb3d3ade7fe494/597635f71feb3d3ade7fe39d ]
  1807. |_[ + ] Exploit:: 
  1808. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1809. |_[ + ] More details::  / - / , ISP: 
  1810. |_[ + ] Found:: UNIDENTIFIED
  1811. 
  1812.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1813. |_[ + ] [ 88 / 100 ]-[02:07:46] [ - ] 
  1814. |_[ + ] Target:: [ http://www.getdogsex.com/click/597636311feb3d3ade7fe634/597636031feb3d3ade7fe3f0 ]
  1815. |_[ + ] Exploit:: 
  1816. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1817. |_[ + ] More details::  / - / , ISP: 
  1818. |_[ + ] Found:: UNIDENTIFIED
  1819. 
  1820.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1821. |_[ + ] [ 89 / 100 ]-[02:07:47] [ - ] 
  1822. |_[ + ] Target:: [ http://getdogsex.com/movies/m2ehnPyud-g-Z8gF-YFWP5iYez6jX1Aj-2V3TeRJ4foGOtwcH4aNK_ZxQuAq4raqoONzMoDyd6--MTbOJbxlyg/ ]
  1823. |_[ + ] Exploit:: 
  1824. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:185.181.102.198:80 
  1825. |_[ + ] More details::  / - / , ISP: 
  1826. |_[ + ] Found:: UNIDENTIFIED
  1827. 
  1828.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1829. |_[ + ] [ 90 / 100 ]-[02:07:47] [ - ] 
  1830. |_[ + ] Target:: [ http://getdogsex.com/click/597636301feb3d3ade7fe62b/597636031feb3d3ade7fe3ee ]
  1831. |_[ + ] Exploit:: 
  1832. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx/1.10.3 (Ubuntu) X-Powered-By: Express, IP:185.181.102.198:80 
  1833. |_[ + ] More details::  / - / , ISP: 
  1834. |_[ + ] Found:: UNIDENTIFIED
  1835. 
  1836.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1837. |_[ + ] [ 91 / 100 ]-[02:07:49] [ - ] 
  1838. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636021feb3d3ade7fe3eb/5976362f1feb3d3ade7fe61c/ ]
  1839. |_[ + ] Exploit:: 
  1840. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1841. |_[ + ] More details::  / - / , ISP: 
  1842. |_[ + ] Found:: UNIDENTIFIED
  1843. 
  1844.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1845. |_[ + ] [ 92 / 100 ]-[02:07:49] [ - ] 
  1846. |_[ + ] Target:: [ http://www.getdogsex.com/movies/8KeOamVs4FhiEHz94yhTWB33LAQOSQgffiqwLQpv0XyhkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1847. |_[ + ] Exploit:: 
  1848. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1849. |_[ + ] More details::  / - / , ISP: 
  1850. |_[ + ] Found:: UNIDENTIFIED
  1851. 
  1852.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1853. |_[ + ] [ 93 / 100 ]-[02:07:51] [ - ] 
  1854. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635ff1feb3d3ade7fe3d3/597636271feb3d3ade7fe5a0/ ]
  1855. |_[ + ] Exploit:: 
  1856. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1857. |_[ + ] More details::  / - / , ISP: 
  1858. |_[ + ] Found:: UNIDENTIFIED
  1859. 
  1860.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1861. |_[ + ] [ 94 / 100 ]-[02:07:52] [ - ] 
  1862. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f51feb3d3ade7fe390/5976360d1feb3d3ade7fe451/ ]
  1863. |_[ + ] Exploit:: 
  1864. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1865. |_[ + ] More details::  / - / , ISP: 
  1866. |_[ + ] Found:: UNIDENTIFIED
  1867. 
  1868.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1869. |_[ + ] [ 95 / 100 ]-[02:07:53] [ - ] 
  1870. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636031feb3d3ade7fe3ee/597636301feb3d3ade7fe628/ ]
  1871. |_[ + ] Exploit:: 
  1872. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1873. |_[ + ] More details::  / - / , ISP: 
  1874. |_[ + ] Found:: UNIDENTIFIED
  1875. 
  1876.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1877. |_[ + ] [ 96 / 100 ]-[02:07:55] [ - ] 
  1878. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635fd1feb3d3ade7fe3c6/597636221feb3d3ade7fe561/ ]
  1879. |_[ + ] Exploit:: 
  1880. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1881. |_[ + ] More details::  / - / , ISP: 
  1882. |_[ + ] Found:: UNIDENTIFIED
  1883. 
  1884.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1885. |_[ + ] [ 97 / 100 ]-[02:07:56] [ - ] 
  1886. |_[ + ] Target:: [ http://www.getdogsex.com/view/597636041feb3d3ade7fe3f6/597636341feb3d3ade7fe652/ ]
  1887. |_[ + ] Exploit:: 
  1888. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1889. |_[ + ] More details::  / - / , ISP: 
  1890. |_[ + ] Found:: UNIDENTIFIED
  1891. 
  1892.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1893. |_[ + ] [ 98 / 100 ]-[02:07:57] [ - ] 
  1894. |_[ + ] Target:: [ http://www.getdogsex.com/view/597635f61feb3d3ade7fe398/597636121feb3d3ade7fe47b/ ]
  1895. |_[ + ] Exploit:: 
  1896. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1897. |_[ + ] More details::  / - / , ISP: 
  1898. |_[ + ] Found:: UNIDENTIFIED
  1899. 
  1900.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1901. |_[ + ] [ 99 / 100 ]-[02:07:58] [ - ] 
  1902. |_[ + ] Target:: [ http://www.getdogsex.com/movies/YbBFlehF1quQFzSZkufEJHyB0fpfI2KQNa5h07RLjBmhkAoB7iA7ta_3sEN-l_fMVA1TDIywXx35rATlrlJWVw/ ]
  1903. |_[ + ] Exploit:: 
  1904. |_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.10.0 (Ubuntu) X-Powered-By: Express, IP:46.166.173.125:80 
  1905. |_[ + ] More details::  / - / , ISP: 
  1906. |_[ + ] Found:: UNIDENTIFIED
  1907.  
  1908. [ INFO ] [ Shutting down ]
  1909. [ INFO ] [ End of process INURLBR at [23-10-2017 02:07:58]
  1910. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  1911. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-getdogsex.com.txt ]
  1912. |_________________________________________________________________________________________
  1913.  
  1914. \_________________________________________________________________________________________/
  1915.  
  1916.  + -- --=[Port 110 closed... skipping.
  1917.  + -- --=[Port 111 closed... skipping.
  1918.  + -- --=[Port 135 closed... skipping.
  1919.  + -- --=[Port 139 closed... skipping.
  1920.  + -- --=[Port 161 closed... skipping.
  1921.  + -- --=[Port 162 closed... skipping.
  1922.  + -- --=[Port 389 closed... skipping.
  1923.  + -- --=[Port 443 closed... skipping.
  1924.  + -- --=[Port 445 closed... skipping.
  1925.  + -- --=[Port 512 closed... skipping.
  1926.  + -- --=[Port 513 closed... skipping.
  1927.  + -- --=[Port 514 closed... skipping.
  1928.  + -- --=[Port 623 closed... skipping.
  1929.  + -- --=[Port 624 closed... skipping.
  1930.  + -- --=[Port 1099 closed... skipping.
  1931.  + -- --=[Port 1433 closed... skipping.
  1932.  + -- --=[Port 2049 closed... skipping.
  1933.  + -- --=[Port 2121 closed... skipping.
  1934.  + -- --=[Port 3306 closed... skipping.
  1935.  + -- --=[Port 3310 closed... skipping.
  1936.  + -- --=[Port 3128 closed... skipping.
  1937.  + -- --=[Port 3389 closed... skipping.
  1938.  + -- --=[Port 3632 closed... skipping.
  1939.  + -- --=[Port 4443 closed... skipping.
  1940.  + -- --=[Port 5432 closed... skipping.
  1941.  + -- --=[Port 5800 closed... skipping.
  1942.  + -- --=[Port 5900 closed... skipping.
  1943.  + -- --=[Port 5984 closed... skipping.
  1944.  + -- --=[Port 6000 closed... skipping.
  1945.  + -- --=[Port 6667 closed... skipping.
  1946.  + -- --=[Port 8000 closed... skipping.
  1947.  + -- --=[Port 8100 closed... skipping.
  1948.  + -- --=[Port 8080 closed... skipping.
  1949.  + -- --=[Port 8180 closed... skipping.
  1950.  + -- --=[Port 8443 closed... skipping.
  1951.  + -- --=[Port 8888 closed... skipping.
  1952.  + -- --=[Port 10000 closed... skipping.
  1953.  + -- --=[Port 16992 closed... skipping.
  1954.  + -- --=[Port 27017 closed... skipping.
  1955.  + -- --=[Port 27018 closed... skipping.
  1956.  + -- --=[Port 27019 closed... skipping.
  1957.  + -- --=[Port 28017 closed... skipping.
  1958.  + -- --=[Port 49152 closed... skipping.
  1959.  + -- ----------------------------=[Scanning For Common Vulnerabilities]=----- -- +
  1960. #########################################################################################
  1961. oooooo oooo .o. .oooooo..o ooooo ooo .oooooo.
  1962. `888. .8' .888. d8P' `Y8 `888' `8' d8P' `Y8b
  1963. `888. .8' .88888. Y88bo. 888 8 888 888
  1964. `888.8' .8' `888. `ZY8888o. 888 8 888 888
  1965. `888' .88ooo8888. `0Y88b 888 8 888 888
  1966. 888 .8' `888. oo .d8P `88. .8' `88b d88'
  1967. o888o o88o o8888o 88888888P' `YbodP' `Y8bood8P'
  1968. Welcome to Yasuo v2.3
  1969. Author: Saurabh Harit (@0xsauby) | Contribution & Coolness: Stephen Hall (@logicalsec)
  1970. #########################################################################################
  1971.  
  1972. I, [2017-10-23T02:08:02.042759 #17801] INFO -- : Initiating port scan
  1973. I, [2017-10-23T02:10:34.977829 #17801] INFO -- : Using nmap scan output file logs/nmap_output_2017-10-23_02-08-02.xml
  1974. W, [2017-10-23T02:10:35.001518 #17801] WARN -- : Yasuo did not find any potential hosts to enumerate
  1975.  + -- ----------------------------=[Performing Full NMap Port Scan]=---------- -- +
  1976.  
  1977. Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-23 02:10 EDT
  1978. NSE: Loaded 42 scripts for scanning.
  1979. Initiating Parallel DNS resolution of 1 host. at 02:10
  1980. Completed Parallel DNS resolution of 1 host. at 02:10, 2.73s elapsed
  1981. Initiating SYN Stealth Scan at 02:10
  1982. Scanning getdogsex.com (198.251.89.87) [65355 ports]
  1983. Discovered open port 80/tcp on 198.251.89.87
  1984. SYN Stealth Scan Timing: About 4.53% done; ETC: 02:22 (0:10:53 remaining)
  1985. SYN Stealth Scan Timing: About 10.56% done; ETC: 02:22 (0:10:18 remaining)
  1986. SYN Stealth Scan Timing: About 16.87% done; ETC: 02:22 (0:09:41 remaining)
  1987. SYN Stealth Scan Timing: About 21.74% done; ETC: 02:22 (0:09:03 remaining)
  1988. SYN Stealth Scan Timing: About 26.65% done; ETC: 02:21 (0:08:18 remaining)
  1989. SYN Stealth Scan Timing: About 31.67% done; ETC: 02:21 (0:07:35 remaining)
  1990. SYN Stealth Scan Timing: About 36.88% done; ETC: 02:21 (0:06:52 remaining)
  1991. SYN Stealth Scan Timing: About 42.41% done; ETC: 02:21 (0:06:16 remaining)
  1992. SYN Stealth Scan Timing: About 47.46% done; ETC: 02:21 (0:05:43 remaining)
  1993. SYN Stealth Scan Timing: About 52.68% done; ETC: 02:21 (0:05:05 remaining)
  1994. SYN Stealth Scan Timing: About 58.06% done; ETC: 02:21 (0:04:32 remaining)
  1995. SYN Stealth Scan Timing: About 63.10% done; ETC: 02:21 (0:03:57 remaining)
  1996. SYN Stealth Scan Timing: About 68.44% done; ETC: 02:21 (0:03:21 remaining)
  1997. SYN Stealth Scan Timing: About 73.87% done; ETC: 02:21 (0:02:48 remaining)
  1998. SYN Stealth Scan Timing: About 79.06% done; ETC: 02:21 (0:02:15 remaining)
  1999. SYN Stealth Scan Timing: About 84.40% done; ETC: 02:21 (0:01:41 remaining)
  2000. SYN Stealth Scan Timing: About 90.16% done; ETC: 02:21 (0:01:03 remaining)
  2001. SYN Stealth Scan Timing: About 95.26% done; ETC: 02:21 (0:00:30 remaining)
  2002. Completed SYN Stealth Scan at 02:21, 632.87s elapsed (65355 total ports)
  2003. Initiating Service scan at 02:21
  2004. Scanning 1 service on getdogsex.com (198.251.89.87)
  2005. Completed Service scan at 02:21, 6.26s elapsed (1 service on 1 host)
  2006. Initiating OS detection (try #1) against getdogsex.com (198.251.89.87)
  2007. Retrying OS detection (try #2) against getdogsex.com (198.251.89.87)
  2008. NSE: Script scanning 198.251.89.87.
  2009. Initiating NSE at 02:21
  2010. Completed NSE at 02:21, 2.04s elapsed
  2011. Initiating NSE at 02:21
  2012. Completed NSE at 02:21, 0.00s elapsed
  2013. Nmap scan report for getdogsex.com (198.251.89.87)
  2014. Host is up (0.14s latency).
  2015. Other addresses for getdogsex.com (not scanned): 185.11.146.211 185.62.190.188 185.165.168.153 95.153.31.209 198.251.80.112 209.141.38.134 46.166.173.125 185.181.102.198 94.156.189.106
  2016. rDNS record for 198.251.89.87: r10.greybison.com
  2017. Not shown: 65354 filtered ports
  2018. PORT STATE SERVICE VERSION
  2019. 80/tcp open http nginx 1.10.0 (Ubuntu)
  2020. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  2021. Device type: general purpose
  2022. Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (91%)
  2023. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:2.6
  2024. Aggressive OS guesses: Linux 3.11 - 4.1 (91%), Linux 3.2.0 (90%), Linux 3.13 (88%), Linux 2.6.18 - 2.6.22 (86%), Linux 3.16 (86%), Linux 2.6.39 (85%), Linux 3.10 - 4.8 (85%), Linux 3.12 (85%), Linux 3.13 or 4.2 (85%), Linux 3.16 - 4.6 (85%)
  2025. No exact OS matches for host (test conditions non-ideal).
  2026. Uptime guess: 99.043 days (since Sun Jul 16 01:19:16 2017)
  2027. TCP Sequence Prediction: Difficulty=260 (Good luck!)
  2028. IP ID Sequence Generation: All zeros
  2029. Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
  2030.  
  2031. Read data files from: /usr/bin/../share/nmap
  2032. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2033. Nmap done: 1 IP address (1 host up) scanned in 651.64 seconds
  2034. Raw packets sent: 131206 (5.777MB) | Rcvd: 444 (20.276KB)
  2035.  + -- ----------------------------=[Enumerating Exploits via Searchsploit]=--- -- +
  2036. [i] Reading: '/usr/share/sniper/loot/nmap/nmap-getdogsex.com.xml'
  2037.  
  2038. --------------------------------------------- ----------------------------------
  2039. Exploit Title | Path
  2040. | (/usr/share/exploitdb/platforms/)
  2041. --------------------------------------------- ----------------------------------
  2042. Nginx (Debian-Based Distros + Gentoo) - 'log | linux/local/40768.sh
  2043. Nginx 0.6.36 - Directory Traversal | multiple/remote/12804.txt
  2044. Nginx 0.6.38 - Heap Corruption | linux/local/14830.py
  2045. Nginx 0.6.x - Arbitrary Code Execution NullB | multiple/webapps/24967.txt
  2046. Nginx 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5. | linux/dos/9901.txt
  2047. Nginx 0.7.61 - WebDAV Directory Traversal | multiple/remote/9829.txt
  2048. Nginx 0.7.64 - Terminal Escape Sequence in L | multiple/remote/33490.txt
  2049. Nginx 0.7.65/0.8.39 (dev) - Source Disclosur | windows/remote/13822.txt
  2050. Nginx 0.8.36 - Source Disclosure / Denial of | windows/remote/13818.txt
  2051. Nginx 1.1.17 - URI Processing SecURIty Bypas | multiple/remote/38846.txt
  2052. Nginx 1.3.9 < 1.4.0 - Chuncked Encoding Stac | linux/remote/25775.rb
  2053. Nginx 1.3.9 < 1.4.0 - Denial of Service (PoC | linux/dos/25499.py
  2054. Nginx 1.3.9/1.4.0 (x86) - Brute Force Remote | lin_x86/remote/26737.pl
  2055. Nginx 1.4.0 (Generic Linux x64) - Remote Exp | lin_x86-64/remote/32277.txt
  2056. --------------------------------------------- ----------------------------------
  2057.  
  2058.  
  2059. --------------------------------------------- ----------------------------------
  2060. Exploit Title | Path
  2061. | (/usr/share/exploitdb/platforms/)
  2062. --------------------------------------------- ----------------------------------
  2063. Nginx 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5. | linux/dos/9901.txt
  2064. Nginx 0.7.61 - WebDAV Directory Traversal | multiple/remote/9829.txt
  2065. Nginx 1.1.17 - URI Processing SecURIty Bypas | multiple/remote/38846.txt
  2066. Nginx 1.3.9 < 1.4.0 - Chuncked Encoding Stac | linux/remote/25775.rb
  2067. Nginx 1.3.9 < 1.4.0 - Denial of Service (PoC | linux/dos/25499.py
  2068. Nginx 1.3.9/1.4.0 (x86) - Brute Force Remote | lin_x86/remote/26737.pl
  2069. Nginx 1.4.0 (Generic Linux x64) - Remote Exp | lin_x86-64/remote/32277.txt
  2070. --------------------------------------------- ----------------------------------
  2071.  
  2072.  
  2073.  + -- ----------------------------=[Running Brute Force]=--------------------- -- +
  2074.  __________ __ ____ ___
  2075.  \______ \_______ __ ___/ |_ ____ \ \/ /
  2076.  | | _/\_ __ \ | \ __\/ __ \ \ / 
  2077.  | | \ | | \/ | /| | \ ___/ / \ 
  2078.  |______ / |__| |____/ |__| \___ >___/\ \ 
  2079.  \/ \/ \_/
  2080.  
  2081.  + -- --=[BruteX v1.7 by 1N3
  2082.  + -- --=[http://crowdshield.com
  2083.  
  2084.  
  2085. ################################### Running Port Scan ##############################
  2086.  
  2087. Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-23 02:21 EDT
  2088. Nmap scan report for getdogsex.com (185.11.146.211)
  2089. Host is up (0.12s latency).
  2090. Other addresses for getdogsex.com (not scanned): 185.62.190.188 185.165.168.153 95.153.31.209 198.251.80.112 209.141.38.134 46.166.173.125 185.181.102.198 94.156.189.106 198.251.89.87
  2091. rDNS record for 185.11.146.211: r12.greybison.com
  2092. Not shown: 25 filtered ports
  2093. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  2094. PORT STATE SERVICE
  2095. 80/tcp open http
  2096.  
  2097. Nmap done: 1 IP address (1 host up) scanned in 4.10 seconds
  2098.  
  2099. ################################### Running Brute Force ############################
  2100.  
  2101.  + -- --=[Port 21 closed... skipping.
  2102.  + -- --=[Port 22 closed... skipping.
  2103.  + -- --=[Port 23 closed... skipping.
  2104.  + -- --=[Port 25 closed... skipping.
  2105.  + -- --=[Port 80 opened... running tests...
  2106. Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
  2107.  
  2108. Hydra (http://www.thc.org/thc-hydra) starting at 2017-10-23 02:21:31
  2109. [DATA] max 1 task per 1 server, overall 1 task, 1496 login tries (l:34/p:44), ~1496 tries per task
  2110. [DATA] attacking http-get://getdogsex.com:80//
  2111. [80][http-get] host: getdogsex.com login: admin password: admin
  2112. [STATUS] attack finished for getdogsex.com (valid pair found)
  2113. 1 of 1 target successfully completed, 1 valid password found
  2114. Hydra (http://www.thc.org/thc-hydra) finished at 2017-10-23 02:22:14
  2115.  + -- --=[Port 110 closed... skipping.
  2116.  + -- --=[Port 139 closed... skipping.
  2117.  + -- --=[Port 162 closed... skipping.
  2118.  + -- --=[Port 389 closed... skipping.
  2119.  + -- --=[Port 443 closed... skipping.
  2120.  + -- --=[Port 445 closed... skipping.
  2121.  + -- --=[Port 512 closed... skipping.
  2122.  + -- --=[Port 513 closed... skipping.
  2123.  + -- --=[Port 514 closed... skipping.
  2124.  + -- --=[Port 993 closed... skipping.
  2125.  + -- --=[Port 1433 closed... skipping.
  2126.  + -- --=[Port 1521 closed... skipping.
  2127.  + -- --=[Port 3306 closed... skipping.
  2128.  + -- --=[Port 3389 closed... skipping.
  2129.  + -- --=[Port 5432 closed... skipping.
  2130.  + -- --=[Port 5900 closed... skipping.
  2131.  + -- --=[Port 5901 closed... skipping.
  2132.  + -- --=[Port 8000 closed... skipping.
  2133.  + -- --=[Port 8080 closed... skipping.
  2134.  + -- --=[Port 8100 closed... skipping.
  2135.  + -- --=[Port 6667 closed... skipping.
  2136.  
  2137. ################################### Done! ###########################################
  2138. #######################################################################################################################################
  2139. Hostname www.petsex.com ISP Cloudflare Inc (AS13335)
  2140. Continent North America Flag
  2141. US
  2142. Country United States Country Code US (USA)
  2143. Region Unknown Local time 23 Oct 2017 02:45 CDT
  2144. Metropolis Unknown Postal Code Unknown
  2145. City Unknown Latitude 37.751
  2146. IP Address 104.25.55.27 Longitude -97.822
  2147. #######################################################################################################################################
  2148. [i] Scanning Site: http://petsex.com
  2149.  
  2150.  
  2151.  
  2152. B A S I C I N F O
  2153. ====================
  2154.  
  2155.  
  2156. [+] Site Title:
  2157. [+] IP address: 104.25.54.27
  2158. [+] Web Server: cloudflare-nginx
  2159. [+] CMS: Could Not Detect
  2160. [+] Cloudflare: Not Detected
  2161. [+] Robots File: Could NOT Find robots.txt!
  2162.  
  2163.  
  2164.  
  2165.  
  2166. W H O I S L O O K U P
  2167. ========================
  2168.  
  2169. Domain Name: PETSEX.COM
  2170. Registry Domain ID: 762007_DOMAIN_COM-VRSN
  2171. Registrar WHOIS Server: whois.tucows.com
  2172. Registrar URL: http://www.tucowsdomains.com
  2173. Updated Date: 2016-12-16T05:21:55Z
  2174. Creation Date: 1998-01-15T05:00:00Z
  2175. Registry Expiry Date: 2018-01-14T05:00:00Z
  2176. Registrar: Tucows Domains Inc.
  2177. Registrar IANA ID: 69
  2178. Registrar Abuse Contact Email:
  2179. Registrar Abuse Contact Phone:
  2180. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  2181. Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
  2182. Name Server: ELLIOT.NS.CLOUDFLARE.COM
  2183. Name Server: TEGAN.NS.CLOUDFLARE.COM
  2184. DNSSEC: unsigned
  2185. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  2186. >>> Last update of whois database: 2017-10-23T07:48:35Z <<<
  2187.  
  2188. For more information on Whois status codes, please visit https://icann.org/epp
  2189.  
  2190.  
  2191.  
  2192. The Registry database contains ONLY .COM, .NET, .EDU domains and
  2193. Registrars.
  2194.  
  2195.  
  2196.  
  2197.  
  2198. G E O I P L O O K U P
  2199. =========================
  2200.  
  2201. [i] IP Address: 104.25.55.27
  2202. [i] Country: US
  2203. [i] State: N/A
  2204. [i] City: N/A
  2205. [i] Latitude: 37.750999
  2206. [i] Longitude: -97.821999
  2207.  
  2208.  
  2209.  
  2210.  
  2211. H T T P H E A D E R S
  2212. =======================
  2213.  
  2214.  
  2215. [i] HTTP/1.1 200 OK
  2216. [i] Date: Mon, 23 Oct 2017 07:48:48 GMT
  2217. [i] Content-Type: text/html; charset=UTF-8
  2218. [i] Connection: close
  2219. [i] Set-Cookie: __cfduid=de1f652ec837eda1e76ebfdcf517d46e31508744928; expires=Tue, 23-Oct-18 07:48:48 GMT; path=/; domain=.petsex.com; HttpOnly
  2220. [i] Expires: Thu, 01 Jan 1970 00:00:01 GMT
  2221. [i] Cache-Control: no-cache
  2222. [i] Set-Cookie: surfer=Ch4ADVntnt84DVqjeBO7Ag==; expires=Tue, 23-Oct-18 07:48:47 GMT; path=/
  2223. [i] Server: cloudflare-nginx
  2224. [i] CF-RAY: 3b23189b70d83bc9-CDG
  2225.  
  2226.  
  2227.  
  2228.  
  2229. D N S L O O K U P
  2230. ===================
  2231.  
  2232. petsex.com. 172800 IN NS elliot.ns.cloudflare.com.
  2233. petsex.com. 172800 IN NS tegan.ns.cloudflare.com.
  2234.  
  2235.  
  2236.  
  2237.  
  2238. S U B N E T C A L C U L A T I O N
  2239. ====================================
  2240.  
  2241. Address = 104.25.54.27
  2242. Network = 104.25.54.27 / 32
  2243. Netmask = 255.255.255.255
  2244. Broadcast = not needed on Point-to-Point links
  2245. Wildcard Mask = 0.0.0.0
  2246. Hosts Bits = 0
  2247. Max. Hosts = 1 (2^0 - 0)
  2248. Host Range = { 104.25.54.27 - 104.25.54.27 }
  2249.  
  2250.  
  2251.  
  2252. N M A P P O R T S C A N
  2253. ============================
  2254.  
  2255.  
  2256. Starting Nmap 7.01 ( https://nmap.org ) at 2017-10-23 07:48 UTC
  2257. Nmap scan report for petsex.com (104.25.54.27)
  2258. Host is up (0.0022s latency).
  2259. Other addresses for petsex.com (not scanned): 104.25.55.27
  2260. PORT STATE SERVICE VERSION
  2261. 21/tcp filtered ftp
  2262. 22/tcp filtered ssh
  2263. 23/tcp filtered telnet
  2264. 25/tcp filtered smtp
  2265. 80/tcp open http Cloudflare nginx
  2266. 110/tcp filtered pop3
  2267. 143/tcp filtered imap
  2268. 443/tcp open ssl/http Cloudflare nginx
  2269. 445/tcp filtered microsoft-ds
  2270. 3389/tcp filtered ms-wbt-server
  2271.  
  2272. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2273. Nmap done: 1 IP address (1 host up) scanned in 13.87 seconds
  2274.  
  2275.  
  2276.  
  2277. S U B - D O M A I N F I N D E R
  2278. ==================================
  2279.  
  2280.  
  2281. [i] Total Subdomains Found : 4
  2282.  
  2283. [+] Subdomain: petsex.com
  2284. [-] IP: 104.25.54.27
  2285.  
  2286. [+] Subdomain: petsex.com
  2287. [-] IP: 104.25.55.27
  2288.  
  2289. [+] Subdomain: www.petsex.com
  2290. [-] IP: 104.25.54.27
  2291.  
  2292. [+] Subdomain: www.petsex.com
  2293. [-] IP: 104.25.55.27
  2294.  
  2295.  
  2296.  
  2297.  
  2298.  
  2299. R E V E R S E I P L O O K U P
  2300. ==================================
  2301.  
  2302.  
  2303. [i] Total Sites Found On This Server : 0
  2304.  
  2305.  
  2306.  
  2307.  
  2308.  
  2309. S Q L V U L N E R A B I L I T Y S C A N N E R
  2310. ===================================================
  2311.  
  2312.  
  2313. [+] URL(s) With Parameter(s):0
  2314. #
  2315. # ARIN WHOIS data and services are subject to the Terms of Use
  2316. # available at: https://www.arin.net/whois_tou.html
  2317. #
  2318. # If you see inaccuracies in the results, please report at
  2319. # https://www.arin.net/public/whoisinaccuracy/index.xhtml
  2320. #
  2321.  
  2322.  
  2323. #
  2324. # The following results may also be obtained via:
  2325. # https://whois.arin.net/rest/nets;q=104.25.54.27?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
  2326. #
  2327.  
  2328. NetRange: 104.16.0.0 - 104.31.255.255
  2329. CIDR: 104.16.0.0/12
  2330. NetName: CLOUDFLARENET
  2331. NetHandle: NET-104-16-0-0-1
  2332. Parent: NET104 (NET-104-0-0-0-0)
  2333. NetType: Direct Assignment
  2334. OriginAS: AS13335
  2335. Organization: Cloudflare, Inc. (CLOUD14)
  2336. RegDate: 2014-03-28
  2337. Updated: 2017-02-17
  2338. Comment: All Cloudflare abuse reporting can be done via https://www.cloudflare.com/abuse
  2339. Ref: https://whois.arin.net/rest/net/NET-104-16-0-0-1
  2340.  
  2341.  
  2342.  
  2343. OrgName: Cloudflare, Inc.
  2344. OrgId: CLOUD14
  2345. Address: 101 Townsend Street
  2346. City: San Francisco
  2347. StateProv: CA
  2348. PostalCode: 94107
  2349. Country: US
  2350. RegDate: 2010-07-09
  2351. Updated: 2017-02-17
  2352. Comment: All Cloudflare abuse reporting can be done via https://www.cloudflare.com/abuse
  2353. Ref: https://whois.arin.net/rest/org/CLOUD14
  2354.  
  2355.  
  2356. OrgTechHandle: ADMIN2521-ARIN
  2357. OrgTechName: Admin
  2358. OrgTechPhone: +1-650-319-8930
  2359. OrgTechEmail: rir@cloudflare.com
  2360. OrgTechRef: https://whois.arin.net/rest/poc/ADMIN2521-ARIN
  2361.  
  2362. OrgNOCHandle: NOC11962-ARIN
  2363. OrgNOCName: NOC
  2364. OrgNOCPhone: +1-650-319-8930
  2365. OrgNOCEmail: noc@cloudflare.com
  2366. OrgNOCRef: https://whois.arin.net/rest/poc/NOC11962-ARIN
  2367.  
  2368. OrgAbuseHandle: ABUSE2916-ARIN
  2369. OrgAbuseName: Abuse
  2370. OrgAbusePhone: +1-650-319-8930
  2371. OrgAbuseEmail: abuse@cloudflare.com
  2372. OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE2916-ARIN
  2373.  
  2374. RNOCHandle: NOC11962-ARIN
  2375. RNOCName: NOC
  2376. RNOCPhone: +1-650-319-8930
  2377. RNOCEmail: noc@cloudflare.com
  2378. RNOCRef: https://whois.arin.net/rest/poc/NOC11962-ARIN
  2379.  
  2380. RAbuseHandle: ABUSE2916-ARIN
  2381. RAbuseName: Abuse
  2382. RAbusePhone: +1-650-319-8930
  2383. RAbuseEmail: abuse@cloudflare.com
  2384. RAbuseRef: https://whois.arin.net/rest/poc/ABUSE2916-ARIN
  2385.  
  2386. RTechHandle: ADMIN2521-ARIN
  2387. RTechName: Admin
  2388. RTechPhone: +1-650-319-8930
  2389. RTechEmail: rir@cloudflare.com
  2390. RTechRef: https://whois.arin.net/rest/poc/ADMIN2521-ARIN
  2391.  
  2392.  
  2393. #
  2394. # ARIN WHOIS data and services are subject to the Terms of Use
  2395. # available at: https://www.arin.net/whois_tou.html
  2396. #
  2397. # If you see inaccuracies in the results, please report at
  2398. # https://www.arin.net/public/whoisinaccuracy/index.xhtml
  2399. #[*] Performing TLD Brute force Enumeration against petsex.com
  2400. [*] The operation could take up to: 00:01:07
  2401. [*] A petsex.biz.af 5.45.75.45
  2402. [*] A petsex.co.asia 91.195.240.135
  2403. [*] CNAME petsex.biz.at free.biz.at
  2404. [*] A free.biz.at 216.92.134.29
  2405. [*] A petsex.org.aw 142.4.20.12
  2406. [*] A petsex.org.ax 185.55.85.123
  2407. [*] A petsex.com.ax 185.55.85.123
  2408. [*] A petsex.com.ba 195.222.33.180
  2409. [*] A petsex.co.ba 176.9.45.78
  2410. [*] A petsex.com.be 95.173.170.166
  2411. [*] A petsex.biz 144.76.1.130
  2412. [*] A petsex.biz 144.76.0.242
  2413. [*] A petsex.biz.by 71.18.52.2
  2414. [*] A petsex.biz.bz 199.59.242.150
  2415. [*] A petsex.net.cc 54.252.89.206
  2416. [*] A petsex.com.cc 54.252.107.64
  2417. [*] A petsex.org.ch 72.52.4.122
  2418. [*] A petsex.co.cc 175.126.123.219
  2419. [*] A petsex.biz.cl 185.53.178.8
  2420. [*] A petsex.com.com 52.33.196.199
  2421. [*] A petsex.co 185.53.178.29
  2422. [*] A petsex.co.com 173.192.115.17
  2423. [*] A petsex.com 104.25.54.27
  2424. [*] A petsex.com 104.25.55.27
  2425. [*] A petsex.net.com 199.59.242.150
  2426. [*] A petsex.org.com 23.23.86.44
  2427. [*] CNAME petsex.biz.cm i.cns.cm
  2428. [*] A i.cns.cm 118.184.56.30
  2429. [*] A petsex.biz.cr 72.52.4.122
  2430. [*] A petsex.co.cm 85.25.140.105
  2431. [*] A petsex.net.cm 85.25.140.105
  2432. [*] A petsex.biz.cx 72.52.4.122
  2433. [*] A petsex.com.cz 62.109.128.30
  2434. [*] A petsex.net.cz 80.250.24.177
  2435. [*] A petsex.biz.cz 185.53.179.7
  2436. [*] A petsex.de 94.102.214.160
  2437. [*] A petsex.com.de 50.56.68.37
  2438. [*] CNAME petsex.co.de co.de
  2439. [*] A co.de 144.76.162.245
  2440. [*] CNAME petsex.org.de www.org.de
  2441. [*] A www.org.de 78.47.128.8
  2442. [*] A petsex.net.eu 78.46.90.98
  2443. [*] A petsex.org.eu 78.46.90.98
  2444. [*] A petsex.biz.fi 185.55.85.123
  2445. [*] A petsex.fm 173.230.131.38
  2446. [*] A petsex.biz.fm 173.230.131.38
  2447. [*] A petsex.org.fr 149.202.133.35
  2448. [*] A petsex.biz.gl 72.52.4.122
  2449. [*] CNAME petsex.co.gp co.gp
  2450. [*] A co.gp 144.76.162.245
  2451. [*] A petsex.co.hn 208.100.40.203
  2452. [*] CNAME petsex.net.hr net.hr
  2453. [*] A net.hr 192.0.78.24
  2454. [*] A net.hr 192.0.78.25
  2455. [*] A petsex.co.ht 72.52.4.122
  2456. [*] CNAME petsex.biz.hn parkmydomain.vhostgo.com
  2457. [*] CNAME parkmydomain.vhostgo.com westuser.dopa.com
  2458. [*] A westuser.dopa.com 107.186.245.119
  2459. [*] A petsex.co.jobs 50.17.193.222
  2460. [*] A petsex.com.jobs 50.19.241.165
  2461. [*] A petsex.net.jobs 50.19.241.165
  2462. [*] A petsex.org.jobs 50.19.241.165
  2463. [*] A petsex.biz.jobs 50.19.241.165
  2464. [*] A petsex.la 173.230.141.80
  2465. [*] A petsex.co.la 195.110.124.154
  2466. [*] CNAME petsex.biz.li 712936.parkingcrew.net
  2467. [*] A 712936.parkingcrew.net 185.53.179.29
  2468. [*] A petsex.biz.lu 195.26.5.2
  2469. [*] A petsex.biz.ly 64.136.20.39
  2470. [*] A petsex.biz.md 72.52.4.122
  2471. [*] A petsex.co.mk 87.76.31.211
  2472. [*] A petsex.co.mobi 54.225.105.179
  2473. [*] A petsex.biz.my 202.190.174.44
  2474. [*] A petsex.net.net 52.50.81.210
  2475. [*] A petsex.co.net 188.166.216.219
  2476. [*] A petsex.net 178.175.138.99
  2477. [*] A petsex.org.net 23.23.86.44
  2478. [*] A petsex.co.nl 37.97.184.204
  2479. [*] A petsex.com.nl 83.98.157.102
  2480. [*] A petsex.net.nl 83.98.157.102
  2481. [*] A petsex.nu 185.53.178.6
  2482. [*] A petsex.co.nr 208.100.40.202
  2483. [*] A petsex.net.nu 199.102.76.78
  2484. [*] CNAME petsex.co.nu co.nu
  2485. [*] A co.nu 144.76.162.245
  2486. [*] CNAME petsex.com.nu com.nu
  2487. [*] A com.nu 144.76.162.245
  2488. [*] A petsex.org.nu 80.92.84.139
  2489. [*] A petsex.com.org 23.23.86.44
  2490. [*] CNAME petsex.net.org pewtrusts.org
  2491. [*] A pewtrusts.org 204.74.99.100
  2492. [*] A petsex.ph 45.79.222.138
  2493. [*] A petsex.co.ph 45.79.222.138
  2494. [*] A petsex.com.ph 45.79.222.138
  2495. [*] A petsex.net.ph 45.79.222.138
  2496. [*] A petsex.org.ph 45.79.222.138
  2497. [*] A petsex.co.pl 212.91.6.55
  2498. [*] A petsex.org.pm 208.73.210.217
  2499. [*] A petsex.org.pm 208.73.211.177
  2500. [*] A petsex.org.pm 208.73.210.202
  2501. [*] A petsex.org.pm 208.73.211.165
  2502. [*] A petsex.co.ps 66.96.132.56
  2503. [*] CNAME petsex.biz.ps biz.ps
  2504. [*] A biz.ps 144.76.162.245
  2505. [*] A petsex.co.pt 194.107.127.52
  2506. [*] A petsex.pw 141.8.226.58
  2507. [*] A petsex.co.pw 141.8.226.59
  2508. [*] A petsex.net.pw 141.8.226.59
  2509. [*] A petsex.biz.pw 141.8.226.59
  2510. [*] A petsex.org.pw 141.8.226.59
  2511. [*] A petsex.org.re 217.70.184.38
  2512. [*] A petsex.net.ro 69.64.52.127
  2513. [*] CNAME petsex.co.ro now.co.ro
  2514. [*] A now.co.ro 185.27.255.9
  2515. [*] A petsex.ru 72.52.4.122
  2516. [*] A petsex.com.ru 178.210.89.119
  2517. [*] A petsex.biz.sb 72.52.4.122
  2518. [*] A petsex.biz.se 185.53.179.6
  2519. [*] CNAME petsex.net.se 773147.parkingcrew.net
  2520. [*] A 773147.parkingcrew.net 185.53.179.29
  2521. [*] A petsex.co.sl 91.195.240.135
  2522. [*] A petsex.com.sr 143.95.106.249
  2523. [*] A petsex.biz.st 91.121.28.115
  2524. [*] A petsex.co.su 72.52.4.122
  2525. [*] A petsex.biz.tc 64.136.20.39
  2526. [*] A petsex.biz.tf 85.236.153.18
  2527. [*] A petsex.net.tf 188.40.70.27
  2528. [*] A petsex.net.tf 188.40.117.12
  2529. [*] A petsex.net.tf 188.40.70.29
  2530. [*] A petsex.co.tl 208.100.40.202
  2531. [*] A petsex.co.to 175.118.124.44
  2532. [*] A petsex.co.tv 31.186.25.163
  2533. [*] A petsex.biz.tv 72.52.4.122
  2534. [*] A petsex.org.tv 72.52.4.122
  2535. [*] CNAME petsex.biz.uz biz.uz
  2536. [*] A biz.uz 144.76.162.245
  2537. [*] A petsex.vg 88.198.29.97
  2538. [*] A petsex.co.vg 88.198.29.97
  2539. [*] A petsex.com.vg 88.198.29.97
  2540. [*] A petsex.net.vg 166.62.28.147
  2541. [*] A petsex.biz.vg 89.31.143.20
  2542. [*] A petsex.ws 64.70.19.203
  2543. [*] A petsex.com.ws 202.4.48.211
  2544. [*] A petsex.net.ws 202.4.48.211
  2545. [*] A petsex.org.ws 202.4.48.211
  2546. [*] A petsex.biz.ws 184.168.221.104
  2547. [92m + -- ----------------------------=[Running Nslookup]=------------------------ -- +
  2548. Server: 192.168.1.254
  2549. Address: 192.168.1.254#53
  2550.  
  2551. Non-authoritative answer:
  2552. Name: petsex.com
  2553. Address: 104.25.55.27
  2554. Name: petsex.com
  2555. Address: 104.25.54.27
  2556.  
  2557. petsex.com has address 104.25.54.27
  2558. petsex.com has address 104.25.55.27
  2559. petsex.com mail is handled by 10 aspmx2.googlemail.com.
  2560. petsex.com mail is handled by 1 aspmx.l.google.com.
  2561. petsex.com mail is handled by 5 alt2.aspmx.l.google.com.
  2562. petsex.com mail is handled by 10 aspmx3.googlemail.com.
  2563. petsex.com mail is handled by 5 alt1.aspmx.l.google.com.
  2564.  + -- ----------------------------=[Checking OS Fingerprint]=----------------- -- +
  2565.  
  2566. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  2567.  
  2568. [+] Target is petsex.com
  2569. [+] Loading modules.
  2570. [+] Following modules are loaded:
  2571. [x] [1] ping:icmp_ping - ICMP echo discovery module
  2572. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  2573. [x] [3] ping:udp_ping - UDP-based ping discovery module
  2574. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  2575. [x] [5] infogather:portscan - TCP and UDP PortScanner
  2576. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  2577. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  2578. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  2579. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  2580. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  2581. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  2582. [x] [12] fingerprint:smb - SMB fingerprinting module
  2583. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  2584. [+] 13 modules registered
  2585. [+] Initializing scan engine
  2586. [+] Running scan engine
  2587. [-] ping:tcp_ping module: no closed/open TCP ports known on 104.25.55.27. Module test failed
  2588. [-] ping:udp_ping module: no closed/open UDP ports known on 104.25.55.27. Module test failed
  2589. [-] No distance calculation. 104.25.55.27 appears to be dead or no ports known
  2590. [+] Host: 104.25.55.27 is up (Guess probability: 50%)
  2591. [+] Target: 104.25.55.27 is alive. Round-Trip Time: 0.51568 sec
  2592. [+] Selected safe Round-Trip Time value is: 1.03135 sec
  2593. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  2594. [-] fingerprint:smb need either TCP port 139 or 445 to run
  2595. [+] Primary guess:
  2596. [+] Host 104.25.55.27 Running OS: (Guess probability: 100%)
  2597. [+] Other guesses:
  2598. [+] Host 104.25.55.27 Running OS: Àbà V (Guess probability: 91%)
  2599. [+] Host 104.25.55.27 Running OS: (Guess probability: 91%)
  2600. [+] Host 104.25.55.27 Running OS: (Guess probability: 91%)
  2601. [+] Host 104.25.55.27 Running OS: Àbà V (Guess probability: 91%)
  2602. [+] Host 104.25.55.27 Running OS: Àbà V (Guess probability: 91%)
  2603. [+] Host 104.25.55.27 Running OS: Àbà V (Guess probability: 91%)
  2604. [+] Host 104.25.55.27 Running OS: Àbà V (Guess probability: 91%)
  2605. [+] Host 104.25.55.27 Running OS: (Guess probability: 91%)
  2606. [+] Host 104.25.55.27 Running OS: (Guess probability: 91%)
  2607. [+] Cleaning up scan engine
  2608. [+] Modules deinitialized
  2609. [+] Execution completed.
  2610.  + -- ----------------------------=[Gathering Whois Info]=-------------------- -- +
  2611. Domain Name: PETSEX.COM
  2612. Registry Domain ID: 762007_DOMAIN_COM-VRSN
  2613. Registrar WHOIS Server: whois.tucows.com
  2614. Registrar URL: http://www.tucowsdomains.com
  2615. Updated Date: 2016-12-16T05:21:55Z
  2616. Creation Date: 1998-01-15T05:00:00Z
  2617. Registry Expiry Date: 2018-01-14T05:00:00Z
  2618. Registrar: Tucows Domains Inc.
  2619. Registrar IANA ID: 69
  2620. Registrar Abuse Contact Email:
  2621. Registrar Abuse Contact Phone:
  2622. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  2623. Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
  2624. Name Server: ELLIOT.NS.CLOUDFLARE.COM
  2625. Name Server: TEGAN.NS.CLOUDFLARE.COM
  2626. DNSSEC: unsigned
  2627. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  2628. >>> Last update of whois database: 2017-10-23T07:47:18Z <<<
  2629.  
  2630. For more information on Whois status codes, please visit https://icann.org/epp
  2631.  
  2632. NOTICE: The expiration date displayed in this record is the date the
  2633. registrar's sponsorship of the domain name registration in the registry is
  2634. currently set to expire. This date does not necessarily reflect the expiration
  2635. date of the domain name registrant's agreement with the sponsoring
  2636. registrar. Users may consult the sponsoring registrar's Whois database to
  2637. view the registrar's reported date of expiration for this registration.
  2638.  
  2639. TERMS OF USE: You are not authorized to access or query our Whois
  2640. database through the use of electronic processes that are high-volume and
  2641. automated except as reasonably necessary to register domain names or
  2642. modify existing registrations; the Data in VeriSign Global Registry
  2643. Services' ("VeriSign") Whois database is provided by VeriSign for
  2644. information purposes only, and to assist persons in obtaining information
  2645. about or related to a domain name registration record. VeriSign does not
  2646. guarantee its accuracy. By submitting a Whois query, you agree to abide
  2647. by the following terms of use: You agree that you may use this Data only
  2648. for lawful purposes and that under no circumstances will you use this Data
  2649. to: (1) allow, enable, or otherwise support the transmission of mass
  2650. unsolicited, commercial advertising or solicitations via e-mail, telephone,
  2651. or facsimile; or (2) enable high volume, automated, electronic processes
  2652. that apply to VeriSign (or its computer systems). The compilation,
  2653. repackaging, dissemination or other use of this Data is expressly
  2654. prohibited without the prior written consent of VeriSign. You agree not to
  2655. use electronic processes that are automated and high-volume to access or
  2656. query the Whois database except as reasonably necessary to register
  2657. domain names or modify existing registrations. VeriSign reserves the right
  2658. to restrict your access to the Whois database in its sole discretion to ensure
  2659. operational stability. VeriSign may restrict or terminate your access to the
  2660. Whois database for failure to abide by these terms of use. VeriSign
  2661. reserves the right to modify these terms at any time.
  2662.  
  2663. The Registry database contains ONLY .COM, .NET, .EDU domains and
  2664. Registrars.
  2665. Domain Name: PETSEX.COM
  2666. Domain ID: 762007_DOMAIN_COM-VRSN
  2667. Registrar WHOIS Server: whois.tucows.com
  2668. Registrar URL: http://tucowsdomains.com
  2669. Updated Date: 2016-12-16T05:21:56Z
  2670. Creation Date: 1998-01-15T05:00:00Z
  2671. Registrar Registration Expiration Date: 2018-01-14T05:00:00Z
  2672. Registrar: TUCOWS, INC.
  2673. Registrar IANA ID: 69
  2674. Registrar Abuse Contact Email: domainabuse@tucows.com
  2675. Registrar Abuse Contact Phone: +1.4165350123
  2676. Reseller: WHOISGuardians
  2677. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  2678. Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
  2679. Registry Registrant ID:
  2680. Registrant Name: WHOISGuardians Client petsex.com WHOISGuardians Client petsex.com
  2681. Registrant Organization: WHOISGuardians Client petsex.com
  2682. Registrant Street: Zurcherstrasse 161 P.O. 103141
  2683. Registrant City: Zurich
  2684. Registrant State/Province: Zurich
  2685. Registrant Postal Code: 8010
  2686. Registrant Country: CH
  2687. Registrant Phone: +41.445853579
  2688. Registrant Phone Ext:
  2689. Registrant Fax:
  2690. Registrant Fax Ext:
  2691. Registrant Email: clients+petsex.com@whoisguardians.com
  2692. Registry Admin ID:
  2693. Admin Name: WHOISGuardians Client petsex.com WHOISGuardians Client petsex.com
  2694. Admin Organization: WHOISGuardians Client petsex.com
  2695. Admin Street: Zurcherstrasse 161 P.O. 103141
  2696. Admin City: Zurich
  2697. Admin State/Province: Zurich
  2698. Admin Postal Code: 8010
  2699. Admin Country: CH
  2700. Admin Phone: +41.445853579
  2701. Admin Phone Ext:
  2702. Admin Fax:
  2703. Admin Fax Ext:
  2704. Admin Email: clients+petsex.com@whoisguardians.com
  2705. Registry Tech ID:
  2706. Tech Name: WHOISGuardians Client petsex.com WHOISGuardians Client petsex.com
  2707. Tech Organization: WHOISGuardians Client petsex.com
  2708. Tech Street: Zurcherstrasse 161 P.O. 103141
  2709. Tech City: Zurich
  2710. Tech State/Province: Zurich
  2711. Tech Postal Code: 8010
  2712. Tech Country: CH
  2713. Tech Phone: +41.445853579
  2714. Tech Phone Ext:
  2715. Tech Fax:
  2716. Tech Fax Ext:
  2717. Tech Email: clients+petsex.com@whoisguardians.com
  2718. Name Server: ELLIOT.NS.CLOUDFLARE.COM
  2719. Name Server: TEGAN.NS.CLOUDFLARE.COM
  2720. DNSSEC: unsigned
  2721. URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
  2722. >>> Last update of WHOIS database: 2016-12-16T05:21:56Z <<<
  2723.  
  2724. "For more information on Whois status codes, please visit https://icann.org/epp"
  2725.  
  2726. Registration Service Provider:
  2727. WHOISGuardians, clients@whoisguardians.com
  2728. +41.445853579
  2729. http://www.whoisguardians.com
  2730. This company may be contacted for domain login/passwords,
  2731. DNS/Nameserver changes, and general domain support questions.
  2732.  
  2733. The Data in the Tucows Registrar WHOIS database is provided to you by Tucows
  2734. for information purposes only, and may be used to assist you in obtaining
  2735. information about or related to a domain name's registration record.
  2736.  
  2737. Tucows makes this information available "as is," and does not guarantee its
  2738. accuracy.
  2739.  
  2740. By submitting a WHOIS query, you agree that you will use this data only for
  2741. lawful purposes and that, under no circumstances will you use this data to:
  2742. a) allow, enable, or otherwise support the transmission by e-mail,
  2743. telephone, or facsimile of mass, unsolicited, commercial advertising or
  2744. solicitations to entities other than the data recipient's own existing
  2745. customers; or (b) enable high volume, automated, electronic processes that
  2746. send queries or data to the systems of any Registry Operator or
  2747. ICANN-Accredited registrar, except as reasonably necessary to register
  2748. domain names or modify existing registrations.
  2749.  
  2750. The compilation, repackaging, dissemination or other use of this Data is
  2751. expressly prohibited without the prior written consent of Tucows.
  2752.  
  2753. Tucows reserves the right to terminate your access to the Tucows WHOIS
  2754. database in its sole discretion, including without limitation, for excessive
  2755. querying of the WHOIS database or for failure to otherwise abide by this
  2756. policy.
  2757.  
  2758. Tucows reserves the right to modify these terms at any time.
  2759.  
  2760. By submitting this query, you agree to abide by these terms.
  2761.  
  2762. NOTE: THE WHOIS DATABASE IS A CONTACT DATABASE ONLY. LACK OF A DOMAIN
  2763. RECORD DOES NOT SIGNIFY DOMAIN AVAILABILITY.
  2764.  
  2765.  + -- ----------------------------=[Gathering OSINT Info]=-------------------- -- +
  2766.  
  2767. *******************************************************************
  2768. * *
  2769. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  2770. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  2771. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  2772. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  2773. * *
  2774. * TheHarvester Ver. 2.7 *
  2775. * Coded by Christian Martorella *
  2776. * Edge-Security Research *
  2777. * cmartorella@edge-security.com *
  2778. *******************************************************************
  2779.  
  2780.  
  2781. [-] Searching in Bing:
  2782. Searching 50 results...
  2783. Searching 100 results...
  2784.  
  2785.  
  2786. [+] Emails found:
  2787. ------------------
  2788. No emails found
  2789.  
  2790. [+] Hosts found in search engines:
  2791. ------------------------------------
  2792. [-] Resolving hostnames IPs...
  2793. 104.25.54.27:www.petsex.com
  2794.  + -- ----------------------------=[Gathering DNS Info]=---------------------- -- +
  2795.  
  2796. ; <<>> DiG 9.10.3-P4-Debian <<>> -x petsex.com
  2797. ;; global options: +cmd
  2798. ;; Got answer:
  2799. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25330
  2800. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  2801.  
  2802. ;; OPT PSEUDOSECTION:
  2803. ; EDNS: version: 0, flags:; udp: 4096
  2804. ;; QUESTION SECTION:
  2805. ;com.petsex.in-addr.arpa. IN PTR
  2806.  
  2807. ;; AUTHORITY SECTION:
  2808. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017043309 1800 900 604800 3600
  2809.  
  2810. ;; Query time: 106 msec
  2811. ;; SERVER: 192.168.1.254#53(192.168.1.254)
  2812. ;; WHEN: Mon Oct 23 03:47:46 EDT 2017
  2813. ;; MSG SIZE rcvd: 120
  2814.  
  2815. dnsenum VERSION:1.2.4
  2816. 
  2817. ----- petsex.com -----
  2818. 
  2819.  
  2820. Host's addresses:
  2821. __________________
  2822.  
  2823. petsex.com. 273 IN A 104.25.54.27
  2824. petsex.com. 273 IN A 104.25.55.27
  2825. 
  2826.  
  2827. Name Servers:
  2828. ______________
  2829.  
  2830. elliot.ns.cloudflare.com. 86400 IN A 173.245.59.162
  2831. tegan.ns.cloudflare.com. 86400 IN A 173.245.58.226
  2832. 
  2833.  
  2834. Mail (MX) Servers:
  2835. ___________________
  2836.  
  2837. aspmx.l.google.com. 293 IN A 209.85.232.26
  2838. alt2.aspmx.l.google.com. 293 IN A 209.85.203.26
  2839. aspmx3.googlemail.com. 293 IN A 209.85.203.26
  2840. alt1.aspmx.l.google.com. 293 IN A 64.233.186.26
  2841. aspmx2.googlemail.com. 293 IN A 64.233.186.26
  2842. 
  2843.  
  2844. Trying Zone Transfers and getting Bind Versions:
  2845. _________________________________________________
  2846.  
  2847. 
  2848. Trying Zone Transfer for petsex.com on elliot.ns.cloudflare.com ...
  2849.  
  2850. Trying Zone Transfer for petsex.com on tegan.ns.cloudflare.com ...
  2851.  
  2852. brute force file not specified, bay.
  2853.  + -- ----------------------------=[Gathering DNS Subdomains]=---------------- -- +
  2854. 
  2855. ____ _ _ _ _ _____
  2856. / ___| _ _| |__ | (_)___| |_|___ / _ __
  2857. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  2858. ___) | |_| | |_) | | \__ \ |_ ___) | |
  2859. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  2860.  
  2861. # Coded By Ahmed Aboul-Ela - @aboul3la
  2862.  
  2863. [-] Enumerating subdomains now for petsex.com
  2864. [-] verbosity is enabled, will show the subdomains results in realtime
  2865. [-] Searching now in Baidu..
  2866. [-] Searching now in Yahoo..
  2867. [-] Searching now in Google..
  2868. [-] Searching now in Bing..
  2869. [-] Searching now in Ask..
  2870. [-] Searching now in Netcraft..
  2871. [-] Searching now in DNSdumpster..
  2872. [-] Searching now in Virustotal..
  2873. [-] Searching now in ThreatCrowd..
  2874. [-] Searching now in SSL Certificates..
  2875. [-] Searching now in PassiveDNS..
  2876. SSL Certificates: www.petsex.com
  2877. ThreatCrowd: cdn.0.petsex.com
  2878. ThreatCrowd: cdn.1.petsex.com
  2879. ThreatCrowd: cdn.2.petsex.com
  2880. ThreatCrowd: cdn.3.petsex.com
  2881. ThreatCrowd: cdn.4.petsex.com
  2882. ThreatCrowd: cdn.5.petsex.com
  2883. ThreatCrowd: cdn.6.petsex.com
  2884. ThreatCrowd: cdn.7.petsex.com
  2885. ThreatCrowd: cdn.8.petsex.com
  2886. ThreatCrowd: cdn.9.petsex.com
  2887. ThreatCrowd: randy-maugans-i-iz-a-netelligent-limestone-geekstorage-whore.petsex.com
  2888. ThreatCrowd: streaming.petsex.com
  2889. ThreatCrowd: randy-bloody-hands-maugans.petsex.com
  2890. ThreatCrowd: randy-maugans.petsex.com
  2891. ThreatCrowd: www.petsex.com
  2892. ThreatCrowd: randy-maugans-i-haz-animal-sex.petsex.com
  2893. ThreatCrowd: randy-maugans-i-iz-untruthful-dishonest-and-i-lackz-integrity.petsex.com
  2894. Yahoo: www.petsex.com
  2895. Virustotal: streaming.petsex.com
  2896. Virustotal: cdn.1.petsex.com
  2897. Virustotal: cdn.6.petsex.com
  2898. Virustotal: cdn.8.petsex.com
  2899. Virustotal: cdn.7.petsex.com
  2900. Virustotal: cdn.0.petsex.com
  2901. Virustotal: cdn.5.petsex.com
  2902. Virustotal: cdn.3.petsex.com
  2903. Virustotal: cdn.2.petsex.com
  2904. Virustotal: cdn.4.petsex.com
  2905. Virustotal: cdn.9.petsex.com
  2906. Virustotal: www.petsex.com
  2907. DNSdumpster: www.petsex.com
  2908. Netcraft: www.petsex.com
  2909. [-] Saving results to file: /usr/share/sniper/loot/domains/domains-petsex.com.txt
  2910. [-] Total Unique Subdomains Found: 17
  2911. www.petsex.com
  2912. cdn.0.petsex.com
  2913. cdn.1.petsex.com
  2914. cdn.2.petsex.com
  2915. cdn.3.petsex.com
  2916. cdn.4.petsex.com
  2917. cdn.5.petsex.com
  2918. cdn.6.petsex.com
  2919. cdn.7.petsex.com
  2920. cdn.8.petsex.com
  2921. cdn.9.petsex.com
  2922. randy-bloody-hands-maugans.petsex.com
  2923. randy-maugans.petsex.com
  2924. randy-maugans-i-haz-animal-sex.petsex.com
  2925. randy-maugans-i-iz-a-netelligent-limestone-geekstorage-whore.petsex.com
  2926. randy-maugans-i-iz-untruthful-dishonest-and-i-lackz-integrity.petsex.com
  2927. streaming.petsex.com
  2928.  
  2929.  ╔═╗╩═╗╔╩╗╔═╗╩ ╩
  2930.  ║ ╠╩╝ ║ ╚═╗╠═╣
  2931.  ╚═╝╩╚═ ╩o╚═╝╩ ╩
  2932.  + -- ----------------------------=[Gathering Certificate Subdomains]=-------- -- +
  2933. 
  2934. *.petsex.com
  2935. www.petsex.com
  2936.  [+] Domains saved to: /usr/share/sniper/loot/domains/domains-petsex.com-full.txt
  2937. 
  2938.  + -- ----------------------------=[Checking for Sub-Domain Hijacking]=------- -- +
  2939.  + -- ----------------------------=[Checking Email Security]=----------------- -- +
  2940.  
  2941.  + -- ----------------------------=[Pinging host]=---------------------------- -- +
  2942. PING petsex.com (104.25.55.27) 56(84) bytes of data.
  2943. 64 bytes from 104.25.55.27 (104.25.55.27): icmp_seq=1 ttl=58 time=114 ms
  2944.  
  2945. --- petsex.com ping statistics ---
  2946. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  2947. rtt min/avg/max/mdev = 114.470/114.470/114.470/0.000 ms
  2948.  
  2949.  + -- ----------------------------=[Running TCP port scan]=------------------- -- +
  2950.  
  2951. Starting Nmap 7.60 ( https://nmap.org ) at 2017-10-23 03:48 EDT
  2952. Nmap scan report for petsex.com (104.25.54.27)
  2953. Host is up (0.11s latency).
  2954. Other addresses for petsex.com (not scanned): 104.25.55.27
  2955. Not shown: 45 filtered ports
  2956. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  2957. PORT STATE SERVICE
  2958. 80/tcp open http
  2959. 443/tcp open https
  2960. 8080/tcp open http-proxy
  2961. 8443/tcp open https-alt
  2962.  
  2963. Nmap done: 1 IP address (1 host up) scanned in 13.57 seconds
  2964.  
  2965.  + -- ----------------------------=[Running Intrusive Scans]=----------------- -- +
  2966.  + -- --=[Port 21 closed... skipping.
  2967.  + -- --=[Port 22 closed... skipping.
  2968.  + -- --=[Port 23 closed... skipping.
  2969.  + -- --=[Port 25 closed... skipping.
  2970.  + -- --=[Port 53 closed... skipping.
  2971.  + -- --=[Port 79 closed... skipping.
  2972.  + -- --=[Port 80 opened... running tests...
  2973.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  2974.  
  2975. ^ ^
  2976. _ __ _ ____ _ __ _ _ ____
  2977. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  2978. | V V // o // _/ | V V // 0 // 0 // _/
  2979. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  2980. <
  2981. ...'
  2982.  
  2983. WAFW00F - Web Application Firewall Detection Tool
  2984.  
  2985. By Sandro Gauci && Wendel G. Henrique
  2986.  
  2987. Checking http://petsex.com
  2988. The site http://petsex.com is behind a CloudFlare
  2989. Number of requests: 1
  2990.  
  2991.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  2992. http://petsex.com [200 OK] CloudFlare, Cookies[__cfduid,surfer], Country[UNITED STATES][US], HTTPServer[cloudflare-nginx], HttpOnly[__cfduid], IP[104.25.54.27], Script, UncommonHeaders[cf-ray]
  2993.  
  2994.  __ ______ _____ 
  2995.  \ \/ / ___|_ _|
  2996.  \ /\___ \ | | 
  2997.  / \ ___) || | 
  2998.  /_/\_|____/ |_| 
  2999.  
  3000. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  3001. + -- --=[Target: petsex.com:80
  3002. + -- --=[Site not vulnerable to Cross-Site Tracing!
  3003. + -- --=[Site not vulnerable to Host Header Injection!
  3004. + -- --=[Site vulnerable to Cross-Frame Scripting!
  3005. + -- --=[Site vulnerable to Clickjacking!
  3006.  
  3007. HTTP/1.1 405 Not Allowed
  3008. Date: Mon, 23 Oct 2017 07:48:41 GMT
  3009. Content-Type: text/html
  3010. Content-Length: 177
  3011. Connection: close
  3012. Server: -nginx
  3013. CF-RAY: -
  3014.  
  3015. <html>
  3016. <head><title>405 Not Allowed</title></head>
  3017. <body bgcolor="white">
  3018. <center><h1>405 Not Allowed</h1></center>
  3019. <hr><center>cloudflare-nginx</center>
  3020. </body>
  3021. </html>
  3022. 
  3023. HTTP/1.1 200 OK
  3024. Date: Mon, 23 Oct 2017 07:48:42 GMT
  3025. Content-Type: text/html; charset=UTF-8
  3026. Transfer-Encoding: chunked
  3027. Connection: keep-alive
  3028. Set-Cookie: __cfduid=d307f4b3defa7215711ad1e620eaefe821508744922; expires=Tue, 23-Oct-18 07:48:42 GMT; path=/; domain=.petsex.com; HttpOnly
  3029. Expires: Thu, 01 Jan 1970 00:00:01 GMT
  3030. Cache-Control: no-cache
  3031. Set-Cookie: surfer=Ch4ADVntntk4DVqjeBO0Ag==; expires=Tue, 23-Oct-18 07:48:41 GMT; path=/
  3032. Server: cloudflare-nginx
  3033. CF-RAY: 3b231872a77b14e5-CDG
  3034.  
  3035. 20f
  3036. <html>
  3037. <body onload="challenge();">
  3038. <script>
  3039. eval(function(p,a,c,k,e,r){e=function(c){return c.toString(a)};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('1 6(){2.3=\'4=5; 0-7=8; 9=/\';a.b.c()}',13,13,'max|function|document|cookie|Anti-Robot|f766aff0f33c60bf51a03f5d30a03044148b1ca2|challenge|age|86400|path|window|location|reload'.split('|'),0,{}))
  3040. </script>
  3041. </body>
  3042. 
  3043.  
  3044.  
  3045.  
  3046.  + -- ----------------------------=[Checking HTTP Headers]=------------------- -- +
  3047. + -- --=[Checking if X-Content options are enabled on petsex.com... 
  3048.  
  3049. + -- --=[Checking if X-Frame options are enabled on petsex.com... 
  3050. X-Frame-Options: SAMEORIGIN
  3051.  
  3052. + -- --=[Checking if X-XSS-Protection header is enabled on petsex.com... 
  3053.  
  3054. + -- --=[Checking HTTP methods on petsex.com... 
  3055.  
  3056. + -- --=[Checking if TRACE method is enabled on petsex.com... 
  3057.  
  3058. + -- --=[Checking for META tags on petsex.com... 
  3059.  
  3060. + -- --=[Checking for open proxy on petsex.com... 
  3061. </div><!-- /#cf-wrapper -->
  3062.  
  3063. <script type="text/javascript">
  3064. window._cf_translation = {};
  3065.  
  3066.  
  3067. </script>
  3068.  
  3069. </body>
  3070. </html>
  3071.  
  3072. + -- --=[Enumerating software on petsex.com... 
  3073. Server: cloudflare-nginx
  3074.  
  3075. + -- --=[Checking if Strict-Transport-Security is enabled on petsex.com... 
  3076.  
  3077. + -- --=[Checking for Flash cross-domain policy on petsex.com... 
  3078. <html>
  3079. <body onload="challenge();">
  3080. <script>
  3081. eval(function(p,a,c,k,e,r){e=function(c){return c.toString(a)};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('1 6(){2.3=\'4=5; 0-7=8; 9=/\';a.b.c()}',13,13,'max|function|document|cookie|Anti-Robot|38a844fd7d17c0a81199039af80f26ceffc7ada2|challenge|age|86400|path|window|location|reload'.split('|'),0,{}))
  3082. </script>
  3083. </body>
  3084. </html>
  3085.  
  3086. + -- --=[Checking for Silverlight cross-domain policy on petsex.com... 
  3087. <html>
  3088. <body onload="challenge();">
  3089. <script>
  3090. eval(function(p,a,c,k,e,r){e=function(c){return c.toString(a)};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('1 6(){2.3=\'4=5; 0-7=8; 9=/\';a.b.c()}',13,13,'max|function|document|cookie|Anti-Robot|38a844fd7d17c0a81199039af80f26ceffc7ada2|challenge|age|86400|path|window|location|reload'.split('|'),0,{}))
  3091. </script>
  3092. </body>
  3093. </html>
  3094.  
  3095. + -- --=[Checking for HTML5 cross-origin resource sharing on petsex.com... 
  3096.  
  3097. + -- --=[Retrieving robots.txt on petsex.com... 
  3098. <html>
  3099. <head><title>301 Moved Permanently</title></head>
  3100. <body bgcolor="white">
  3101. <center><h1>301 Moved Permanently</h1></center>
  3102. <hr><center>nginx</center>
  3103. </body>
  3104. </html>
  3105.  
  3106. + -- --=[Retrieving sitemap.xml on petsex.com... 
  3107. <html>
  3108. <body onload="challenge();">
  3109. <script>
  3110. eval(function(p,a,c,k,e,r){e=function(c){return c.toString(a)};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('1 6(){2.3=\'4=5; 0-7=8; 9=/\';a.b.c()}',13,13,'max|function|document|cookie|Anti-Robot|38a844fd7d17c0a81199039af80f26ceffc7ada2|challenge|age|86400|path|window|location|reload'.split('|'),0,{}))
  3111. </script>
  3112. </body>
  3113. </html>
  3114.  
  3115. + -- --=[Checking cookie attributes on petsex.com... 
  3116. Set-Cookie: __cfduid=dbb40540cab0ceddabfa242e28967f0a61508745577; expires=Tue, 23-Oct-18 07:59:37 GMT; path=/; domain=.petsex.com; HttpOnly
  3117.  
  3118. + -- --=[Checking for ASP.NET Detailed Errors on petsex.com... 
  3119.  
  3120. 
  3121.  + -- ----------------------------=[Running Web Vulnerability Scan]=---------- -- +
  3122. - Nikto v2.1.6
  3123. ---------------------------------------------------------------------------
  3124. + Target IP: 104.25.55.27
  3125. + Target Hostname: petsex.com
  3126. + Target Port: 80
  3127. + Start Time: 2017-10-23 04:00:43 (GMT-4)
  3128. ---------------------------------------------------------------------------
  3129. + Server: cloudflare-nginx
  3130. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  3131. + Uncommon header 'cf-ray' found, with contents: 3b232a12766768f0-CDG
  3132. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  3133. + All CGI directories 'found', use '-C none' to test none
  3134. + Server banner has changed from 'cloudflare-nginx' to '-nginx' which may suggest a WAF, load balancer or proxy is in place
  3135. + 26097 requests: 0 error(s) and 3 item(s) reported on remote host
  3136. + End Time: 2017-10-23 05:54:56 (GMT-4) (6853 seconds)
  3137. ---------------------------------------------------------------------------
  3138. + 1 host(s) tested
  3139.  + -- ----------------------------=[Saving Web Screenshots]=------------------ -- +
  3140. [+] Screenshot saved to /usr/share/sniper/loot/screenshots/petsex.com-port80.jpg
  3141.  + -- ----------------------------=[Running Google Hacking Queries]=--------------------- -- +
  3142.  + -- ----------------------------=[Running InUrlBR OSINT Queries]=---------- -- +
  3143.  
  3144.  _____  .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
  3145.  (_____) 01 01N. C 01 C 01 .01. 01  01 Yb 01 .01.
  3146.  (() ()) 01 C YCb C 01 C 01 ,C9 01  01 dP 01 ,C9
  3147.  \ /  01 C .CN. C 01 C 0101dC9 01  01'''bg. 0101dC9
  3148.  \ /  01 C .01.C 01 C 01 YC. 01 ,  01 .Y 01 YC.
  3149.  /=\  01 C Y01 YC. ,C 01 .Cb. 01 ,C  01 ,9 01 .Cb.
  3150.  [___]  .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
  3151.  
  3152. __[ ! ] Neither war between hackers, nor peace for the system.
  3153. __[ ! ] http://blog.inurl.com.br
  3154. __[ ! ] http://fb.com/InurlBrasil
  3155. __[ ! ] http://twitter.com/@googleinurl
  3156. __[ ! ] http://github.com/googleinurl
  3157. __[ ! ] Current PHP version::[ 7.0.22-3 ]
  3158. __[ ! ] Current script owner::[ root ]
  3159. __[ ! ] Current uname::[ Linux Kali 4.13.0-kali1-amd64 #1 SMP Debian 4.13.4-2kali1 (2017-10-16) x86_64 ]
  3160. __[ ! ] Current pwd::[ /usr/share/sniper ]
  3161. __[ ! ] Help: php inurlbr.php --help
  3162. ------------------------------------------------------------------------------------------------------------------------
  3163.  
  3164. [ ! ] Starting SCANNER INURLBR 2.1 at [23-10-2017 05:55:47]
  3165. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  3166. It is the end user's responsibility to obey all applicable local, state and federal laws.
  3167. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  3168.  
  3169. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-petsex.com.txt ]
  3170. [ INFO ][ DORK ]::[ site:petsex.com ]
  3171. [ INFO ][ SEARCHING ]:: {
  3172. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.sl ]
  3173.  
  3174. [ INFO ][ SEARCHING ]:: 
  3175. -[:::]
  3176. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  3177.  
  3178. [ INFO ][ SEARCHING ]:: 
  3179. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  3180. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.bg ID: 006748068166572874491:55ez0c3j3ey ]
  3181.  
  3182. [ INFO ][ SEARCHING ]:: 
  3183. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  3184.  
  3185. [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
  3186.  
  3187. 
  3188.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3189. |_[ + ] [ 0 / 100 ]-[05:55:59] [ - ] 
  3190. |_[ + ] Target:: [ https://www.petsex.com/ ]
  3191. |_[ + ] Exploit:: 
  3192. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3193. |_[ + ] More details::  / - / , ISP: 
  3194. |_[ + ] Found:: UNIDENTIFIED
  3195. 
  3196.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3197. |_[ + ] [ 1 / 100 ]-[05:56:00] [ - ] 
  3198. |_[ + ] Target:: [ http://www.petsex.com/bonus ]
  3199. |_[ + ] Exploit:: 
  3200. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3201. |_[ + ] More details::  / - / , ISP: 
  3202. |_[ + ] Found:: UNIDENTIFIED
  3203. 
  3204.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3205. |_[ + ] [ 2 / 100 ]-[05:56:00] [ - ] 
  3206. |_[ + ] Target:: [ https://www.petsex.com/user/signup ]
  3207. |_[ + ] Exploit:: 
  3208. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3209. |_[ + ] More details::  / - / , ISP: 
  3210. |_[ + ] Found:: UNIDENTIFIED
  3211. 
  3212.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3213. |_[ + ] [ 3 / 100 ]-[05:56:01] [ - ] 
  3214. |_[ + ] Target:: [ https://www.petsex.com/user/login ]
  3215. |_[ + ] Exploit:: 
  3216. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3217. |_[ + ] More details::  / - / , ISP: 
  3218. |_[ + ] Found:: UNIDENTIFIED
  3219. 
  3220.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3221. |_[ + ] [ 4 / 100 ]-[05:56:02] [ - ] 
  3222. |_[ + ] Target:: [ https://www.petsex.com/terms ]
  3223. |_[ + ] Exploit:: 
  3224. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3225. |_[ + ] More details::  / - / , ISP: 
  3226. |_[ + ] Found:: UNIDENTIFIED
  3227. 
  3228.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3229. |_[ + ] [ 5 / 100 ]-[05:56:03] [ - ] 
  3230. |_[ + ] Target:: [ https://www.petsex.com/user/show/rolodex ]
  3231. |_[ + ] Exploit:: 
  3232. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3233. |_[ + ] More details::  / - / , ISP: 
  3234. |_[ + ] Found:: UNIDENTIFIED
  3235. 
  3236.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3237. |_[ + ] [ 6 / 100 ]-[05:56:04] [ - ] 
  3238. |_[ + ] Target:: [ https://www.petsex.com/user/show/dstone16 ]
  3239. |_[ + ] Exploit:: 
  3240. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3241. |_[ + ] More details::  / - / , ISP: 
  3242. |_[ + ] Found:: UNIDENTIFIED
  3243. 
  3244.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3245. |_[ + ] [ 7 / 100 ]-[05:56:05] [ - ] 
  3246. |_[ + ] Target:: [ https://www.petsex.com/movie/28986/more_fk9_licking_my_cock ]
  3247. |_[ + ] Exploit:: 
  3248. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3249. |_[ + ] More details::  / - / , ISP: 
  3250. |_[ + ] Found:: UNIDENTIFIED
  3251. 
  3252.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3253. |_[ + ] [ 8 / 100 ]-[05:56:06] [ - ] 
  3254. |_[ + ] Target:: [ https://www.petsex.com/user/show/69exhib69 ]
  3255. |_[ + ] Exploit:: 
  3256. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3257. |_[ + ] More details::  / - / , ISP: 
  3258. |_[ + ] Found:: UNIDENTIFIED
  3259. 
  3260.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3261. |_[ + ] [ 9 / 100 ]-[05:56:06] [ - ] 
  3262. |_[ + ] Target:: [ https://www.petsex.com/user/show/caledonian ]
  3263. |_[ + ] Exploit:: 
  3264. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3265. |_[ + ] More details::  / - / , ISP: 
  3266. |_[ + ] Found:: UNIDENTIFIED
  3267. 
  3268.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3269. |_[ + ] [ 10 / 100 ]-[05:56:16] [ - ] 
  3270. |_[ + ] Target:: [ https://www.petsex.com/user/show/lassi42 ]
  3271. |_[ + ] Exploit:: 
  3272. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3273. |_[ + ] More details::  / - / , ISP: 
  3274. |_[ + ] Found:: UNIDENTIFIED
  3275. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 38536 bytes received
  3276. 
  3277.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3278. |_[ + ] [ 11 / 100 ]-[05:56:18] [ - ] 
  3279. |_[ + ] Target:: [ https://www.petsex.com/movie/18208/guy_fucks_g_dane_bitch ]
  3280. |_[ + ] Exploit:: 
  3281. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3282. |_[ + ] More details::  / - / , ISP: 
  3283. |_[ + ] Found:: UNIDENTIFIED
  3284. 
  3285.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3286. |_[ + ] [ 12 / 100 ]-[05:56:19] [ - ] 
  3287. |_[ + ] Target:: [ https://www.petsex.com/user/show/sexyjenny16 ]
  3288. |_[ + ] Exploit:: 
  3289. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3290. |_[ + ] More details::  / - / , ISP: 
  3291. |_[ + ] Found:: UNIDENTIFIED
  3292. 
  3293.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3294. |_[ + ] [ 13 / 100 ]-[05:56:19] [ - ] 
  3295. |_[ + ] Target:: [ http://www.petsex.com/movie/3926/2_dog_lick_man_2 ]
  3296. |_[ + ] Exploit:: 
  3297. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3298. |_[ + ] More details::  / - / , ISP: 
  3299. |_[ + ] Found:: UNIDENTIFIED
  3300. 
  3301.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3302. |_[ + ] [ 14 / 100 ]-[05:56:20] [ - ] 
  3303. |_[ + ] Target:: [ http://www.petsex.com/movie/31162/aluzky_fingering_a_bitch_short_clip ]
  3304. |_[ + ] Exploit:: 
  3305. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3306. |_[ + ] More details::  / - / , ISP: 
  3307. |_[ + ] Found:: UNIDENTIFIED
  3308. 
  3309.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3310. |_[ + ] [ 15 / 100 ]-[05:56:20] [ - ] 
  3311. |_[ + ] Target:: [ http://www.petsex.com/movie/17498/grandma_and_granddog ]
  3312. |_[ + ] Exploit:: 
  3313. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3314. |_[ + ] More details::  / - / , ISP: 
  3315. |_[ + ] Found:: UNIDENTIFIED
  3316. 
  3317.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3318. |_[ + ] [ 16 / 100 ]-[05:56:21] [ - ] 
  3319. |_[ + ] Target:: [ http://www.petsex.com/movie/24148/foursome_with_dog_3 ]
  3320. |_[ + ] Exploit:: 
  3321. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3322. |_[ + ] More details::  / - / , ISP: 
  3323. |_[ + ] Found:: UNIDENTIFIED
  3324. 
  3325.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3326. |_[ + ] [ 17 / 100 ]-[05:56:21] [ - ] 
  3327. |_[ + ] Target:: [ http://www.petsex.com/movie/33779/homemade_fuck ]
  3328. |_[ + ] Exploit:: 
  3329. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3330. |_[ + ] More details::  / - / , ISP: 
  3331. |_[ + ] Found:: UNIDENTIFIED
  3332. 
  3333.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3334. |_[ + ] [ 18 / 100 ]-[05:56:22] [ - ] 
  3335. |_[ + ] Target:: [ http://www.petsex.com/movie/32409/stallion_stroke ]
  3336. |_[ + ] Exploit:: 
  3337. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3338. |_[ + ] More details::  / - / , ISP: 
  3339. |_[ + ] Found:: UNIDENTIFIED
  3340. 
  3341.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3342. |_[ + ] [ 19 / 100 ]-[05:56:22] [ - ] 
  3343. |_[ + ] Target:: [ http://www.petsex.com/movie/73088/cute_blonde_tries_dog_sex ]
  3344. |_[ + ] Exploit:: 
  3345. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3346. |_[ + ] More details::  / - / , ISP: 
  3347. |_[ + ] Found:: UNIDENTIFIED
  3348. 
  3349.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3350. |_[ + ] [ 20 / 100 ]-[05:56:23] [ - ] 
  3351. |_[ + ] Target:: [ http://www.petsex.com/movie/9041/a_mare_consent ]
  3352. |_[ + ] Exploit:: 
  3353. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3354. |_[ + ] More details::  / - / , ISP: 
  3355. |_[ + ] Found:: UNIDENTIFIED
  3356. 
  3357.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3358. |_[ + ] [ 21 / 100 ]-[05:56:23] [ - ] 
  3359. |_[ + ] Target:: [ http://www.petsex.com/movie/19914/fat_man_does_a_husky_plush ]
  3360. |_[ + ] Exploit:: 
  3361. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3362. |_[ + ] More details::  / - / , ISP: 
  3363. |_[ + ] Found:: UNIDENTIFIED
  3364. 
  3365.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3366. |_[ + ] [ 22 / 100 ]-[05:56:27] [ - ] 
  3367. |_[ + ] Target:: [ http://www.petsex.com/movie/22839/dog_licking_pussy_3 ]
  3368. |_[ + ] Exploit:: 
  3369. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3370. |_[ + ] More details::  / - / , ISP: 
  3371. |_[ + ] Found:: UNIDENTIFIED
  3372. 
  3373.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3374. |_[ + ] [ 23 / 100 ]-[05:56:27] [ - ] 
  3375. |_[ + ] Target:: [ http://www.petsex.com/movie/28973/guy_fuck_a_pig ]
  3376. |_[ + ] Exploit:: 
  3377. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3378. |_[ + ] More details::  / - / , ISP: 
  3379. |_[ + ] Found:: UNIDENTIFIED
  3380. 
  3381.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3382. |_[ + ] [ 24 / 100 ]-[05:56:28] [ - ] 
  3383. |_[ + ] Target:: [ http://www.petsex.com/movie/33553/eating_cum_from_pussy ]
  3384. |_[ + ] Exploit:: 
  3385. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3386. |_[ + ] More details::  / - / , ISP: 
  3387. |_[ + ] Found:: UNIDENTIFIED
  3388. 
  3389.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3390. |_[ + ] [ 25 / 100 ]-[05:56:28] [ - ] 
  3391. |_[ + ] Target:: [ http://www.petsex.com/movie/35012/dog_cums_inside_young_pussy ]
  3392. |_[ + ] Exploit:: 
  3393. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3394. |_[ + ] More details::  / - / , ISP: 
  3395. |_[ + ] Found:: UNIDENTIFIED
  3396. 
  3397.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3398. |_[ + ] [ 26 / 100 ]-[05:56:29] [ - ] 
  3399. |_[ + ] Target:: [ http://www.petsex.com/movie/28460/goat_finger ]
  3400. |_[ + ] Exploit:: 
  3401. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3402. |_[ + ] More details::  / - / , ISP: 
  3403. |_[ + ] Found:: UNIDENTIFIED
  3404. 
  3405.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3406. |_[ + ] [ 27 / 100 ]-[05:56:29] [ - ] 
  3407. |_[ + ] Target:: [ http://www.petsex.com/movie/23468/akita_heat ]
  3408. |_[ + ] Exploit:: 
  3409. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3410. |_[ + ] More details::  / - / , ISP: 
  3411. |_[ + ] Found:: UNIDENTIFIED
  3412. 
  3413.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3414. |_[ + ] [ 28 / 100 ]-[05:56:30] [ - ] 
  3415. |_[ + ] Target:: [ http://www.petsex.com/movie/34847/sucking_dog_dick ]
  3416. |_[ + ] Exploit:: 
  3417. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3418. |_[ + ] More details::  / - / , ISP: 
  3419. |_[ + ] Found:: UNIDENTIFIED
  3420. 
  3421.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3422. |_[ + ] [ 29 / 100 ]-[05:56:30] [ - ] 
  3423. |_[ + ] Target:: [ http://www.petsex.com/movie/88/a_lot_of_horsecum ]
  3424. |_[ + ] Exploit:: 
  3425. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3426. |_[ + ] More details::  / - / , ISP: 
  3427. |_[ + ] Found:: UNIDENTIFIED
  3428. 
  3429.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3430. |_[ + ] [ 30 / 100 ]-[05:56:31] [ - ] 
  3431. |_[ + ] Target:: [ http://www.petsex.com/movie/18783/rottie_anal ]
  3432. |_[ + ] Exploit:: 
  3433. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3434. |_[ + ] More details::  / - / , ISP: 
  3435. |_[ + ] Found:: UNIDENTIFIED
  3436. 
  3437.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3438. |_[ + ] [ 31 / 100 ]-[05:56:31] [ - ] 
  3439. |_[ + ] Target:: [ http://www.petsex.com/movie/9921/dog_cock_inside_male_ass ]
  3440. |_[ + ] Exploit:: 
  3441. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3442. |_[ + ] More details::  / - / , ISP: 
  3443. |_[ + ] Found:: UNIDENTIFIED
  3444. 
  3445.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3446. |_[ + ] [ 32 / 100 ]-[05:56:32] [ - ] 
  3447. |_[ + ] Target:: [ http://www.petsex.com/movie/22503/leech_action ]
  3448. |_[ + ] Exploit:: 
  3449. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3450. |_[ + ] More details::  / - / , ISP: 
  3451. |_[ + ] Found:: UNIDENTIFIED
  3452. 
  3453.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3454. |_[ + ] [ 33 / 100 ]-[05:56:33] [ - ] 
  3455. |_[ + ] Target:: [ http://www.petsex.com/movie/3406/deer_pleasure ]
  3456. |_[ + ] Exploit:: 
  3457. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3458. |_[ + ] More details::  / - / , ISP: 
  3459. |_[ + ] Found:: UNIDENTIFIED
  3460. 
  3461.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3462. |_[ + ] [ 34 / 100 ]-[05:56:33] [ - ] 
  3463. |_[ + ] Target:: [ http://www.petsex.com/movie/525/manandcrocod ]
  3464. |_[ + ] Exploit:: 
  3465. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3466. |_[ + ] More details::  / - / , ISP: 
  3467. |_[ + ] Found:: UNIDENTIFIED
  3468. 
  3469.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3470. |_[ + ] [ 35 / 100 ]-[05:56:34] [ - ] 
  3471. |_[ + ] Target:: [ http://www.petsex.com/movie/2362/more_dog_cock_up_my_ass ]
  3472. |_[ + ] Exploit:: 
  3473. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3474. |_[ + ] More details::  / - / , ISP: 
  3475. |_[ + ] Found:: UNIDENTIFIED
  3476. 
  3477.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3478. |_[ + ] [ 36 / 100 ]-[05:56:34] [ - ] 
  3479. |_[ + ] Target:: [ http://www.petsex.com/movie/18647/snailcunt ]
  3480. |_[ + ] Exploit:: 
  3481. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3482. |_[ + ] More details::  / - / , ISP: 
  3483. |_[ + ] Found:: UNIDENTIFIED
  3484. 
  3485.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3486. |_[ + ] [ 37 / 100 ]-[05:56:35] [ - ] 
  3487. |_[ + ] Target:: [ http://www.petsex.com/movie/9385/animated_horse_sex ]
  3488. |_[ + ] Exploit:: 
  3489. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3490. |_[ + ] More details::  / - / , ISP: 
  3491. |_[ + ] Found:: UNIDENTIFIED
  3492. 
  3493.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3494. |_[ + ] [ 38 / 100 ]-[05:56:35] [ - ] 
  3495. |_[ + ] Target:: [ http://www.petsex.com/movie/19334/lovely_wife_and_dog ]
  3496. |_[ + ] Exploit:: 
  3497. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3498. |_[ + ] More details::  / - / , ISP: 
  3499. |_[ + ] Found:: UNIDENTIFIED
  3500. 
  3501.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3502. |_[ + ] [ 39 / 100 ]-[05:56:36] [ - ] 
  3503. |_[ + ] Target:: [ http://www.petsex.com/movie/28469/cum_inside_mare ]
  3504. |_[ + ] Exploit:: 
  3505. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3506. |_[ + ] More details::  / - / , ISP: 
  3507. |_[ + ] Found:: UNIDENTIFIED
  3508. 
  3509.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3510. |_[ + ] [ 40 / 100 ]-[05:56:36] [ - ] 
  3511. |_[ + ] Target:: [ http://www.petsex.com/movie/19148/hard_cock_for_akita_bitch ]
  3512. |_[ + ] Exploit:: 
  3513. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3514. |_[ + ] More details::  / - / , ISP: 
  3515. |_[ + ] Found:: UNIDENTIFIED
  3516. 
  3517.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3518. |_[ + ] [ 41 / 100 ]-[05:56:37] [ - ] 
  3519. |_[ + ] Target:: [ http://www.petsex.com/movie/33634/stallion_gets_a_boner ]
  3520. |_[ + ] Exploit:: 
  3521. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3522. |_[ + ] More details::  / - / , ISP: 
  3523. |_[ + ] Found:: UNIDENTIFIED
  3524. 
  3525.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3526. |_[ + ] [ 42 / 100 ]-[05:56:37] [ - ] 
  3527. |_[ + ] Target:: [ http://www.petsex.com/movie/18167/man_fuck_dog ]
  3528. |_[ + ] Exploit:: 
  3529. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3530. |_[ + ] More details::  / - / , ISP: 
  3531. |_[ + ] Found:: UNIDENTIFIED
  3532. 
  3533.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3534. |_[ + ] [ 43 / 100 ]-[05:56:38] [ - ] 
  3535. |_[ + ] Target:: [ http://www.petsex.com/movie/33825/lick_my_dog ]
  3536. |_[ + ] Exploit:: 
  3537. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3538. |_[ + ] More details::  / - / , ISP: 
  3539. |_[ + ] Found:: UNIDENTIFIED
  3540. 
  3541.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3542. |_[ + ] [ 44 / 100 ]-[05:56:38] [ - ] 
  3543. |_[ + ] Target:: [ http://www.petsex.com/movie/20584/man_gets_fucked_by_pig ]
  3544. |_[ + ] Exploit:: 
  3545. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3546. |_[ + ] More details::  / - / , ISP: 
  3547. |_[ + ] Found:: UNIDENTIFIED
  3548. 
  3549.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3550. |_[ + ] [ 45 / 100 ]-[05:56:39] [ - ] 
  3551. |_[ + ] Target:: [ http://www.petsex.com/movie/7234/man_fucks_dogs_sheath ]
  3552. |_[ + ] Exploit:: 
  3553. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3554. |_[ + ] More details::  / - / , ISP: 
  3555. |_[ + ] Found:: UNIDENTIFIED
  3556. 
  3557.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3558. |_[ + ] [ 46 / 100 ]-[05:56:39] [ - ] 
  3559. |_[ + ] Target:: [ http://www.petsex.com/movie/18072/man_and_mare ]
  3560. |_[ + ] Exploit:: 
  3561. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3562. |_[ + ] More details::  / - / , ISP: 
  3563. |_[ + ] Found:: UNIDENTIFIED
  3564. 
  3565.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3566. |_[ + ] [ 47 / 100 ]-[05:56:40] [ - ] 
  3567. |_[ + ] Target:: [ http://www.petsex.com/movie/31517/licking_clit ]
  3568. |_[ + ] Exploit:: 
  3569. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3570. |_[ + ] More details::  / - / , ISP: 
  3571. |_[ + ] Found:: UNIDENTIFIED
  3572. 
  3573.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3574. |_[ + ] [ 48 / 100 ]-[05:56:40] [ - ] 
  3575. |_[ + ] Target:: [ http://www.petsex.com/movie/5715/donkeysex ]
  3576. |_[ + ] Exploit:: 
  3577. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3578. |_[ + ] More details::  / - / , ISP: 
  3579. |_[ + ] Found:: UNIDENTIFIED
  3580. 
  3581.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3582. |_[ + ] [ 49 / 100 ]-[05:56:41] [ - ] 
  3583. |_[ + ] Target:: [ http://www.petsex.com/movie/33847/face_fucking_coty ]
  3584. |_[ + ] Exploit:: 
  3585. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3586. |_[ + ] More details::  / - / , ISP: 
  3587. |_[ + ] Found:: UNIDENTIFIED
  3588. 
  3589.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3590. |_[ + ] [ 50 / 100 ]-[05:56:41] [ - ] 
  3591. |_[ + ] Target:: [ http://www.petsex.com/movie/20655/luke_and_angela ]
  3592. |_[ + ] Exploit:: 
  3593. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3594. |_[ + ] More details::  / - / , ISP: 
  3595. |_[ + ] Found:: UNIDENTIFIED
  3596. 
  3597.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3598. |_[ + ] [ 51 / 100 ]-[05:56:42] [ - ] 
  3599. |_[ + ] Target:: [ http://www.petsex.com/movie/33644/anothe_stallion_cock_masterbate ]
  3600. |_[ + ] Exploit:: 
  3601. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3602. |_[ + ] More details::  / - / , ISP: 
  3603. |_[ + ] Found:: UNIDENTIFIED
  3604. 
  3605.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3606. |_[ + ] [ 52 / 100 ]-[05:56:42] [ - ] 
  3607. |_[ + ] Target:: [ http://www.petsex.com/movie/15839/girl_rubs_clit_while_getting_licked ]
  3608. |_[ + ] Exploit:: 
  3609. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3610. |_[ + ] More details::  / - / , ISP: 
  3611. |_[ + ] Found:: UNIDENTIFIED
  3612. 
  3613.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3614. |_[ + ] [ 53 / 100 ]-[05:56:43] [ - ] 
  3615. |_[ + ] Target:: [ http://www.petsex.com/movie/26925/masturbating_dog ]
  3616. |_[ + ] Exploit:: 
  3617. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3618. |_[ + ] More details::  / - / , ISP: 
  3619. |_[ + ] Found:: UNIDENTIFIED
  3620. 
  3621.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3622. |_[ + ] [ 54 / 100 ]-[05:56:43] [ - ] 
  3623. |_[ + ] Target:: [ http://www.petsex.com/movie/33205/slut_gets_clean_shaven_pussy_licked_by_pup_in_bath ]
  3624. |_[ + ] Exploit:: 
  3625. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3626. |_[ + ] More details::  / - / , ISP: 
  3627. |_[ + ] Found:: UNIDENTIFIED
  3628. 
  3629.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3630. |_[ + ] [ 55 / 100 ]-[05:56:44] [ - ] 
  3631. |_[ + ] Target:: [ http://www.petsex.com/movie/911/mare_cumshots ]
  3632. |_[ + ] Exploit:: 
  3633. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3634. |_[ + ] More details::  / - / , ISP: 
  3635. |_[ + ] Found:: UNIDENTIFIED
  3636. 
  3637.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3638. |_[ + ] [ 56 / 100 ]-[05:56:44] [ - ] 
  3639. |_[ + ] Target:: [ http://www.petsex.com/movie/37409/my_puppy_licking ]
  3640. |_[ + ] Exploit:: 
  3641. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3642. |_[ + ] More details::  / - / , ISP: 
  3643. |_[ + ] Found:: UNIDENTIFIED
  3644. 
  3645.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3646. |_[ + ] [ 57 / 100 ]-[05:56:45] [ - ] 
  3647. |_[ + ] Target:: [ http://www.petsex.com/movie/20675/man_fucks_stuffed_bear ]
  3648. |_[ + ] Exploit:: 
  3649. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3650. |_[ + ] More details::  / - / , ISP: 
  3651. |_[ + ] Found:: UNIDENTIFIED
  3652. 
  3653.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3654. |_[ + ] [ 58 / 100 ]-[05:56:45] [ - ] 
  3655. |_[ + ] Target:: [ http://www.petsex.com/movie/8670/guy_jack_huge_dog ]
  3656. |_[ + ] Exploit:: 
  3657. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3658. |_[ + ] More details::  / - / , ISP: 
  3659. |_[ + ] Found:: UNIDENTIFIED
  3660. 
  3661.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3662. |_[ + ] [ 59 / 100 ]-[05:56:46] [ - ] 
  3663. |_[ + ] Target:: [ http://www.petsex.com/movie/26121/bbw_and_pitbull_2 ]
  3664. |_[ + ] Exploit:: 
  3665. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3666. |_[ + ] More details::  / - / , ISP: 
  3667. |_[ + ] Found:: UNIDENTIFIED
  3668. 
  3669.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3670. |_[ + ] [ 60 / 100 ]-[05:56:46] [ - ] 
  3671. |_[ + ] Target:: [ http://www.petsex.com/movie/23117/lab_lickis_my_dick_till_i_cum ]
  3672. |_[ + ] Exploit:: 
  3673. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3674. |_[ + ] More details::  / - / , ISP: 
  3675. |_[ + ] Found:: UNIDENTIFIED
  3676. 
  3677.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3678. |_[ + ] [ 61 / 100 ]-[05:56:47] [ - ] 
  3679. |_[ + ] Target:: [ http://www.petsex.com/movie/35878/fat_girl_sucking ]
  3680. |_[ + ] Exploit:: 
  3681. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3682. |_[ + ] More details::  / - / , ISP: 
  3683. |_[ + ] Found:: UNIDENTIFIED
  3684. 
  3685.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3686. |_[ + ] [ 62 / 100 ]-[05:56:47] [ - ] 
  3687. |_[ + ] Target:: [ http://www.petsex.com/movie/40230/girl_masturbates_dog ]
  3688. |_[ + ] Exploit:: 
  3689. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3690. |_[ + ] More details::  / - / , ISP: 
  3691. |_[ + ] Found:: UNIDENTIFIED
  3692. 
  3693.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3694. |_[ + ] [ 63 / 100 ]-[05:56:48] [ - ] 
  3695. |_[ + ] Target:: [ http://www.petsex.com/movie/18654/man_lets_wasp_on_his_dick ]
  3696. |_[ + ] Exploit:: 
  3697. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3698. |_[ + ] More details::  / - / , ISP: 
  3699. |_[ + ] Found:: UNIDENTIFIED
  3700. 
  3701.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3702. |_[ + ] [ 64 / 100 ]-[05:56:48] [ - ] 
  3703. |_[ + ] Target:: [ http://www.petsex.com/movie/592/knotty_scene_high_quality ]
  3704. |_[ + ] Exploit:: 
  3705. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3706. |_[ + ] More details::  / - / , ISP: 
  3707. |_[ + ] Found:: UNIDENTIFIED
  3708. 
  3709.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3710. |_[ + ] [ 65 / 100 ]-[05:56:49] [ - ] 
  3711. |_[ + ] Target:: [ http://www.petsex.com/movie/4162/calve_pacifier_3 ]
  3712. |_[ + ] Exploit:: 
  3713. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3714. |_[ + ] More details::  / - / , ISP: 
  3715. |_[ + ] Found:: UNIDENTIFIED
  3716. 
  3717.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3718. |_[ + ] [ 66 / 100 ]-[05:56:49] [ - ] 
  3719. |_[ + ] Target:: [ http://www.petsex.com/movie/25221/rearview_of_a_mare ]
  3720. |_[ + ] Exploit:: 
  3721. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3722. |_[ + ] More details::  / - / , ISP: 
  3723. |_[ + ] Found:: UNIDENTIFIED
  3724. 
  3725.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3726. |_[ + ] [ 67 / 100 ]-[05:56:50] [ - ] 
  3727. |_[ + ] Target:: [ http://www.petsex.com/movie/78788/horse_cum ]
  3728. |_[ + ] Exploit:: 
  3729. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3730. |_[ + ] More details::  / - / , ISP: 
  3731. |_[ + ] Found:: UNIDENTIFIED
  3732. 
  3733.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3734. |_[ + ] [ 68 / 100 ]-[05:56:50] [ - ] 
  3735. |_[ + ] Target:: [ http://www.petsex.com/movie/22834/pony_cum ]
  3736. |_[ + ] Exploit:: 
  3737. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3738. |_[ + ] More details::  / - / , ISP: 
  3739. |_[ + ] Found:: UNIDENTIFIED
  3740. 
  3741.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3742. |_[ + ] [ 69 / 100 ]-[05:56:51] [ - ] 
  3743. |_[ + ] Target:: [ http://www.petsex.com/movie/16519/dog_licks_cock_with_cum ]
  3744. |_[ + ] Exploit:: 
  3745. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3746. |_[ + ] More details::  / - / , ISP: 
  3747. |_[ + ] Found:: UNIDENTIFIED
  3748. 
  3749.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3750. |_[ + ] [ 70 / 100 ]-[05:56:51] [ - ] 
  3751. |_[ + ] Target:: [ http://www.petsex.com/movie/20947/beagle_anal ]
  3752. |_[ + ] Exploit:: 
  3753. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3754. |_[ + ] More details::  / - / , ISP: 
  3755. |_[ + ] Found:: UNIDENTIFIED
  3756. 
  3757.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3758. |_[ + ] [ 71 / 100 ]-[05:56:52] [ - ] 
  3759. |_[ + ] Target:: [ http://www.petsex.com/movie/17357/dog_lick ]
  3760. |_[ + ] Exploit:: 
  3761. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3762. |_[ + ] More details::  / - / , ISP: 
  3763. |_[ + ] Found:: UNIDENTIFIED
  3764. 
  3765.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3766. |_[ + ] [ 72 / 100 ]-[05:56:52] [ - ] 
  3767. |_[ + ] Target:: [ http://www.petsex.com/movie/39714/dog_eating_fat_hairy_ass_and_pussy ]
  3768. |_[ + ] Exploit:: 
  3769. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3770. |_[ + ] More details::  / - / , ISP: 
  3771. |_[ + ] Found:: UNIDENTIFIED
  3772. 
  3773.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3774. |_[ + ] [ 73 / 100 ]-[05:56:53] [ - ] 
  3775. |_[ + ] Target:: [ http://www.petsex.com/movie/30853/gorilla_rape_2 ]
  3776. |_[ + ] Exploit:: 
  3777. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3778. |_[ + ] More details::  / - / , ISP: 
  3779. |_[ + ] Found:: UNIDENTIFIED
  3780. 
  3781.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3782. |_[ + ] [ 74 / 100 ]-[05:56:53] [ - ] 
  3783. |_[ + ] Target:: [ http://www.petsex.com/movie/30186/girl_gets_panties_licked ]
  3784. |_[ + ] Exploit:: 
  3785. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3786. |_[ + ] More details::  / - / , ISP: 
  3787. |_[ + ] Found:: UNIDENTIFIED
  3788. 
  3789.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3790. |_[ + ] [ 75 / 100 ]-[05:56:54] [ - ] 
  3791. |_[ + ] Target:: [ http://www.petsex.com/movie/23052/dog_cum_ijn_woman_pussy ]
  3792. |_[ + ] Exploit:: 
  3793. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3794. |_[ + ] More details::  / - / , ISP: 
  3795. |_[ + ] Found:: UNIDENTIFIED
  3796. 
  3797.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3798. |_[ + ] [ 76 / 100 ]-[05:56:55] [ - ] 
  3799. |_[ + ] Target:: [ http://www.petsex.com/movie/22440/dolphin_fucks_woman ]
  3800. |_[ + ] Exploit:: 
  3801. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3802. |_[ + ] More details::  / - / , ISP: 
  3803. |_[ + ] Found:: UNIDENTIFIED
  3804. 
  3805.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3806. |_[ + ] [ 77 / 100 ]-[05:56:55] [ - ] 
  3807. |_[ + ] Target:: [ http://www.petsex.com/movie/12724/man_doing_a_mare_after_stallion ]
  3808. |_[ + ] Exploit:: 
  3809. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3810. |_[ + ] More details::  / - / , ISP: 
  3811. |_[ + ] Found:: UNIDENTIFIED
  3812. 
  3813.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3814. |_[ + ] [ 78 / 100 ]-[05:56:56] [ - ] 
  3815. |_[ + ] Target:: [ http://www.petsex.com/movie/9456/beach_babe ]
  3816. |_[ + ] Exploit:: 
  3817. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3818. |_[ + ] More details::  / - / , ISP: 
  3819. |_[ + ] Found:: UNIDENTIFIED
  3820. 
  3821.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3822. |_[ + ] [ 79 / 100 ]-[05:56:56] [ - ] 
  3823. |_[ + ] Target:: [ http://www.petsex.com/movie/31638/husband_share_wife ]
  3824. |_[ + ] Exploit:: 
  3825. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3826. |_[ + ] More details::  / - / , ISP: 
  3827. |_[ + ] Found:: UNIDENTIFIED
  3828. 
  3829.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3830. |_[ + ] [ 80 / 100 ]-[05:56:57] [ - ] 
  3831. |_[ + ] Target:: [ http://www.petsex.com/movie/20545/lion_and_tiger ]
  3832. |_[ + ] Exploit:: 
  3833. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3834. |_[ + ] More details::  / - / , ISP: 
  3835. |_[ + ] Found:: UNIDENTIFIED
  3836. 
  3837.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3838. |_[ + ] [ 81 / 100 ]-[05:56:57] [ - ] 
  3839. |_[ + ] Target:: [ http://www.petsex.com/movie/32105/amateur_head_hump ]
  3840. |_[ + ] Exploit:: 
  3841. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3842. |_[ + ] More details::  / - / , ISP: 
  3843. |_[ + ] Found:: UNIDENTIFIED
  3844. 
  3845.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3846. |_[ + ] [ 82 / 100 ]-[05:56:58] [ - ] 
  3847. |_[ + ] Target:: [ http://www.petsex.com/movie/25802/doggy_squirt ]
  3848. |_[ + ] Exploit:: 
  3849. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3850. |_[ + ] More details::  / - / , ISP: 
  3851. |_[ + ] Found:: UNIDENTIFIED
  3852. 
  3853.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3854. |_[ + ] [ 83 / 100 ]-[05:56:59] [ - ] 
  3855. |_[ + ] Target:: [ http://www.petsex.com/movie/23012/screwing_my_pig ]
  3856. |_[ + ] Exploit:: 
  3857. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3858. |_[ + ] More details::  / - / , ISP: 
  3859. |_[ + ] Found:: UNIDENTIFIED
  3860. 
  3861.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3862. |_[ + ] [ 84 / 100 ]-[05:56:59] [ - ] 
  3863. |_[ + ] Target:: [ http://www.petsex.com/movie/30421/mare_get_licked_and_fingered ]
  3864. |_[ + ] Exploit:: 
  3865. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3866. |_[ + ] More details::  / - / , ISP: 
  3867. |_[ + ] Found:: UNIDENTIFIED
  3868. 
  3869.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3870. |_[ + ] [ 85 / 100 ]-[05:57:00] [ - ] 
  3871. |_[ + ] Target:: [ http://www.petsex.com/movie/15240/woman_and_rottie ]
  3872. |_[ + ] Exploit:: 
  3873. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3874. |_[ + ] More details::  / - / , ISP: 
  3875. |_[ + ] Found:: UNIDENTIFIED
  3876. 
  3877.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3878. |_[ + ] [ 86 / 100 ]-[05:57:00] [ - ] 
  3879. |_[ + ] Target:: [ http://www.petsex.com/movie/11233/dog_suck_mans_cock_cum_on_face ]
  3880. |_[ + ] Exploit:: 
  3881. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3882. |_[ + ] More details::  / - / , ISP: 
  3883. |_[ + ] Found:: UNIDENTIFIED
  3884. 
  3885.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3886. |_[ + ] [ 87 / 100 ]-[05:57:01] [ - ] 
  3887. |_[ + ] Target:: [ http://www.petsex.com/movie/3358/tesa_poo_in_pants ]
  3888. |_[ + ] Exploit:: 
  3889. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3890. |_[ + ] More details::  / - / , ISP: 
  3891. |_[ + ] Found:: UNIDENTIFIED
  3892. 
  3893.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3894. |_[ + ] [ 88 / 100 ]-[05:57:01] [ - ] 
  3895. |_[ + ] Target:: [ http://www.petsex.com/movie/22966/rimmed_by_my_rottie ]
  3896. |_[ + ] Exploit:: 
  3897. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3898. |_[ + ] More details::  / - / , ISP: 
  3899. |_[ + ] Found:: UNIDENTIFIED
  3900. 
  3901.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3902. |_[ + ] [ 89 / 100 ]-[05:57:02] [ - ] 
  3903. |_[ + ] Target:: [ http://www.petsex.com/movie/64583/dog_gives_woman_a_creampie ]
  3904. |_[ + ] Exploit:: 
  3905. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3906. |_[ + ] More details::  / - / , ISP: 
  3907. |_[ + ] Found:: UNIDENTIFIED
  3908. 
  3909.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3910. |_[ + ] [ 90 / 100 ]-[05:57:02] [ - ] 
  3911. |_[ + ] Target:: [ http://www.petsex.com/movie/24818/mounted_by_brindle_pit_bull_dog ]
  3912. |_[ + ] Exploit:: 
  3913. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3914. |_[ + ] More details::  / - / , ISP: 
  3915. |_[ + ] Found:: UNIDENTIFIED
  3916. 
  3917.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3918. |_[ + ] [ 91 / 100 ]-[05:57:03] [ - ] 
  3919. |_[ + ] Target:: [ http://www.petsex.com/movie/31768/slow_fucking ]
  3920. |_[ + ] Exploit:: 
  3921. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3922. |_[ + ] More details::  / - / , ISP: 
  3923. |_[ + ] Found:: UNIDENTIFIED
  3924. 
  3925.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3926. |_[ + ] [ 92 / 100 ]-[05:57:03] [ - ] 
  3927. |_[ + ] Target:: [ http://www.petsex.com/movie/28359/horse_fuck_young_man ]
  3928. |_[ + ] Exploit:: 
  3929. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3930. |_[ + ] More details::  / - / , ISP: 
  3931. |_[ + ] Found:: UNIDENTIFIED
  3932. 
  3933.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3934. |_[ + ] [ 93 / 100 ]-[05:57:04] [ - ] 
  3935. |_[ + ] Target:: [ http://www.petsex.com/movie/26802/doggy_fuck_10_18_1 ]
  3936. |_[ + ] Exploit:: 
  3937. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3938. |_[ + ] More details::  / - / , ISP: 
  3939. |_[ + ] Found:: UNIDENTIFIED
  3940. 
  3941.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3942. |_[ + ] [ 94 / 100 ]-[05:57:04] [ - ] 
  3943. |_[ + ] Target:: [ http://www.petsex.com/movie/7322/guy_and_donkey2 ]
  3944. |_[ + ] Exploit:: 
  3945. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3946. |_[ + ] More details::  / - / , ISP: 
  3947. |_[ + ] Found:: UNIDENTIFIED
  3948. 
  3949.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3950. |_[ + ] [ 95 / 100 ]-[05:57:05] [ - ] 
  3951. |_[ + ] Target:: [ http://www.petsex.com/movie/653/3_way ]
  3952. |_[ + ] Exploit:: 
  3953. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3954. |_[ + ] More details::  / - / , ISP: 
  3955. |_[ + ] Found:: UNIDENTIFIED
  3956. 
  3957.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3958. |_[ + ] [ 96 / 100 ]-[05:57:05] [ - ] 
  3959. |_[ + ] Target:: [ http://www.petsex.com/movie/42305/male_dog_knots_boy ]
  3960. |_[ + ] Exploit:: 
  3961. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3962. |_[ + ] More details::  / - / , ISP: 
  3963. |_[ + ] Found:: UNIDENTIFIED
  3964. 
  3965.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3966. |_[ + ] [ 97 / 100 ]-[05:57:06] [ - ] 
  3967. |_[ + ] Target:: [ http://www.petsex.com/movie/30090/condom_tricks ]
  3968. |_[ + ] Exploit:: 
  3969. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3970. |_[ + ] More details::  / - / , ISP: 
  3971. |_[ + ] Found:: UNIDENTIFIED
  3972. 
  3973.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3974. |_[ + ] [ 98 / 100 ]-[05:57:06] [ - ] 
  3975. |_[ + ] Target:: [ http://www.petsex.com/movie/29711/babysitting_neighbors_dog ]
  3976. |_[ + ] Exploit:: 
  3977. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.55.27:80 
  3978. |_[ + ] More details::  / - / , ISP: 
  3979. |_[ + ] Found:: UNIDENTIFIED
  3980. 
  3981.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  3982. |_[ + ] [ 99 / 100 ]-[05:57:07] [ - ] 
  3983. |_[ + ] Target:: [ https://www.petsex.com/user/show/south2 ]
  3984. |_[ + ] Exploit:: 
  3985. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: cloudflare-nginx , IP:104.25.54.27:443 
  3986. |_[ + ] More details::  / - / , ISP: 
  3987. |_[ + ] Found:: UNIDENTIFIED
  3988.  
  3989. [ INFO ] [ Shutting down ]
  3990. [ INFO ] [ End of process INURLBR at [23-10-2017 05:57:07]
  3991. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  3992. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-petsex.com.txt ]
  3993. |_________________________________________________________________________________________
  3994.  
  3995. \_________________________________________________________________________________________/
  3996.  
  3997.  + -- --=[Port 110 closed... skipping.
  3998.  + -- --=[Port 111 closed... skipping.
  3999.  + -- --=[Port 135 closed... skipping.
  4000.  + -- --=[Port 139 closed... skipping.
  4001.  + -- --=[Port 161 closed... skipping.
  4002.  + -- --=[Port 162 closed... skipping.
  4003.  + -- --=[Port 389 closed... skipping.
  4004.  + -- --=[Port 443 opened... running tests...
  4005.  + -- ----------------------------=[Checking for WAF]=------------------------ -- +
  4006.  
  4007. ^ ^
  4008. _ __ _ ____ _ __ _ _ ____
  4009. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  4010. | V V // o // _/ | V V // 0 // 0 // _/
  4011. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  4012. <
  4013. ...'
  4014.  
  4015. WAFW00F - Web Application Firewall Detection Tool
  4016.  
  4017. By Sandro Gauci && Wendel G. Henrique
  4018.  
  4019. Checking https://petsex.com
  4020. The site https://petsex.com is behind a CloudFlare
  4021. Number of requests: 1
  4022.  
  4023.  + -- ----------------------------=[Checking Cloudflare]=--------------------- -- +
  4024. ____ _ _ _____ _ _
  4025. / ___| | ___ _ _ __| | ___|_ _(_) |
  4026. | | | |/ _ \| | | |/ _` | |_ / _` | | |
  4027. | |___| | (_) | |_| | (_| | _| (_| | | |
  4028. \____|_|\___/ \__,_|\__,_|_| \__,_|_|_|
  4029. v1.0.1 by m0rtem
  4030.  
  4031.  
  4032. [05:57:11] Initializing CloudFail - the date is: 23/10/2017
  4033. [05:57:11] Fetching initial information from: petsex.com...
  4034. [05:57:11] Server IP: 104.25.55.27
  4035. [05:57:11] Testing if petsex.com is on the Cloudflare network...
  4036. [05:57:11] petsex.com is part of the Cloudflare network!
  4037. [05:57:11] Testing for misconfigured DNS using dnsdumpster...
  4038. [05:57:13] [FOUND:HOST] petsex.comHTTP: cloudflare-nginxTCP8080: cloudflare-nginx 104.25.55.27 AS13335 Cloudflare Inc
  4039. [05:57:13] [FOUND:HOST] petsex.comHTTP: cloudflare-nginxTCP8080: cloudflare-nginx 104.25.54.27 AS13335 Cloudflare Inc
  4040. [05:57:13] [FOUND:HOST] petsex.comHTTP: cloudflare-nginxTCP8080: cloudflare-nginx 104.25.55.27 AS13335 Cloudflare Inc
  4041. [05:57:13] [FOUND:HOST] www.petsex.comHTTP: cloudflare-nginxTCP8080: cloudflare-nginx 104.25.54.27 AS13335 Cloudflare Inc
  4042. [05:57:13] [FOUND:HOST] www.petsex.comHTTP: cloudflare-nginxTCP8080: cloudflare-nginx 104.25.55.27 AS13335 Cloudflare Inc
  4043. [05:57:13] [FOUND:DNS] elliot.ns.cloudflare.com. 173.245.59.162 AS13335 Cloudflare Inc United States
  4044. [05:57:13] [FOUND:DNS] tegan.ns.cloudflare.com. 173.245.58.226 AS13335 Cloudflare Inc United States
  4045. [05:57:13] [FOUND:MX] 64.233.186.26 AS15169 Google Inc. 10 aspmx2.googlemail.com.
  4046. [05:57:13] [FOUND:MX] 74.125.192.26 AS15169 Google Inc. 1 aspmx.l.google.com.
  4047. [05:57:13] [FOUND:MX] 209.85.203.26 AS15169 Google Inc. 5 alt2.aspmx.l.google.com.
  4048. [05:57:13] [FOUND:MX] 209.85.203.26 AS15169 Google Inc. 10 aspmx3.googlemail.com.
  4049. [05:57:13] [FOUND:MX] 64.233.186.27 AS15169 Google Inc. 5 alt1.aspmx.l.google.com.
  4050. [05:57:13] Scanning crimeflare database...
  4051. [05:57:14] Did not find anything.
  4052. [05:57:14] Scanning 2897 subdomains (subdomains.txt), please wait...
  4053. [05:57:16] 0.97% complete
  4054. [05:57:18] 1.93% complete
  4055. [05:57:21] 2.9% complete
  4056. [05:57:24] 3.87% complete
  4057. [05:57:26] 4.83% complete
  4058. [05:57:29] 5.8% complete
  4059. [05:57:32] 6.77% complete
  4060. [05:57:34] 7.73% complete
  4061. [05:57:37] 8.7% complete
  4062. [05:57:40] 9.67% complete
  4063. [05:57:43] 10.63% complete
  4064. [05:57:46] 11.6% complete
  4065. [05:57:48] 12.56% complete
  4066. [05:57:51] 13.53% complete
  4067. [05:57:53] 14.5% complete
  4068. [05:57:56] 15.46% complete
  4069. [05:57:59] 16.43% complete
  4070. [05:58:01] 17.4% complete
  4071. [05:58:04] 18.36% complete
  4072. [05:58:06] 19.33% complete
  4073. [05:58:09] 20.3% complete
  4074. [05:58:12] 21.26% complete
  4075. [05:58:14] 22.23% complete
  4076. [05:58:17] 23.2% complete
  4077. [05:58:19] 24.16% complete
  4078. [05:58:22] 25.13% complete
  4079. [05:58:25] 26.1% complete
  4080. [05:58:28] 27.06% complete
  4081. [05:58:30] 28.03% complete
  4082. [05:58:33] 29.0% complete
  4083. [05:58:36] 29.96% complete
  4084. [05:58:38] 30.93% complete
  4085. [05:58:41] 31.9% complete
  4086. [05:58:44] 32.86% complete
  4087. [05:58:46] 33.83% complete
  4088. [05:58:49] 34.79% complete
  4089. [05:58:52] 35.76% complete
  4090. [05:58:54] 36.73% complete
  4091. [05:58:57] 37.69% complete
  4092. [05:58:59] 38.66% complete
  4093. [05:59:02] 39.63% complete
  4094. [05:59:04] 40.59% complete
  4095. [05:59:07] 41.56% complete
  4096. [05:59:10] 42.53% complete
  4097. [05:59:13] 43.49% complete
  4098. [05:59:15] 44.46% complete
  4099. [05:59:18] 45.43% complete
  4100. [05:59:21] 46.39% complete
  4101. [05:59:23] 47.36% complete
  4102. [05:59:26] 48.33% complete
  4103. [05:59:28] 49.29% complete
  4104. [05:59:31] 50.26% complete
  4105. [05:59:34] 51.23% complete
  4106. [05:59:36] 52.19% complete
  4107. [05:59:39] 53.16% complete
  4108. [05:59:42] 54.12% complete
  4109. [05:59:44] 55.09% complete
  4110. [05:59:47] 56.06% complete
  4111. [05:59:50] 57.02% complete
  4112. [05:59:53] 57.99% complete
  4113. [05:59:56] 58.96% complete
  4114. [05:59:58] 59.92% complete
  4115. [06:00:01] 60.89% complete
  4116. [06:00:04] 61.86% complete
  4117. [06:00:07] 62.82% complete
  4118. [06:00:10] 63.79% complete
  4119. [06:00:12] 64.76% complete
  4120. [06:00:15] 65.72% complete
  4121. [06:00:18] 66.69% complete
  4122. [06:00:21] 67.66% complete
  4123. [06:00:23] 68.62% complete
  4124. [06:00:26] 69.59% complete
  4125. [06:00:29] 70.56% complete
  4126. [06:00:31] 71.52% complete
  4127. [06:00:34] 72.49% complete
  4128. [06:00:36] 73.46% complete
  4129. [06:00:39] 74.42% complete
  4130. [06:00:42] 75.39% complete
  4131. [06:00:45] 76.35% complete
  4132. [06:00:48] 77.32% complete
  4133. [06:00:50] 78.29% complete
  4134. [06:00:53] 79.25% complete
  4135. [06:00:55] 80.22% complete
  4136. [06:00:58] 81.19% complete
  4137. [06:01:00] [FOUND:SUBDOMAIN] streaming.petsex.com ON CLOUDFLARE NETWORK!
  4138. [06:01:01] 82.15% complete
  4139. [06:01:03] 83.12% complete
  4140. [06:01:06] 84.09% complete
  4141. [06:01:09] 85.05% complete
  4142. [06:01:12] 86.02% complete
  4143. [06:01:14] 86.99% complete
  4144. [06:01:17] 87.95% complete
  4145. [06:01:20] 88.92% complete
  4146. [06:01:22] 89.89% complete
  4147. [06:01:25] 90.85% complete
  4148. [06:01:28] 91.82% complete
  4149. [06:01:30] 92.79% complete
  4150. [06:01:33] 93.75% complete
  4151. [06:01:35] 94.72% complete
  4152. [06:01:38] [FOUND:SUBDOMAIN] www.petsex.com ON CLOUDFLARE NETWORK!
  4153. [06:01:39] 95.69% complete
  4154. [06:01:42] 96.65% complete
  4155. [06:01:44] 97.62% complete
  4156. [06:01:47] 98.58% complete
  4157. [06:01:50] 99.55% complete
  4158. [06:01:51] Scanning finished, we did not find anything sorry...
  4159.  + -- ----------------------------=[Gathering HTTP Info]=--------------------- -- +
  4160. https://petsex.com [200 OK] CloudFlare, Cookies[__cfduid,surfer], Country[UNITED STATES][US], HTTPServer[cloudflare-nginx], HttpOnly[__cfduid], IP[104.25.54.27], Script, UncommonHeaders[cf-ray]
  4161.  
  4162.  + -- ----------------------------=[Gathering SSL/TLS Info]=------------------ -- +
  4163.  
  4164.  
  4165.  
  4166. AVAILABLE PLUGINS
  4167. -----------------
  4168.  
  4169. PluginChromeSha1Deprecation
  4170. PluginHeartbleed
  4171. PluginSessionResumption
  4172. PluginHSTS
  4173. PluginSessionRenegotiation
  4174. PluginCertInfo
  4175. PluginOpenSSLCipherSuites
  4176. PluginCompression
  4177.  
  4178.  
  4179.  
  4180. CHECKING HOST(S) AVAILABILITY
  4181. -----------------------------
  4182.  
  4183. petsex.com:443 => 104.25.55.27:443
  4184.  
  4185.  
  4186.  
  4187. SCAN RESULTS FOR PETSEX.COM:443 - 104.25.55.27:443
  4188. --------------------------------------------------
  4189.  
  4190. * Deflate Compression:
  4191. OK - Compression disabled
  4192.  
  4193. * Session Renegotiation:
  4194. Client-initiated Renegotiations: OK - Rejected
  4195. Secure Renegotiation: OK - Supported
  4196.  
  4197. * SSLV3 Cipher Suites:
  4198. Server rejected all cipher suites.
  4199.  
  4200. * SSLV2 Cipher Suites:
  4201. Server rejected all cipher suites.
  4202.  
  4203. * Certificate - Content:
  4204. SHA1 Fingerprint: 9b6340d30cfee35d2bd9f41f28e5018bb1ff6f5c
  4205. Common Name: ssl388690.cloudflaressl.com
  4206. Issuer: COMODO RSA Domain Validation Secure Server CA 2
  4207. Serial Number: B8893D3D0FB66DCB2C0D680B6C4ECD1C
  4208. Not Before: Oct 10 00:00:00 2017 GMT
  4209. Not After: Nov 16 23:59:59 2017 GMT
  4210. Signature Algorithm: sha256WithRSAEncryption
  4211. Public Key Algorithm: rsaEncryption
  4212. Key Size: 2048 bit
  4213. Exponent: 65537 (0x10001)
  4214. X509v3 Subject Alternative Name: {'DNS': ['ssl388690.cloudflaressl.com', '*.barnlove.com', '*.beastforum.com', '*.gaybeast.com', '*.lottonow.com', '*.lottonow.in', '*.medicomhealth.com', '*.obviate.io', '*.petsex.com', '*.resortsofmaldives.com', '*.snowulf.com', '*.travelbelize.org', '*.trouver-un-cours.fr', '*.wikistrategies.net', 'barnlove.com', 'beastforum.com', 'gaybeast.com', 'lottonow.com', 'lottonow.in', 'medicomhealth.com', 'obviate.io', 'petsex.com', 'resortsofmaldives.com', 'snowulf.com', 'travelbelize.org', 'trouver-un-cours.fr', 'wikistrategies.net']}
  4215.  
  4216. * Certificate - Trust:
  4217. Hostname Validation: OK - Subject Alternative Name matches
  4218. Google CA Store (09/2015): OK - Certificate is trusted
  4219. Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
  4220. Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
  4221. Java 6 CA Store (Update 65): ERROR: timeout - timed out
  4222. Microsoft CA Store (09/2015): ERROR: timeout - timed out
  4223. Certificate Chain Received: ['ssl388690.cloudflaressl.com', 'COMODO RSA Domain Validation Secure Server CA 2', 'COMODO RSA Certification Authority']
  4224.  
  4225. * Certificate - OCSP Stapling:
  4226. OCSP Response Status: successful
  4227. Validation w/ Mozilla's CA Store: OK - Response is trusted
  4228. Responder Id: D4B0F4FD4F9C42A46CDC3D2EEE5B4118C9AD03F6
  4229. Cert Status: good
  4230. Cert Serial Number: B8893D3D0FB66DCB2C0D680B6C4ECD1C
  4231. This Update: Oct 21 11:33:13 2017 GMT
  4232. Next Update: Oct 28 11:33:13 2017 GMT
  4233.  
  4234. * Session Resumption:
  4235. With Session IDs: PARTIALLY SUPPORTED (4 successful, 0 failed, 1 errors, 5 total attempts). Try --resum_rate.
  4236. ERROR #1: timeout - timed out
  4237. With TLS Session Tickets: OK - Supported
  4238.  
  4239.  
  4240.  
  4241. SCAN COMPLETED IN 30.01 S
  4242. -------------------------
  4243. Version: 1.11.10-static
  4244. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  4245. 
  4246. Testing SSL server petsex.com on port 443 using SNI name petsex.com
  4247.  
  4248. TLS Fallback SCSV:
  4249. Server does not support TLS Fallback SCSV
  4250.  
  4251. TLS renegotiation:
  4252. Secure session renegotiation supported
  4253.  
  4254. TLS Compression:
  4255. Compression disabled
  4256.  
  4257. Heartbleed:
  4258. TLS 1.2 not vulnerable to heartbleed
  4259. TLS 1.1 not vulnerable to heartbleed
  4260. TLS 1.0 not vulnerable to heartbleed
  4261.  
  4262. Supported Server Cipher(s):
  4263. Preferred TLSv1.2 256 bits ECDHE-ECDSA-CHACHA20-POLY1305 Curve P-256 DHE 256
  4264. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  4265. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA Curve P-256 DHE 256
  4266. Accepted TLSv1.2 128 bits ECDHE-ECDSA-AES128-SHA256 Curve P-256 DHE 256
  4267. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  4268. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA Curve P-256 DHE 256
  4269. Accepted TLSv1.2 256 bits ECDHE-ECDSA-AES256-SHA384 Curve P-256 DHE 256
  4270. Accepted TLSv1.2 256 bits ECDHE-RSA-CHACHA20-POLY1305  Curve P-256 DHE 256
  4271. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256  Curve P-256 DHE 256
  4272. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  4273. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  4274. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  4275. Accepted TLSv1.2 128 bits AES128-SHA
  4276. Accepted TLSv1.2 128 bits AES128-SHA256
  4277. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384  Curve P-256 DHE 256
  4278. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  4279. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  4280. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  4281. Accepted TLSv1.2 256 bits AES256-SHA
  4282. Accepted TLSv1.2 256 bits AES256-SHA256
  4283. Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  4284. Accepted TLSv1.1 128 bits AES128-SHA
  4285. Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  4286. Accepted TLSv1.1 256 bits AES256-SHA
  4287. Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  4288. Accepted TLSv1.0 128 bits AES128-SHA
  4289. Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  4290. Accepted TLSv1.0 256 bits AES256-SHA
  4291. Accepted TLSv1.0 112 bits DES-CBC3-SHA 
  4292.  
  4293. SSL Certificate:
  4294. Signature Algorithm: ecdsa-with-SHA256
  4295. Subject: ssl388691.cloudflaressl.com
  4296. Altnames: DNS:ssl388691.cloudflaressl.com, DNS:*.barnlove.com, DNS:*.beastforum.com, DNS:*.gaybeast.com, DNS:*.lottonow.com, DNS:*.lottonow.in, DNS:*.medicomhealth.com, DNS:*.obviate.io, DNS:*.petsex.com, DNS:*.resortsofmaldives.com, DNS:*.snowulf.com, DNS:*.travelbelize.org, DNS:*.trouver-un-cours.fr, DNS:*.wikistrategies.net, DNS:barnlove.com, DNS:beastforum.com, DNS:gaybeast.com, DNS:lottonow.com, DNS:lottonow.in, DNS:medicomhealth.com, DNS:obviate.io, DNS:petsex.com, DNS:resortsofmaldives.com, DNS:snowulf.com, DNS:travelbelize.org, DNS:trouver-un-cours.fr, DNS:wikistrategies.net
  4297. Issuer: COMODO ECC Domain Validation Secure Server CA 2
  4298.  
  4299. Not valid before: Oct 10 00:00:00 2017 GMT
  4300. Not valid after: Nov 16 23:59:59 2017 GMT
  4301. 
  4302. ###########################################################
  4303. testssl 2.9dev from https://testssl.sh/dev/
  4304. 
  4305. This program is free software. Distribution and
  4306. modification under GPLv2 permitted.
  4307. USAGE w/o ANY WARRANTY. USE IT AT YOUR OWN RISK!
  4308.  
  4309. Please file bugs @ https://testssl.sh/bugs/
  4310. 
  4311. ###########################################################
  4312.  
  4313. Using "OpenSSL 1.0.2-chacha (1.0.2i-dev)" [~183 ciphers]
  4314. on Kali:/usr/share/sniper/plugins/testssl.sh/bin/openssl.Linux.x86_64
  4315. (built: "Jun 22 19:32:29 2016", platform: "linux-x86_64")
  4316.  
  4317.  
  4318. Testing all IPv4 addresses (port 443): 104.25.54.27 104.25.55.27
  4319. -----------------------------------------------------
  4320.  Start 2017-10-23 06:02:43 -->> 104.25.54.27:443 (petsex.com) <<--
  4321.  
  4322. further IP addresses: 104.25.55.27
  4323. rDNS (104.25.54.27): --
  4324. Service detected: HTTP
  4325.  
  4326.  
  4327.  Testing protocols via sockets except SPDY+HTTP2 
  4328.  
  4329.  SSLv2 not offered (OK)
  4330.  SSLv3 not offered (OK)
  4331.  TLS 1 offered
  4332.  TLS 1.1 offered
  4333.  TLS 1.2 offered (OK)
  4334.  SPDY/NPN h2, spdy/3.1, http/1.1 (advertised)
  4335.  HTTP2/ALPN h2, spdy/3.1, http/1.1 (offered)
  4336.  
  4337.  Testing ~standard cipher categories 
  4338.  
  4339.  NULL ciphers (no encryption) not offered (OK)
  4340.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  4341.  Export ciphers (w/o ADH+NULL) not offered (OK)
  4342.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  4343.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  4344.  Triple DES Ciphers (Medium) offered
  4345.  High encryption (AES+Camellia, no AEAD) offered (OK)
  4346.  Strong encryption (AEAD ciphers) offered (OK)
  4347.  
  4348.  
  4349.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  4350.  
  4351.  PFS is offered (OK) ECDHE-ECDSA-CHACHA20-POLY1305-OLD
  4352. ECDHE-RSA-CHACHA20-POLY1305-OLD
  4353. ECDHE-RSA-AES256-GCM-SHA384
  4354. ECDHE-ECDSA-AES256-GCM-SHA384
  4355. ECDHE-RSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA384
  4356. ECDHE-RSA-AES256-SHA ECDHE-ECDSA-AES256-SHA
  4357. ECDHE-ECDSA-CHACHA20-POLY1305
  4358. ECDHE-RSA-CHACHA20-POLY1305
  4359. ECDHE-RSA-AES128-GCM-SHA256
  4360. ECDHE-ECDSA-AES128-GCM-SHA256
  4361. ECDHE-RSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA256
  4362. ECDHE-RSA-AES128-SHA ECDHE-ECDSA-AES128-SHA
  4363.  Elliptic curves offered: secp224r1 prime256v1 secp384r1 secp521r1 X25519
  4364.  
  4365.  
  4366.  Testing server preferences 
  4367.  
  4368.  Has server cipher order? yes (OK)
  4369.  Negotiated protocol TLSv1.2
  4370.  Negotiated cipher ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  4371.  Cipher order
  4372. TLSv1: ECDHE-RSA-AES128-SHA AES128-SHA ECDHE-RSA-AES256-SHA AES256-SHA
  4373. DES-CBC3-SHA
  4374. TLSv1.1: ECDHE-RSA-AES128-SHA AES128-SHA ECDHE-RSA-AES256-SHA AES256-SHA
  4375. TLSv1.2: ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-CHACHA20-POLY1305
  4376. ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA
  4377. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384
  4378. ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-AES256-SHA384
  4379. ECDHE-RSA-CHACHA20-POLY1305-OLD ECDHE-RSA-CHACHA20-POLY1305
  4380. ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA
  4381. ECDHE-RSA-AES128-SHA256 AES128-GCM-SHA256 AES128-SHA
  4382. AES128-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA
  4383. ECDHE-RSA-AES256-SHA384 AES256-GCM-SHA384 AES256-SHA
  4384. AES256-SHA256
  4385.  
  4386.  
  4387.  Testing server defaults (Server Hello) 
  4388.  
  4389.  TLS extensions (standard) "renegotiation info/#65281" "server name/#0"
  4390. "session ticket/#35" "status request/#5"
  4391. "next protocol/#13172" "EC point formats/#11"
  4392. "extended master secret/#23"
  4393. "signed certificate timestamps/#18"
  4394. "application layer protocol negotiation/#16"
  4395.  Session Ticket RFC 5077 hint 64800 seconds, session tickets keys seems to be rotated < daily
  4396.  SSL Session ID support yes
  4397.  Session Resumption Tickets: yes, ID: yes
  4398.  TLS clock skew -1 sec from localtime
  4399.  
  4400. Server Certificate #1
  4401.  Signature Algorithm SHA256 with RSA
  4402.  Server key size RSA 2048 bits
  4403.  Fingerprint / Serial SHA1 9B6340D30CFEE35D2BD9F41F28E5018BB1FF6F5C / B8893D3D0FB66DCB2C0D680B6C4ECD1C
  4404. SHA256 1EEBE71D54A5E4ECADF6047D55B1438630DE658CCEC78142C93D3F4EA137AD37
  4405.  Common Name (CN) ssl388690.cloudflaressl.com (CN in response to request w/o SNI: ssl388689.cloudflaressl.com)
  4406.  subjectAltName (SAN) ssl388690.cloudflaressl.com *.barnlove.com
  4407. *.beastforum.com *.gaybeast.com *.lottonow.com
  4408. *.lottonow.in *.medicomhealth.com *.obviate.io
  4409. *.petsex.com *.resortsofmaldives.com
  4410. *.snowulf.com *.travelbelize.org
  4411. *.trouver-un-cours.fr *.wikistrategies.net
  4412. barnlove.com beastforum.com gaybeast.com
  4413. lottonow.com lottonow.in medicomhealth.com
  4414. obviate.io petsex.com resortsofmaldives.com
  4415. snowulf.com travelbelize.org
  4416. trouver-un-cours.fr wikistrategies.net 
  4417.  Issuer COMODO RSA Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
  4418.  Trust (hostname) Ok via SAN (same w/o SNI)
  4419.  Chain of trust Ok 
  4420.  EV cert (experimental) no
  4421.  Certificate Expiration expires < 30 days (24) ! (2017-10-09 20:00 --> 2017-11-16 18:59 -0500)
  4422.  # of certificates provided 3
  4423.  Certificate Revocation List http://crl.comodoca4.com/COMODORSADomainValidationSecureServerCA2.crl
  4424.  OCSP URI http://ocsp.comodoca4.com
  4425.  OCSP stapling offered
  4426.  OCSP must staple no
  4427.  DNS CAA RR (experimental) --
  4428.  Certificate Transparency yes (TLS extension)
  4429.  
  4430. Server Certificate #2
  4431.  Signature Algorithm ECDSA with SHA256
  4432.  Server key size ECDSA 256 bits
  4433.  Fingerprint / Serial SHA1 F7D1FFF5BD641874270C0BA6C874BFC9FD4D13A9 / FE8D5E2D9CCDD79348321A5B30D0AC95
  4434. SHA256 45221CAF15CCD2C76AA9F36EA0F43AE32BEECE183EBCD042EA82D9C35B06A6CC
  4435.  Common Name (CN) ssl388691.cloudflaressl.com (CN in response to request w/o SNI: ssl388689.cloudflaressl.com)
  4436.  subjectAltName (SAN) ssl388691.cloudflaressl.com *.barnlove.com
  4437. *.beastforum.com *.gaybeast.com *.lottonow.com
  4438. *.lottonow.in *.medicomhealth.com *.obviate.io
  4439. *.petsex.com *.resortsofmaldives.com
  4440. *.snowulf.com *.travelbelize.org
  4441. *.trouver-un-cours.fr *.wikistrategies.net
  4442. barnlove.com beastforum.com gaybeast.com
  4443. lottonow.com lottonow.in medicomhealth.com
  4444. obviate.io petsex.com resortsofmaldives.com
  4445. snowulf.com travelbelize.org
  4446. trouver-un-cours.fr wikistrategies.net 
  4447.  Issuer COMODO ECC Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
  4448.  Trust (hostname) Ok via SAN (same w/o SNI)
  4449.  Chain of trust Ok 
  4450.  EV cert (experimental) no
  4451.  Certificate Expiration expires < 30 days (24) ! (2017-10-09 20:00 --> 2017-11-16 18:59 -0500)
  4452.  # of certificates provided 3
  4453.  Certificate Revocation List http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
  4454.  OCSP URI http://ocsp.comodoca4.com
  4455.  OCSP stapling offered
  4456.  OCSP must staple no
  4457.  DNS CAA RR (experimental) --
  4458.  Certificate Transparency yes (TLS extension)
  4459.  
  4460. Server Certificate #3 (in response to request w/o SNI)
  4461.  Signature Algorithm SHA1 with RSA -- besides: users will receive a strong browser WARNING
  4462.  Server key size RSA 2048 bits
  4463.  Fingerprint / Serial SHA1 79F33C2BFA7C5A6E42565CA762C944548E264847 / D6D1B04905C7126A506D3FC2E725299F
  4464. SHA256 B6AB58C6926CBDDEB07DFB4BD628045C67C77A26688C8BF9FD0D493ED1C76779
  4465.  Common Name (CN) ssl388689.cloudflaressl.com
  4466.  subjectAltName (SAN) ssl388689.cloudflaressl.com *.barnlove.com
  4467. *.beastforum.com *.gaybeast.com *.lottonow.com
  4468. *.lottonow.in *.lottonow.world
  4469. *.medicomhealth.com *.obviate.io *.petsex.com
  4470. *.resortsofmaldives.com *.snowulf.com
  4471. *.travelbelize.org *.trouver-un-cours.fr
  4472. *.wikistrategies.net barnlove.com
  4473. beastforum.com gaybeast.com lottonow.com
  4474. lottonow.in lottonow.world medicomhealth.com
  4475. obviate.io petsex.com resortsofmaldives.com
  4476. snowulf.com travelbelize.org
  4477. trouver-un-cours.fr wikistrategies.net 
  4478.  Issuer COMODO Domain Validation Legacy Server CA 2 (COMODO CA Limited from GB)
  4479.  Trust (hostname) Ok via SAN
  4480.  Chain of trust NOT ok: Linux (chain incomplete) Microsoft (chain incomplete) Mozilla (chain incomplete)
  4481. OK: Apple 
  4482.  EV cert (experimental) no
  4483.  Certificate Expiration expires < 30 days (24) ! (2017-10-09 20:00 --> 2017-11-16 18:59 -0500)
  4484.  # of certificates provided 2
  4485.  Certificate Revocation List http://crl.comodoca4.com/COMODODomainValidationLegacyServerCA2.crl
  4486.  OCSP URI http://ocsp.comodoca4.com
  4487.  OCSP stapling offered
  4488.  OCSP must staple no
  4489.  DNS CAA RR (experimental) --
  4490.  Certificate Transparency yes (TLS extension)
  4491.  
  4492.  
  4493.  Testing HTTP header response @ "/" 
  4494.  
  4495.  HTTP Status Code  200 OK
  4496.  HTTP clock skew 0 sec from localtime
  4497.  Strict Transport Security --
  4498.  Public Key Pinning --
  4499.  Server banner cloudflare-nginx
  4500.  Application banner --
  4501.  Cookie(s) 2 issued: NONE secure, 1/2 HttpOnly
  4502.  Security headers --
  4503.  Reverse Proxy banner --
  4504.  
  4505.  
  4506.  Testing vulnerabilities 
  4507.  
  4508.  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
  4509.  CCS (CVE-2014-0224) not vulnerable (OK)
  4510.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK)
  4511.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  4512.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  4513.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  4514.  BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
  4515. Can be ignored for static pages or if no secrets in the page
  4516.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  4517.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  4518.  SWEET32 (CVE-2016-2183, CVE-2016-6329) VULNERABLE, uses 64 bit block ciphers
  4519.  FREAK (CVE-2015-0204) not vulnerable (OK)
  4520.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  4521. make sure you don't use this certificate elsewhere with SSLv2 enabled services
  4522. https://censys.io/ipv4?q=1EEBE71D54A5E4ECADF6047D55B1438630DE658CCEC78142C93D3F4EA137AD37 could help you to find out
  4523.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  4524.  BEAST (CVE-2011-3389) TLS1: ECDHE-RSA-AES128-SHA
  4525. AES128-SHA
  4526. ECDHE-RSA-AES256-SHA
  4527. AES256-SHA DES-CBC3-SHA 
  4528. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  4529.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  4530.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  4531.  
  4532.  
  4533.  Testing 364 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  4534.  
  4535. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  4536. -----------------------------------------------------------------------------------------------------------------------------
  4537. xcc14 ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256_OLD
  4538. xcc13 ECDHE-RSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256_OLD
  4539. xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  4540. xc02c ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  4541. xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  4542. xc024 ECDHE-ECDSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
  4543. xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  4544. xc00a ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  4545. xcca9 ECDHE-ECDSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
  4546. xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
  4547. x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
  4548. x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
  4549. x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
  4550. xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  4551. xc02b ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  4552. xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  4553. xc023 ECDHE-ECDSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  4554. xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  4555. xc009 ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  4556. x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
  4557. x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
  4558. x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
  4559. x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA
  4560.  
  4561.  
  4562.  Running client simulations via sockets 
  4563.  
  4564. Android 2.3.7 TLSv1.0 AES128-SHA
  4565. Android 4.1.1 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4566. Android 4.3 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4567. Android 4.4.2 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4568. Android 5.0.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  4569. Android 6.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  4570. Android 7.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 253 bit ECDH (X25519)
  4571. Chrome 51 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 253 bit ECDH (X25519)
  4572. Chrome 57 Win 7 TLSv1.3 TLS13-AES-128-GCM-SHA256, 253 bit ECDH (X25519)
  4573. Firefox 49 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4574. Firefox 53 Win 7 TLSv1.3 TLS13-AES-128-GCM-SHA256, 253 bit ECDH (X25519)
  4575. IE 6 XP No connection
  4576. IE 7 Vista TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4577. IE 8 XP TLSv1.0 DES-CBC3-SHA
  4578. IE 8 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4579. IE 11 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4580. IE 11 Win 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4581. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4582. IE 11 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4583. Edge 13 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4584. Edge 13 Win Phone 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4585. Opera 17 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4586. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4587. Safari 7 iOS 7.1 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4588. Safari 9 OS X 10.11 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4589. Safari 10 OS X 10.12 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4590. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4591. Tor 17.0.9 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4592. Java 6u45 TLSv1.0 AES128-SHA
  4593. Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4594. Java 8u31 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4595. OpenSSL 1.0.1l TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4596. OpenSSL 1.0.2e TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4597.  
  4598.  Done 2017-10-23 06:07:09 [ 268s] -->> 104.25.54.27:443 (petsex.com) <<--
  4599.  
  4600. -----------------------------------------------------
  4601.  Start 2017-10-23 06:07:09 -->> 104.25.55.27:443 (petsex.com) <<--
  4602.  
  4603. further IP addresses: 104.25.54.27
  4604. rDNS (104.25.55.27): --
  4605. Service detected: HTTP
  4606.  
  4607.  
  4608.  Testing protocols via sockets except SPDY+HTTP2 
  4609.  
  4610.  SSLv2 not offered (OK)
  4611.  SSLv3 not offered (OK)
  4612.  TLS 1 offered
  4613.  TLS 1.1 offered
  4614.  TLS 1.2 offered (OK)
  4615.  SPDY/NPN h2, spdy/3.1, http/1.1 (advertised)
  4616.  HTTP2/ALPN h2, spdy/3.1, http/1.1 (offered)
  4617.  
  4618.  Testing ~standard cipher categories 
  4619.  
  4620.  NULL ciphers (no encryption) not offered (OK)
  4621.  Anonymous NULL Ciphers (no authentication) not offered (OK)
  4622.  Export ciphers (w/o ADH+NULL) not offered (OK)
  4623.  LOW: 64 Bit + DES encryption (w/o export) not offered (OK)
  4624.  Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK)
  4625.  Triple DES Ciphers (Medium) offered
  4626.  High encryption (AES+Camellia, no AEAD) offered (OK)
  4627.  Strong encryption (AEAD ciphers) offered (OK)
  4628.  
  4629.  
  4630.  Testing robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4 
  4631.  
  4632.  PFS is offered (OK) ECDHE-ECDSA-CHACHA20-POLY1305-OLD
  4633. ECDHE-RSA-CHACHA20-POLY1305-OLD
  4634. ECDHE-RSA-AES256-GCM-SHA384
  4635. ECDHE-ECDSA-AES256-GCM-SHA384
  4636. ECDHE-RSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA384
  4637. ECDHE-RSA-AES256-SHA ECDHE-ECDSA-AES256-SHA
  4638. ECDHE-ECDSA-CHACHA20-POLY1305
  4639. ECDHE-RSA-CHACHA20-POLY1305
  4640. ECDHE-RSA-AES128-GCM-SHA256
  4641. ECDHE-ECDSA-AES128-GCM-SHA256
  4642. ECDHE-RSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA256
  4643. ECDHE-RSA-AES128-SHA ECDHE-ECDSA-AES128-SHA
  4644.  Elliptic curves offered: secp224r1 prime256v1 secp384r1 secp521r1 X25519
  4645.  
  4646.  
  4647.  Testing server preferences 
  4648.  
  4649.  Has server cipher order? yes (OK)
  4650.  Negotiated protocol TLSv1.2
  4651.  Negotiated cipher ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  4652.  Cipher order
  4653. TLSv1: ECDHE-RSA-AES128-SHA AES128-SHA ECDHE-RSA-AES256-SHA AES256-SHA
  4654. DES-CBC3-SHA
  4655. TLSv1.1: ECDHE-RSA-AES128-SHA AES128-SHA ECDHE-RSA-AES256-SHA AES256-SHA
  4656. TLSv1.2: ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDHE-ECDSA-CHACHA20-POLY1305
  4657. ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA
  4658. ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384
  4659. ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-AES256-SHA384
  4660. ECDHE-RSA-CHACHA20-POLY1305-OLD ECDHE-RSA-CHACHA20-POLY1305
  4661. ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA
  4662. ECDHE-RSA-AES128-SHA256 AES128-GCM-SHA256 AES128-SHA
  4663. AES128-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA
  4664. ECDHE-RSA-AES256-SHA384 AES256-GCM-SHA384 AES256-SHA
  4665. AES256-SHA256
  4666.  
  4667.  
  4668.  Testing server defaults (Server Hello) 
  4669.  
  4670.  TLS extensions (standard) "renegotiation info/#65281" "server name/#0"
  4671. "session ticket/#35" "status request/#5"
  4672. "next protocol/#13172" "EC point formats/#11"
  4673. "extended master secret/#23"
  4674. "signed certificate timestamps/#18"
  4675. "application layer protocol negotiation/#16"
  4676.  Session Ticket RFC 5077 hint 64800 seconds, session tickets keys seems to be rotated < daily
  4677.  SSL Session ID support yes
  4678.  Session Resumption Tickets: yes, ID: yes
  4679.  TLS clock skew -1 sec from localtime
  4680.  
  4681. Server Certificate #1
  4682.  Signature Algorithm SHA256 with RSA
  4683.  Server key size RSA 2048 bits
  4684.  Fingerprint / Serial SHA1 9B6340D30CFEE35D2BD9F41F28E5018BB1FF6F5C / B8893D3D0FB66DCB2C0D680B6C4ECD1C
  4685. SHA256 1EEBE71D54A5E4ECADF6047D55B1438630DE658CCEC78142C93D3F4EA137AD37
  4686.  Common Name (CN) ssl388690.cloudflaressl.com (CN in response to request w/o SNI: ssl388689.cloudflaressl.com)
  4687.  subjectAltName (SAN) ssl388690.cloudflaressl.com *.barnlove.com
  4688. *.beastforum.com *.gaybeast.com *.lottonow.com
  4689. *.lottonow.in *.medicomhealth.com *.obviate.io
  4690. *.petsex.com *.resortsofmaldives.com
  4691. *.snowulf.com *.travelbelize.org
  4692. *.trouver-un-cours.fr *.wikistrategies.net
  4693. barnlove.com beastforum.com gaybeast.com
  4694. lottonow.com lottonow.in medicomhealth.com
  4695. obviate.io petsex.com resortsofmaldives.com
  4696. snowulf.com travelbelize.org
  4697. trouver-un-cours.fr wikistrategies.net 
  4698.  Issuer COMODO RSA Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
  4699.  Trust (hostname) Ok via SAN (same w/o SNI)
  4700.  Chain of trust Ok 
  4701.  EV cert (experimental) no
  4702.  Certificate Expiration expires < 30 days (24) ! (2017-10-09 20:00 --> 2017-11-16 18:59 -0500)
  4703.  # of certificates provided 3
  4704.  Certificate Revocation List http://crl.comodoca4.com/COMODORSADomainValidationSecureServerCA2.crl
  4705.  OCSP URI http://ocsp.comodoca4.com
  4706.  OCSP stapling offered
  4707.  OCSP must staple no
  4708.  DNS CAA RR (experimental) --
  4709.  Certificate Transparency yes (TLS extension)
  4710.  
  4711. Server Certificate #2
  4712.  Signature Algorithm ECDSA with SHA256
  4713.  Server key size ECDSA 256 bits
  4714.  Fingerprint / Serial SHA1 F7D1FFF5BD641874270C0BA6C874BFC9FD4D13A9 / FE8D5E2D9CCDD79348321A5B30D0AC95
  4715. SHA256 45221CAF15CCD2C76AA9F36EA0F43AE32BEECE183EBCD042EA82D9C35B06A6CC
  4716.  Common Name (CN) ssl388691.cloudflaressl.com (CN in response to request w/o SNI: ssl388689.cloudflaressl.com)
  4717.  subjectAltName (SAN) ssl388691.cloudflaressl.com *.barnlove.com
  4718. *.beastforum.com *.gaybeast.com *.lottonow.com
  4719. *.lottonow.in *.medicomhealth.com *.obviate.io
  4720. *.petsex.com *.resortsofmaldives.com
  4721. *.snowulf.com *.travelbelize.org
  4722. *.trouver-un-cours.fr *.wikistrategies.net
  4723. barnlove.com beastforum.com gaybeast.com
  4724. lottonow.com lottonow.in medicomhealth.com
  4725. obviate.io petsex.com resortsofmaldives.com
  4726. snowulf.com travelbelize.org
  4727. trouver-un-cours.fr wikistrategies.net 
  4728.  Issuer COMODO ECC Domain Validation Secure Server CA 2 (COMODO CA Limited from GB)
  4729.  Trust (hostname) Ok via SAN (same w/o SNI)
  4730.  Chain of trust Ok 
  4731.  EV cert (experimental) no
  4732.  Certificate Expiration expires < 30 days (24) ! (2017-10-09 20:00 --> 2017-11-16 18:59 -0500)
  4733.  # of certificates provided 3
  4734.  Certificate Revocation List http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl
  4735.  OCSP URI http://ocsp.comodoca4.com
  4736.  OCSP stapling offered
  4737.  OCSP must staple no
  4738.  DNS CAA RR (experimental) --
  4739.  Certificate Transparency yes (TLS extension)
  4740.  
  4741. Server Certificate #3 (in response to request w/o SNI)
  4742.  Signature Algorithm SHA1 with RSA -- besides: users will receive a strong browser WARNING
  4743.  Server key size RSA 2048 bits
  4744.  Fingerprint / Serial SHA1 79F33C2BFA7C5A6E42565CA762C944548E264847 / D6D1B04905C7126A506D3FC2E725299F
  4745. SHA256 B6AB58C6926CBDDEB07DFB4BD628045C67C77A26688C8BF9FD0D493ED1C76779
  4746.  Common Name (CN) ssl388689.cloudflaressl.com
  4747.  subjectAltName (SAN) ssl388689.cloudflaressl.com *.barnlove.com
  4748. *.beastforum.com *.gaybeast.com *.lottonow.com
  4749. *.lottonow.in *.lottonow.world
  4750. *.medicomhealth.com *.obviate.io *.petsex.com
  4751. *.resortsofmaldives.com *.snowulf.com
  4752. *.travelbelize.org *.trouver-un-cours.fr
  4753. *.wikistrategies.net barnlove.com
  4754. beastforum.com gaybeast.com lottonow.com
  4755. lottonow.in lottonow.world medicomhealth.com
  4756. obviate.io petsex.com resortsofmaldives.com
  4757. snowulf.com travelbelize.org
  4758. trouver-un-cours.fr wikistrategies.net 
  4759.  Issuer COMODO Domain Validation Legacy Server CA 2 (COMODO CA Limited from GB)
  4760.  Trust (hostname) Ok via SAN
  4761.  Chain of trust NOT ok: Linux (chain incomplete) Microsoft (chain incomplete) Mozilla (chain incomplete)
  4762. OK: Apple 
  4763.  EV cert (experimental) no
  4764.  Certificate Expiration expires < 30 days (24) ! (2017-10-09 20:00 --> 2017-11-16 18:59 -0500)
  4765.  # of certificates provided 2
  4766.  Certificate Revocation List http://crl.comodoca4.com/COMODODomainValidationLegacyServerCA2.crl
  4767.  OCSP URI http://ocsp.comodoca4.com
  4768.  OCSP stapling offered
  4769.  OCSP must staple no
  4770.  DNS CAA RR (experimental) --
  4771.  Certificate Transparency yes (TLS extension)
  4772.  
  4773.  
  4774.  Testing HTTP header response @ "/" 
  4775.  
  4776.  HTTP Status Code  200 OK
  4777.  HTTP clock skew 0 sec from localtime
  4778.  Strict Transport Security --
  4779.  Public Key Pinning --
  4780.  Server banner cloudflare-nginx
  4781.  Application banner --
  4782.  Cookie(s) 2 issued: NONE secure, 1/2 HttpOnly
  4783.  Security headers --
  4784.  Reverse Proxy banner --
  4785.  
  4786.  
  4787.  Testing vulnerabilities 
  4788.  
  4789.  Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
  4790.  CCS (CVE-2014-0224) not vulnerable (OK)
  4791.  Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK)
  4792.  Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
  4793.  Secure Client-Initiated Renegotiation not vulnerable (OK)
  4794.  CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
  4795.  BREACH (CVE-2013-3587) potentially NOT ok, uses gzip HTTP compression. - only supplied "/" tested
  4796. Can be ignored for static pages or if no secrets in the page
  4797.  POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
  4798.  TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention supported (OK)
  4799.  SWEET32 (CVE-2016-2183, CVE-2016-6329) VULNERABLE, uses 64 bit block ciphers
  4800.  FREAK (CVE-2015-0204) not vulnerable (OK)
  4801.  DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
  4802. make sure you don't use this certificate elsewhere with SSLv2 enabled services
  4803. https://censys.io/ipv4?q=1EEBE71D54A5E4ECADF6047D55B1438630DE658CCEC78142C93D3F4EA137AD37 could help you to find out
  4804.  LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
  4805.  BEAST (CVE-2011-3389) TLS1: ECDHE-RSA-AES128-SHA
  4806. AES128-SHA
  4807. ECDHE-RSA-AES256-SHA
  4808. AES256-SHA DES-CBC3-SHA 
  4809. VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2
  4810.  LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS
  4811.  RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
  4812.  
  4813.  
  4814.  Testing 364 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength 
  4815.  
  4816. Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
  4817. -----------------------------------------------------------------------------------------------------------------------------
  4818. xcc14 ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256_OLD
  4819. xcc13 ECDHE-RSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256_OLD
  4820. xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  4821. xc02c ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  4822. xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  4823. xc024 ECDHE-ECDSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
  4824. xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  4825. xc00a ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  4826. xcca9 ECDHE-ECDSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
  4827. xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
  4828. x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
  4829. x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
  4830. x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
  4831. xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  4832. xc02b ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  4833. xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  4834. xc023 ECDHE-ECDSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  4835. xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  4836. xc009 ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  4837. x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
  4838. x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
  4839. x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
  4840. x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA
  4841.  
  4842.  
  4843.  Running client simulations via sockets 
  4844.  
  4845. Android 2.3.7 TLSv1.0 AES128-SHA
  4846. Android 4.1.1 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4847. Android 4.3 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4848. Android 4.4.2 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4849. Android 5.0.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  4850. Android 6.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD, 256 bit ECDH (P-256)
  4851. Android 7.0 TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 253 bit ECDH (X25519)
  4852. Chrome 51 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 253 bit ECDH (X25519)
  4853. Chrome 57 Win 7 TLSv1.3 TLS13-AES-128-GCM-SHA256, 253 bit ECDH (X25519)
  4854. Firefox 49 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4855. Firefox 53 Win 7 TLSv1.3 TLS13-AES-128-GCM-SHA256, 253 bit ECDH (X25519)
  4856. IE 6 XP No connection
  4857. IE 7 Vista TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4858. IE 8 XP TLSv1.0 DES-CBC3-SHA
  4859. IE 8 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4860. IE 11 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4861. IE 11 Win 8.1 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4862. IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4863. IE 11 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4864. Edge 13 Win 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4865. Edge 13 Win Phone 10 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4866. Opera 17 Win 7 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4867. Safari 5.1.9 OS X 10.6.8 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4868. Safari 7 iOS 7.1 TLSv1.2 ECDHE-ECDSA-AES128-SHA, 256 bit ECDH (P-256)
  4869. Safari 9 OS X 10.11 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4870. Safari 10 OS X 10.12 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4871. Apple ATS 9 iOS 9 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4872. Tor 17.0.9 Win 7 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4873. Java 6u45 TLSv1.0 AES128-SHA
  4874. Java 7u25 TLSv1.0 ECDHE-RSA-AES128-SHA, 256 bit ECDH (P-256)
  4875. Java 8u31 TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4876. OpenSSL 1.0.1l TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4877. OpenSSL 1.0.2e TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)
  4878.  
  4879.  Done 2017-10-23 06:11:39 [ 538s] -->> 104.25.55.27:443 (petsex.com) <<--
  4880.  
  4881. -----------------------------------------------------
  4882. Done testing now all IP addresses (on port 443): 104.25.54.27 104.25.55.27
  4883. #######################################################################################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement