Advertisement
RussX9

heartblead

Aug 20th, 2014
318
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.96 KB | None | 0 0
  1. [-----------------------]
  2. #Leaked By : RussX9
  3. # FB : https://www.facebook.com/405forbiden
  4. # email : Russx9@gmail.com | Russx9@Linuxmail.org
  5. #Indonesian Hacker Cyber team
  6. # YunoGasai | Dr.1n73ction | 404_Proxy | Larva_ROOT | Dandi Dot ID | FR_Dot_Id | Killuax404 | X-GHOST404 | TRUTH404 | Mr.Al404 |3xpl01t1n6 | Bl4ckUmbrell4_404 | umar dot id | Dzikri Dot ID | Haxor_Dd05 | riko_sinkadorable
  7. [-]-----------------------[+]
  8.  
  9. [+]==================[+]
  10. Greatz To : Indonesian BLACKHATS CYBER TEAM , Odong-Odong UNDERGROUND , Mauritania Hacker Team
  11. Root@Greatz#~ > ./Na-Z ./Sickpeoples ./SvN_Nevermore ./Mr.ApaPedulimu ./Anzi007 ./Mr.SaputraAttackerXX ./D22 ./Sakinah ./cybercrows ./RkeNz_007 ./MoXat ./BL4CK_GHOST
  12. [+]==================[+]
  13.  
  14.  
  15. root@localhost:~# nmap -sV -p 443 --script=ssl-heartbleed 82.80.221.161
  16.  
  17. Starting Nmap 6.46 ( http://nmap.org ) at 2014-20-08 21:34 WIB
  18. Nmap scan report for bzq-82-80-221-161.red.bezeqint.net (82.80.221.161)
  19. Host is up (0.11s latency).
  20. PORT STATE SERVICE VERSION
  21. 443/tcp open ssl/https?
  22. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
  23. SF-Port443-TCP:V=6.46%T=SSL%I=7%D=8/12%Time=53EA261D%P=i686-pc-bokep-gpu%r
  24. SF:(GetRequest,18F,"HTTP/1\.1\x20303\x20See\x20other\r\nDate:\x20Tue,\x201
  25. SF:2\x20Aug\x202014\x2014:34:43\x20GMT\r\nX-Powered-By:\x20PHP/5\.3\.3\r\n
  26. SF:Set-Cookie:\x2042916cde03dce9b72aa250e0f2ac8b81=8k5htqre2jasvv4u8kvj2ik
  27. SF:n62;\x20path=/\r\nLocation:\x20/index\.php/he/\r\nVary:\x20Accept-Encod
  28. SF:ing\r\nContent-Length:\x200\r\nConnection:\x20close\r\nContent-Type:\x2
  29. SF:0text/html;\x20charset=utf-8\r\nSet-Cookie:\x20TSd488c5=8ad72bd1d2e94b8
  30. SF:d41904023c8cfe9df6e0c732749af7db653ea264b839ec9013d1fde2f;\x20Path=/\r\
  31. SF:n\r\n");
  32.  
  33. Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  34. Nmap done: 1 IP address (1 host up) scanned in 93.18 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement