Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- =======================================================================================================================================
- Hostname www.audit.gov.sd ISP HostDime.com, Inc.
- Continent North America Flag
- US
- Country United States Country Code US
- Region Florida Local time 30 Jun 2019 15:11 EDT
- City Orlando Postal Code 32826
- IP Address 138.128.160.2 Latitude 28.581
- Longitude -81.189
- =======================================================================================================================================
- #######################################################################################################################################
- > www.audit.gov.sd
- Server: 185.93.180.131
- Address: 185.93.180.131#53
- Non-authoritative answer:
- www.audit.gov.sd canonical name = audit.gov.sd.
- Name: audit.gov.sd
- Address: 138.128.160.2
- >
- #######################################################################################################################################
- [+] Target : www.audit.gov.sd
- [+] IP Address : 138.128.160.2
- [+] Headers :
- [+] Date : Sun, 30 Jun 2019 21:03:00 GMT
- [+] Server : Apache
- [+] X-Powered-By : PHP/5.6.40
- [+] Expires : Thu, 19 Nov 1981 08:52:00 GMT
- [+] Cache-Control : no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- [+] Pragma : no-cache
- [+] Referrer-Policy : unsafe-url
- [+] x-frame-options : SAMEORIGIN
- [+] X-XSS-Protection : 1; mode=block
- [+] X-Content-Type-Options : nosniff
- [+] Link : <http://www.audit.gov.sd?lang=ar%2Findex.php&rest_route=/>; rel="https://api.w.org/"
- [+] Set-Cookie : mltlngg_language=ar; expires=Tue, 30-Jul-2019 21:03:01 GMT; Max-Age=2592000; path=/; domain=.audit.gov.sd
- [+] Content-Length : 109971
- [+] Connection : close
- [+] Content-Type : text/html; charset=UTF-8
- [+] SSL Certificate Information :
- [+] commonName : abaad.sd
- [+] commonName : abaad.sd
- [+] Version : 3
- [+] Serial Number : EC7F604A
- [+] Not Before : Aug 12 11:26:16 2017 GMT
- [+] Not After : Aug 12 11:26:16 2018 GMT
- [+] Whois Lookup :
- [+] NIR : None
- [+] ASN Registry : arin
- [+] ASN : 33182
- [+] ASN CIDR : 138.128.160.0/19
- [+] ASN Country Code : US
- [+] ASN Date : 2014-05-16
- [+] ASN Description : DIMENOC - HostDime.com, Inc., US
- [+] cidr : 138.128.160.0/19
- [+] name : DIMENOC
- [+] handle : NET-138-128-160-0-1
- [+] range : 138.128.160.0 - 138.128.191.255
- [+] description : HostDime.com, Inc.
- [+] country : US
- [+] state : FL
- [+] city : Orlando
- [+] address : 2603 Challenger Tech CT
- Suite 140
- [+] postal_code : 32826
- [+] emails : ['network@dimenoc.com', 'abuse@dimenoc.com']
- [+] created : 2014-05-16
- [+] updated : 2014-05-16
- [+] Crawling Target...
- [+] Looking for robots.txt........[ Found ]
- [+] Extracting robots Links.......[ 24 ]
- [+] Looking for sitemap.xml.......[ Not Found ]
- [+] Extracting CSS Links..........[ 25 ]
- [+] Extracting Javascript Links...[ 19 ]
- [+] Extracting Internal Links.....[ 73 ]
- [+] Extracting External Links.....[ 9 ]
- [+] Extracting Images.............[ 34 ]
- [+] Total Links Extracted : 184
- [+] Dumping Links in /opt/FinalRecon/dumps/www.audit.gov.sd.dump
- [+] Completed!
- #######################################################################################################################################
- [+] Starting At 2019-06-30 17:02:59.701311
- [+] Collecting Information On: www.audit.gov.sd
- [#] Status: 200
- ---------------------------------------------------------------------------------------------------------------------------------------
- [#] Web Server Detected: Apache
- [#] X-Powered-By: PHP/5.6.40
- [+] Xss Protection Detected !
- - Date: Sun, 30 Jun 2019 21:02:58 GMT
- - Server: Apache
- - X-Powered-By: PHP/5.6.40
- - Expires: Thu, 19 Nov 1981 08:52:00 GMT
- - Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- - Pragma: no-cache
- - Referrer-Policy: unsafe-url
- - x-frame-options: SAMEORIGIN
- - X-XSS-Protection: 1; mode=block
- - X-Content-Type-Options: nosniff
- - Link: <https://www.audit.gov.sd?lang=ar%2Findex.php&rest_route=/>; rel="https://api.w.org/"
- - Set-Cookie: mltlngg_language=ar; expires=Tue, 30-Jul-2019 21:02:58 GMT; Max-Age=2592000; path=/; domain=.audit.gov.sd; secure
- - Content-Length: 110295
- - Connection: close
- - Content-Type: text/html; charset=UTF-8
- ---------------------------------------------------------------------------------------------------------------------------------------
- [#] Finding Location..!
- [#] as: AS33182 HostDime.com, Inc.
- [#] city: Orlando
- [#] country: United States
- [#] countryCode: US
- [#] isp: HostDime.com
- [#] lat: 28.5383
- [#] lon: -81.3792
- [#] org: microsyslabs.com
- [#] query: 138.128.160.2
- [#] region: FL
- [#] regionName: Florida
- [#] status: success
- [#] timezone: America/New_York
- [#] zip: 32810
- ---------------------------------------------------------------------------------------------------------------------------------------
- [x] Didn't Detect WAF Presence on: https://www.audit.gov.sd/?lang=ar
- ---------------------------------------------------------------------------------------------------------------------------------------
- [#] Starting Reverse DNS
- [!] Found 51 any Domain
- - aayan.com.qa
- - adding-sd.com
- - alfala.com
- - aljazeerabank.com.sd
- - aloaloa.com
- - aou.edu.sd
- - apg-sd.com
- - audit.gov.sd
- - bajafar.sd
- - benzcenter.net
- - click.sd
- - cm.sd
- - cpd.gov.sd
- - eims.ae
- - engcouncil.sd
- - giadservices.com
- - gpo-sd.com
- - iec.gov.sd
- - indonileexport.com
- - khairport.gov.sd
- - khmedical.edu.sd
- - mofdgoia.gov.sd
- - mohe.gov.sd
- - mssmanal.com
- - nileuniversity-edu.com
- - oau.edu.sd
- - petroall.net
- - sahl.gov.sd
- - sdac.gov.sd
- - sidcotel.sd
- - ssia.sd
- - sudafast.edu.sd
- - sudan.gov.sd
- - sudanap.org
- - sudanconsumers.org
- - sudanports.gov.sd
- - sudapet.sd
- - sudapost.sd
- - tpsudan.gov.sd
- - wre.gov.sd
- - www.aljazeerabank.com.sd
- - www.cpd.gov.sd
- - www.dandaradentalcenter.com
- - www.goldenarrow.sd
- - www.iec.gov.sd
- - www.khmedical.edu.sd
- - www.mohe.gov.sd
- - www.studentwelfare.sd
- - www.sudan.gov.sd
- - www.sudapet.sd
- - www.tararealestate.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- [!] Scanning Open Port
- [#] 21/tcp open ftp
- [#] 53/tcp open domain
- [#] 80/tcp open http
- [#] 110/tcp open pop3
- [#] 143/tcp open imap
- [#] 443/tcp open https
- [#] 465/tcp open smtps
- [#] 587/tcp open submission
- [#] 993/tcp open imaps
- [#] 995/tcp open pop3s
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] Collecting Information Disclosure!
- #######################################################################################################################################
- [i] Scanning Site: http://www.audit.gov.sd
- B A S I C I N F O
- ====================
- [+] Site Title: National Audit Chamber
- [+] IP address: 138.128.160.2
- [+] Web Server: Apache
- [+] CMS: WordPress
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow: /calendar/action~posterboard/
- Disallow: /calendar/action~agenda/
- Disallow: /calendar/action~oneday/
- Disallow: /calendar/action~month/
- Disallow: /calendar/action~week/
- Disallow: /calendar/action~stream/
- Disallow: /calendar/action~undefined/
- Disallow: /calendar/action~http:/
- Disallow: /calendar/action~default/
- Disallow: /calendar/action~poster/
- Disallow: /calendar/action~*/
- Disallow: /*controller=ai1ec_exporter_controller*
- Disallow: /*/action~*/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~posterboard/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~agenda/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~oneday/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~month/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~week/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~stream/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~undefined/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~http:/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~default/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~poster/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~*/
- -----------[end of contents]-------------
- #######################################################################################################################################
- G E O I P L O O K U P
- =========================
- [i] IP Address: 138.128.160.2
- [i] Country: United States
- [i] State: Florida
- [i] City: Orlando
- [i] Latitude: 28.5807
- [i] Longitude: -81.1893
- #######################################################################################################################################
- H T T P H E A D E R S
- =======================
- [i] HTTP/1.1 302 Moved Temporarily
- [i] Date: Sun, 30 Jun 2019 21:03:44 GMT
- [i] Server: Apache
- [i] X-Powered-By: PHP/5.6.40
- [i] Expires: Thu, 19 Nov 1981 08:52:00 GMT
- [i] Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- [i] Pragma: no-cache
- [i] X-Redirect-By: WordPress
- [i] Set-Cookie: PHPSESSID=80mirgqtt5dq0enbnp39qsmic2; path=/
- [i] Set-Cookie: mltlngg_language=ar; expires=Tue, 30-Jul-2019 21:03:44 GMT; Max-Age=2592000; path=/; domain=.audit.gov.sd
- [i] Location: http://www.audit.gov.sd/?lang=ar
- [i] Content-Length: 0
- [i] Connection: close
- [i] Content-Type: text/html; charset=UTF-8
- [i] HTTP/1.1 200 OK
- [i] Date: Sun, 30 Jun 2019 21:03:45 GMT
- [i] Server: Apache
- [i] X-Powered-By: PHP/5.6.40
- [i] Expires: Thu, 19 Nov 1981 08:52:00 GMT
- [i] Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- [i] Pragma: no-cache
- [i] Referrer-Policy: unsafe-url
- [i] x-frame-options: SAMEORIGIN
- [i] X-XSS-Protection: 1; mode=block
- [i] X-Content-Type-Options: nosniff
- [i] Link: <http://www.audit.gov.sd?lang=ar%2Findex.php&rest_route=/>; rel="https://api.w.org/"
- [i] Set-Cookie: PHPSESSID=ebelkvihv6iss0br5d4losc8e0; path=/
- [i] Set-Cookie: mltlngg_language=ar; expires=Tue, 30-Jul-2019 21:03:46 GMT; Max-Age=2592000; path=/; domain=.audit.gov.sd
- [i] Content-Length: 109503
- [i] Connection: close
- [i] Content-Type: text/html; charset=UTF-8
- #######################################################################################################################################
- D N S L O O K U P
- ===================
- audit.gov.sd. 14360 IN MX 0 mail.audit.gov.sd.
- audit.gov.sd. 21560 IN SOA ns1.click-grafix.com. karouri.gmail.com. 2019032105 3600 7200 1209600 86400
- audit.gov.sd. 21560 IN NS ns1.click-grafix.com.
- audit.gov.sd. 21560 IN NS ns2.click-grafix.com.
- audit.gov.sd. 14360 IN A 138.128.160.2
- #######################################################################################################################################
- S U B N E T C A L C U L A T I O N
- ====================================
- Address = 138.128.160.2
- Network = 138.128.160.2 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 138.128.160.2 - 138.128.160.2 }
- #######################################################################################################################################
- N M A P P O R T S C A N
- ============================
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 21:03 UTC
- Nmap scan report for audit.gov.sd (138.128.160.2)
- Host is up (0.046s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp closed ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.33 seconds
- #######################################################################################################################################
- S U B - D O M A I N F I N D E R
- ==================================
- [i] Total Subdomains Found : 1
- [+] Subdomain: mail.audit.gov.sd
- [-] IP: 212.0.136.50
- #######################################################################################################################################
- Enter Address Website = audit.gov.sd
- Reversing IP With HackTarget 'audit.gov.sd'
- ----------------------------------------------
- [+] 138.128.160.2
- [+] aacpd.org
- [+] aayan.com.qa
- [+] abanos.net
- [+] abdeenandco.com
- [+] adding-sd.com
- [+] advocatemakki.com
- [+] adyagroup.net
- [+] agrogate-holdings.com
- [+] ahqsudan.com
- [+] alanfalgroup.com
- [+] alanfaljabra.com
- [+] albadaael.com
- [+] albarakafinancial.com
- [+] alfala.com
- [+] alitimadgroup.com
- [+] aljazeerabank.com.sd
- [+] almadadgroup.com
- [+] almamoonoil.com
- [+] aloaloa.com
- [+] alomergroup.com
- [+] alrawabi.yassirkambalgroup.com
- [+] alsundusiamedical.com
- [+] alwatanyia.com
- [+] alwathbagroup.com
- [+] alzawaya-medical.com
- [+] anpm.co
- [+] aou.edu.sd
- [+] apg-sd.com
- [+] app.advocatemakki.com
- [+] apple-login.org.rakhie.net
- [+] arabiawork.com
- [+] arech.apg-sd.com
- [+] arenboutique.com
- [+] ariabmining.net
- [+] ar.nileuniversity-edu.com
- [+] aseel.yassirkambalgroup.com
- [+] aseelcomplex.yassirkambalgroup.com
- [+] ashrafelsharif.com
- [+] audit.gov.sd
- [+] badawi.alzawaya-medical.com
- [+] bajrawiafab.com
- [+] bargos.apg-sd.com
- [+] basma-ocf.org
- [+] beautyconceptlounge.com
- [+] benzcenter.net
- [+] berigdar.berigdargroup.com
- [+] berigdar.com
- [+] berigdargroup.com
- [+] berimalegal.com
- [+] bivetsud.com
- [+] bmcproject.net
- [+] brandavenue.net
- [+] casiexpress.net
- [+] cctctraining.com
- [+] citi.online.yam-cdc.com
- [+] clarionlaserclinic.ie
- [+] click.sd
- [+] clickgrafix.co
- [+] clicksd.info
- [+] click-grafix.com
- [+] codon-med.com
- [+] conference.sudanesephysicians.org
- [+] cpanel.aacpd.org
- [+] cpanel.aayan.com.qa
- [+] cpanel.abanos.net
- [+] cpanel.abdeenandco.com
- [+] cpanel.adyagroup.net
- [+] cpanel.ahqsudan.com
- [+] cpanel.alanfalgroup.com
- [+] cpanel.alanfaljabra.com
- [+] cpanel.albadaael.com
- [+] cpanel.albarakafinancial.com
- [+] cpanel.alfala.com
- [+] cpanel.alitimadgroup.com
- [+] cpanel.almadadgroup.com
- [+] cpanel.almamoonoil.com
- [+] cpanel.aloaloa.com
- [+] cpanel.alomergroup.com
- [+] cpanel.alsundusiamedical.com
- [+] cpanel.alwatanyia.com
- [+] cpanel.alwathbagroup.com
- [+] cpanel.anpm.co
- [+] cpanel.ariabmining.net
- [+] cpanel.ashrafelsharif.com
- [+] cpanel.bajrawiafab.com
- [+] cpanel.beautyconceptlounge.com
- [+] cpanel.benzcenter.net
- [+] cpanel.berigdargroup.com
- [+] cpanel.berigdar.com
- [+] cpanel.berimalegal.com
- [+] cpanel.bivetsud.com
- [+] cpanel.bmcproject.net
- [+] cpanel.brandavenue.net
- [+] cpanel.casiexpress.net
- [+] cpanel.cctctraining.com
- [+] cpanel.clarionlaserclinic.ie
- [+] cpanel.clickgrafix.co
- [+] cpanel.clicksd.info
- [+] cpanel.dallahpharma.net
- [+] cpanel.dandaradentalcenter.com
- [+] cpanel.difafvillage.com
- [+] cpanel.dirnour.com
- [+] cpanel.ecogroupsd.com
- [+] cpanel.eims.ae
- [+] cpanel.elgadal.com
- [+] cpanel.elitihadlogistics.com
- [+] cpanel.elprincesudan.com
- [+] cpanel.eltagtrading.com
- [+] cpanel.emitradingco.com
- [+] cpanel.fasrc.org
- [+] cpanel.forwomenbywomen.org
- [+] cpanel.gdsudan.com
- [+] cpanel.giadservices.com
- [+] cpanel.higleig.com
- [+] cpanel.hishamkarouri.com
- [+] cpanel.hopemedicalsd.com
- [+] cpanel.ideagp.com
- [+] cpanel.indonileexport.com
- [+] cpanel.indonile.com
- [+] cpanel.ingawetrading.com
- [+] cpanel.jubaauto.com
- [+] cpanel.ktcesudan.com
- [+] cpanel.ladconsult.com
- [+] cpanel.lanjico.com
- [+] cpanel.lowcosttravelcenter.com
- [+] cpanel.lulamab.com
- [+] cpanel.lunatusmed.com
- [+] cpanel.mahgoubsons.com
- [+] cpanel.mamedmedical.com
- [+] cpanel.marwacoenterprises.com
- [+] cpanel.medanico.com
- [+] cpanel.mieragspace.com
- [+] cpanel.moontrade.net
- [+] cpanel.mssmanal.com
- [+] cpanel.mudalala.qa
- [+] cpanel.musanadaholding.com
- [+] cpanel.nagi.photo
- [+] cpanel.nilecement.org
- [+] cpanel.nisosd.com
- [+] cpanel.niss.tech
- [+] cpanel.nlicfinance.com
- [+] cpanel.npetroleum.com
- [+] cpanel.nuspetro.com
- [+] cpanel.olgaecs.com
- [+] cpanel.osamaalgadee.com
- [+] cpanel.pawfreight.com
- [+] cpanel.petroall.net
- [+] cpanel.radmedco.com
- [+] cpanel.raheeg.com
- [+] cpanel.rakhie.net
- [+] cpanel.rcctsd.com
- [+] cpanel.rocketeng.net
- [+] cpanel.sabintod.com
- [+] cpanel.sangsl.com
- [+] cpanel.scmsltd.com
- [+] cpanel.senahypermarket.com
- [+] cpanel.shakak.org
- [+] cpanel.shirouqpaints.net
- [+] cpanel.shoyum.com
- [+] cpanel.sinnarshipping.com
- [+] cpanel.skhcsudan.com
- [+] cpanel.smacosd.com
- [+] cpanel.srptechnology.com
- [+] cpanel.stiltgroup.org
- [+] cpanel.sudanbcisd.net
- [+] cpanel.sudanesephysicians.org
- [+] cpanel.sudanpile.com
- [+] cpanel.sudanwork.com
- [+] cpanel.tawakolmedical.com
- [+] cpanel.tawseelsudan.com
- [+] cpanel.tbmlawfirm.com
- [+] cpanel.tharjatheng.com
- [+] cpanel.transways.ae
- [+] cpanel.tstmatjar.com
- [+] cpanel.vittoriopierino.com
- [+] cpanel.wgarasud.com
- [+] cpanel.yasminycl.com
- [+] cpanel.yassirkambalgroup.com
- [+] cpanel.yathribyp.com
- [+] cpanel.zawayabricks.com
- [+] cpanel.adding-sd.com
- [+] cpanel.agrogate-holdings.com
- [+] cpanel.alzawaya-medical.com
- [+] cpanel.apg-sd.com
- [+] cpanel.basma-ocf.org
- [+] cpanel.click-grafix.com
- [+] cpanel.codon-med.com
- [+] cpanel.crimsonlights-sd.com
- [+] cpanel.das-diesel.com
- [+] cpanel.elmohandis-paints.com
- [+] cpanel.etegahat-ap.com
- [+] cpanel.extra-pharma.com
- [+] cpanel.farha-sd.com
- [+] cpanel.flynas-sudan.com
- [+] cpanel.focusschool-sd.com
- [+] cpanel.geocad-sd.com
- [+] cpanel.gladiator-bdc.com
- [+] cpanel.gpo-sd.com
- [+] cpanel.hamza-farm.com
- [+] cpanel.hcs-sd.com
- [+] cpanel.ideal-sdn.com
- [+] cpanel.khartoum-int.net
- [+] cpanel.kmc-sd.com
- [+] cpanel.maak-sd.com
- [+] cpanel.manar-group.com
- [+] cpanel.mechatronic-sd.com
- [+] cpanel.medicare-sd.com
- [+] cpanel.medpharma-sd.com
- [+] cpanel.nileuniversity-edu.com
- [+] cpanel.numberone-sd.com
- [+] cpanel.oit-sd.com
- [+] cpanel.osool-sd.com
- [+] cpanel.paradisehotels-sd.com
- [+] cpanel.pts-sd.com
- [+] cpanel.rittal-sd.com
- [+] cpanel.skyart-sd.com
- [+] cpanel.soed-sd.org
- [+] cpanel.summit-schools.com
- [+] cpanel.supergeneral-sd.com
- [+] cpanel.tanglewood-sd.com
- [+] cpanel.whitewaters-sd.com
- [+] cpanel.yam-cdc.com
- [+] crimsonlights-sd.com
- [+] dallahpharma.alwathbagroup.com
- [+] dallahpharma.net
- [+] dandaradentalcenter.com
- [+] das-diesel.com
- [+] design.alwatanyia.com
- [+] difafvillage.com
- [+] digitalmarketingafrica.net
- [+] dindir.higleig.com
- [+] dirnour.com
- [+] dps.com.sd
- [+] easyhotel.advocatemakki.com
- [+] ecogroupsd.com
- [+] edge.ideagp.com
- [+] eims.ae
- [+] elgadal.com
- [+] elitihadlogistics.com
- [+] elmohandis-paints.com
- [+] elprincesudan.com
- [+] eltagtrading.com
- [+] emitradingco.com
- [+] engcouncil.sd
- [+] etegahat-ap.com
- [+] exams.nileuniversity-edu.com
- [+] extra-pharma.com
- [+] farha-sd.com
- [+] farha-sd.tanglewood-sd.com
- [+] fasrc.org
- [+] flynas-sudan.com
- [+] focusschool-sd.com
- [+] forwomenbywomen.org
- [+] fresh.yassirkambalgroup.com
- [+] gadc01.goldenarrow.sd
- [+] gdsudan.com
- [+] geocad-sd.com
- [+] giadservices.com
- [+] gladiator-bdc.com
- [+] goldenarrow.sd
- [+] gpo-sd.com
- [+] green.yassirkambalgroup.com
- [+] hamza-farm.com
- [+] hcs-sd.com
- [+] higleig.com
- [+] hopemedicalsd.com
- [+] ideagp.com
- [+] ideal-sdn.com
- [+] iec.gov.sd
- [+] indonile.com
- [+] indonileexport.com
- [+] ingawetrading.com
- [+] it.alanfalgroup.com
- [+] jubaauto.com
- [+] kambalexport.com
- [+] khartoum-int.net
- [+] khmedical.edu.sd
- [+] kmc-sd.com
- [+] ktcesudan.com
- [+] ladconsult.com
- [+] lanjico.com
- [+] lowcosttravelcenter.com
- [+] lulamab.com
- [+] lunatusmed.com
- [+] mahgoubsons.com
- [+] mail.pawfreight.com
- [+] mamedmedical.com
- [+] manar-group.com
- [+] marwacoenterprises.com
- [+] mdisam.paradisehotels-sd.com
- [+] mechatronic-sd.com
- [+] med.gov.sd
- [+] medanico.com
- [+] medicare-sd.com
- [+] medpharma-sd.com
- [+] mieragspace.com
- [+] milestonesd.com
- [+] mohe.gov.sd
- [+] moodle.nileuniversity-edu.com
- [+] moontrade.net
- [+] mssmanal.com
- [+] mudalala.qa
- [+] musanadaholding.com
- [+] nagi.photo
- [+] nilecement.org
- [+] nileuniversity-edu.com
- [+] nisosd.com
- [+] niss.tech
- [+] nlicfinance.com
- [+] npetroleum.com
- [+] numberone-sd.com
- [+] nuspetro.com
- [+] oau.edu.sd
- [+] oit-sd.com
- [+] olgaecs.com
- [+] omiga.yassirkambalgroup.com
- [+] openskies247.com
- [+] osamaalgadee.com
- [+] osool-sd.com
- [+] owner.advocatemakki.com
- [+] paradisehotels-sd.com
- [+] pawfreight.com
- [+] petroall.net
- [+] portal.iec.gov.sd
- [+] powerblue.yassirkambalgroup.com
- [+] pts-sd.com
- [+] radmedco.com
- [+] raheeg.com
- [+] rakhie.net
- [+] rcctsd.com
- [+] reports.lowcosttravelcenter.com
- [+] rikaz.sd
- [+] rittal-sd.com
- [+] rocketeng.net
- [+] rotana.mechatronic-sd.com
- [+] sabintod.com
- [+] saliglobal.org
- [+] sangsl.com
- [+] saria.sd
- [+] sarrealways.com
- [+] saudisb.sd
- [+] scmsltd.com
- [+] secure-paypal.org.rakhie.net
- [+] senahypermarket.com
- [+] server2.click-grafix.com
- [+] server.click-grafix.com
- [+] sgsuae.com
- [+] shakak.org
- [+] shirouqpaints.net
- [+] shoyum.com
- [+] sidcotel.sd
- [+] sinnarshipping.com
- [+] skhcsudan.com
- [+] skyart-sd.com
- [+] smacosd.com
- [+] soed-sd.org
- [+] sonic.yassirkambalgroup.com
- [+] srptechnology.com
- [+] ssia.sd
- [+] stiltgroup.org
- [+] students.nileuniversity-edu.com
- [+] sudanbcisd.net
- [+] sudanesephysicians.org
- [+] sudanpile.com
- [+] sudanports.gov.sd
- [+] sudanwork.com
- [+] sudapet.sd
- [+] sudapost.sd
- [+] summit-schools.com
- [+] supergeneral-sd.com
- [+] tadamonbank-sd.com
- [+] talawiet.org.sd
- [+] tanglewood-sd.com
- [+] tawakolmedical.com
- [+] tbmlawfirm.com
- [+] test.almamoonoil.com
- [+] test.mechatronic-sd.com
- [+] tharjatheng.com
- [+] tpsudan.gov.sd
- [+] transways.ae
- [+] tstmatjar.com
- [+] vittoriopierino.com
- [+] webdisk.aacpd.org
- [+] webdisk.aayan.com.qa
- [+] webdisk.abanos.net
- [+] webdisk.abdeenandco.com
- [+] webdisk.advocatemakki.com
- [+] webdisk.adyagroup.net
- [+] webdisk.ahqsudan.com
- [+] webdisk.alanfalgroup.com
- [+] webdisk.alanfaljabra.com
- [+] webdisk.albadaael.com
- [+] webdisk.albarakafinancial.com
- [+] webdisk.alfala.com
- [+] webdisk.alitimadgroup.com
- [+] webdisk.almadadgroup.com
- [+] webdisk.almamoonoil.com
- [+] webdisk.aloaloa.com
- [+] webdisk.alomergroup.com
- [+] webdisk.alsundusiamedical.com
- [+] webdisk.alwatanyia.com
- [+] webdisk.alwathbagroup.com
- [+] webdisk.anpm.co
- [+] webdisk.arenboutique.com
- [+] webdisk.ariabmining.net
- [+] webdisk.ashrafelsharif.com
- [+] webdisk.bajrawiafab.com
- [+] webdisk.beautyconceptlounge.com
- [+] webdisk.benzcenter.net
- [+] webdisk.berigdargroup.com
- [+] webdisk.berigdar.com
- [+] webdisk.berimalegal.com
- [+] webdisk.bivetsud.com
- [+] webdisk.bmcproject.net
- [+] webdisk.brandavenue.net
- [+] webdisk.casiexpress.net
- [+] webdisk.cctctraining.com
- [+] webdisk.clarionlaserclinic.ie
- [+] webdisk.clickgrafix.co
- [+] webdisk.clicksd.info
- [+] webdisk.dallahpharma.net
- [+] webdisk.dandaradentalcenter.com
- [+] webdisk.difafvillage.com
- [+] webdisk.dirnour.com
- [+] webdisk.ecogroupsd.com
- [+] webdisk.eims.ae
- [+] webdisk.elgadal.com
- [+] webdisk.elitihadlogistics.com
- [+] webdisk.elprincesudan.com
- [+] webdisk.eltagtrading.com
- [+] webdisk.emitradingco.com
- [+] webdisk.fasrc.org
- [+] webdisk.forwomenbywomen.org
- [+] webdisk.gdsudan.com
- [+] webdisk.giadservices.com
- [+] webdisk.higleig.com
- [+] webdisk.hishamkarouri.com
- [+] webdisk.hopemedicalsd.com
- [+] webdisk.ideagp.com
- [+] webdisk.indonileexport.com
- [+] webdisk.indonile.com
- [+] webdisk.ingawetrading.com
- [+] webdisk.jubaauto.com
- [+] webdisk.ktcesudan.com
- [+] webdisk.ladconsult.com
- [+] webdisk.lanjico.com
- [+] webdisk.lowcosttravelcenter.com
- [+] webdisk.lulamab.com
- [+] webdisk.lunatusmed.com
- [+] webdisk.mahgoubsons.com
- [+] webdisk.mamedmedical.com
- [+] webdisk.marwacoenterprises.com
- [+] webdisk.medanico.com
- [+] webdisk.mieragspace.com
- [+] webdisk.moontrade.net
- [+] webdisk.mssmanal.com
- [+] webdisk.mudalala.qa
- [+] webdisk.musanadaholding.com
- [+] webdisk.nagi.photo
- [+] webdisk.nilecement.org
- [+] webdisk.nisosd.com
- [+] webdisk.niss.tech
- [+] webdisk.nlicfinance.com
- [+] webdisk.npetroleum.com
- [+] webdisk.nuspetro.com
- [+] webdisk.olgaecs.com
- [+] webdisk.osamaalgadee.com
- [+] webdisk.pawfreight.com
- [+] webdisk.petroall.net
- [+] webdisk.radmedco.com
- [+] webdisk.raheeg.com
- [+] webdisk.rakhie.net
- [+] webdisk.rcctsd.com
- [+] webdisk.rocketeng.net
- [+] webdisk.sabintod.com
- [+] webdisk.sangsl.com
- [+] webdisk.scmsltd.com
- [+] webdisk.senahypermarket.com
- [+] webdisk.shakak.org
- [+] webdisk.shirouqpaints.net
- [+] webdisk.shoyum.com
- [+] webdisk.sinnarshipping.com
- [+] webdisk.skhcsudan.com
- [+] webdisk.smacosd.com
- [+] webdisk.srptechnology.com
- [+] webdisk.stiltgroup.org
- [+] webdisk.sudanbcisd.net
- [+] webdisk.sudanesephysicians.org
- [+] webdisk.sudanpile.com
- [+] webdisk.sudanwork.com
- [+] webdisk.tawakolmedical.com
- [+] webdisk.tawseelsudan.com
- [+] webdisk.tbmlawfirm.com
- [+] webdisk.tharjatheng.com
- [+] webdisk.transways.ae
- [+] webdisk.tstmatjar.com
- [+] webdisk.vittoriopierino.com
- [+] webdisk.wgarasud.com
- [+] webdisk.yasminycl.com
- [+] webdisk.yassirkambalgroup.com
- [+] webdisk.yathribyp.com
- [+] webdisk.zawayabricks.com
- [+] webdisk.adding-sd.com
- [+] webdisk.agrogate-holdings.com
- [+] webdisk.alzawaya-medical.com
- [+] webdisk.apg-sd.com
- [+] webdisk.basma-ocf.org
- [+] webdisk.click-grafix.com
- [+] webdisk.codon-med.com
- [+] webdisk.crimsonlights-sd.com
- [+] webdisk.das-diesel.com
- [+] webdisk.elmohandis-paints.com
- [+] webdisk.etegahat-ap.com
- [+] webdisk.extra-pharma.com
- [+] webdisk.farha-sd.com
- [+] webdisk.flynas-sudan.com
- [+] webdisk.focusschool-sd.com
- [+] webdisk.geocad-sd.com
- [+] webdisk.gladiator-bdc.com
- [+] webdisk.gpo-sd.com
- [+] webdisk.hamza-farm.com
- [+] webdisk.hcs-sd.com
- [+] webdisk.ideal-sdn.com
- [+] webdisk.khartoum-int.net
- [+] webdisk.kmc-sd.com
- [+] webdisk.maak-sd.com
- [+] webdisk.manar-group.com
- [+] webdisk.mechatronic-sd.com
- [+] webdisk.medicare-sd.com
- [+] webdisk.medpharma-sd.com
- [+] webdisk.nileuniversity-edu.com
- [+] webdisk.numberone-sd.com
- [+] webdisk.oit-sd.com
- [+] webdisk.osool-sd.com
- [+] webdisk.paradisehotels-sd.com
- [+] webdisk.pts-sd.com
- [+] webdisk.rittal-sd.com
- [+] webdisk.skyart-sd.com
- [+] webdisk.soed-sd.org
- [+] webdisk.summit-schools.com
- [+] webdisk.supergeneral-sd.com
- [+] webdisk.tanglewood-sd.com
- [+] webdisk.whitewaters-sd.com
- [+] webdisk.yam-cdc.com
- [+] webmail.aacpd.org
- [+] webmail.aayan.com.qa
- [+] webmail.abanos.net
- [+] webmail.abdeenandco.com
- [+] webmail.advocatemakki.com
- [+] webmail.adyagroup.net
- [+] webmail.ahqsudan.com
- [+] webmail.alanfalgroup.com
- [+] webmail.alanfaljabra.com
- [+] webmail.albadaael.com
- [+] webmail.albarakafinancial.com
- [+] webmail.alfala.com
- [+] webmail.alitimadgroup.com
- [+] webmail.almadadgroup.com
- [+] webmail.almamoonoil.com
- [+] webmail.aloaloa.com
- [+] webmail.alomergroup.com
- [+] webmail.alsundusiamedical.com
- [+] webmail.alwatanyia.com
- [+] webmail.alwathbagroup.com
- [+] webmail.anpm.co
- [+] webmail.arenboutique.com
- [+] webmail.ariabmining.net
- [+] webmail.ashrafelsharif.com
- [+] webmail.bajrawiafab.com
- [+] webmail.beautyconceptlounge.com
- [+] webmail.benzcenter.net
- [+] webmail.berigdargroup.com
- [+] webmail.berigdar.com
- [+] webmail.berimalegal.com
- [+] webmail.bivetsud.com
- [+] webmail.bmcproject.net
- [+] webmail.brandavenue.net
- [+] webmail.casiexpress.net
- [+] webmail.cctctraining.com
- [+] webmail.clarionlaserclinic.ie
- [+] webmail.clickgrafix.co
- [+] webmail.clicksd.info
- [+] webmail.dallahpharma.net
- [+] webmail.dandaradentalcenter.com
- [+] webmail.difafvillage.com
- [+] webmail.ecogroupsd.com
- [+] webmail.eims.ae
- [+] webmail.elgadal.com
- [+] webmail.elitihadlogistics.com
- [+] webmail.elprincesudan.com
- [+] webmail.eltagtrading.com
- [+] webmail.emitradingco.com
- [+] webmail.fasrc.org
- [+] webmail.forwomenbywomen.org
- [+] webmail.gdsudan.com
- [+] webmail.giadservices.com
- [+] webmail.higleig.com
- [+] webmail.hishamkarouri.com
- [+] webmail.hopemedicalsd.com
- [+] webmail.ideagp.com
- [+] webmail.indonileexport.com
- [+] webmail.indonile.com
- [+] webmail.ingawetrading.com
- [+] webmail.jubaauto.com
- [+] webmail.ktcesudan.com
- [+] webmail.ladconsult.com
- [+] webmail.lanjico.com
- [+] webmail.lowcosttravelcenter.com
- [+] webmail.lulamab.com
- [+] webmail.lunatusmed.com
- [+] webmail.mahgoubsons.com
- [+] webmail.mamedmedical.com
- [+] webmail.marwacoenterprises.com
- [+] webmail.medanico.com
- [+] webmail.mieragspace.com
- [+] webmail.moontrade.net
- [+] webmail.mssmanal.com
- [+] webmail.mudalala.qa
- [+] webmail.musanadaholding.com
- [+] webmail.nagi.photo
- [+] webmail.nilecement.org
- [+] webmail.nisosd.com
- [+] webmail.niss.tech
- [+] webmail.nlicfinance.com
- [+] webmail.npetroleum.com
- [+] webmail.nuspetro.com
- [+] webmail.olgaecs.com
- [+] webmail.osamaalgadee.com
- [+] webmail.pawfreight.com
- [+] webmail.petroall.net
- [+] webmail.radmedco.com
- [+] webmail.raheeg.com
- [+] webmail.rakhie.net
- [+] webmail.rcctsd.com
- [+] webmail.rocketeng.net
- [+] webmail.sabintod.com
- [+] webmail.sangsl.com
- [+] webmail.scmsltd.com
- [+] webmail.senahypermarket.com
- [+] webmail.shakak.org
- [+] webmail.shirouqpaints.net
- [+] webmail.shoyum.com
- [+] webmail.sinnarshipping.com
- [+] webmail.skhcsudan.com
- [+] webmail.smacosd.com
- [+] webmail.srptechnology.com
- [+] webmail.stiltgroup.org
- [+] webmail.sudanbcisd.net
- [+] webmail.sudanesephysicians.org
- [+] webmail.sudanpile.com
- [+] webmail.sudanwork.com
- [+] webmail.tawakolmedical.com
- [+] webmail.tawseelsudan.com
- [+] webmail.tbmlawfirm.com
- [+] webmail.tharjatheng.com
- [+] webmail.transways.ae
- [+] webmail.tstmatjar.com
- [+] webmail.vittoriopierino.com
- [+] webmail.wgarasud.com
- [+] webmail.yasminycl.com
- [+] webmail.yassirkambalgroup.com
- [+] webmail.yathribyp.com
- [+] webmail.zawayabricks.com
- [+] webmail.adding-sd.com
- [+] webmail.agrogate-holdings.com
- [+] webmail.alzawaya-medical.com
- [+] webmail.apg-sd.com
- [+] webmail.basma-ocf.org
- [+] webmail.click-grafix.com
- [+] webmail.codon-med.com
- [+] webmail.crimsonlights-sd.com
- [+] webmail.das-diesel.com
- [+] webmail.elmohandis-paints.com
- [+] webmail.etegahat-ap.com
- [+] webmail.extra-pharma.com
- [+] webmail.farha-sd.com
- [+] webmail.flynas-sudan.com
- [+] webmail.focusschool-sd.com
- [+] webmail.geocad-sd.com
- [+] webmail.gladiator-bdc.com
- [+] webmail.gpo-sd.com
- [+] webmail.hamza-farm.com
- [+] webmail.hcs-sd.com
- [+] webmail.ideal-sdn.com
- [+] webmail.khartoum-int.net
- [+] webmail.kmc-sd.com
- [+] webmail.maak-sd.com
- [+] webmail.manar-group.com
- [+] webmail.mechatronic-sd.com
- [+] webmail.medicare-sd.com
- [+] webmail.medpharma-sd.com
- [+] webmail.nileuniversity-edu.com
- [+] webmail.numberone-sd.com
- [+] webmail.oit-sd.com
- [+] webmail.osool-sd.com
- [+] webmail.paradisehotels-sd.com
- [+] webmail.pts-sd.com
- [+] webmail.rittal-sd.com
- [+] webmail.skyart-sd.com
- [+] webmail.soed-sd.org
- [+] webmail.summit-schools.com
- [+] webmail.supergeneral-sd.com
- [+] webmail.tanglewood-sd.com
- [+] webmail.whitewaters-sd.com
- [+] webmail.yam-cdc.com
- [+] westvilledevelopers.co.za
- [+] wgarasud.com
- [+] whitewaters-sd.com
- [+] whm.click-grafix.com
- [+] wre.gov.sd
- [+] www.alrawabi.yassirkambalgroup.com
- [+] www.app.advocatemakki.com
- [+] www.aseelcomplex.yassirkambalgroup.com
- [+] www.aseel.yassirkambalgroup.com
- [+] www.berigdar.berigdargroup.com
- [+] www.conference.sudanesephysicians.org
- [+] www.dallahpharma.alwathbagroup.com
- [+] www.design.alwatanyia.com
- [+] www.dindir.higleig.com
- [+] www.easyhotel.advocatemakki.com
- [+] www.edge.ideagp.com
- [+] www.fresh.yassirkambalgroup.com
- [+] www.green.yassirkambalgroup.com
- [+] www.it.alanfalgroup.com
- [+] www.mahgoubsons.com
- [+] www.mail.pawfreight.com
- [+] www.omiga.yassirkambalgroup.com
- [+] www.owner.advocatemakki.com
- [+] www.powerblue.yassirkambalgroup.com
- [+] www.reports.lowcosttravelcenter.com
- [+] www.sonic.yassirkambalgroup.com
- [+] www.test.almamoonoil.com
- [+] www.apple-login.org.rakhie.net
- [+] www.arech.apg-sd.com
- [+] www.ar.nileuniversity-edu.com
- [+] www.badawi.alzawaya-medical.com
- [+] www.bargos.apg-sd.com
- [+] www.citi.online.yam-cdc.com
- [+] www.exams.nileuniversity-edu.com
- [+] www.farha-sd.tanglewood-sd.com
- [+] www.mdisam.paradisehotels-sd.com
- [+] www.moodle.nileuniversity-edu.com
- [+] www.rotana.mechatronic-sd.com
- [+] www.secure-paypal.org.rakhie.net
- [+] www.students.nileuniversity-edu.com
- [+] www.test.mechatronic-sd.com
- [+] yam-cdc.com
- [+] yasminycl.com
- [+] yassirkambalgroup.com
- [+] yathribyp.com
- [+] zawayabricks.com
- #######################################################################################################################################
- Reverse IP With YouGetSignal 'audit.gov.sd'
- ----------------------------------------------
- [*] IP: 138.128.160.2
- [*] Domain: audit.gov.sd
- [*] Total Domains: 51
- [+] aayan.com.qa
- [+] adding-sd.com
- [+] alfala.com
- [+] aljazeerabank.com.sd
- [+] aloaloa.com
- [+] aou.edu.sd
- [+] apg-sd.com
- [+] audit.gov.sd
- [+] bajafar.sd
- [+] benzcenter.net
- [+] click.sd
- [+] cm.sd
- [+] cpd.gov.sd
- [+] eims.ae
- [+] engcouncil.sd
- [+] giadservices.com
- [+] gpo-sd.com
- [+] iec.gov.sd
- [+] indonileexport.com
- [+] khairport.gov.sd
- [+] khmedical.edu.sd
- [+] mofdgoia.gov.sd
- [+] mohe.gov.sd
- [+] mssmanal.com
- [+] nileuniversity-edu.com
- [+] oau.edu.sd
- [+] petroall.net
- [+] sahl.gov.sd
- [+] sdac.gov.sd
- [+] sidcotel.sd
- [+] ssia.sd
- [+] sudafast.edu.sd
- [+] sudan.gov.sd
- [+] sudanap.org
- [+] sudanconsumers.org
- [+] sudanports.gov.sd
- [+] sudapet.sd
- [+] sudapost.sd
- [+] tpsudan.gov.sd
- [+] wre.gov.sd
- [+] www.aljazeerabank.com.sd
- [+] www.cpd.gov.sd
- [+] www.dandaradentalcenter.com
- [+] www.goldenarrow.sd
- [+] www.iec.gov.sd
- [+] www.khmedical.edu.sd
- [+] www.mohe.gov.sd
- [+] www.studentwelfare.sd
- [+] www.sudan.gov.sd
- [+] www.sudapet.sd
- [+] www.tararealestate.sd
- #######################################################################################################################################
- Geo IP Lookup 'audit.gov.sd'
- -------------------------------
- [+] IP Address: 138.128.160.2
- [+] Country: United States
- [+] State: Florida
- [+] City: Orlando
- [+] Latitude: 28.5807
- [+] Longitude: -81.1893
- #######################################################################################################################################
- Bypass Cloudflare 'audit.gov.sd'
- -----------------------------------
- [!] CloudFlare Bypass 138.128.160.2 | ftp.audit.gov.sd
- [!] CloudFlare Bypass 138.128.160.2 | cpanel.audit.gov.sd
- [!] CloudFlare Bypass 138.128.160.2 | webmail.audit.gov.sd
- [!] CloudFlare Bypass 127.0.0.1 | localhost.audit.gov.sd
- [!] CloudFlare Bypass 212.0.136.50 | mail.audit.gov.sd
- [!] CloudFlare Bypass 138.128.160.2 | www.audit.gov.sd
- #######################################################################################################################################
- DNS Lookup 'audit.gov.sd'
- ----------------------------
- [+] audit.gov.sd. 14399 IN MX 0 mail.audit.gov.sd.
- [+] audit.gov.sd. 21599 IN SOA ns1.click-grafix.com. karouri.gmail.com. 2019032105 3600 7200 1209600 86400
- [+] audit.gov.sd. 21599 IN NS ns1.click-grafix.com.
- [+] audit.gov.sd. 21599 IN NS ns2.click-grafix.com.
- [+] audit.gov.sd. 14399 IN A 138.128.160.2
- #######################################################################################################################################
- Show HTTP Header 'audit.gov.sd'
- ----------------------------------
- [+] HTTP/1.1 302 Moved Temporarily
- [+] Date: Sun, 30 Jun 2019 21:03:11 GMT
- [+] Server: Apache
- [+] X-Powered-By: PHP/5.6.40
- [+] Expires: Thu, 19 Nov 1981 08:52:00 GMT
- [+] Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- [+] Pragma: no-cache
- [+] X-Redirect-By: WordPress
- [+] Set-Cookie: PHPSESSID=pnh7e278e14s21t6vd87dtb8p4; path=/
- [+] Set-Cookie: mltlngg_language=ar; expires=Tue, 30-Jul-2019 21:03:12 GMT; Max-Age=2592000; path=/; domain=.audit.gov.sd
- [+] Location: http://audit.gov.sd/?lang=ar
- [+] Connection: close
- [+] Content-Type: text/html; charset=UTF-8
- #######################################################################################################################################
- Port Scan 'audit.gov.sd'
- ---------------------------
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 21:03 UTC
- Nmap scan report for audit.gov.sd (138.128.160.2)
- Host is up (0.033s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp closed ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.92 seconds
- #######################################################################################################################################
- Cms Scan 'audit.gov.sd'
- --------------------------
- [+] Cms : WordPress
- [+] Web Servers : Apache
- [+] Programming Languages : PHP
- #######################################################################################################################################
- Robot.txt 'audit.gov.sd'
- ---------------------------
- User-agent: *
- Disallow: /calendar/action~posterboard/
- Disallow: /calendar/action~agenda/
- Disallow: /calendar/action~oneday/
- Disallow: /calendar/action~month/
- Disallow: /calendar/action~week/
- Disallow: /calendar/action~stream/
- Disallow: /calendar/action~undefined/
- Disallow: /calendar/action~http:/
- Disallow: /calendar/action~default/
- Disallow: /calendar/action~poster/
- Disallow: /calendar/action~*/
- Disallow: /*controller=ai1ec_exporter_controller*
- Disallow: /*/action~*/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~posterboard/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~agenda/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~oneday/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~month/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~week/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~stream/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~undefined/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~http:/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~default/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~poster/
- Disallow: /%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~*/
- #######################################################################################################################################
- Traceroute 'audit.gov.sd'
- ----------------------------
- Start: 2019-06-30T21:03:31+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.201 0.0% 3 0.7 0.8 0.7 1.0 0.2
- 2.|-- 45.79.12.0 0.0% 3 0.5 0.6 0.5 0.7 0.1
- 3.|-- 45.79.12.9 0.0% 3 8.2 3.2 0.6 8.2 4.3
- 4.|-- 199.245.16.65 0.0% 3 1.6 1.6 1.5 1.7 0.1
- 5.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 6.|-- ae-1-8.bar1.Orlando1.Level3.net 0.0% 3 33.9 34.0 33.9 34.0 0.0
- 7.|-- HOSTDIME.bar1.Orlando1.Level3.net 0.0% 3 35.4 35.5 35.4 35.5 0.1
- 8.|-- ae2.core2.mco.hostdime.com 0.0% 3 34.3 34.1 34.0 34.3 0.1
- 9.|-- server.click-grafix.com 0.0% 3 33.8 33.9 33.8 33.9 0.0
- #######################################################################################################################################
- Page Admin Finder 'audit.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Avilable Links :
- Find Page >> http://audit.gov.sd/wp-login.php
- #######################################################################################################################################
- Trying "audit.gov.sd"
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29276
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 2, ADDITIONAL: 2
- ;; QUESTION SECTION:
- ;audit.gov.sd. IN ANY
- ;; ANSWER SECTION:
- audit.gov.sd. 14400 IN A 138.128.160.2
- audit.gov.sd. 86400 IN SOA ns1.click-grafix.com. karouri.gmail.com. 2019032105 3600 7200 1209600 86400
- audit.gov.sd. 14400 IN MX 0 mail.audit.gov.sd.
- audit.gov.sd. 14400 IN NS ns2.click-grafix.com.
- audit.gov.sd. 14400 IN NS ns1.click-grafix.com.
- ;; AUTHORITY SECTION:
- audit.gov.sd. 14400 IN NS ns2.click-grafix.com.
- audit.gov.sd. 14400 IN NS ns1.click-grafix.com.
- ;; ADDITIONAL SECTION:
- ns2.click-grafix.com. 172800 IN A 138.128.160.4
- ns1.click-grafix.com. 172800 IN A 138.128.160.3
- Received 229 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 398 ms
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P4-5.1-Debian <<>> +trace audit.gov.sd
- ;; global options: +cmd
- . 81436 IN NS d.root-servers.net.
- . 81436 IN NS m.root-servers.net.
- . 81436 IN NS k.root-servers.net.
- . 81436 IN NS a.root-servers.net.
- . 81436 IN NS j.root-servers.net.
- . 81436 IN NS b.root-servers.net.
- . 81436 IN NS g.root-servers.net.
- . 81436 IN NS h.root-servers.net.
- . 81436 IN NS e.root-servers.net.
- . 81436 IN NS c.root-servers.net.
- . 81436 IN NS i.root-servers.net.
- . 81436 IN NS f.root-servers.net.
- . 81436 IN NS l.root-servers.net.
- . 81436 IN RRSIG NS 8 0 518400 20190713170000 20190630160000 25266 . VB7S+BDIpeFGPW9gut9lRFVkC+X4VQ8vl43hXcRdqccS/ltPurUWh952 8ntwlNGfJiY5bTLA0+1WvP2GnMDZjZ7FVHm7BT6jAinXMzXr8f9Wds3n nCnTFfsNWc4pLjas46Pepcr39fg58mxmC8BRHADvkVLwK+CUj6ep+HW5 YXzyX8y06uiZSqO7R33g+3pBuIs8MbB6u2ws4AxtQLkFF7GMEO2A/mcp R7ZxAi0sGlRAQhU8rIs92I3YLC8DLbE0YbEcwJse6No6rArg3rkG4fnw /72IAKJ/v0W62Rwbub7/ybfZCN8BjI1OoRtkkTp5ZL4X1Sccqh8RTGT9 8h8N6Q==
- ;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 115 ms
- sd. 172800 IN NS ans1.canar.sd.
- sd. 172800 IN NS ns-sd.afrinic.net.
- sd. 172800 IN NS ans1.sis.sd.
- sd. 172800 IN NS sd.cctld.authdns.ripe.net.
- sd. 172800 IN NS ns2.uaenic.ae.
- sd. 172800 IN NS ans2.canar.sd.
- sd. 172800 IN NS ns1.uaenic.ae.
- sd. 86400 IN NSEC se. NS RRSIG NSEC
- sd. 86400 IN RRSIG NSEC 8 1 86400 20190713170000 20190630160000 25266 . Q3p9pjhj66y7GRqwdC28oPN79LInn/LIiWU5vRv937hjryvWWKB7l8EO QPkCi9sOGmAK9koYsa9wZG7djVy43mGdQe5slk2awPcjf6Y965ej/gNi k0A+qBv8tmRshksknN7S0n8b5tnc9yENP+es93CGTMFge0fU7bTZsaC+ WfBtc46L88kHBYFx5X76u5mKHqzmmbIXN2Vs/18InZu3pjLH3m95KZZo 1fTpZbIa2raKxdVX3+2A71NFNkXdfUeUQAjNny3BbhpQU21WYolUNumI Cyx+JOefMpzh31XyYvvV5L/B+soJfHDrq54942DyAvAQh0xn5lEfRqDj uy/KgA==
- ;; Received 699 bytes from 192.36.148.17#53(i.root-servers.net) in 118 ms
- audit.gov.sd. 14400 IN NS ns1.click-grafix.com.
- audit.gov.sd. 14400 IN NS ns2.click-grafix.com.
- ;; Received 93 bytes from 196.29.180.14#53(ans1.canar.sd) in 248 ms
- audit.gov.sd. 14400 IN A 138.128.160.2
- audit.gov.sd. 86400 IN NS ns1.click-grafix.com.
- audit.gov.sd. 86400 IN NS ns2.click-grafix.com.
- ;; Received 141 bytes from 138.128.160.3#53(ns1.click-grafix.com) in 225 ms
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: audit.gov.sd
- [-] DNSSEC is not configured for audit.gov.sd
- [*] SOA ns1.click-grafix.com 138.128.160.3
- [*] NS ns1.click-grafix.com 138.128.160.3
- [*] Bind Version for 138.128.160.3 9.9.4-RedHat-9.9.4-74.el7_6.1
- [*] NS ns2.click-grafix.com 138.128.160.4
- [*] Bind Version for 138.128.160.4 9.9.4-RedHat-9.9.4-74.el7_6.1
- [*] MX mail.audit.gov.sd 212.0.136.50
- [*] A audit.gov.sd 138.128.160.2
- [*] Enumerating SRV Records
- [-] No SRV Records Found for audit.gov.sd
- [+] 0 Records Found
- #######################################################################################################################################
- [*] Processing domain audit.gov.sd
- [*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a', '192.168.0.1']
- [+] Getting nameservers
- 138.128.160.3 - ns1.click-grafix.com
- 138.128.160.4 - ns2.click-grafix.com
- [-] Zone transfer failed
- [+] MX records found, added to target list
- 0 mail.audit.gov.sd.
- [*] Scanning audit.gov.sd for A records
- 138.128.160.2 - audit.gov.sd
- 138.128.160.2 - cpanel.audit.gov.sd
- 138.128.160.2 - ftp.audit.gov.sd
- 127.0.0.1 - localhost.audit.gov.sd
- 212.0.136.50 - mail.audit.gov.sd
- 138.128.160.2 - webmail.audit.gov.sd
- 138.128.160.2 - webdisk.audit.gov.sd
- 138.128.160.2 - whm.audit.gov.sd
- 138.128.160.2 - www.audit.gov.sd
- #######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 138.128.160.2 200 host ftp.audit.gov.sd Apache
- 127.0.0.1 host localhost.audit.gov.sd
- 212.0.136.50 403 host mail.audit.gov.sd Microsoft-IIS/8.0
- 138.128.160.2 301 host webmail.audit.gov.sd Apache
- 138.128.160.2 302 alias www.audit.gov.sd Apache
- 138.128.160.2 302 host audit.gov.sd Apache
- #######################################################################################################################################
- [+] Testing domain
- www.audit.gov.sd 138.128.160.2
- [+] Dns resolving
- Domain name Ip address Name server
- audit.gov.sd 138.128.160.2 server.click-grafix.com
- Found 1 host(s) for audit.gov.sd
- [+] Testing wildcard
- Ok, no wildcard found.
- [+] Scanning for subdomain on audit.gov.sd
- [!] Wordlist not specified. I scannig with my internal wordlist...
- Estimated time about 212.08 seconds
- Subdomain Ip address Name server
- ftp.audit.gov.sd 138.128.160.2 server.click-grafix.com
- localhost.audit.gov.sd 127.0.0.1 localhost
- mail.audit.gov.sd 212.0.136.50 mail.audit.gov.sd
- webmail.audit.gov.sd 138.128.160.2 server.click-grafix.com
- www.audit.gov.sd 138.128.160.2 server.click-grafix.com
- #######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- FallbackScsvPlugin
- HeartbleedPlugin
- RobotPlugin
- EarlyDataPlugin
- CertificateInfoPlugin
- SessionResumptionPlugin
- HttpHeadersPlugin
- OpenSslCipherSuitesPlugin
- CompressionPlugin
- SessionRenegotiationPlugin
- OpenSslCcsInjectionPlugin
- CHECKING HOST(S) AVAILABILITY
- --------------------------------------------------------------------------------------------------------------------------------------
- 138.128.160.2:443 => 138.128.160.2
- SCAN RESULTS FOR 138.128.160.2:443 - 138.128.160.2
- ---------------------------------------------------------------------------------------------------------------------------------------
- * Downgrade Attacks:
- TLS_FALLBACK_SCSV: OK - Supported
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * Session Renegotiation:
- Client-initiated Renegotiation: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Certificate Information:
- Content
- SHA1 Fingerprint: 416a957b5935e3d64c9c2ee76f20b970269e26a3
- Common Name: abaad.sd
- Issuer: abaad.sd
- Serial Number: 3967770698
- Not Before: 2017-08-12 11:26:16
- Not After: 2018-08-12 11:26:16
- Signature Algorithm: sha256
- Public Key Algorithm: RSA
- Key Size: 2048
- Exponent: 65537 (0x10001)
- DNS Subject Alternative Names: ['abaad.sd', 'mail.abaad.sd', 'www.abaad.sd']
- Trust
- Hostname Validation: FAILED - Certificate does NOT match 138.128.160.2
- Android CA Store (9.0.0_r9): FAILED - Certificate is NOT Trusted: self signed certificate
- iOS CA Store (12, macOS 10.14, watchOS 5, and tvOS 12):FAILED - Certificate is NOT Trusted: self signed certificate
- Java CA Store (jdk-11.0.2): FAILED - Certificate is NOT Trusted: self signed certificate
- macOS CA Store (12, macOS 10.14, watchOS 5, and tvOS 12):FAILED - Certificate is NOT Trusted: self signed certificate
- Mozilla CA Store (2018-11-22): FAILED - Certificate is NOT Trusted: self signed certificate
- OPENJDK CA Store (jdk-11.0.2): FAILED - Certificate is NOT Trusted: self signed certificate
- Windows CA Store (2018-12-08): FAILED - Certificate is NOT Trusted: self signed certificate
- Symantec 2018 Deprecation: OK - Not a Symantec-issued certificate
- Received Chain: abaad.sd
- Verified Chain: ERROR - Could not build verified chain (certificate untrusted?)
- Received Chain Contains Anchor: ERROR - Could not build verified chain (certificate untrusted?)
- Received Chain Order: OK - Order is valid
- Verified Chain contains SHA1: ERROR - Could not build verified chain (certificate untrusted?)
- Extensions
- OCSP Must-Staple: NOT SUPPORTED - Extension not found
- Certificate Transparency: NOT SUPPORTED - Extension not found
- OCSP Stapling
- NOT SUPPORTED - Server did not send back an OCSP response
- * OpenSSL CCS Injection:
- OK - Not vulnerable to OpenSSL CCS injection
- * TLSV1_3 Cipher Suites:
- Server rejected all cipher suites.
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- * TLS 1.2 Session Resumption Support:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Tickets: OK - Supported
- * OpenSSL Heartbleed:
- OK - Not vulnerable to Heartbleed
- * Deflate Compression:
- OK - Compression disabled
- * TLSV1_1 Cipher Suites:
- Forward Secrecy OK - Supported
- RC4 OK - Not Supported
- Preferred:
- None - Server followed client cipher suite preference.
- Accepted:
- TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- * ROBOT Attack:
- OK - Not vulnerable
- * TLSV1_2 Cipher Suites:
- Forward Secrecy OK - Supported
- RC4 OK - Not Supported
- Preferred:
- None - Server followed client cipher suite preference.
- Accepted:
- TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
- TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
- TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
- TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
- TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- * TLSV1 Cipher Suites:
- Forward Secrecy OK - Supported
- RC4 OK - Not Supported
- Preferred:
- None - Server followed client cipher suite preference.
- Accepted:
- TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
- SCAN COMPLETED IN 24.65 S
- -------------------------
- #######################################################################################################################################
- Parsero scan report for www.audit.gov.sd
- http://www.audit.gov.sd/calendar/action~posterboard/ 404 Not Found
- http://www.audit.gov.sd/calendar/action~month/ 404 Not Found
- http://www.audit.gov.sd/calendar/action~stream/ 404 Not Found
- http://www.audit.gov.sd/%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~*/ 404 Not Found
- http://www.audit.gov.sd/%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~week/ 404 Not Found
- http://www.audit.gov.sd/%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~http:/ 404 Not Found
- http://www.audit.gov.sd/%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~oneday/ 404 Not Found
- http://www.audit.gov.sd/calendar/action~week/ 404 Not Found
- http://www.audit.gov.sd/*/action~*/ 404 Not Found
- http://www.audit.gov.sd/%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~agenda/ 404 Not Found
- http://www.audit.gov.sd/calendar/action~oneday/ 404 Not Found
- http://www.audit.gov.sd/calendar/action~http:/ 404 Not Found
- http://www.audit.gov.sd/%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~posterboard/ 404 Not Found
- http://www.audit.gov.sd/%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~undefined/ 404 Not Found
- http://www.audit.gov.sd/%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~default/ 404 Not Found
- http://www.audit.gov.sd/calendar/action~agenda/ 404 Not Found
- http://www.audit.gov.sd/*controller=ai1ec_exporter_controller* 404 Not Found
- http://www.audit.gov.sd/%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~month/ 404 Not Found
- http://www.audit.gov.sd/calendar/action~default/ 404 Not Found
- http://www.audit.gov.sd/calendar/action~poster/ 404 Not Found
- http://www.audit.gov.sd/calendar/action~*/ 404 Not Found
- http://www.audit.gov.sd/%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~stream/ 404 Not Found
- http://www.audit.gov.sd/%d8%a7%d9%84%d9%88%d8%b3%d8%a7%d8%a6%d8%b7/events/action~poster/ 404 Not Found
- http://www.audit.gov.sd/calendar/action~undefined/ 404 Not Found
- [+] 24 links have been analyzed but any them are available...
- Finished in 14.196236610412598 seconds
- #######################################################################################################################################
- WhatWeb report for http://audit.gov.sd
- Status : 302 Found
- Title : <None>
- IP : 138.128.160.2
- Country : UNITED STATES, US
- Summary : PHP[5.6.40], Apache, HTTPServer[Apache], RedirectLocation[http://audit.gov.sd/?lang=ar], UncommonHeaders[x-redirect-by], Cookies[PHPSESSID,mltlngg_language], X-Powered-By[PHP/5.6.40]
- Detected Plugins:
- [ Apache ]
- The Apache HTTP Server Project is an effort to develop and
- maintain an open-source HTTP server for modern operating
- systems including UNIX and Windows NT. The goal of this
- project is to provide a secure, efficient and extensible
- server that provides HTTP services in sync with the current
- HTTP standards.
- Google Dorks: (3)
- Website : http://httpd.apache.org/
- [ Cookies ]
- Display the names of cookies in the HTTP headers. The
- values are not returned to save on space.
- String : PHPSESSID
- String : mltlngg_language
- [ HTTPServer ]
- HTTP server header string. This plugin also attempts to
- identify the operating system from the server header.
- String : Apache (from server string)
- [ PHP ]
- PHP is a widely-used general-purpose scripting language
- that is especially suited for Web development and can be
- embedded into HTML. This plugin identifies PHP errors,
- modules and versions and extracts the local file path and
- username if present.
- Version : 5.6.40
- Google Dorks: (2)
- Website : http://www.php.net/
- [ RedirectLocation ]
- HTTP Server string location. used with http-status 301 and
- 302
- String : http://audit.gov.sd/?lang=ar (from location)
- [ UncommonHeaders ]
- Uncommon HTTP server headers. The blacklist includes all
- the standard headers and many non standard but common ones.
- Interesting but fairly common headers should have their own
- plugins, eg. x-powered-by, server and x-aspnet-version.
- Info about headers can be found at www.http-stats.com
- String : x-redirect-by (from headers)
- [ X-Powered-By ]
- X-Powered-By HTTP header
- String : PHP/5.6.40 (from x-powered-by string)
- HTTP Headers:
- HTTP/1.1 302 Moved Temporarily
- Date: Sun, 30 Jun 2019 21:52:03 GMT
- Server: Apache
- X-Powered-By: PHP/5.6.40
- Expires: Thu, 19 Nov 1981 08:52:00 GMT
- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- Pragma: no-cache
- X-Redirect-By: WordPress
- Set-Cookie: PHPSESSID=69sg62qlrkdsjthm5unpl7hak3; path=/
- Set-Cookie: mltlngg_language=ar; expires=Tue, 30-Jul-2019 21:52:03 GMT; Max-Age=2592000; path=/; domain=.audit.gov.sd
- Location: http://audit.gov.sd/?lang=ar
- Content-Length: 0
- Connection: close
- Content-Type: text/html; charset=UTF-8
- WhatWeb report for http://audit.gov.sd/?lang=ar
- Status : 301 Moved Permanently
- Title : <None>
- IP : 138.128.160.2
- Country : UNITED STATES, US
- Summary : PHP[5.6.40], X-Frame-Options[SAMEORIGIN], Apache, HTTPServer[Apache], RedirectLocation[http://www.audit.gov.sd/?lang=ar], UncommonHeaders[referrer-policy,x-content-type-options,x-redirect-by], Cookies[PHPSESSID,icwp-wpsf,mltlngg_language], X-Powered-By[PHP/5.6.40], X-XSS-Protection[1; mode=block]
- Detected Plugins:
- [ Apache ]
- The Apache HTTP Server Project is an effort to develop and
- maintain an open-source HTTP server for modern operating
- systems including UNIX and Windows NT. The goal of this
- project is to provide a secure, efficient and extensible
- server that provides HTTP services in sync with the current
- HTTP standards.
- Google Dorks: (3)
- Website : http://httpd.apache.org/
- [ Cookies ]
- Display the names of cookies in the HTTP headers. The
- values are not returned to save on space.
- String : PHPSESSID
- String : mltlngg_language
- String : icwp-wpsf
- [ HTTPServer ]
- HTTP server header string. This plugin also attempts to
- identify the operating system from the server header.
- String : Apache (from server string)
- [ PHP ]
- PHP is a widely-used general-purpose scripting language
- that is especially suited for Web development and can be
- embedded into HTML. This plugin identifies PHP errors,
- modules and versions and extracts the local file path and
- username if present.
- Version : 5.6.40
- Google Dorks: (2)
- Website : http://www.php.net/
- [ RedirectLocation ]
- HTTP Server string location. used with http-status 301 and
- 302
- String : http://www.audit.gov.sd/?lang=ar (from location)
- [ UncommonHeaders ]
- Uncommon HTTP server headers. The blacklist includes all
- the standard headers and many non standard but common ones.
- Interesting but fairly common headers should have their own
- plugins, eg. x-powered-by, server and x-aspnet-version.
- Info about headers can be found at www.http-stats.com
- String : referrer-policy,x-content-type-options,x-redirect-by (from headers)
- [ X-Frame-Options ]
- This plugin retrieves the X-Frame-Options value from the
- HTTP header. - More Info:
- http://msdn.microsoft.com/en-us/library/cc288472%28VS.85%29.
- aspx
- String : SAMEORIGIN
- [ X-Powered-By ]
- X-Powered-By HTTP header
- String : PHP/5.6.40 (from x-powered-by string)
- [ X-XSS-Protection ]
- This plugin retrieves the X-XSS-Protection value from the
- HTTP header. - More Info:
- http://msdn.microsoft.com/en-us/library/cc288472%28VS.85%29.
- aspx
- String : 1; mode=block
- HTTP Headers:
- HTTP/1.1 301 Moved Permanently
- Date: Sun, 30 Jun 2019 21:52:04 GMT
- Server: Apache
- X-Powered-By: PHP/5.6.40
- Expires: Thu, 19 Nov 1981 08:52:00 GMT
- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- Pragma: no-cache
- Referrer-Policy: unsafe-url
- x-frame-options: SAMEORIGIN
- X-XSS-Protection: 1; mode=block
- X-Content-Type-Options: nosniff
- X-Redirect-By: WordPress
- Set-Cookie: PHPSESSID=3ch499rua1qrgbi9rist5lnhm4; path=/
- Set-Cookie: mltlngg_language=ar; expires=Tue, 30-Jul-2019 21:52:05 GMT; Max-Age=2592000; path=/; domain=.audit.gov.sd
- Set-Cookie: icwp-wpsf=c62eada5976e1a7d03aaba17c0c8fb28; expires=Sat, 26-Jan-2069 19:44:10 GMT; Max-Age=1564523523; path=/
- Location: http://www.audit.gov.sd/?lang=ar
- Content-Length: 0
- Connection: close
- Content-Type: text/html; charset=UTF-8
- WhatWeb report for http://www.audit.gov.sd/?lang=ar
- Status : 200 OK
- Title : National Audit Chamber
- IP : 138.128.160.2
- Country : UNITED STATES, US
- Summary : PHP[5.6.40], X-Frame-Options[SAMEORIGIN], JQuery[1.12.4], Apache, HTTPServer[Apache], WordPress[5.1.1], Script[text/javascript], Email[info@audit.gov.sd], HTML5, UncommonHeaders[referrer-policy,x-content-type-options,link], MetaGenerator[Everest Forms 1.4.8,WordPress 5.1.1], Cookies[PHPSESSID,mltlngg_language], X-Powered-By[PHP/5.6.40], X-XSS-Protection[1; mode=block]
- Detected Plugins:
- [ Apache ]
- The Apache HTTP Server Project is an effort to develop and
- maintain an open-source HTTP server for modern operating
- systems including UNIX and Windows NT. The goal of this
- project is to provide a secure, efficient and extensible
- server that provides HTTP services in sync with the current
- HTTP standards.
- Google Dorks: (3)
- Website : http://httpd.apache.org/
- [ Cookies ]
- Display the names of cookies in the HTTP headers. The
- values are not returned to save on space.
- String : PHPSESSID
- String : mltlngg_language
- [ Email ]
- Extract email addresses. Find valid email address and
- syntactically invalid email addresses from mailto: link
- tags. We match syntactically invalid links containing
- mailto: to catch anti-spam email addresses, eg. bob at
- gmail.com. This uses the simplified email regular
- expression from
- http://www.regular-expressions.info/email.html for valid
- email address matching.
- String : info@audit.gov.sd
- String : info@audit.gov.sd
- [ HTML5 ]
- HTML version 5, detected by the doctype declaration
- [ HTTPServer ]
- HTTP server header string. This plugin also attempts to
- identify the operating system from the server header.
- String : Apache (from server string)
- [ JQuery ]
- A fast, concise, JavaScript that simplifies how to traverse
- HTML documents, handle events, perform animations, and add
- AJAX.
- Version : 1.12.4
- Website : http://jquery.com/
- [ MetaGenerator ]
- This plugin identifies meta generator tags and extracts its
- value.
- String : Everest Forms 1.4.8,WordPress 5.1.1
- [ PHP ]
- PHP is a widely-used general-purpose scripting language
- that is especially suited for Web development and can be
- embedded into HTML. This plugin identifies PHP errors,
- modules and versions and extracts the local file path and
- username if present.
- Version : 5.6.40
- Google Dorks: (2)
- Website : http://www.php.net/
- [ Script ]
- This plugin detects instances of script HTML elements and
- returns the script language/type.
- String : text/javascript
- [ UncommonHeaders ]
- Uncommon HTTP server headers. The blacklist includes all
- the standard headers and many non standard but common ones.
- Interesting but fairly common headers should have their own
- plugins, eg. x-powered-by, server and x-aspnet-version.
- Info about headers can be found at www.http-stats.com
- String : referrer-policy,x-content-type-options,link (from headers)
- [ WordPress ]
- WordPress is an opensource blogging system commonly used as
- a CMS.
- Version : 5.1.1
- Aggressive function available (check plugin file or details).
- Google Dorks: (1)
- Website : http://www.wordpress.org/
- [ X-Frame-Options ]
- This plugin retrieves the X-Frame-Options value from the
- HTTP header. - More Info:
- http://msdn.microsoft.com/en-us/library/cc288472%28VS.85%29.
- aspx
- String : SAMEORIGIN
- [ X-Powered-By ]
- X-Powered-By HTTP header
- String : PHP/5.6.40 (from x-powered-by string)
- [ X-XSS-Protection ]
- This plugin retrieves the X-XSS-Protection value from the
- HTTP header. - More Info:
- http://msdn.microsoft.com/en-us/library/cc288472%28VS.85%29.
- aspx
- String : 1; mode=block
- HTTP Headers:
- HTTP/1.1 200 OK
- Date: Sun, 30 Jun 2019 21:52:07 GMT
- Server: Apache
- X-Powered-By: PHP/5.6.40
- Expires: Thu, 19 Nov 1981 08:52:00 GMT
- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- Pragma: no-cache
- Referrer-Policy: unsafe-url
- x-frame-options: SAMEORIGIN
- X-XSS-Protection: 1; mode=block
- X-Content-Type-Options: nosniff
- Link: <http://www.audit.gov.sd?lang=ar%2Findex.php&rest_route=/>; rel="https://api.w.org/"
- Set-Cookie: PHPSESSID=r13b1jrhooe4u4cbpqduottls1; path=/
- Set-Cookie: mltlngg_language=ar; expires=Tue, 30-Jul-2019 21:52:08 GMT; Max-Age=2592000; path=/; domain=.audit.gov.sd
- Content-Length: 109839
- Connection: close
- Content-Type: text/html; charset=UTF-8
- #######################################################################################################################################
- DNS Servers for audit.gov.sd:
- ns2.click-grafix.com
- ns1.click-grafix.com
- Trying zone transfer first...
- Testing ns2.click-grafix.com
- Request timed out or transfer not allowed.
- Testing ns1.click-grafix.com
- Request timed out or transfer not allowed.
- Unsuccessful in zone transfer (it was worth a shot)
- Okay, trying the good old fashioned way... brute force
- Checking for wildcard DNS...
- Nope. Good.
- Now performing 2280 test(s)...
- 138.128.160.2 ftp.audit.gov.sd
- 127.0.0.1 localhost.audit.gov.sd
- 212.0.136.50 mail.audit.gov.sd
- 138.128.160.2 webmail.audit.gov.sd
- 138.128.160.2 www.audit.gov.sd
- Subnets found (may want to probe here using nmap or unicornscan):
- 127.0.0.0-255 : 1 hostnames found.
- 138.128.160.0-255 : 3 hostnames found.
- 212.0.136.0-255 : 1 hostnames found.
- Done with Fierce scan: http://ha.ckers.org/fierce/
- Found 5 entries.
- Have a nice day.
- #######################################################################################################################################
- Domains still to check: 1
- Checking if the hostname audit.gov.sd. given is in fact a domain...
- Analyzing domain: audit.gov.sd.
- Checking NameServers using system default resolver...
- IP: 138.128.160.4 (United States)
- HostName: ns2.click-grafix.com Type: NS
- HostName: ns2.click-grafix.com Type: PTR
- IP: 138.128.160.3 (United States)
- HostName: ns1.click-grafix.com Type: NS
- HostName: ns1.click-grafix.com Type: PTR
- Checking MailServers using system default resolver...
- IP: 212.0.136.50 (Sudan)
- HostName: mail.audit.gov.sd Type: MX
- HostName: mail.audit.gov.sd Type: PTR
- Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
- No zone transfer found on nameserver 138.128.160.3
- No zone transfer found on nameserver 138.128.160.4
- Checking SPF record...
- No SPF record
- Checking 192 most common hostnames using system default resolver...
- IP: 138.128.160.2 (United States)
- HostName: www.audit.gov.sd. Type: A
- IP: 138.128.160.2 (United States)
- HostName: www.audit.gov.sd. Type: A
- HostName: ftp.audit.gov.sd. Type: A
- HostName: server.click-grafix.com Type: PTR
- IP: 212.0.136.50 (Sudan)
- HostName: mail.audit.gov.sd Type: MX
- HostName: mail.audit.gov.sd Type: PTR
- HostName: mail.audit.gov.sd. Type: A
- IP: 138.128.160.2 (United States)
- HostName: www.audit.gov.sd. Type: A
- HostName: ftp.audit.gov.sd. Type: A
- HostName: server.click-grafix.com Type: PTR
- HostName: webmail.audit.gov.sd. Type: A
- Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
- Checking netblock 138.128.160.0
- Checking netblock 212.0.136.0
- Searching for audit.gov.sd. emails in Google
- eltahir@audit.gov.sd.
- info@audit.gov.sd
- eltahir@audit.gov.sd&
- info@audit.gov.sd&
- ahamid@audit.gov.sd,
- ahamid@audit.gov.sd.
- Checking 4 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
- Host 138.128.160.3 is up (reset ttl 64)
- Host 138.128.160.2 is up (reset ttl 64)
- Host 212.0.136.50 is up (reset ttl 64)
- Host 138.128.160.4 is up (reset ttl 64)
- Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
- Scanning ip 138.128.160.3 (ns1.click-grafix.com (PTR)):
- 53/tcp open domain syn-ack ttl 54 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
- 80/tcp open http syn-ack ttl 54 Apache httpd
- | http-methods:
- | Supported Methods: POST OPTIONS HEAD GET TRACE
- |_ Potentially risky methods: TRACE
- |_http-server-header: Apache
- |_http-title: Site doesn't have a title (text/html).
- 143/tcp open imap syn-ack ttl 54 Dovecot imapd
- |_imap-capabilities: AUTH=PLAIN LOGIN-REFERRALS have IMAP4rev1 ENABLE OK more NAMESPACE Pre-login capabilities IDLE post-login listed STARTTLS AUTH=LOGINA0001 LITERAL+ ID SASL-IR
- |_ssl-date: TLS randomness does not represent time
- 443/tcp open ssl/http syn-ack ttl 54 Apache httpd
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Apache
- |_http-title: Site doesn't have a title (text/html).
- | ssl-cert: Subject: commonName=server.click-grafix.com
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-06-30T00:00:00
- | Not valid after: 2020-06-29T23:59:59
- | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- 465/tcp open ssl/smtp syn-ack ttl 54 Exim smtpd 4.92
- | smtp-commands: server.click-grafix.com Hello nmap.scanme.org [185.232.21.119], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
- |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=server.click-grafix.com
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-06-30T00:00:00
- | Not valid after: 2020-06-29T23:59:59
- | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- |_ssl-date: TLS randomness does not represent time
- 587/tcp open smtp syn-ack ttl 54 Exim smtpd 4.92
- | smtp-commands: server.click-grafix.com Hello nmap.scanme.org [185.232.21.119], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=server.click-grafix.com
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-06-30T00:00:00
- | Not valid after: 2020-06-29T23:59:59
- | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- |_ssl-date: TLS randomness does not represent time
- 993/tcp open ssl/imaps? syn-ack ttl 54
- |_ssl-date: TLS randomness does not represent time
- OS Info: Service Info: Host: server.click-grafix.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Scanning ip 138.128.160.2 (webmail.audit.gov.sd.):
- 53/tcp open domain syn-ack ttl 54 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
- 80/tcp open http syn-ack ttl 54 Apache httpd
- | http-methods:
- | Supported Methods: POST OPTIONS HEAD GET TRACE
- |_ Potentially risky methods: TRACE
- |_http-server-header: Apache
- |_http-title: Site doesn't have a title (text/html).
- 143/tcp open imap syn-ack ttl 54 Dovecot imapd
- |_imap-capabilities: IMAP4rev1 NAMESPACE AUTH=PLAIN Pre-login OK LITERAL+ IDLE capabilities more have post-login STARTTLS ENABLE SASL-IR listed ID LOGIN-REFERRALS AUTH=LOGINA0001
- |_ssl-date: TLS randomness does not represent time
- 443/tcp open ssl/http syn-ack ttl 54 Apache httpd
- | http-methods:
- |_ Supported Methods: GET HEAD
- |_http-server-header: Apache
- |_http-title: 400 Bad Request
- | ssl-cert: Subject: commonName=abaad.sd
- | Subject Alternative Name: DNS:abaad.sd, DNS:mail.abaad.sd, DNS:www.abaad.sd
- | Issuer: commonName=abaad.sd
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-08-12T11:26:16
- | Not valid after: 2018-08-12T11:26:16
- | MD5: 78ae d5d8 edd0 888b fec7 66d8 0056 3b28
- |_SHA-1: 416a 957b 5935 e3d6 4c9c 2ee7 6f20 b970 269e 26a3
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- 465/tcp open ssl/smtp syn-ack ttl 54 Exim smtpd 4.92
- | smtp-commands: server.click-grafix.com Hello nmap.scanme.org [185.232.21.119], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
- |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=server.click-grafix.com
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-06-30T00:00:00
- | Not valid after: 2020-06-29T23:59:59
- | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- |_ssl-date: TLS randomness does not represent time
- 587/tcp open smtp syn-ack ttl 54 Exim smtpd 4.92
- | smtp-commands: server.click-grafix.com Hello nmap.scanme.org [185.232.21.119], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=server.click-grafix.com
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-06-30T00:00:00
- | Not valid after: 2020-06-29T23:59:59
- | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- |_ssl-date: TLS randomness does not represent time
- 993/tcp open ssl/imaps? syn-ack ttl 54
- |_ssl-date: TLS randomness does not represent time
- OS Info: Service Info: Host: server.click-grafix.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Scanning ip 212.0.136.50 (mail.audit.gov.sd.):
- 80/tcp open http syn-ack ttl 119 Microsoft IIS httpd 8.0
- |_http-server-header: Microsoft-IIS/8.0
- |_http-title: 403 - Forbidden: Access is denied.
- 443/tcp open ssl/http syn-ack ttl 119 Microsoft IIS httpd 8.0
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Microsoft-IIS/8.0
- |_http-title: Site doesn't have a title (text/html; charset=utf-8).
- | ssl-cert: Subject: commonName=audit-sd.com/organizationName=Al Hawafiz Computer Devices LLC/countryName=AE
- | Subject Alternative Name: DNS:audit-sd.com, DNS:www.audit-sd.com
- | Issuer: commonName=DigiCert SHA2 Secure Server CA/organizationName=DigiCert Inc/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-11-06T00:00:00
- | Not valid after: 2019-11-14T12:00:00
- | MD5: 7900 0f9a 42b1 5545 7365 e29d 12a5 df9e
- |_SHA-1: 4411 685f 2b95 1e63 9741 2ad0 e021 83c1 2daa aeb4
- Device type: general purpose|WAP
- Running (JUST GUESSING): Linux 2.6.X|2.4.X (90%), Microsoft Windows 2012 (85%)
- OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- Scanning ip 138.128.160.4 (ns2.click-grafix.com (PTR)):
- 53/tcp open domain syn-ack ttl 54 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
- 80/tcp open http syn-ack ttl 54 Apache httpd
- | http-methods:
- | Supported Methods: POST OPTIONS HEAD GET TRACE
- |_ Potentially risky methods: TRACE
- |_http-server-header: Apache
- |_http-title: Site doesn't have a title (text/html).
- 143/tcp open imap syn-ack ttl 54 Dovecot imapd
- |_imap-capabilities: capabilities SASL-IR LOGIN-REFERRALS LITERAL+ listed AUTH=LOGINA0001 ID STARTTLS IMAP4rev1 NAMESPACE ENABLE OK IDLE more post-login AUTH=PLAIN have Pre-login
- |_ssl-date: TLS randomness does not represent time
- 443/tcp open ssl/http syn-ack ttl 54 Apache httpd
- | http-methods:
- | Supported Methods: POST OPTIONS HEAD GET TRACE
- |_ Potentially risky methods: TRACE
- |_http-server-header: Apache
- |_http-title: Site doesn't have a title (text/html).
- | ssl-cert: Subject: commonName=server.click-grafix.com
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-06-30T00:00:00
- | Not valid after: 2020-06-29T23:59:59
- | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- 465/tcp open ssl/smtp syn-ack ttl 54 Exim smtpd 4.92
- |_smtp-commands: SMTP EHLO nmap.scanme.org: failed to receive data: failed to receive data
- | ssl-cert: Subject: commonName=server.click-grafix.com
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-06-30T00:00:00
- | Not valid after: 2020-06-29T23:59:59
- | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- |_ssl-date: TLS randomness does not represent time
- 587/tcp open smtp syn-ack ttl 54 Exim smtpd 4.92
- | smtp-commands: server.click-grafix.com Hello nmap.scanme.org [185.232.21.119], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=server.click-grafix.com
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-06-30T00:00:00
- | Not valid after: 2020-06-29T23:59:59
- | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- |_ssl-date: TLS randomness does not represent time
- 993/tcp open ssl/imaps? syn-ack ttl 54
- |_ssl-date: TLS randomness does not represent time
- OS Info: Service Info: Host: server.click-grafix.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- WebCrawling domain's web servers... up to 50 max links.
- + URL to crawl: http://ns1.click-grafix.com
- + Date: 2019-06-30
- + Crawling URL: http://ns1.click-grafix.com:
- + Links:
- + Crawling http://ns1.click-grafix.com (REDIRECTING TO: /cgi-sys/defaultwebpage.cgi)
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: https://ns1.click-grafix.com
- + Date: 2019-06-30
- + Crawling URL: https://ns1.click-grafix.com:
- + Links:
- + Crawling https://ns1.click-grafix.com
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: http://ftp.audit.gov.sd.
- + Date: 2019-06-30
- + Crawling URL: http://ftp.audit.gov.sd.:
- + Links:
- + Crawling http://ftp.audit.gov.sd. (REDIRECTING TO: /cgi-sys/defaultwebpage.cgi)
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: http://www.audit.gov.sd.
- + Date: 2019-06-30
- + Crawling URL: http://www.audit.gov.sd.:
- + Links:
- + Crawling http://www.audit.gov.sd.
- + Crawling http://www.audit.gov.sd./maps.googleapis.com (404 Not Found)
- + Crawling http://www.audit.gov.sd./fonts.googleapis.com (404 Not Found)
- + Crawling http://www.audit.gov.sd./s.w.org (404 Not Found)
- + Crawling http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/ai1ec_parsed_css.css?ver=2.5.41 (404 Not Found)
- + Crawling http://www.audit.gov.sd./fonts.googleapis.com/css?family=Lato%3A100%2C300%2C400%2C700& (404 Not Found)
- + Crawling http://www.audit.gov.sd./fonts.googleapis.com/css?family=Oswald%3A400%2C700%2C300& (404 Not Found)
- + Crawling http://www.audit.gov.sd./fonts.googleapis.com/css?family=Open+Sans%3A400%2C600& (404 Not Found)
- + Crawling http://www.audit.gov.sd./
- + Searching for directories...
- - Found: http://www.audit.gov.sd./www.audit.gov.sd/
- - Found: http://www.audit.gov.sd./www.audit.gov.sd/wp-content/
- - Found: http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/
- - Found: http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/
- - Found: http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/
- - Found: http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/
- - Found: http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/
- - Found: http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/
- - Found: http://www.audit.gov.sd./fonts.googleapis.com/
- + Searching open folders...
- - http://www.audit.gov.sd./www.audit.gov.sd/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/ (404 Not Found)
- - http://www.audit.gov.sd./fonts.googleapis.com/ (404 Not Found)
- + Crawl finished successfully.
- ---------------------------------------------------------------------------------------------------------------------------------------
- Summary of http://http://www.audit.gov.sd.
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Links crawled:
- - http://www.audit.gov.sd.
- - http://www.audit.gov.sd./
- - http://www.audit.gov.sd./fonts.googleapis.com (404 Not Found)
- - http://www.audit.gov.sd./fonts.googleapis.com/css?family=Lato%3A100%2C300%2C400%2C700& (404 Not Found)
- - http://www.audit.gov.sd./fonts.googleapis.com/css?family=Open+Sans%3A400%2C600& (404 Not Found)
- - http://www.audit.gov.sd./fonts.googleapis.com/css?family=Oswald%3A400%2C700%2C300& (404 Not Found)
- - http://www.audit.gov.sd./maps.googleapis.com (404 Not Found)
- - http://www.audit.gov.sd./s.w.org (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/ai1ec_parsed_css.css?ver=2.5.41 (404 Not Found)
- Total links crawled: 9
- + Links to files found:
- Total links to files: 0
- + Externals links found:
- - data:image/jpeg;base64,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
- - http://gmpg.org/xfn/11
- - http://www.afrosai-e.org.za
- - http://www.afrosai.org
- - http://www.arabosai.org
- - http://www.audit.gov.sd/?
- - http://www.audit.gov.sd/?cat=27&lang=ar
- - http://www.audit.gov.sd/?cat=28&lang=ar
- - http://www.audit.gov.sd/?cat=33&lang=ar
- - http://www.audit.gov.sd/?cat=35&lang=ar
- - http://www.audit.gov.sd/?cat=5&lang=ar
- - http://www.audit.gov.sd/?cat=56&lang=ar
- - http://www.audit.gov.sd/?cat=57&lang=ar
- - http://www.audit.gov.sd/?cat=59&lang=ar
- - http://www.audit.gov.sd/?cat=6&lang=ar
- - http://www.audit.gov.sd/?lang=ar
- - http://www.audit.gov.sd/?lang=ar&
- - http://www.audit.gov.sd/?p=2197&
- - http://www.audit.gov.sd/?p=2197&lang=ar
- - http://www.audit.gov.sd/?p=2260&
- - http://www.audit.gov.sd/?p=2260&lang=ar
- - http://www.audit.gov.sd/?p=2482&
- - http://www.audit.gov.sd/?p=2482&lang=ar
- - http://www.audit.gov.sd/?p=2737&
- - http://www.audit.gov.sd/?p=2737&lang=ar
- - http://www.audit.gov.sd/?p=3027&
- - http://www.audit.gov.sd/?p=3076&
- - http://www.audit.gov.sd/?p=3076&lang=ar
- - http://www.audit.gov.sd/?p=3096&
- - http://www.audit.gov.sd/?p=3096&lang=ar
- - http://www.audit.gov.sd/?p=3098&
- - http://www.audit.gov.sd/?p=3098&lang=ar
- - http://www.audit.gov.sd/?p=3105&
- - http://www.audit.gov.sd/?p=3105&lang=ar
- - http://www.audit.gov.sd/?p=3123&
- - http://www.audit.gov.sd/?p=3123&lang=ar
- - http://www.audit.gov.sd/?p=3133&
- - http://www.audit.gov.sd/?p=3133&lang=ar
- - http://www.audit.gov.sd/?p=3145&
- - http://www.audit.gov.sd/?p=3145&lang=ar
- - http://www.audit.gov.sd/?p=3159&
- - http://www.audit.gov.sd/?p=3159&lang=ar
- - http://www.audit.gov.sd/?p=3169&
- - http://www.audit.gov.sd/?p=3169&lang=ar
- - http://www.audit.gov.sd/?p=3186&
- - http://www.audit.gov.sd/?p=3186&lang=ar
- - http://www.audit.gov.sd/?p=3195&
- - http://www.audit.gov.sd/?p=3195&lang=ar
- - http://www.audit.gov.sd/?p=3206&
- - http://www.audit.gov.sd/?p=3206&lang=ar
- - http://www.audit.gov.sd/?p=3483&
- - http://www.audit.gov.sd/?p=3489&
- - http://www.audit.gov.sd/?p=3500&
- - http://www.audit.gov.sd/?p=3506&
- - http://www.audit.gov.sd/?p=3512&
- - http://www.audit.gov.sd/?p=3524&
- - http://www.audit.gov.sd/?p=3529&
- - http://www.audit.gov.sd/?p=3533&
- - http://www.audit.gov.sd/?p=3538&
- - http://www.audit.gov.sd/?p=3542&
- - http://www.audit.gov.sd/?p=3544&
- - http://www.audit.gov.sd/?p=3551&
- - http://www.audit.gov.sd/?p=3558&
- - http://www.audit.gov.sd/?p=3559&
- - http://www.audit.gov.sd/?p=3564&
- - http://www.audit.gov.sd/?p=3642&
- - http://www.audit.gov.sd/?p=3642&lang=ar
- - http://www.audit.gov.sd/?p=3657&
- - http://www.audit.gov.sd/?p=3657&lang=ar
- - http://www.audit.gov.sd/?p=3686&
- - http://www.audit.gov.sd/?p=3686&lang=ar
- - http://www.audit.gov.sd/?p=3702&
- - http://www.audit.gov.sd/?p=3702&lang=ar
- - http://www.audit.gov.sd/?page_id=212&lang=ar
- - http://www.audit.gov.sd/?page_id=215&lang=ar
- - http://www.audit.gov.sd/?page_id=227&lang=ar
- - http://www.audit.gov.sd/?page_id=232&lang=ar
- - http://www.audit.gov.sd/?page_id=236&lang=ar
- - http://www.audit.gov.sd/?page_id=2612&lang=ar
- - http://www.audit.gov.sd/?page_id=3057&lang=ar
- - http://www.audit.gov.sd/?page_id=3230&lang=ar
- - http://www.audit.gov.sd/?page_id=3253&lang=ar
- - http://www.audit.gov.sd/?page_id=3290&lang=ar
- - http://www.audit.gov.sd/?page_id=3299&lang=ar
- - http://www.audit.gov.sd/?page_id=3301&lang=ar
- - http://www.audit.gov.sd/?page_id=3306&lang=ar
- - http://www.audit.gov.sd/?page_id=3310&lang=ar
- - http://www.audit.gov.sd/?page_id=3314&lang=ar
- - http://www.audit.gov.sd/?page_id=3318&lang=ar
- - http://www.audit.gov.sd/?page_id=3330&lang=ar
- - http://www.audit.gov.sd/?page_id=3338&lang=ar
- - http://www.audit.gov.sd/?page_id=3349&lang=ar
- - http://www.audit.gov.sd/?page_id=3356&lang=ar
- - http://www.audit.gov.sd/?page_id=3362&lang=ar
- - http://www.audit.gov.sd/?page_id=3388&lang=ar
- - http://www.audit.gov.sd/?page_id=3393&lang=ar
- - http://www.audit.gov.sd/?page_id=3409&lang=ar
- - http://www.audit.gov.sd/?page_id=3627&lang=ar
- - http://www.audit.gov.sd/?page_id=562&lang=ar
- - http://www.audit.gov.sd/wp-content/plugins/ads-wp-site-count/css/styles.css?ver=5.1.1
- - http://www.audit.gov.sd/wp-content/plugins/awesome-weather/awesome-weather.css?ver=5.1.1
- - http://www.audit.gov.sd/wp-content/plugins/contact-form-7/includes/css/styles-rtl.css?ver=5.1.3
- - http://www.audit.gov.sd/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=5.1.3
- - http://www.audit.gov.sd/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.1.3
- - http://www.audit.gov.sd/wp-content/plugins/easy-weather-widget/css/style.min.css?ver=5.1.1
- - http://www.audit.gov.sd/wp-content/plugins/everest-forms/assets/css/everest-forms-rtl.css?ver=1.4.8
- - http://www.audit.gov.sd/wp-content/plugins/jm-breaking-news//css/breaking-news-style.css?ver=5.1.1
- - http://www.audit.gov.sd/wp-content/plugins/job-manager/css/display.css?ver=0.7.25
- - http://www.audit.gov.sd/wp-content/plugins/job-manager/js/display.js?ver=0.7.25
- - http://www.audit.gov.sd/wp-content/plugins/multilanguage/css/style.css?ver=1.3.3
- - http://www.audit.gov.sd/wp-content/plugins/page-visit-counter/public/css/counter-style.css?ver=5.1.1
- - http://www.audit.gov.sd/wp-content/plugins/page-visit-counter/public/js/custom.js?ver=1.0.0
- - http://www.audit.gov.sd/wp-content/plugins/sassy-social-share/public/css/sassy-social-share-public.css?ver=3.2.24
- - http://www.audit.gov.sd/wp-content/plugins/sassy-social-share/public/js/sassy-social-share-public.js?ver=3.2.24
- - http://www.audit.gov.sd/wp-content/plugins/shortcodes-ultimate/assets/css/rtl-shortcodes.css?ver=5.3.0
- - http://www.audit.gov.sd/wp-content/plugins/wp-advanced-pdf/asset/css/front_end.css?ver=1.1.5
- - http://www.audit.gov.sd/wp-content/plugins/wp-advanced-pdf/asset/js/ajaxsave.js?ver=1.1.5
- - http://www.audit.gov.sd/wp-content/plugins/wp-spry-menu/SpryAssets/SpryMenuBar.js?ver=1.5.2
- - http://www.audit.gov.sd/wp-content/plugins/wp-spry-menu/SpryAssets/global.css?ver=1.5.2
- - http://www.audit.gov.sd/wp-content/plugins/wp-spry-menu/themes/silver/style.css?ver=1.5.2
- - http://www.audit.gov.sd/wp-content/plugins/wp-symposium-toolbar/css/wp-symposium-toolbar_admin.css?ver=3223
- - http://www.audit.gov.sd/wp-content/themes/colormag/fontawesome/css/font-awesome.css?ver=4.2.1
- - http://www.audit.gov.sd/wp-content/themes/colormag/js/colormag-custom.js?ver=5.1.1
- - http://www.audit.gov.sd/wp-content/themes/colormag/js/fitvids/jquery.fitvids.js?ver=20150311
- - http://www.audit.gov.sd/wp-content/themes/colormag/js/html5shiv.min.js?ver=5.1.1
- - http://www.audit.gov.sd/wp-content/themes/colormag/js/jquery.bxslider.min.js?ver=4.2.10
- - http://www.audit.gov.sd/wp-content/themes/colormag/js/magnific-popup/jquery.magnific-popup.min.js?ver=20150310
- - http://www.audit.gov.sd/wp-content/themes/colormag/js/magnific-popup/magnific-popup.css?ver=20150310
- - http://www.audit.gov.sd/wp-content/themes/colormag/js/navigation.js?ver=5.1.1
- - http://www.audit.gov.sd/wp-content/themes/colormag/js/news-ticker/jquery.newsTicker.min.js?ver=1.0.0
- - http://www.audit.gov.sd/wp-content/themes/colormag/js/sticky/jquery.sticky.js?ver=20150309
- - http://www.audit.gov.sd/wp-content/themes/colormag/rtl.css
- - http://www.audit.gov.sd/wp-content/themes/colormag/style.css?ver=5.1.1
- - http://www.audit.gov.sd/wp-content/uploads/2018/03/AfroSAI.png
- - http://www.audit.gov.sd/wp-content/uploads/2018/03/INTOSAI.png
- - http://www.audit.gov.sd/wp-content/uploads/2018/03/arabosai-logo-1.png
- - http://www.audit.gov.sd/wp-content/uploads/2018/03/cropped-nac-1-180x180.png
- - http://www.audit.gov.sd/wp-content/uploads/2018/03/cropped-nac-1-192x192.png
- - http://www.audit.gov.sd/wp-content/uploads/2018/03/cropped-nac-1-32x32.png
- - http://www.audit.gov.sd/wp-content/uploads/2018/03/information-technology-related-services-500x500-130x90.png
- - http://www.audit.gov.sd/wp-content/uploads/2018/04/IT-Audit-Risk-Assessment1-130x90.jpeg
- - http://www.audit.gov.sd/wp-content/uploads/2018/06/workshop3-130x90.jpg
- - http://www.audit.gov.sd/wp-content/uploads/2018/07/afrosai.png
- - http://www.audit.gov.sd/wp-content/uploads/2018/08/WhatsApp-Image-2018-08-14-at-2.32.09-PM-392x272.jpeg
- - http://www.audit.gov.sd/wp-content/uploads/2018/11/sharaka_815-792x445.jpg
- - http://www.audit.gov.sd/wp-content/uploads/2018/11/the_hague.png
- - http://www.audit.gov.sd/wp-content/uploads/2018/12/2480-392x272.jpg
- - http://www.audit.gov.sd/wp-content/uploads/2019/01/4897-800x445.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/01/Saudi-Audit-Berue-large-800x445.jpg
- - http://www.audit.gov.sd/wp-content/uploads/2019/01/Sudan_Saudia-130x90.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/01/Sudan_Saudia-800x445.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/01/arabosai-390x205.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/01/signing-780x445.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/02/1-392x272.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/02/ICBF-regional-workshop-800x445.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/02/Qatar_sudan-130x90.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/02/Qatar_sudan-800x445.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/03/Audit_BG-1.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/03/DAG_MNoor-1-392x272.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/03/Dag_aa-800x445.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/03/IDI-130x90.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/03/IDI-800x445.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/03/Parliament-800x445.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/03/ads_1.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/03/cropped-logoNAC.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/03/integrity_unit-390x205.png
- - http://www.audit.gov.sd/wp-content/uploads/2019/03/integrity_unit-800x445.png
- - http://www.audit.gov.sd/wp-content/uploads/multilanguage/ar.png
- - http://www.audit.gov.sd/wp-content/uploads/multilanguage/en_US.png
- - http://www.audit.gov.sd/wp-content/uploads/useanyfont/uaf.css?ver=1556005162
- - http://www.audit.gov.sd/wp-includes/css/dashicons.min.css?ver=5.1.1
- - http://www.audit.gov.sd/wp-includes/css/dist/block-library/style-rtl.min.css?ver=5.1.1
- - http://www.audit.gov.sd/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
- - http://www.audit.gov.sd/wp-includes/js/jquery/jquery.js?ver=1.12.4
- - http://www.audit.gov.sd/wp-includes/js/jquery/ui/core.min.js?ver=1.11.4
- - http://www.audit.gov.sd/wp-includes/js/jquery/ui/datepicker.min.js?ver=1.11.4
- - http://www.audit.gov.sd/wp-includes/js/thickbox/thickbox.css?ver=5.1.1
- - http://www.audit.gov.sd/wp-includes/js/thickbox/thickbox.js?ver=3.1-20121105
- - http://www.audit.gov.sd/wp-includes/js/wp-embed.min.js?ver=5.1.1
- - http://www.audit.gov.sd/wp-includes/wlwmanifest.xml
- - http://www.audit.gov.sd/xmlrpc.php?rsd
- - http://www.audit.gov.sd?lang=ar%2Findex.php&
- - http://www.intosai.org
- - https://fonts.googleapis.com/css?family=Open+Sans%3A400%2C300&
- - https://maps.googleapis.com/maps/api/js?key=AIzaSyD0xqmUYoR-r3Hqmb2TKqd74F6Q2CEBrRk&
- - https://plus.google.com/112988279842067073128
- - https://themegrill.com/themes/colormag
- - https://web.facebook.com/SudanAuditChamber/?ref=aymt_homepage_panel
- - https://wordpress.org
- - https://www.youtube.com/channel/UCl5Q-D82P_4bXy87aoqdNvg
- Total external links: 190
- + Email addresses found:
- Total email address found: 0
- + Directories found:
- - http://www.audit.gov.sd./fonts.googleapis.com/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/ (404 Not Found)
- - http://www.audit.gov.sd./www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/ (404 Not Found)
- Total directories: 9
- + Directory indexing found:
- Total directories with indexing: 0
- ---------------------------------------------------------------------------------------------------------------------------------------
- + URL to crawl: http://webmail.audit.gov.sd.
- + Date: 2019-06-30
- + Crawling URL: http://webmail.audit.gov.sd.:
- + Links:
- + Crawling http://webmail.audit.gov.sd.
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: https://ftp.audit.gov.sd.
- + Date: 2019-06-30
- + Crawling URL: https://ftp.audit.gov.sd.:
- + Links:
- + Crawling https://ftp.audit.gov.sd. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: https://www.audit.gov.sd.
- + Date: 2019-06-30
- + Crawling URL: https://www.audit.gov.sd.:
- + Links:
- + Crawling https://www.audit.gov.sd. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: https://webmail.audit.gov.sd.
- + Date: 2019-06-30
- + Crawling URL: https://webmail.audit.gov.sd.:
- + Links:
- + Crawling https://webmail.audit.gov.sd.
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: http://mail.audit.gov.sd
- + Date: 2019-06-30
- + Crawling URL: http://mail.audit.gov.sd:
- + Links:
- + Crawling http://mail.audit.gov.sd (403 Forbidden)
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: http://mail.audit.gov.sd.
- + Date: 2019-06-30
- + Crawling URL: http://mail.audit.gov.sd.:
- + Links:
- + Crawling http://mail.audit.gov.sd. (400 Bad Request)
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: https://mail.audit.gov.sd
- + Date: 2019-06-30
- + Crawling URL: https://mail.audit.gov.sd:
- + Links:
- + Crawling https://mail.audit.gov.sd
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: https://mail.audit.gov.sd.
- + Date: 2019-06-30
- + Crawling URL: https://mail.audit.gov.sd.:
- + Links:
- + Crawling https://mail.audit.gov.sd.
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: http://ns2.click-grafix.com
- + Date: 2019-06-30
- + Crawling URL: http://ns2.click-grafix.com:
- + Links:
- + Crawling http://ns2.click-grafix.com (REDIRECTING TO: /cgi-sys/defaultwebpage.cgi)
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: https://ns2.click-grafix.com
- + Date: 2019-06-30
- + Crawling URL: https://ns2.click-grafix.com:
- + Links:
- + Crawling https://ns2.click-grafix.com
- + Searching for directories...
- + Searching open folders...
- --Finished--
- Summary information for domain audit.gov.sd.
- ---------------------------------------------------------------------------------------------------------------------------------------
- Domain Specific Information:
- Email: eltahir@audit.gov.sd.
- Email: info@audit.gov.sd
- Email: eltahir@audit.gov.sd&
- Email: info@audit.gov.sd&
- Email: ahamid@audit.gov.sd,
- Email: ahamid@audit.gov.sd.
- Domain Ips Information:
- IP: 138.128.160.3
- HostName: ns1.click-grafix.com Type: NS
- HostName: ns1.click-grafix.com Type: PTR
- Country: United States
- Is Active: True (reset ttl 64)
- Port: 53/tcp open domain syn-ack ttl 54 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- Script Info: | dns-nsid:
- Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
- Port: 80/tcp open http syn-ack ttl 54 Apache httpd
- Script Info: | http-methods:
- Script Info: | Supported Methods: POST OPTIONS HEAD GET TRACE
- Script Info: |_ Potentially risky methods: TRACE
- Script Info: |_http-server-header: Apache
- Script Info: |_http-title: Site doesn't have a title (text/html).
- Port: 143/tcp open imap syn-ack ttl 54 Dovecot imapd
- Script Info: |_imap-capabilities: AUTH=PLAIN LOGIN-REFERRALS have IMAP4rev1 ENABLE OK more NAMESPACE Pre-login capabilities IDLE post-login listed STARTTLS AUTH=LOGINA0001 LITERAL+ ID SASL-IR
- Script Info: |_ssl-date: TLS randomness does not represent time
- Port: 443/tcp open ssl/http syn-ack ttl 54 Apache httpd
- Script Info: | http-methods:
- Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
- Script Info: |_http-server-header: Apache
- Script Info: |_http-title: Site doesn't have a title (text/html).
- Script Info: | ssl-cert: Subject: commonName=server.click-grafix.com
- Script Info: | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- Script Info: | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2019-06-30T00:00:00
- Script Info: | Not valid after: 2020-06-29T23:59:59
- Script Info: | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- Script Info: |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- Script Info: |_ssl-date: TLS randomness does not represent time
- Port: 465/tcp open ssl/smtp syn-ack ttl 54 Exim smtpd 4.92
- Script Info: | smtp-commands: server.click-grafix.com Hello nmap.scanme.org [185.232.21.119], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
- Script Info: |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- Script Info: | ssl-cert: Subject: commonName=server.click-grafix.com
- Script Info: | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- Script Info: | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2019-06-30T00:00:00
- Script Info: | Not valid after: 2020-06-29T23:59:59
- Script Info: | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- Script Info: |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- Script Info: |_ssl-date: TLS randomness does not represent time
- Port: 587/tcp open smtp syn-ack ttl 54 Exim smtpd 4.92
- Script Info: | smtp-commands: server.click-grafix.com Hello nmap.scanme.org [185.232.21.119], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- Script Info: | ssl-cert: Subject: commonName=server.click-grafix.com
- Script Info: | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- Script Info: | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2019-06-30T00:00:00
- Script Info: | Not valid after: 2020-06-29T23:59:59
- Script Info: | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- Script Info: |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- Script Info: |_ssl-date: TLS randomness does not represent time
- Port: 993/tcp open ssl/imaps? syn-ack ttl 54
- Script Info: |_ssl-date: TLS randomness does not represent time
- Os Info: Host: server.click-grafix.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- IP: 138.128.160.2
- HostName: www.audit.gov.sd. Type: A
- HostName: ftp.audit.gov.sd. Type: A
- HostName: server.click-grafix.com Type: PTR
- HostName: webmail.audit.gov.sd. Type: A
- Country: United States
- Is Active: True (reset ttl 64)
- Port: 53/tcp open domain syn-ack ttl 54 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- Script Info: | dns-nsid:
- Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
- Port: 80/tcp open http syn-ack ttl 54 Apache httpd
- Script Info: | http-methods:
- Script Info: | Supported Methods: POST OPTIONS HEAD GET TRACE
- Script Info: |_ Potentially risky methods: TRACE
- Script Info: |_http-server-header: Apache
- Script Info: |_http-title: Site doesn't have a title (text/html).
- Port: 143/tcp open imap syn-ack ttl 54 Dovecot imapd
- Script Info: |_imap-capabilities: IMAP4rev1 NAMESPACE AUTH=PLAIN Pre-login OK LITERAL+ IDLE capabilities more have post-login STARTTLS ENABLE SASL-IR listed ID LOGIN-REFERRALS AUTH=LOGINA0001
- Script Info: |_ssl-date: TLS randomness does not represent time
- Port: 443/tcp open ssl/http syn-ack ttl 54 Apache httpd
- Script Info: | http-methods:
- Script Info: |_ Supported Methods: GET HEAD
- Script Info: |_http-server-header: Apache
- Script Info: |_http-title: 400 Bad Request
- Script Info: | ssl-cert: Subject: commonName=abaad.sd
- Script Info: | Subject Alternative Name: DNS:abaad.sd, DNS:mail.abaad.sd, DNS:www.abaad.sd
- Script Info: | Issuer: commonName=abaad.sd
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2017-08-12T11:26:16
- Script Info: | Not valid after: 2018-08-12T11:26:16
- Script Info: | MD5: 78ae d5d8 edd0 888b fec7 66d8 0056 3b28
- Script Info: |_SHA-1: 416a 957b 5935 e3d6 4c9c 2ee7 6f20 b970 269e 26a3
- Script Info: |_ssl-date: TLS randomness does not represent time
- Script Info: | tls-alpn:
- Port: 465/tcp open ssl/smtp syn-ack ttl 54 Exim smtpd 4.92
- Script Info: | smtp-commands: server.click-grafix.com Hello nmap.scanme.org [185.232.21.119], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
- Script Info: |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- Script Info: | ssl-cert: Subject: commonName=server.click-grafix.com
- Script Info: | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- Script Info: | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2019-06-30T00:00:00
- Script Info: | Not valid after: 2020-06-29T23:59:59
- Script Info: | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- Script Info: |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- Script Info: |_ssl-date: TLS randomness does not represent time
- Port: 587/tcp open smtp syn-ack ttl 54 Exim smtpd 4.92
- Script Info: | smtp-commands: server.click-grafix.com Hello nmap.scanme.org [185.232.21.119], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- Script Info: | ssl-cert: Subject: commonName=server.click-grafix.com
- Script Info: | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- Script Info: | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2019-06-30T00:00:00
- Script Info: | Not valid after: 2020-06-29T23:59:59
- Script Info: | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- Script Info: |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- Script Info: |_ssl-date: TLS randomness does not represent time
- Port: 993/tcp open ssl/imaps? syn-ack ttl 54
- Script Info: |_ssl-date: TLS randomness does not represent time
- Os Info: Host: server.click-grafix.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- IP: 212.0.136.50
- HostName: mail.audit.gov.sd Type: MX
- HostName: mail.audit.gov.sd Type: PTR
- HostName: mail.audit.gov.sd. Type: A
- Country: Sudan
- Is Active: True (reset ttl 64)
- Port: 80/tcp open http syn-ack ttl 119 Microsoft IIS httpd 8.0
- Script Info: |_http-server-header: Microsoft-IIS/8.0
- Script Info: |_http-title: 403 - Forbidden: Access is denied.
- Port: 443/tcp open ssl/http syn-ack ttl 119 Microsoft IIS httpd 8.0
- Script Info: | http-methods:
- Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
- Script Info: |_http-server-header: Microsoft-IIS/8.0
- Script Info: |_http-title: Site doesn't have a title (text/html; charset=utf-8).
- Script Info: | ssl-cert: Subject: commonName=audit-sd.com/organizationName=Al Hawafiz Computer Devices LLC/countryName=AE
- Script Info: | Subject Alternative Name: DNS:audit-sd.com, DNS:www.audit-sd.com
- Script Info: | Issuer: commonName=DigiCert SHA2 Secure Server CA/organizationName=DigiCert Inc/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2018-11-06T00:00:00
- Script Info: | Not valid after: 2019-11-14T12:00:00
- Script Info: | MD5: 7900 0f9a 42b1 5545 7365 e29d 12a5 df9e
- Script Info: |_SHA-1: 4411 685f 2b95 1e63 9741 2ad0 e021 83c1 2daa aeb4
- Script Info: Device type: general purpose|WAP
- Script Info: Running (JUST GUESSING): Linux 2.6.X|2.4.X (90%), Microsoft Windows 2012 (85%)
- Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- IP: 138.128.160.4
- HostName: ns2.click-grafix.com Type: NS
- HostName: ns2.click-grafix.com Type: PTR
- Country: United States
- Is Active: True (reset ttl 64)
- Port: 53/tcp open domain syn-ack ttl 54 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- Script Info: | dns-nsid:
- Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
- Port: 80/tcp open http syn-ack ttl 54 Apache httpd
- Script Info: | http-methods:
- Script Info: | Supported Methods: POST OPTIONS HEAD GET TRACE
- Script Info: |_ Potentially risky methods: TRACE
- Script Info: |_http-server-header: Apache
- Script Info: |_http-title: Site doesn't have a title (text/html).
- Port: 143/tcp open imap syn-ack ttl 54 Dovecot imapd
- Script Info: |_imap-capabilities: capabilities SASL-IR LOGIN-REFERRALS LITERAL+ listed AUTH=LOGINA0001 ID STARTTLS IMAP4rev1 NAMESPACE ENABLE OK IDLE more post-login AUTH=PLAIN have Pre-login
- Script Info: |_ssl-date: TLS randomness does not represent time
- Port: 443/tcp open ssl/http syn-ack ttl 54 Apache httpd
- Script Info: | http-methods:
- Script Info: | Supported Methods: POST OPTIONS HEAD GET TRACE
- Script Info: |_ Potentially risky methods: TRACE
- Script Info: |_http-server-header: Apache
- Script Info: |_http-title: Site doesn't have a title (text/html).
- Script Info: | ssl-cert: Subject: commonName=server.click-grafix.com
- Script Info: | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- Script Info: | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2019-06-30T00:00:00
- Script Info: | Not valid after: 2020-06-29T23:59:59
- Script Info: | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- Script Info: |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- Script Info: |_ssl-date: TLS randomness does not represent time
- Script Info: | tls-alpn:
- Port: 465/tcp open ssl/smtp syn-ack ttl 54 Exim smtpd 4.92
- Script Info: |_smtp-commands: SMTP EHLO nmap.scanme.org: failed to receive data: failed to receive data
- Script Info: | ssl-cert: Subject: commonName=server.click-grafix.com
- Script Info: | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- Script Info: | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2019-06-30T00:00:00
- Script Info: | Not valid after: 2020-06-29T23:59:59
- Script Info: | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- Script Info: |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- Script Info: |_ssl-date: TLS randomness does not represent time
- Port: 587/tcp open smtp syn-ack ttl 54 Exim smtpd 4.92
- Script Info: | smtp-commands: server.click-grafix.com Hello nmap.scanme.org [185.232.21.119], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- Script Info: | ssl-cert: Subject: commonName=server.click-grafix.com
- Script Info: | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- Script Info: | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2019-06-30T00:00:00
- Script Info: | Not valid after: 2020-06-29T23:59:59
- Script Info: | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- Script Info: |_SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- Script Info: |_ssl-date: TLS randomness does not represent time
- Port: 993/tcp open ssl/imaps? syn-ack ttl 54
- Script Info: |_ssl-date: TLS randomness does not represent time
- Os Info: Host: server.click-grafix.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- www.audit.gov.sd -----
- Host's addresses:
- __________________
- audit.gov.sd. 10625 IN A 138.128.160.2
- Name Servers:
- ______________
- ns1.click-grafix.com. 11908 IN A 138.128.160.3
- ns2.click-grafix.com. 11908 IN A 138.128.160.4
- Mail (MX) Servers:
- ___________________
- mail.audit.gov.sd. 11903 IN A 212.0.136.50
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for www.audit.gov.sd on ns1.click-grafix.com ...
- Trying Zone Transfer for www.audit.gov.sd on ns2.click-grafix.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- ===============================================
- -=Subfinder v1.1.3 github.com/subfinder/subfinder
- ===============================================
- Running Source: Ask
- Running Source: Archive.is
- Running Source: Baidu
- Running Source: Bing
- Running Source: CertDB
- Running Source: CertificateTransparency
- Running Source: Certspotter
- Running Source: Commoncrawl
- Running Source: Crt.sh
- Running Source: Dnsdb
- Running Source: DNSDumpster
- Running Source: DNSTable
- Running Source: Dogpile
- Running Source: Exalead
- Running Source: Findsubdomains
- Running Source: Googleter
- Running Source: Hackertarget
- Running Source: Ipv4Info
- Running Source: PTRArchive
- Running Source: Sitedossier
- Running Source: Threatcrowd
- Running Source: ThreatMiner
- Running Source: WaybackArchive
- Running Source: Yahoo
- Running enumeration on www.audit.gov.sd
- dnsdb: Unexpected return status 503
- ipv4info: <nil>
- waybackarchive: parse http://web.archive.org/cdx/search/cdx?url=*.www.audit.gov.sd/*&output=json&fl=original&collapse=urlkey&page=: net/url: invalid control character in URL
- dogpile: Get https://www.dogpile.com/search/web?q=www.audit.gov.sd&qsi=1: EOF
- Starting Bruteforcing of www.audit.gov.sd with 9985 words
- Total 1 Unique subdomains found for www.audit.gov.sd
- .www.audit.gov.sd
- #######################################################################################################################################
- [*] Processing domain www.audit.gov.sd
- [*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a', '192.168.0.1']
- [+] Getting nameservers
- 138.128.160.4 - ns2.click-grafix.com
- 138.128.160.3 - ns1.click-grafix.com
- [-] Zone transfer failed
- [+] MX records found, added to target list
- 0 mail.audit.gov.sd.
- [*] Scanning www.audit.gov.sd for A records
- 138.128.160.2 - www.audit.gov.sd
- #######################################################################################################################################
- [+] www.audit.gov.sd has no SPF record!
- [*] No DMARC record found. Looking for organizational record
- [*] Found organizational DMARC record:
- [*] v=DMARC1;p=none;sp=none;adkim=r;aspf=r;pct=100;fo=0;rf=afrf;ri=86400
- [+] Organizational subdomain policy set to none
- [+] Spoofing possible for www.audit.gov.sd!
- #######################################################################################################################################
- dig: '.www.audit.gov.sd' is not a legal name (empty label)
- SubOver v.1.2 Nizamul Rana (@Ice3man)
- ==================================================
- [~] Enjoy your hunt !
- [Not Vulnerable] .www.audit.gov.sd
- [Not Vulnerable] 128.65.195.96
- [Not Vulnerable] 141.105.65.111
- [Not Vulnerable] 107.154.85.17
- [Not Vulnerable] 77.104.162.243
- [Not Vulnerable] 67.225.171.176
- [Not Vulnerable] domain
- [Not Vulnerable] www.albetaqa.site
- [Not Vulnerable] www.sudan-tourism.gov.sd
- [Not Vulnerable] www.chechensinsyria.com
- [Not Vulnerable] www.banque-comores.km
- [Not Vulnerable] www.audit.gov.sd
- [Not Vulnerable] islam-iea.com
- #######################################################################################################################################
- INFO[0000] Starting to process queue....
- INFO[0000] Starting to process permutations....
- INFO[0000] FORBIDDEN http://ldap-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://oracle-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://cf-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://mysql-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://sec-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://dns-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://audit-backup.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://ios-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://audit-s3.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://audit-reports.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://dynamo-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://ec2-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://audit-staging.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://backup-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://audit-elb.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://audit-testing.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0000] FORBIDDEN http://audit-logs.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://aws-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-data.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-scripts.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://devops-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://internal-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://ops-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-test.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://stage-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://elb-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://iam-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://security-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://media-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://dev-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-lambda.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-iam.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://billing-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://rds-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-oracle.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-aws.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://admin-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://bucket-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-bucket.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-billing.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://syslog-audit.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-temp.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-docker.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://audit-tmp.s3.amazonaws.com (http://audit.gov.sd)
- INFO[0001] FORBIDDEN http://cluster-audit.s3.amazonaws.com (http://audit.gov.sd)
- #######################################################################################################################################
- 5.226.173.0/24
- 8.10.120.0/24
- 8.19.188.0/22
- 8.33.160.0/20
- 23.92.60.0/23
- 23.239.129.0/24
- 23.239.130.0/24
- 23.239.132.0/24
- 23.239.134.0/24
- 23.239.135.0/24
- 23.239.140.0/24
- 23.239.145.0/24
- 23.239.146.0/24
- 23.239.150.0/24
- 23.239.151.0/24
- 23.239.157.0/24
- 23.239.159.0/24
- 23.249.224.0/23
- 45.59.16.0/24
- 45.59.31.0/24
- 63.142.244.0/23
- 63.142.246.0/23
- 64.37.48.0/20
- 64.132.144.0/24
- 65.248.144.0/24
- 66.7.192.0/19
- 66.193.174.0/23
- 66.193.230.0/23
- 66.194.40.0/23
- 66.194.152.0/23
- 66.194.238.0/23
- 66.195.16.0/22
- 66.195.16.0/24
- 66.195.17.0/24
- 66.195.18.0/24
- 66.195.19.0/24
- 66.195.124.0/22
- 66.195.124.0/24
- 66.195.125.0/24
- 66.195.126.0/24
- 66.195.127.0/24
- 66.195.240.0/22
- 66.195.240.0/24
- 66.195.241.0/24
- 66.195.242.0/24
- 66.195.243.0/24
- 66.195.252.0/24
- 67.23.224.0/19
- 67.23.224.0/20
- 67.23.224.0/21
- 67.23.232.0/22
- 67.23.236.0/23
- 67.23.238.0/24
- 67.23.239.0/24
- 69.80.224.0/20
- 72.29.64.0/19
- 72.29.76.0/24
- 72.53.192.0/24
- 72.53.194.0/24
- 72.53.200.0/24
- 72.53.201.0/24
- 72.53.202.0/24
- 86.111.176.0/20
- 86.111.176.0/22
- 86.111.180.0/23
- 86.111.182.0/23
- 86.111.184.0/21
- 103.13.240.0/22
- 103.13.240.0/24
- 103.13.241.0/24
- 103.13.242.0/24
- 103.13.243.0/24
- 104.37.58.0/24
- 104.200.141.0/24
- 104.200.144.0/24
- 104.200.232.0/22
- 104.237.10.0/24
- 104.237.12.0/24
- 104.237.15.0/24
- 104.251.80.0/24
- 104.251.89.0/24
- 104.251.212.0/23
- 104.251.220.0/24
- 104.251.221.0/24
- 107.161.176.0/20
- 107.161.176.0/21
- 107.161.184.0/24
- 107.161.185.0/24
- 107.161.186.0/23
- 107.161.188.0/22
- 107.190.128.0/20
- 107.190.128.0/22
- 107.190.132.0/24
- 107.190.133.0/24
- 107.190.134.0/24
- 107.190.135.0/24
- 107.190.136.0/21
- 109.73.160.0/24
- 109.73.162.0/24
- 109.73.163.0/24
- 109.73.165.0/24
- 109.73.167.0/24
- 109.73.171.0/24
- 109.73.174.0/24
- 129.75.0.0/18
- 129.75.64.0/24
- 129.75.67.0/24
- 129.75.72.0/21
- 129.75.80.0/21
- 129.75.88.0/21
- 129.75.96.0/21
- 129.75.96.0/20
- 129.75.104.0/21
- 129.75.120.0/21
- 129.75.128.0/21
- 129.75.140.0/22
- 129.75.152.0/21
- 129.75.168.0/21
- 129.75.192.0/18
- 129.134.32.0/21
- 129.134.40.0/21
- 129.134.48.0/21
- 129.134.56.0/21
- 129.134.64.0/19
- 129.134.96.0/19
- 129.134.128.0/20
- 129.134.144.0/20
- 129.134.160.0/20
- 129.134.208.0/21
- 129.134.224.0/19
- 138.121.200.0/22
- 138.121.200.0/23
- 138.121.202.0/24
- 138.121.203.0/24
- 138.128.160.0/19
- 138.128.160.0/21
- 138.128.168.0/24
- 138.128.169.0/24
- 138.128.170.0/23
- 138.128.172.0/24
- 138.128.173.0/24
- 138.128.174.0/23
- 138.128.176.0/24
- 138.128.177.0/24
- 138.128.178.0/23
- 138.128.180.0/24
- 138.128.181.0/24
- 138.128.182.0/24
- 138.128.183.0/24
- 138.128.184.0/24
- 138.128.185.0/24
- 138.128.186.0/23
- 138.128.188.0/22
- 143.255.56.0/23
- 143.255.58.0/24
- 143.255.59.0/24
- 156.236.26.0/24
- 156.236.27.0/24
- 162.221.184.0/21
- 162.221.184.0/22
- 162.221.188.0/24
- 162.221.189.0/24
- 162.221.190.0/23
- 172.111.134.0/24
- 177.234.144.0/24
- 177.234.144.0/21
- 177.234.145.0/24
- 177.234.146.0/24
- 177.234.147.0/24
- 177.234.148.0/24
- 177.234.149.0/24
- 177.234.150.0/24
- 177.234.151.0/24
- 177.234.152.0/24
- 177.234.153.0/24
- 177.234.154.0/24
- 177.234.155.0/24
- 177.234.156.0/24
- 177.234.156.0/22
- 177.234.157.0/24
- 177.234.158.0/24
- 177.234.159.0/24
- 179.48.64.0/19
- 179.61.252.0/24
- 179.191.176.0/24
- 181.41.195.0/24
- 184.171.240.0/20
- 185.7.80.0/22
- 185.34.40.0/24
- 185.38.44.0/22
- 185.183.182.0/24
- 185.185.126.0/24
- 185.185.127.0/24
- 185.189.27.0/24
- 186.224.107.0/24
- 186.227.192.0/24
- 186.227.193.0/24
- 186.227.194.0/24
- 186.227.194.0/23
- 186.227.195.0/24
- 186.227.196.0/24
- 186.227.196.0/22
- 186.227.197.0/24
- 186.227.198.0/24
- 186.227.199.0/24
- 186.227.200.0/24
- 186.227.200.0/21
- 186.227.201.0/24
- 186.227.202.0/24
- 186.227.203.0/24
- 186.227.204.0/24
- 186.227.205.0/24
- 186.227.206.0/24
- 186.227.207.0/24
- 187.45.176.0/21
- 187.45.176.0/23
- 187.45.176.0/24
- 187.45.176.0/22
- 187.45.177.0/24
- 187.45.178.0/23
- 187.45.178.0/24
- 187.45.179.0/24
- 187.45.180.0/23
- 187.45.180.0/24
- 187.45.181.0/24
- 187.45.182.0/23
- 187.45.182.0/24
- 187.45.183.0/24
- 187.45.184.0/24
- 187.45.184.0/22
- 187.45.185.0/24
- 187.45.186.0/24
- 187.45.187.0/24
- 187.45.188.0/24
- 187.45.188.0/23
- 187.45.189.0/24
- 187.45.190.0/24
- 187.45.191.0/24
- 191.96.106.0/24
- 196.55.2.0/24
- 198.49.64.0/20
- 198.49.64.0/22
- 198.49.68.0/23
- 198.49.70.0/24
- 198.49.71.0/24
- 198.49.72.0/22
- 198.49.76.0/23
- 198.49.78.0/24
- 198.49.79.0/24
- 198.136.48.0/20
- 198.136.48.0/22
- 198.136.52.0/23
- 198.136.54.0/24
- 198.136.55.0/24
- 198.136.56.0/24
- 198.136.57.0/24
- 198.136.58.0/24
- 198.136.58.0/23
- 198.136.60.0/24
- 198.136.61.0/24
- 198.136.62.0/23
- 199.166.30.0/23
- 199.168.184.0/21
- 201.131.124.0/22
- 201.131.125.0/24
- 201.131.126.0/24
- 201.131.127.0/24
- 208.184.146.0/23
- 209.148.93.0/24
- 212.18.224.0/20
- 212.18.224.0/22
- 212.18.228.0/23
- 212.18.230.0/24
- 212.18.231.0/24
- 212.18.232.0/24
- 212.18.233.0/24
- 212.18.234.0/23
- 212.18.234.0/24
- 212.18.235.0/24
- 212.18.236.0/24
- 212.18.237.0/24
- 212.18.238.0/23
- 240.50.64.0/23
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:20 EDT
- Nmap scan report for www.audit.gov.sd (138.128.160.2)
- Host is up (0.23s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- Not shown: 457 filtered ports, 9 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 53/tcp open domain
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- Nmap done: 1 IP address (1 host up) scanned in 5.78 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:20 EDT
- Nmap scan report for www.audit.gov.sd (138.128.160.2)
- Host is up (0.12s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 2.36 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:20 EDT
- Nmap scan report for www.audit.gov.sd (138.128.160.2)
- Host is up (0.22s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Pure-FTPd
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 3.18 (98%), Linux 2.6.32 (97%), Linux 2.6.32 or 3.10 (97%), Linux 2.6.35 (97%), Tandberg VCS video conferencing system (97%), Linux 4.8 (97%), Synology DiskStation Manager 5.1 (97%), Linux 3.10 - 3.12 (97%), Linux 4.4 (97%), Linux 4.9 (97%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 13 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 109.54 ms 10.249.200.1
- 2 120.16 ms vlan500.bb1.bru1.be.m247.com (185.210.217.241)
- 3 110.18 ms te0-3-0-2.250.rcr21.bru01.atlas.cogentco.com (149.11.170.113)
- 4 115.76 ms be3674.ccr41.par01.atlas.cogentco.com (130.117.48.233)
- 5 188.71 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197)
- 6 192.77 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
- 7 204.18 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
- 8 212.21 ms be2785.rcr21.jax01.atlas.cogentco.com (154.54.28.110)
- 9 215.39 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 10 216.43 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 11 219.21 ms 38.104.89.26
- 12 220.21 ms ae2.core1.mco.hostdime.com (67.23.229.201)
- 13 222.27 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:31 EDT
- Nmap scan report for www.audit.gov.sd (138.128.160.2)
- Host is up (0.22s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- PORT STATE SERVICE VERSION
- 53/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- |_dns-fuzz: Server didn't response to our probe, can't fuzz
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 3.18 (98%), Linux 2.6.32 (97%), Linux 3.10 (97%), Linux 3.5 (97%), Linux 4.2 (97%), Synology DiskStation Manager 5.1 (97%), Linux 2.6.32 or 3.10 (95%), Linux 2.6.35 (95%), Linux 3.4 (95%), Linux 3.7 (95%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 13 hops
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Host script results:
- | dns-blacklist:
- | SPAM
- | spam.dnsbl.sorbs.net - SPAM
- | dnsbl.inps.de - SPAM
- |_ Spam Received See: http://www.sorbs.net/lookup.shtml?138.128.160.2
- | dns-brute:
- | DNS Brute-force hostnames:
- | mail.audit.gov.sd - 212.0.136.50
- | www.audit.gov.sd - 138.128.160.2
- |_ ftp.audit.gov.sd - 138.128.160.2
- TRACEROUTE (using port 53/tcp)
- HOP RTT ADDRESS
- 1 110.04 ms 10.249.200.1
- 2 110.08 ms vlan500.bb1.bru1.be.m247.com (185.210.217.241)
- 3 110.20 ms te0-3-0-2.250.rcr21.bru01.atlas.cogentco.com (149.11.170.113)
- 4 116.18 ms be3675.ccr42.par01.atlas.cogentco.com (154.54.57.165)
- 5 188.70 ms be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169)
- 6 192.90 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
- 7 203.68 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
- 8 212.09 ms be2784.rcr21.jax01.atlas.cogentco.com (154.54.28.106)
- 9 215.20 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 10 215.25 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 11 216.08 ms 38.104.89.26
- 12 222.61 ms ae2.core2.mco.hostdime.com (67.23.229.205)
- 13 223.43 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- http://www.audit.gov.sd [302 Found] Apache, Cookies[PHPSESSID,mltlngg_language], Country[UNITED STATES][US], HTTPServer[Apache], IP[138.128.160.2], PHP[5.6.40], RedirectLocation[http://www.audit.gov.sd/?lang=ar], UncommonHeaders[x-redirect-by], X-Powered-By[PHP/5.6.40]
- http://www.audit.gov.sd/?lang=ar [200 OK] Apache, Cookies[PHPSESSID,mltlngg_language], Country[UNITED STATES][US], Email[info@audit.gov.sd], HTML5, HTTPServer[Apache], IP[138.128.160.2], JQuery[1.12.4], MetaGenerator[Everest Forms 1.4.8,WordPress 5.1.1], PHP[5.6.40], Script[text/javascript], Title[National Audit Chamber], UncommonHeaders[referrer-policy,x-content-type-options,link], WordPress[5.1.1], X-Frame-Options[SAMEORIGIN], X-Powered-By[PHP/5.6.40], X-XSS-Protection[1; mode=block]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://www.audit.gov.sd...
- ___________________________________________________ SITE INFO ____________________________________________________
- IP Title
- 138.128.160.2 National Audit Chamber
- ____________________________________________________ VERSION _____________________________________________________
- Name Versions Type
- WordPress 3.8 | 3.8.1 | 3.8.2 | 3.8.3 | 3.8.4 | 3.8.5 | 3.8.6 | 3.8.7 CMS
- 3.8.8 | 3.9 | 3.9.1 | 3.9.2 | 3.9.3 | 3.9.4 | 3.9.5 | 3.9.6
- 4.0 | 4.0.1 | 4.0.2 | 4.0.3 | 4.0.4 | 4.0.5 | 4.1 | 4.1.1
- 4.1.2 | 4.1.3 | 4.1.4 | 4.1.5 | 4.2 | 4.2.1 | 4.2.2
- Apache Platform
- PHP 5.6.40 Platform
- __________________________________________________ INTERESTING ___________________________________________________
- URL Note Type
- /readme.html Readme file Interesting
- /robots.txt robots.txt index Interesting
- _____________________________________________________ TOOLS ______________________________________________________
- Name Link Software
- wpscan https://github.com/wpscanteam/wpscan WordPress
- CMSmap https://github.com/Dionach/CMSmap WordPress
- ________________________________________________ VULNERABILITIES _________________________________________________
- Affected #Vulns Link
- WordPress 3.8 12 http://cvedetails.com/version/162922
- WordPress 3.8.1 12 http://cvedetails.com/version/162923
- WordPress 3.8.2 7 http://cvedetails.com/version/176067
- WordPress 3.8.3 7 http://cvedetails.com/version/176068
- WordPress 3.8.4 8 http://cvedetails.com/version/176069
- WordPress 3.9 8 http://cvedetails.com/version/176070
- WordPress 3.9.1 15 http://cvedetails.com/version/169908
- WordPress 3.9.2 10 http://cvedetails.com/version/176071
- WordPress 3.9.3 1 http://cvedetails.com/version/185080
- WordPress 4.0 9 http://cvedetails.com/version/176072
- WordPress 4.0.1 1 http://cvedetails.com/version/185081
- WordPress 4.1 1 http://cvedetails.com/version/185082
- WordPress 4.1.1 2 http://cvedetails.com/version/185079
- WordPress 4.2 1 http://cvedetails.com/version/185048
- WordPress 4.2.1 1 http://cvedetails.com/version/184019
- WordPress 4.2.2 2 http://cvedetails.com/version/185073
- __________________________________________________________________________________________________________________
- Time: 73.2 sec Urls: 394 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 302 Moved Temporarily
- Date: Sun, 30 Jun 2019 21:34:39 GMT
- Server: Apache
- X-Powered-By: PHP/5.6.40
- Expires: Thu, 19 Nov 1981 08:52:00 GMT
- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- Pragma: no-cache
- X-Redirect-By: WordPress
- Set-Cookie: PHPSESSID=3eh7jcbe5tqc7g80slumrfvek2; path=/
- Set-Cookie: mltlngg_language=ar; expires=Tue, 30-Jul-2019 21:34:40 GMT; Max-Age=2592000; path=/; domain=.audit.gov.sd
- Location: http://www.audit.gov.sd/?lang=ar
- Connection: close
- Content-Type: text/html; charset=UTF-8
- HTTP/1.1 302 Moved Temporarily
- Date: Sun, 30 Jun 2019 21:34:41 GMT
- Server: Apache
- X-Powered-By: PHP/5.6.40
- Expires: Thu, 19 Nov 1981 08:52:00 GMT
- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- Pragma: no-cache
- X-Redirect-By: WordPress
- Set-Cookie: PHPSESSID=tku76253l4bsf279q65s2d51m0; path=/
- Set-Cookie: mltlngg_language=ar; expires=Tue, 30-Jul-2019 21:34:42 GMT; Max-Age=2592000; path=/; domain=.audit.gov.sd
- Location: http://www.audit.gov.sd/?lang=ar
- Connection: close
- Content-Type: text/html; charset=UTF-8
- HTTP/1.1 200 OK
- Date: Sun, 30 Jun 2019 21:34:42 GMT
- Server: Apache
- X-Powered-By: PHP/5.6.40
- Expires: Thu, 19 Nov 1981 08:52:00 GMT
- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- Pragma: no-cache
- Referrer-Policy: unsafe-url
- x-frame-options: SAMEORIGIN
- X-XSS-Protection: 1; mode=block
- X-Content-Type-Options: nosniff
- Link: <http://www.audit.gov.sd?lang=ar%2Findex.php&rest_route=/>; rel="https://api.w.org/"
- Set-Cookie: PHPSESSID=dhaegl8oleo92o8v35lhp170j7; path=/
- Set-Cookie: mltlngg_language=ar; expires=Tue, 30-Jul-2019 21:34:43 GMT; Max-Age=2592000; path=/; domain=.audit.gov.sd
- Set-Cookie: icwp-wpsf=3130d31f418e9d73fbbf040c81b86f17; expires=Sat, 26-Jan-2069 19:09:26 GMT; Max-Age=1564522483; path=/
- Connection: close
- Content-Type: text/html; charset=UTF-8
- #######################################################################################################################################
- jQuery Migrate
- Apache
- PHP 5.6.40
- WordPress
- Google Font API
- Google Maps
- jQuery 1.12.4
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:35 EDT
- Nmap scan report for www.audit.gov.sd (138.128.160.2)
- Host is up (0.22s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- | Statistics: Performed 72 guesses in 58 seconds, average tps: 1.2
- |_ ERROR: Failed to connect.
- |_pop3-capabilities: AUTH-RESP-CODE UIDL STLS TOP PIPELINING RESP-CODES CAPA USER SASL(PLAIN LOGIN)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 4.4 (98%), Linux 3.18 (98%), Linux 2.6.32 (97%), Linux 2.6.35 (97%), Linux 3.10 (97%), Linux 3.4 (97%), Linux 3.5 (97%), Linux 3.7 (97%), Linux 4.2 (97%), Synology DiskStation Manager 5.1 (97%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 13 hops
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 110.35 ms 10.249.200.1
- 2 110.93 ms vlan500.bb1.bru1.be.m247.com (185.210.217.241)
- 3 110.95 ms te0-3-0-2.250.rcr21.bru01.atlas.cogentco.com (149.11.170.113)
- 4 116.42 ms be3674.ccr41.par01.atlas.cogentco.com (130.117.48.233)
- 5 188.09 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197)
- 6 195.13 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
- 7 205.15 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
- 8 213.12 ms be2785.rcr21.jax01.atlas.cogentco.com (154.54.28.110)
- 9 215.52 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 10 217.84 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 11 217.88 ms 38.104.89.26
- 12 219.96 ms ae2.core1.mco.hostdime.com (67.23.229.201)
- 13 223.61 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- https://www.audit.gov.sd [302 Found] Apache, Cookies[PHPSESSID,mltlngg_language], Country[UNITED STATES][US], HTTPServer[Apache], IP[138.128.160.2], PHP[5.6.40], RedirectLocation[https://www.audit.gov.sd/?lang=ar], UncommonHeaders[x-redirect-by], X-Powered-By[PHP/5.6.40]
- https://www.audit.gov.sd/?lang=ar [200 OK] Apache, Cookies[PHPSESSID,mltlngg_language], Country[UNITED STATES][US], Email[info@audit.gov.sd], HTML5, HTTPServer[Apache], IP[138.128.160.2], JQuery[1.12.4], MetaGenerator[Everest Forms 1.4.8,WordPress 5.1.1], PHP[5.6.40], Script[text/javascript], Title[National Audit Chamber], UncommonHeaders[referrer-policy,x-content-type-options,link], WordPress[5.1.1], X-Frame-Options[SAMEORIGIN], X-Powered-By[PHP/5.6.40], X-XSS-Protection[1; mode=block]
- #######################################################################################################################################
- Google Maps
- Apache
- Google Font API
- PHP 5.6.40
- WordPress
- jQuery 1.12.4
- jQuery Migrate
- #######################################################################################################################################
- Version: 1.11.13-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 138.128.160.2
- Testing SSL server www.audit.gov.sd on port 443 using SNI name www.audit.gov.sd
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: audit.gov.sd
- Altnames: DNS:audit.gov.sd, DNS:mail.audit.gov.sd, DNS:www.audit.gov.sd
- Issuer: audit.gov.sd
- Not valid before: Aug 12 13:17:45 2017 GMT
- Not valid after: Aug 12 13:17:45 2018 GMT
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:50 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.21s latency).
- Not shown: 460 filtered ports, 9 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 53/tcp open domain
- 80/tcp open http
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- Nmap done: 1 IP address (1 host up) scanned in 6.71 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:50 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.13s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 2.32 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:50 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.22s latency).
- PORT STATE SERVICE VERSION
- 53/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- |_dns-fuzz: Server didn't response to our probe, can't fuzz
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 3.18 (98%), Linux 2.6.32 (97%), Linux 3.4 (97%), Linux 3.7 (97%), Synology DiskStation Manager 5.1 (97%), Linux 3.1 - 3.2 (97%), Linux 3.10 - 3.12 (97%), Linux 4.4 (97%), Linux 4.9 (97%), Linux 2.6.32 or 3.10 (95%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 13 hops
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Host script results:
- | dns-blacklist:
- | SPAM
- | dnsbl.inps.de - SPAM
- | Spam Received See: http://www.sorbs.net/lookup.shtml?138.128.160.2
- |_ spam.dnsbl.sorbs.net - SPAM
- | dns-brute:
- | DNS Brute-force hostnames:
- | ns1.click-grafix.com - 138.128.160.3
- | ns2.click-grafix.com - 138.128.160.4
- | mail.click-grafix.com - 138.128.160.2
- | server.click-grafix.com - 138.128.160.2
- | www.click-grafix.com - 138.128.160.2
- |_ ftp.click-grafix.com - 138.128.160.2
- TRACEROUTE (using port 53/tcp)
- HOP RTT ADDRESS
- 1 113.17 ms 10.249.200.1
- 2 151.20 ms vlan500.bb1.bru1.be.m247.com (185.210.217.241)
- 3 114.00 ms te0-3-0-2.250.rcr21.bru01.atlas.cogentco.com (149.11.170.113)
- 4 113.85 ms be3674.ccr41.par01.atlas.cogentco.com (130.117.48.233)
- 5 186.83 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197)
- 6 192.45 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
- 7 202.05 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
- 8 210.47 ms be2785.rcr21.jax01.atlas.cogentco.com (154.54.28.110)
- 9 213.50 ms be3641.rcr52.mco01.atlas.cogentco.com (154.24.22.125)
- 10 213.34 ms te0-0-1-3.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.25.30)
- 11 218.40 ms 38.104.89.26
- 12 223.66 ms ae2.core2.mco.hostdime.com (67.23.229.205)
- 13 218.03 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:51 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.22s latency).
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 13 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 109.77 ms 10.249.200.1
- 2 109.80 ms vlan500.bb1.bru1.be.m247.com (185.210.217.241)
- 3 110.38 ms te0-3-0-2.250.rcr21.bru01.atlas.cogentco.com (149.11.170.113)
- 4 116.09 ms be3675.ccr42.par01.atlas.cogentco.com (154.54.57.165)
- 5 187.78 ms be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169)
- 6 193.55 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
- 7 204.36 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
- 8 211.58 ms be2785.rcr21.jax01.atlas.cogentco.com (154.54.28.110)
- 9 214.61 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 10 216.23 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 11 217.13 ms 38.104.89.26
- 12 222.89 ms ae2.core2.mco.hostdime.com (67.23.229.205)
- 13 222.90 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:53 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.22s latency).
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- Network Distance: 13 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 114.35 ms 10.249.200.1
- 2 117.93 ms vlan500.bb1.bru1.be.m247.com (185.210.217.241)
- 3 115.12 ms te0-3-0-2.250.rcr21.bru01.atlas.cogentco.com (149.11.170.113)
- 4 120.56 ms be3675.ccr42.par01.atlas.cogentco.com (154.54.57.165)
- 5 191.56 ms be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169)
- 6 197.38 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
- 7 202.57 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
- 8 209.60 ms be2785.rcr21.jax01.atlas.cogentco.com (154.54.28.110)
- 9 212.49 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 10 213.88 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 11 218.44 ms 38.104.89.26
- 12 223.35 ms ae2.core2.mco.hostdime.com (67.23.229.205)
- 13 223.36 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:54 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.22s latency).
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 13 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 115.11 ms 10.249.200.1
- 2 153.28 ms vlan500.bb1.bru1.be.m247.com (185.210.217.241)
- 3 115.73 ms te0-3-0-2.250.rcr21.bru01.atlas.cogentco.com (149.11.170.113)
- 4 121.19 ms be3675.ccr42.par01.atlas.cogentco.com (154.54.57.165)
- 5 193.95 ms be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169)
- 6 199.54 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
- 7 209.59 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
- 8 217.81 ms be2785.rcr21.jax01.atlas.cogentco.com (154.54.28.110)
- 9 220.23 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 10 215.07 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 11 218.56 ms 38.104.89.26
- 12 223.87 ms ae2.core2.mco.hostdime.com (67.23.229.205)
- 13 223.90 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- http://138.128.160.2 [200 OK] Apache, Country[UNITED STATES][US], HTTPServer[Apache], IP[138.128.160.2], Meta-Refresh-Redirect[/cgi-sys/defaultwebpage.cgi]
- http://138.128.160.2/cgi-sys/defaultwebpage.cgi [200 OK] Apache, Country[UNITED STATES][US], Email[webmaster@138.128.160.2], HTML5, HTTPServer[Apache], IP[138.128.160.2], Title[Default Web Site Page]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://138.128.160.2...
- _________________ SITE INFO __________________
- IP Title
- 138.128.160.2
- __________________ VERSION ___________________
- Name Versions Type
- Apache Platform
- ______________________________________________
- Time: 37.8 sec Urls: 601 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Sun, 30 Jun 2019 21:57:44 GMT
- Server: Apache
- Last-Modified: Wed, 30 Jan 2019 02:03:25 GMT
- ETag: "70a0253-a3-580a350ab9540"
- Accept-Ranges: bytes
- Content-Length: 163
- Connection: close
- Content-Type: text/html
- HTTP/1.1 200 OK
- Date: Sun, 30 Jun 2019 21:57:45 GMT
- Server: Apache
- Last-Modified: Wed, 30 Jan 2019 02:03:25 GMT
- ETag: "70a0253-a3-580a350ab9540"
- Accept-Ranges: bytes
- Content-Length: 163
- Connection: close
- Content-Type: text/html
- Allow: POST,OPTIONS,HEAD,GET,TRACE
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 17:57 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.22s latency).
- PORT STATE SERVICE VERSION
- 123/udp open|filtered ntp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 13 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 117.09 ms 10.249.200.1
- 2 117.15 ms vlan500.bb1.bru1.be.m247.com (185.210.217.241)
- 3 117.19 ms te0-3-0-2.250.rcr21.bru01.atlas.cogentco.com (149.11.170.113)
- 4 122.91 ms be3675.ccr42.par01.atlas.cogentco.com (154.54.57.165)
- 5 193.96 ms be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169)
- 6 199.55 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
- 7 210.36 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
- 8 217.78 ms be2785.rcr21.jax01.atlas.cogentco.com (154.54.28.110)
- 9 220.60 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 10 213.68 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 11 217.10 ms 38.104.89.26
- 12 222.41 ms ae2.core2.mco.hostdime.com (67.23.229.205)
- 13 222.61 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- prettyPhoto
- Apache
- jQuery 3.3.1
- OWL Carousel
- Bootstrap
- #######################################################################################################################################
- Version: 1.11.13-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 138.128.160.2
- Testing SSL server 138.128.160.2 on port 443 using SNI name 138.128.160.2
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: abaad.sd
- Altnames: DNS:abaad.sd, DNS:mail.abaad.sd, DNS:www.abaad.sd
- Issuer: abaad.sd
- Not valid before: Aug 12 11:26:16 2017 GMT
- Not valid after: Aug 12 11:26:16 2018 GMT
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 18:05 EDT
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 18:05
- Completed NSE at 18:05, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 18:05
- Completed NSE at 18:05, 0.00s elapsed
- Initiating Ping Scan at 18:05
- Scanning 138.128.160.2 [4 ports]
- Completed Ping Scan at 18:05, 0.26s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 18:05
- Completed Parallel DNS resolution of 1 host. at 18:05, 0.07s elapsed
- Initiating Connect Scan at 18:05
- Scanning server.click-grafix.com (138.128.160.2) [65535 ports]
- Discovered open port 53/tcp on 138.128.160.2
- Discovered open port 143/tcp on 138.128.160.2
- Discovered open port 443/tcp on 138.128.160.2
- Discovered open port 80/tcp on 138.128.160.2
- Discovered open port 587/tcp on 138.128.160.2
- Discovered open port 993/tcp on 138.128.160.2
- Connect Scan Timing: About 5.06% done; ETC: 18:15 (0:09:41 remaining)
- Discovered open port 2087/tcp on 138.128.160.2
- Discovered open port 2095/tcp on 138.128.160.2
- Connect Scan Timing: About 12.78% done; ETC: 18:13 (0:06:56 remaining)
- Connect Scan Timing: About 14.65% done; ETC: 18:15 (0:08:50 remaining)
- Connect Scan Timing: About 27.63% done; ETC: 18:12 (0:05:17 remaining)
- Connect Scan Timing: About 47.00% done; ETC: 18:10 (0:02:50 remaining)
- Connect Scan Timing: About 68.90% done; ETC: 18:09 (0:01:22 remaining)
- Completed Connect Scan at 18:08, 218.50s elapsed (65535 total ports)
- Initiating Service scan at 18:08
- Scanning 8 services on server.click-grafix.com (138.128.160.2)
- Completed Service scan at 18:11, 158.50s elapsed (8 services on 1 host)
- Initiating OS detection (try #1) against server.click-grafix.com (138.128.160.2)
- Retrying OS detection (try #2) against server.click-grafix.com (138.128.160.2)
- Initiating Traceroute at 18:11
- Completed Traceroute at 18:11, 0.35s elapsed
- Initiating Parallel DNS resolution of 13 hosts. at 18:11
- Completed Parallel DNS resolution of 13 hosts. at 18:11, 0.19s elapsed
- NSE: Script scanning 138.128.160.2.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 18:11
- NSE Timing: About 99.27% done; ETC: 18:12 (0:00:00 remaining)
- NSE Timing: About 99.36% done; ETC: 18:12 (0:00:00 remaining)
- Completed NSE at 18:12, 71.47s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 18:12
- Completed NSE at 18:12, 1.24s elapsed
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up, received syn-ack ttl 54 (0.13s latency).
- Scanned at 2019-06-30 18:05:12 EDT for 456s
- Not shown: 65137 filtered ports, 390 closed ports
- Reason: 65137 no-responses and 390 conn-refused
- PORT STATE SERVICE REASON VERSION
- 53/tcp open domain syn-ack ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
- 80/tcp open http syn-ack Apache httpd
- | http-methods:
- | Supported Methods: POST OPTIONS HEAD GET TRACE
- |_ Potentially risky methods: TRACE
- |_http-server-header: Apache
- |_http-title: Site doesn't have a title (text/html).
- 143/tcp open imap syn-ack Dovecot imapd
- |_imap-capabilities: SASL-IR ENABLE AUTH=PLAIN IMAP4rev1 post-login Pre-login NAMESPACE IDLE LOGIN-REFERRALS capabilities AUTH=LOGINA0001 ID more OK have LITERAL+ listed STARTTLS
- |_ssl-date: TLS randomness does not represent time
- 443/tcp open ssl/http syn-ack Apache httpd
- | http-methods:
- | Supported Methods: POST OPTIONS HEAD GET TRACE
- |_ Potentially risky methods: TRACE
- |_http-server-header: Apache
- |_http-title: Site doesn't have a title (text/html).
- | ssl-cert: Subject: commonName=abaad.sd
- | Subject Alternative Name: DNS:abaad.sd, DNS:mail.abaad.sd, DNS:www.abaad.sd
- | Issuer: commonName=abaad.sd
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-08-12T11:26:16
- | Not valid after: 2018-08-12T11:26:16
- | MD5: 78ae d5d8 edd0 888b fec7 66d8 0056 3b28
- | SHA-1: 416a 957b 5935 e3d6 4c9c 2ee7 6f20 b970 269e 26a3
- | -----BEGIN CERTIFICATE-----
- | MIIDJDCCAgygAwIBAgIFAOx/YEowDQYJKoZIhvcNAQELBQAwEzERMA8GA1UEAwwI
- | YWJhYWQuc2QwHhcNMTcwODEyMTEyNjE2WhcNMTgwODEyMTEyNjE2WjATMREwDwYD
- | VQQDDAhhYmFhZC5zZDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMDM
- | hJz/G2HEm8jAf+I1DAmSdfiiNOZSNE31cQc/32KppLnMEoZE2rflf8pwF/MHZi4V
- | rWmtYNCeKLIH50bEL5eeLZBNa2xJf7lbAjvLSzVFus+nzH8B9MAjAuiLu4DuJSkX
- | Ld6sS0CACCeicThyxqhQJtjdJJLTMcd6BPJMdJXRznQNC5zEZQoOfRSzoLojIckl
- | 4FIrYhSSTm2MGy0FbpvV61kpb2a9pOi3+Zw4ZcUslbAZ00xtHTaG9fr/IS+d56rd
- | 9VuuThACMcTb/K5W5PutioiqoTPE8eh8q9OPu8A1IlcAffpKGuUqze5iSAtbU7Aa
- | TUenAQFoiPQPuhxsbDECAwEAAaN/MH0wHQYDVR0OBBYEFNreitXDTP70QyKQDCQj
- | Z8IWfFM7MB8GA1UdIwQYMBaAFNreitXDTP70QyKQDCQjZ8IWfFM7MAkGA1UdEwQC
- | MAAwMAYDVR0RBCkwJ4IIYWJhYWQuc2SCDW1haWwuYWJhYWQuc2SCDHd3dy5hYmFh
- | ZC5zZDANBgkqhkiG9w0BAQsFAAOCAQEAJdFK5DKTRSfkSTWe+E9oqV5+dwesfRdA
- | yyEDSv0zHn8ByPjC5ZfCOadmuZ7f2Z7tQVxvhfQS20NPXjzLut7/zuzH2GlXItwT
- | EZX/bZWueBB8crmtfTwFdnHDfk/lYs6vXwPy+xYpReuUGUqeDAuWpuxYgmTnzSsV
- | isZxoWqxXPOmpLao1wSf+SAmBZogUKiB/FmCLdcpmekX+HSQuQzYvouSfbKX1wbd
- | CfWHi5/Qe66YXFHIIyQJKaEdaNyFgwaJsyRhXTMiMvwVX27SYQJFdnuVdxBM/NwL
- | IYruPIROB+wvh4JDEW1dr/JnlYr1+czZad2ZGGm1H2xU7wIcWiSK3Q==
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- 587/tcp open smtp syn-ack Exim smtpd 4.92
- | smtp-commands: server.click-grafix.com Hello server.click-grafix.com [185.232.21.119], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=server.click-grafix.com/organizationalUnitName=PositiveSSL
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US/localityName=Houston
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-06-30T00:00:00
- | Not valid after: 2020-06-29T23:59:59
- | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- | SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- | -----BEGIN CERTIFICATE-----
- | MIIGQTCCBSmgAwIBAgIQeMLOS6PSm10OezKHQxdOCjANBgkqhkiG9w0BAQsFADBy
- | MQswCQYDVQQGEwJVUzELMAkGA1UECBMCVFgxEDAOBgNVBAcTB0hvdXN0b24xFTAT
- | BgNVBAoTDGNQYW5lbCwgSW5jLjEtMCsGA1UEAxMkY1BhbmVsLCBJbmMuIENlcnRp
- | ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDYzMDAwMDAwMFoXDTIwMDYyOTIzNTk1
- | OVowWzEhMB8GA1UECxMYRG9tYWluIENvbnRyb2wgVmFsaWRhdGVkMRQwEgYDVQQL
- | EwtQb3NpdGl2ZVNTTDEgMB4GA1UEAxMXc2VydmVyLmNsaWNrLWdyYWZpeC5jb20w
- | ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCeRXmK/NoairHM+sUA7/Sx
- | +4aUaFLpK9HGQDDTqwBkeanyeUQhf4NauYUuLAkCxZS7pqHXudxgye5iYgk3vYJh
- | 2s7LpJWypfi6xhYH14Amh0qpJv6dyGS++DZpMJiiZx7TC3eYS1js3qGm2H+eZK9Y
- | xMsFfI6lYtxDhMAazgqMegNW2xfeV3CFSQ5pfk0z8sYmWBhWefwo96lcZ9C4Vd5r
- | uOQrm2AlsWdot6QhDAiwI/6WA9fikQWdjZsf1/zn0nQrFmKeB/erhQPvf4gRR32Y
- | f9dubTs8T3lL6ZGE0yU66Xz8C0U3fxNmiAui4pTztgHqYgKWrUmB6u0P1AKJJ6RF
- | AgMBAAGjggLoMIIC5DAfBgNVHSMEGDAWgBR+A1plQWunfgrhuJ0I6h2OHWrHZTAd
- | BgNVHQ4EFgQUrg2QPaQsijhp05yerU7uthYmvUIwDgYDVR0PAQH/BAQDAgWgMAwG
- | A1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1Ud
- | IARIMEYwOgYLKwYBBAGyMQECAjQwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1
- | cmUuY29tb2RvLmNvbS9DUFMwCAYGZ4EMAQIBMEwGA1UdHwRFMEMwQaA/oD2GO2h0
- | dHA6Ly9jcmwuY29tb2RvY2EuY29tL2NQYW5lbEluY0NlcnRpZmljYXRpb25BdXRo
- | b3JpdHkuY3JsMH0GCCsGAQUFBwEBBHEwbzBHBggrBgEFBQcwAoY7aHR0cDovL2Ny
- | dC5jb21vZG9jYS5jb20vY1BhbmVsSW5jQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5j
- | cnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTA/BgNVHREE
- | ODA2ghdzZXJ2ZXIuY2xpY2stZ3JhZml4LmNvbYIbd3d3LnNlcnZlci5jbGljay1n
- | cmFmaXguY29tMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHYAu9nfvB+KcbWTlCOX
- | qpJ7RzhXlQqrUugakJZkNo4e0YUAAAFrpk9VtQAABAMARzBFAiEAm634uvAjGD67
- | 7PUtH69ktb8uURVHlibgBDzGih0N7X4CIDrLLzhcTaL9rbBJMUkFkXaQVCWZTnZQ
- | 3ndWBgpVKg+8AHYAXqdz+d9WwOe1Nkh90EngMnqRmgyEoRIShBh1loFxRVgAAAFr
- | pk9V1QAABAMARzBFAiEAx4UX/K60pkIIx37lzgsABfdJu1/f7KVeOqKqot/DilMC
- | IEcuPthZqjlq1et0g7IDkCNPd1x9FyvafjLE8+BmVGoNMA0GCSqGSIb3DQEBCwUA
- | A4IBAQArz6ZYgc8JaamYpSau5kFH8kkvFFPjJqPZ5k4/IotNg52gKwP6vTbkPO2w
- | Ym8OUeZ+wJk0lH37GB/LcixSSf4yFV7buKblzFfAIrS4GP4gbWNGiP92qx5q2c+Z
- | k4LXB+fh6y0kkKGuK9+lxmr+ew8s09SnUCHTPsCCJU3YKaLqhA9V0rrYrjdZRHNw
- | Tfuik0C6WIOEG1i7huARRakxp+WmgFCzvIRL1bkl4v4Hr854Zq8dH2uh7zaf8r83
- | WfrI1euVTpu2UKv5ghpq7TpIsl+NRPqT3gPpyeGp03r2aYK9jEMelUsg615Rx8fc
- | 9T049gfynHptRSQ5jQB3hcg0LjbS
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 993/tcp open ssl/imaps? syn-ack
- |_ssl-date: TLS randomness does not represent time
- 2087/tcp open ssl/eli? syn-ack
- | fingerprint-strings:
- | GetRequest:
- | HTTP/1.0 200 OK
- | Connection: close
- | Content-Type: text/html; charset="utf-8"
- | Date: Sun, 30 Jun 2019 22:09:17 GMT
- | Cache-Control: no-cache, no-store, must-revalidate, private
- | Pragma: no-cache
- | Set-Cookie: whostmgrrelogin=no; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: whostmgrsession=%3axNSTgLD9Y903Rs9l%2cf03edfd7984a9e52cfd56ece40c2fce5; HttpOnly; path=/; port=2087; secure
- | Set-Cookie: roundcube_sessid=expired; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: roundcube_sessauth=expired; HttpOnly; domain=server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: Horde=expired; HttpOnly; domain=.server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: horde_secret_key=expired; HttpOnly; domain=.server.click-grafix.com
- | HTTPOptions:
- | HTTP/1.0 200 OK
- | Connection: close
- | Content-Type: text/html; charset="utf-8"
- | Date: Sun, 30 Jun 2019 22:09:18 GMT
- | Cache-Control: no-cache, no-store, must-revalidate, private
- | Pragma: no-cache
- | Set-Cookie: whostmgrrelogin=no; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: whostmgrsession=%3a4hxhVEF_d3s6W2t0%2c83c0232717bef5f9adc3181efa38916f; HttpOnly; path=/; port=2087; secure
- | Set-Cookie: roundcube_sessid=expired; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: roundcube_sessauth=expired; HttpOnly; domain=server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: Horde=expired; HttpOnly; domain=.server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- |_ Set-Cookie: horde_secret_key=expired; HttpOnly; domain=.server.click-grafix.com
- | ssl-cert: Subject: commonName=server.click-grafix.com/organizationalUnitName=PositiveSSL
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US/localityName=Houston
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-06-30T00:00:00
- | Not valid after: 2020-06-29T23:59:59
- | MD5: b29c 3abc b460 f262 6860 f153 9e6c e929
- | SHA-1: f7d4 5179 b4b5 afcc 4734 6db2 0f71 4dea 5eee 26d2
- | -----BEGIN CERTIFICATE-----
- | MIIGQTCCBSmgAwIBAgIQeMLOS6PSm10OezKHQxdOCjANBgkqhkiG9w0BAQsFADBy
- | MQswCQYDVQQGEwJVUzELMAkGA1UECBMCVFgxEDAOBgNVBAcTB0hvdXN0b24xFTAT
- | BgNVBAoTDGNQYW5lbCwgSW5jLjEtMCsGA1UEAxMkY1BhbmVsLCBJbmMuIENlcnRp
- | ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDYzMDAwMDAwMFoXDTIwMDYyOTIzNTk1
- | OVowWzEhMB8GA1UECxMYRG9tYWluIENvbnRyb2wgVmFsaWRhdGVkMRQwEgYDVQQL
- | EwtQb3NpdGl2ZVNTTDEgMB4GA1UEAxMXc2VydmVyLmNsaWNrLWdyYWZpeC5jb20w
- | ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCeRXmK/NoairHM+sUA7/Sx
- | +4aUaFLpK9HGQDDTqwBkeanyeUQhf4NauYUuLAkCxZS7pqHXudxgye5iYgk3vYJh
- | 2s7LpJWypfi6xhYH14Amh0qpJv6dyGS++DZpMJiiZx7TC3eYS1js3qGm2H+eZK9Y
- | xMsFfI6lYtxDhMAazgqMegNW2xfeV3CFSQ5pfk0z8sYmWBhWefwo96lcZ9C4Vd5r
- | uOQrm2AlsWdot6QhDAiwI/6WA9fikQWdjZsf1/zn0nQrFmKeB/erhQPvf4gRR32Y
- | f9dubTs8T3lL6ZGE0yU66Xz8C0U3fxNmiAui4pTztgHqYgKWrUmB6u0P1AKJJ6RF
- | AgMBAAGjggLoMIIC5DAfBgNVHSMEGDAWgBR+A1plQWunfgrhuJ0I6h2OHWrHZTAd
- | BgNVHQ4EFgQUrg2QPaQsijhp05yerU7uthYmvUIwDgYDVR0PAQH/BAQDAgWgMAwG
- | A1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1Ud
- | IARIMEYwOgYLKwYBBAGyMQECAjQwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1
- | cmUuY29tb2RvLmNvbS9DUFMwCAYGZ4EMAQIBMEwGA1UdHwRFMEMwQaA/oD2GO2h0
- | dHA6Ly9jcmwuY29tb2RvY2EuY29tL2NQYW5lbEluY0NlcnRpZmljYXRpb25BdXRo
- | b3JpdHkuY3JsMH0GCCsGAQUFBwEBBHEwbzBHBggrBgEFBQcwAoY7aHR0cDovL2Ny
- | dC5jb21vZG9jYS5jb20vY1BhbmVsSW5jQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5j
- | cnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTA/BgNVHREE
- | ODA2ghdzZXJ2ZXIuY2xpY2stZ3JhZml4LmNvbYIbd3d3LnNlcnZlci5jbGljay1n
- | cmFmaXguY29tMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHYAu9nfvB+KcbWTlCOX
- | qpJ7RzhXlQqrUugakJZkNo4e0YUAAAFrpk9VtQAABAMARzBFAiEAm634uvAjGD67
- | 7PUtH69ktb8uURVHlibgBDzGih0N7X4CIDrLLzhcTaL9rbBJMUkFkXaQVCWZTnZQ
- | 3ndWBgpVKg+8AHYAXqdz+d9WwOe1Nkh90EngMnqRmgyEoRIShBh1loFxRVgAAAFr
- | pk9V1QAABAMARzBFAiEAx4UX/K60pkIIx37lzgsABfdJu1/f7KVeOqKqot/DilMC
- | IEcuPthZqjlq1et0g7IDkCNPd1x9FyvafjLE8+BmVGoNMA0GCSqGSIb3DQEBCwUA
- | A4IBAQArz6ZYgc8JaamYpSau5kFH8kkvFFPjJqPZ5k4/IotNg52gKwP6vTbkPO2w
- | Ym8OUeZ+wJk0lH37GB/LcixSSf4yFV7buKblzFfAIrS4GP4gbWNGiP92qx5q2c+Z
- | k4LXB+fh6y0kkKGuK9+lxmr+ew8s09SnUCHTPsCCJU3YKaLqhA9V0rrYrjdZRHNw
- | Tfuik0C6WIOEG1i7huARRakxp+WmgFCzvIRL1bkl4v4Hr854Zq8dH2uh7zaf8r83
- | WfrI1euVTpu2UKv5ghpq7TpIsl+NRPqT3gPpyeGp03r2aYK9jEMelUsg615Rx8fc
- | 9T049gfynHptRSQ5jQB3hcg0LjbS
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 2095/tcp open nbx-ser? syn-ack
- | fingerprint-strings:
- | SIPOptions:
- | HTTP/1.1 301 Moved
- | Content-length: 129
- | Location: https://server.click-grafix.com:2096/sip%3anm
- | Content-type: text/html; charset="utf-8"
- | Cache-Control: no-cache, no-store, must-revalidate, private
- |_ <html><head><META HTTP-EQUIV="refresh" CONTENT="2;URL=https://server.click-grafix.com:2096/sip%3anm"></head><body></body></html>
- 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port2087-TCP:V=7.70%T=SSL%I=7%D=6/30%Time=5D193312%P=x86_64-pc-linux-gn
- SF:u%r(GetRequest,4000,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20close\r\n
- SF:Content-Type:\x20text/html;\x20charset=\"utf-8\"\r\nDate:\x20Sun,\x2030
- SF:\x20Jun\x202019\x2022:09:17\x20GMT\r\nCache-Control:\x20no-cache,\x20no
- SF:-store,\x20must-revalidate,\x20private\r\nPragma:\x20no-cache\r\nSet-Co
- SF:okie:\x20whostmgrrelogin=no;\x20HttpOnly;\x20expires=Thu,\x2001-Jan-197
- SF:0\x2000:00:01\x20GMT;\x20path=/;\x20port=2087;\x20secure\r\nSet-Cookie:
- SF:\x20whostmgrsession=%3axNSTgLD9Y903Rs9l%2cf03edfd7984a9e52cfd56ece40c2f
- SF:ce5;\x20HttpOnly;\x20path=/;\x20port=2087;\x20secure\r\nSet-Cookie:\x20
- SF:roundcube_sessid=expired;\x20HttpOnly;\x20expires=Thu,\x2001-Jan-1970\x
- SF:2000:00:01\x20GMT;\x20path=/;\x20port=2087;\x20secure\r\nSet-Cookie:\x2
- SF:0roundcube_sessauth=expired;\x20HttpOnly;\x20domain=server\.click-grafi
- SF:x\.com;\x20expires=Thu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x20path=/;\x
- SF:20port=2087;\x20secure\r\nSet-Cookie:\x20Horde=expired;\x20HttpOnly;\x2
- SF:0domain=\.server\.click-grafix\.com;\x20expires=Thu,\x2001-Jan-1970\x20
- SF:00:00:01\x20GMT;\x20path=/;\x20port=2087;\x20secure\r\nSet-Cookie:\x20h
- SF:orde_secret_key=expired;\x20HttpOnly;\x20domain=\.server\.click-grafix\
- SF:.com")%r(HTTPOptions,4000,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20clo
- SF:se\r\nContent-Type:\x20text/html;\x20charset=\"utf-8\"\r\nDate:\x20Sun,
- SF:\x2030\x20Jun\x202019\x2022:09:18\x20GMT\r\nCache-Control:\x20no-cache,
- SF:\x20no-store,\x20must-revalidate,\x20private\r\nPragma:\x20no-cache\r\n
- SF:Set-Cookie:\x20whostmgrrelogin=no;\x20HttpOnly;\x20expires=Thu,\x2001-J
- SF:an-1970\x2000:00:01\x20GMT;\x20path=/;\x20port=2087;\x20secure\r\nSet-C
- SF:ookie:\x20whostmgrsession=%3a4hxhVEF_d3s6W2t0%2c83c0232717bef5f9adc3181
- SF:efa38916f;\x20HttpOnly;\x20path=/;\x20port=2087;\x20secure\r\nSet-Cooki
- SF:e:\x20roundcube_sessid=expired;\x20HttpOnly;\x20expires=Thu,\x2001-Jan-
- SF:1970\x2000:00:01\x20GMT;\x20path=/;\x20port=2087;\x20secure\r\nSet-Cook
- SF:ie:\x20roundcube_sessauth=expired;\x20HttpOnly;\x20domain=server\.click
- SF:-grafix\.com;\x20expires=Thu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x20pat
- SF:h=/;\x20port=2087;\x20secure\r\nSet-Cookie:\x20Horde=expired;\x20HttpOn
- SF:ly;\x20domain=\.server\.click-grafix\.com;\x20expires=Thu,\x2001-Jan-19
- SF:70\x2000:00:01\x20GMT;\x20path=/;\x20port=2087;\x20secure\r\nSet-Cookie
- SF::\x20horde_secret_key=expired;\x20HttpOnly;\x20domain=\.server\.click-g
- SF:rafix\.com");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port2095-TCP:V=7.70%I=7%D=6/30%Time=5D193355%P=x86_64-pc-linux-gnu%r(SI
- SF:POptions,14C,"HTTP/1\.1\x20301\x20Moved\r\nContent-length:\x20129\r\nLo
- SF:cation:\x20https://server\.click-grafix\.com:2096/sip%3anm\r\nContent-t
- SF:ype:\x20text/html;\x20charset=\"utf-8\"\r\nCache-Control:\x20no-cache,\
- SF:x20no-store,\x20must-revalidate,\x20private\r\n\r\n<html><head><META\x2
- SF:0HTTP-EQUIV=\"refresh\"\x20CONTENT=\"2;URL=https://server\.click-grafix
- SF:\.com:2096/sip%3anm\"></head><body></body></html>\n");
- OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
- Aggressive OS guesses: Linux 3.10 - 3.12 (92%), Linux 4.4 (92%), Linux 4.9 (92%), Android 5.0.1 (91%), Linux 2.6.32 (91%), Linux 2.6.32 or 3.10 (91%), Linux 2.6.35 (91%), Linux 2.6.39 (91%), Synology DiskStation Manager 5.1 (91%), WatchGuard Fireware 11.8 (91%)
- No exact OS matches for host (test conditions non-ideal).
- TCP/IP fingerprint:
- SCAN(V=7.70%E=4%D=6/30%OT=53%CT=22%CU=%PV=N%DS=13%DC=T%G=N%TM=5D1933E0%P=x86_64-pc-linux-gnu)
- SEQ(SP=101%GCD=1%ISR=10E%TI=Z%TS=A)
- ECN(R=Y%DF=Y%TG=40%W=7210%O=M44FNW7%CC=Y%Q=)
- T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
- T2(R=N)
- T3(R=N)
- T4(R=N)
- T5(R=N)
- T6(R=N)
- T7(R=N)
- U1(R=N)
- IE(R=Y%DFI=N%TG=40%CD=S)
- Uptime guess: 38.646 days (since Thu May 23 02:42:21 2019)
- Network Distance: 13 hops
- TCP Sequence Prediction: Difficulty=257 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 115.43 ms 10.249.200.1
- 2 138.72 ms vlan500.bb1.bru1.be.m247.com (185.210.217.241)
- 3 115.91 ms te0-3-0-2.250.rcr21.bru01.atlas.cogentco.com (149.11.170.113)
- 4 121.19 ms be3675.ccr42.par01.atlas.cogentco.com (154.54.57.165)
- 5 192.64 ms be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169)
- 6 198.45 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
- 7 203.49 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
- 8 210.51 ms be2785.rcr21.jax01.atlas.cogentco.com (154.54.28.110)
- 9 213.43 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 10 215.00 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 11 218.39 ms 38.104.89.26
- 12 224.65 ms ae2.core2.mco.hostdime.com (67.23.229.205)
- 13 224.60 ms server.click-grafix.com (138.128.160.2)
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 18:12
- Completed NSE at 18:12, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 18:12
- Completed NSE at 18:12, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 456.21 seconds
- Raw packets sent: 129 (10.660KB) | Rcvd: 59 (10.719KB)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 18:12 EDT
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 18:12
- Completed NSE at 18:12, 0.00s elapsed
- Initiating NSE at 18:12
- Completed NSE at 18:12, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 18:12
- Completed Parallel DNS resolution of 1 host. at 18:12, 0.03s elapsed
- Initiating UDP Scan at 18:12
- Scanning server.click-grafix.com (138.128.160.2) [14 ports]
- Discovered open port 53/udp on 138.128.160.2
- Completed UDP Scan at 18:12, 2.17s elapsed (14 total ports)
- Initiating Service scan at 18:12
- Scanning 12 services on server.click-grafix.com (138.128.160.2)
- Service scan Timing: About 16.67% done; ETC: 18:22 (0:08:10 remaining)
- Completed Service scan at 18:14, 102.59s elapsed (12 services on 1 host)
- Initiating OS detection (try #1) against server.click-grafix.com (138.128.160.2)
- Retrying OS detection (try #2) against server.click-grafix.com (138.128.160.2)
- Initiating Traceroute at 18:14
- Completed Traceroute at 18:14, 7.26s elapsed
- Initiating Parallel DNS resolution of 1 host. at 18:14
- Completed Parallel DNS resolution of 1 host. at 18:14, 0.00s elapsed
- NSE: Script scanning 138.128.160.2.
- Initiating NSE at 18:14
- Completed NSE at 18:15, 20.27s elapsed
- Initiating NSE at 18:15
- Completed NSE at 18:15, 1.10s elapsed
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.17s latency).
- PORT STATE SERVICE VERSION
- 53/udp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- TRACEROUTE (using port 137/udp)
- HOP RTT ADDRESS
- 1 112.25 ms 10.249.200.1
- 2 ... 3
- 4 109.26 ms 10.249.200.1
- 5 109.22 ms 10.249.200.1
- 6 109.22 ms 10.249.200.1
- 7 109.21 ms 10.249.200.1
- 8 109.21 ms 10.249.200.1
- 9 109.21 ms 10.249.200.1
- 10 109.22 ms 10.249.200.1
- 11 ... 18
- 19 109.52 ms 10.249.200.1
- 20 108.54 ms 10.249.200.1
- 21 ... 27
- 28 108.11 ms 10.249.200.1
- 29 108.70 ms 10.249.200.1
- 30 107.58 ms 10.249.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 18:15
- Completed NSE at 18:15, 0.00s elapsed
- Initiating NSE at 18:15
- Completed NSE at 18:15, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 139.28 seconds
- Raw packets sent: 135 (11.696KB) | Rcvd: 36 (4.054KB)
- #######################################################################################################################################
- Hosts
- =====
- address mac name os_name os_flavor os_sp purpose info comments
- ------- --- ---- ------- --------- ----- ------- ---- --------
- 67.225.171.176 host1.albetaqa.site Unknown device
- 77.104.162.243 ip-77-104-162-243.siteground.com Unknown device
- 107.154.85.17 107.154.85.17.ip.incapdns.net Unknown device
- 128.65.195.96 h2web50.infomaniak.ch Unknown device
- 138.128.160.2 server.click-grafix.com Linux 3.X server
- 141.105.65.111 Unknown device
- Services
- ========
- host port proto name state info
- ---- ---- ----- ---- ----- ----
- 67.225.171.176 21 tcp ftp open
- 67.225.171.176 22 tcp ssh open
- 67.225.171.176 53 tcp domain open
- 67.225.171.176 53 udp domain open
- 67.225.171.176 67 udp dhcps unknown
- 67.225.171.176 68 udp dhcpc unknown
- 67.225.171.176 69 udp tftp unknown
- 67.225.171.176 80 tcp http open
- 67.225.171.176 88 udp kerberos-sec unknown
- 67.225.171.176 110 tcp pop3 open
- 67.225.171.176 123 udp ntp unknown
- 67.225.171.176 137 udp netbios-ns filtered
- 67.225.171.176 138 udp netbios-dgm filtered
- 67.225.171.176 139 udp netbios-ssn unknown
- 67.225.171.176 143 tcp imap open
- 67.225.171.176 161 udp snmp unknown
- 67.225.171.176 162 udp snmptrap unknown
- 67.225.171.176 389 udp ldap unknown
- 67.225.171.176 443 tcp https open
- 67.225.171.176 465 tcp smtps open
- 67.225.171.176 520 udp route unknown
- 67.225.171.176 587 tcp submission open
- 67.225.171.176 993 tcp imaps open
- 67.225.171.176 995 tcp pop3s open
- 67.225.171.176 2049 udp nfs unknown
- 77.104.162.243 21 tcp ftp open 220-#########################################################\x0d\x0a220-Please upload your web files to the public_html directory.\x0d\x0a220-Note that letters are case sensitive.\x0d\x0a220-#########################################################\x0d\x0a220 This is a private system - No anonymous login\x0d\x0a
- 77.104.162.243 53 tcp domain open
- 77.104.162.243 53 udp domain open
- 77.104.162.243 67 udp dhcps unknown
- 77.104.162.243 68 udp dhcpc unknown
- 77.104.162.243 69 udp tftp unknown
- 77.104.162.243 80 tcp http open
- 77.104.162.243 88 udp kerberos-sec unknown
- 77.104.162.243 110 tcp pop3 open
- 77.104.162.243 123 udp ntp unknown
- 77.104.162.243 139 udp netbios-ssn unknown
- 77.104.162.243 143 tcp imap open
- 77.104.162.243 161 udp snmp unknown
- 77.104.162.243 162 udp snmptrap unknown
- 77.104.162.243 389 udp ldap unknown
- 77.104.162.243 443 tcp https open
- 77.104.162.243 465 tcp smtps open
- 77.104.162.243 520 udp route unknown
- 77.104.162.243 587 tcp submission open
- 77.104.162.243 993 tcp imaps open
- 77.104.162.243 995 tcp pop3s open
- 77.104.162.243 2049 udp nfs unknown
- 77.104.162.243 2525 tcp ms-v-worlds open
- 77.104.162.243 3306 tcp mysql open
- 107.154.85.17 53 tcp domain open
- 107.154.85.17 53 udp domain unknown
- 107.154.85.17 67 udp dhcps unknown
- 107.154.85.17 68 udp dhcpc unknown
- 107.154.85.17 69 udp tftp unknown
- 107.154.85.17 80 tcp http open
- 107.154.85.17 81 tcp hosts2-ns open
- 107.154.85.17 85 tcp mit-ml-dev open
- 107.154.85.17 88 tcp kerberos-sec open
- 107.154.85.17 88 udp kerberos-sec unknown
- 107.154.85.17 123 udp ntp unknown
- 107.154.85.17 139 udp netbios-ssn unknown
- 107.154.85.17 161 udp snmp unknown
- 107.154.85.17 162 udp snmptrap unknown
- 107.154.85.17 389 tcp ldap open
- 107.154.85.17 389 udp ldap unknown
- 107.154.85.17 443 tcp https open
- 107.154.85.17 444 tcp snpp open
- 107.154.85.17 446 tcp ddm-rdb open
- 107.154.85.17 520 udp route unknown
- 107.154.85.17 587 tcp submission open
- 107.154.85.17 631 tcp ipp open
- 107.154.85.17 888 tcp accessbuilder open
- 107.154.85.17 995 tcp pop3s open
- 107.154.85.17 998 tcp busboy open
- 107.154.85.17 999 tcp garcon open
- 107.154.85.17 1000 tcp cadlock open
- 107.154.85.17 1024 tcp kdm open
- 107.154.85.17 1234 tcp hotline open
- 107.154.85.17 1433 tcp ms-sql-s open
- 107.154.85.17 1494 tcp citrix-ica open
- 107.154.85.17 2000 tcp cisco-sccp open
- 107.154.85.17 2001 tcp dc open
- 107.154.85.17 2049 tcp nfs open
- 107.154.85.17 2049 udp nfs unknown
- 107.154.85.17 2067 tcp dlswpn open
- 107.154.85.17 2100 tcp amiganetfs open
- 107.154.85.17 2222 tcp ethernetip-1 open
- 107.154.85.17 2598 tcp citriximaclient open
- 107.154.85.17 3000 tcp ppp open
- 107.154.85.17 3050 tcp gds_db open
- 107.154.85.17 3057 tcp goahead-fldup open
- 107.154.85.17 3299 tcp saprouter open
- 107.154.85.17 3306 tcp mysql open
- 107.154.85.17 3333 tcp dec-notes open
- 107.154.85.17 3389 tcp ms-wbt-server open
- 107.154.85.17 3500 tcp rtmp-port open
- 107.154.85.17 3790 tcp quickbooksrds open
- 107.154.85.17 4000 tcp remoteanything open
- 107.154.85.17 4444 tcp krb524 open
- 107.154.85.17 4445 tcp upnotifyp open
- 107.154.85.17 5000 tcp upnp open
- 107.154.85.17 5009 tcp airport-admin open
- 107.154.85.17 5060 tcp sip open
- 107.154.85.17 5227 tcp perfd open
- 107.154.85.17 5247 tcp capwap-data open
- 107.154.85.17 5250 tcp soagateway open
- 107.154.85.17 5555 tcp freeciv open
- 107.154.85.17 5900 tcp vnc open
- 107.154.85.17 5901 tcp vnc-1 open
- 107.154.85.17 5902 tcp vnc-2 open
- 107.154.85.17 5903 tcp vnc-3 open
- 107.154.85.17 5904 tcp unknown open
- 107.154.85.17 5905 tcp unknown open
- 107.154.85.17 5906 tcp unknown open
- 107.154.85.17 5907 tcp unknown open
- 107.154.85.17 5908 tcp unknown open
- 107.154.85.17 5909 tcp unknown open
- 107.154.85.17 5910 tcp cm open
- 107.154.85.17 5920 tcp unknown open
- 107.154.85.17 5984 tcp couchdb open
- 107.154.85.17 5985 tcp wsman open
- 107.154.85.17 5986 tcp wsmans open
- 107.154.85.17 5999 tcp ncd-conf open
- 107.154.85.17 6000 tcp x11 open
- 107.154.85.17 6060 tcp x11 open
- 107.154.85.17 6161 tcp patrol-ism open
- 107.154.85.17 6379 tcp redis open
- 107.154.85.17 6661 tcp open
- 107.154.85.17 6789 tcp ibm-db2-admin open
- 107.154.85.17 7000 tcp afs3-fileserver open
- 107.154.85.17 7001 tcp afs3-callback open
- 107.154.85.17 7021 tcp dpserveadmin open
- 107.154.85.17 7071 tcp iwg1 open
- 107.154.85.17 7080 tcp empowerid open
- 107.154.85.17 7272 tcp watchme-7272 open
- 107.154.85.17 7443 tcp oracleas-https open
- 107.154.85.17 7777 tcp cbt open
- 107.154.85.17 7778 tcp interwise open
- 107.154.85.17 8000 tcp http-alt open
- 107.154.85.17 8001 tcp vcom-tunnel open
- 107.154.85.17 8008 tcp http open
- 107.154.85.17 8014 tcp unknown open
- 107.154.85.17 8020 tcp intu-ec-svcdisc open
- 107.154.85.17 8023 tcp unknown open
- 107.154.85.17 8028 tcp open
- 107.154.85.17 8030 tcp open
- 107.154.85.17 8050 tcp unknown open
- 107.154.85.17 8051 tcp rocrail open
- 107.154.85.17 8080 tcp http-proxy open
- 107.154.85.17 8081 tcp blackice-icecap open
- 107.154.85.17 8082 tcp blackice-alerts open
- 107.154.85.17 8085 tcp unknown open
- 107.154.85.17 8086 tcp d-s-n open
- 107.154.85.17 8087 tcp simplifymedia open
- 107.154.85.17 8088 tcp radan-http open
- 107.154.85.17 8090 tcp opsmessaging open
- 107.154.85.17 8091 tcp jamlink open
- 107.154.85.17 8095 tcp unknown open
- 107.154.85.17 8101 tcp ldoms-migr open
- 107.154.85.17 8222 tcp unknown open
- 107.154.85.17 8333 tcp bitcoin open
- 107.154.85.17 8443 tcp https-alt open
- 107.154.85.17 8444 tcp pcsync-http open
- 107.154.85.17 8445 tcp copy open
- 107.154.85.17 8503 tcp lsp-self-ping open
- 107.154.85.17 8686 tcp sun-as-jmxrmi open
- 107.154.85.17 8787 tcp msgsrvr open
- 107.154.85.17 8800 tcp sunwebadmin open
- 107.154.85.17 8812 tcp open
- 107.154.85.17 8834 tcp nessus-xmlrpc open
- 107.154.85.17 8880 tcp cddbp-alt open
- 107.154.85.17 8888 tcp sun-answerbook open
- 107.154.85.17 8889 tcp ddi-tcp-2 open
- 107.154.85.17 8890 tcp ddi-tcp-3 open
- 107.154.85.17 8899 tcp ospf-lite open
- 107.154.85.17 9000 tcp cslistener open
- 107.154.85.17 9001 tcp tor-orport open
- 107.154.85.17 9002 tcp dynamid open
- 107.154.85.17 9003 tcp unknown open
- 107.154.85.17 9004 tcp unknown open
- 107.154.85.17 9005 tcp golem open
- 107.154.85.17 9010 tcp sdr open
- 107.154.85.17 9050 tcp tor-socks open
- 107.154.85.17 9080 tcp glrpc open
- 107.154.85.17 9081 tcp cisco-aqos open
- 107.154.85.17 9084 tcp aurora open
- 107.154.85.17 9090 tcp zeus-admin open
- 107.154.85.17 9099 tcp unknown open
- 107.154.85.17 9100 tcp jetdirect open
- 107.154.85.17 9111 tcp dragonidsconsole open
- 107.154.85.17 9200 tcp wap-wsp open
- 107.154.85.17 9300 tcp vrace open
- 107.154.85.17 9500 tcp ismserver open
- 107.154.85.17 9711 tcp open
- 107.154.85.17 9991 tcp issa open
- 107.154.85.17 9999 tcp abyss open
- 107.154.85.17 10000 tcp snet-sensor-mgmt open
- 107.154.85.17 10001 tcp scp-config open
- 107.154.85.17 10008 tcp octopus open
- 107.154.85.17 10443 tcp unknown open
- 107.154.85.17 12174 tcp unknown open
- 107.154.85.17 12203 tcp open
- 107.154.85.17 12221 tcp open
- 107.154.85.17 12345 tcp netbus open
- 107.154.85.17 12397 tcp open
- 107.154.85.17 12401 tcp open
- 107.154.85.17 14330 tcp open
- 107.154.85.17 16000 tcp fmsas open
- 107.154.85.17 20000 tcp dnp open
- 107.154.85.17 25000 tcp icl-twobase1 open
- 107.154.85.17 30000 tcp ndmps open
- 107.154.85.17 44334 tcp tinyfw open
- 107.154.85.17 50000 tcp ibm-db2 open
- 107.154.85.17 50001 tcp unknown open
- 107.154.85.17 50050 tcp unknown open
- 128.65.195.96 21 tcp ftp open
- 128.65.195.96 22 tcp ssh open
- 128.65.195.96 53 udp domain unknown
- 128.65.195.96 67 udp dhcps unknown
- 128.65.195.96 68 udp dhcpc unknown
- 128.65.195.96 69 udp tftp unknown
- 128.65.195.96 80 tcp http open
- 128.65.195.96 88 udp kerberos-sec unknown
- 128.65.195.96 123 udp ntp unknown
- 128.65.195.96 137 udp netbios-ns filtered
- 128.65.195.96 138 udp netbios-dgm filtered
- 128.65.195.96 139 udp netbios-ssn unknown
- 128.65.195.96 161 udp snmp unknown
- 128.65.195.96 162 udp snmptrap unknown
- 128.65.195.96 389 udp ldap unknown
- 128.65.195.96 443 tcp https open
- 128.65.195.96 520 udp route unknown
- 128.65.195.96 2049 udp nfs unknown
- 128.65.195.96 2222 tcp ethernetip-1 open
- 138.128.160.2 21 tcp ftp open
- 138.128.160.2 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
- 138.128.160.2 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
- 138.128.160.2 67 udp dhcps unknown
- 138.128.160.2 68 udp dhcpc unknown
- 138.128.160.2 69 udp tftp unknown
- 138.128.160.2 80 tcp http open Apache httpd
- 138.128.160.2 88 udp kerberos-sec unknown
- 138.128.160.2 110 tcp pop3 open
- 138.128.160.2 123 udp ntp unknown
- 138.128.160.2 137 udp netbios-ns filtered
- 138.128.160.2 138 udp netbios-dgm filtered
- 138.128.160.2 139 udp netbios-ssn unknown
- 138.128.160.2 143 tcp imap open Dovecot imapd
- 138.128.160.2 161 udp snmp unknown
- 138.128.160.2 162 udp snmptrap unknown
- 138.128.160.2 389 udp ldap unknown
- 138.128.160.2 443 tcp ssl/http open Apache httpd
- 138.128.160.2 465 tcp smtps open
- 138.128.160.2 520 udp route unknown
- 138.128.160.2 587 tcp smtp open Exim smtpd 4.92
- 138.128.160.2 993 tcp ssl/imaps open
- 138.128.160.2 995 tcp pop3s open
- 138.128.160.2 2049 udp nfs unknown
- 138.128.160.2 2087 tcp ssl/eli open
- 138.128.160.2 2095 tcp nbx-ser open
- 141.105.65.111 21 tcp ftp open
- 141.105.65.111 53 tcp domain open
- 141.105.65.111 53 udp domain open
- 141.105.65.111 67 udp dhcps unknown
- 141.105.65.111 68 udp dhcpc unknown
- 141.105.65.111 69 udp tftp unknown
- 141.105.65.111 80 tcp http open
- 141.105.65.111 88 udp kerberos-sec unknown
- 141.105.65.111 110 tcp pop3 open
- 141.105.65.111 123 udp ntp unknown
- 141.105.65.111 137 udp netbios-ns filtered
- 141.105.65.111 138 udp netbios-dgm filtered
- 141.105.65.111 139 udp netbios-ssn unknown
- 141.105.65.111 143 tcp imap open
- 141.105.65.111 161 udp snmp unknown
- 141.105.65.111 162 udp snmptrap unknown
- 141.105.65.111 389 udp ldap unknown
- 141.105.65.111 443 tcp https open
- 141.105.65.111 465 tcp smtps open
- 141.105.65.111 520 udp route unknown
- 141.105.65.111 587 tcp submission open
- 141.105.65.111 993 tcp imaps open
- 141.105.65.111 995 tcp pop3s open
- 141.105.65.111 2049 udp nfs unknown
- #######################################################################################################################################
- [+] URL: http://www.audit.gov.sd/?lang=ar/
- [+] Started: Sun Jun 30 15:16:29 2019
- Interesting Finding(s):
- [+] http://www.audit.gov.sd/?lang=ar/
- | Interesting Entries:
- | - Server: Apache
- | - X-Powered-By: PHP/5.6.40
- | - Referrer-Policy: unsafe-url
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://www.audit.gov.sd/robots.txt
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://www.audit.gov.sd/xmlrpc.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
- [+] http://www.audit.gov.sd/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] http://www.audit.gov.sd/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 5.1.1 identified (Latest, released on 2019-03-13).
- | Detected By: Rss Generator (Passive Detection)
- | - http://www.audit.gov.sd/?feed=rss2&lang=ar, <generator>https://wordpress.org/?v=5.1.1</generator>
- | Confirmed By: Emoji Settings (Passive Detection)
- | - http://www.audit.gov.sd/?lang=ar/, Match: 'wp-includes\/js\/wp-emoji-release.min.js?ver=5.1.1'
- [+] WordPress theme in use: silver
- | Location: http://www.audit.gov.sd/wp-content/themes/silver/
- | Style URL: http://www.audit.gov.sd/wp-content/plugins/wp-spry-menu/themes/silver/style.css?ver=1.5.2
- |
- | Detected By: Css Style (Passive Detection)
- |
- | The version could not be determined.
- [+] Enumerating All Plugins (via Passive Methods)
- [+] Checking Plugin Versions (via Passive and Aggressive Methods)
- [i] Plugin(s) Identified:
- [+] ads-wp-site-count
- | Location: http://www.audit.gov.sd/wp-content/plugins/ads-wp-site-count/
- | Latest Version: 2.5 (up to date)
- | Last Updated: 2019-06-18T21:40:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 2.5 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/ads-wp-site-count/readme.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/ads-wp-site-count/readme.txt
- [+] all-in-one-event-calendar
- | Location: http://www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/
- | Latest Version: 2.5.41 (up to date)
- | Last Updated: 2019-05-23T20:25:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 2.5.41 (100% confidence)
- | Detected By: Query Parameter (Passive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/ai1ec_parsed_css.css?ver=2.5.41
- | Confirmed By:
- | Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/readme.txt
- | Translation File (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/all-in-one-event-calendar/language/all-in-one-event-calendar.po, Match: 'n: All-in-One Event Calendar by Time.ly 2.5.41'
- [+] awesome-weather
- | Location: http://www.audit.gov.sd/wp-content/plugins/awesome-weather/
- | Latest Version: 2.0 (up to date)
- | Last Updated: 2019-05-06T12:58:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 2.0 (50% confidence)
- | Detected By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/awesome-weather/readme.txt
- [+] contact-form-7
- | Location: http://www.audit.gov.sd/wp-content/plugins/contact-form-7/
- | Latest Version: 5.1.3 (up to date)
- | Last Updated: 2019-05-19T16:15:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 5.1.3 (100% confidence)
- | Detected By: Query Parameter (Passive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=5.1.3
- | - http://www.audit.gov.sd/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.1.3
- | Confirmed By:
- | Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/contact-form-7/readme.txt
- | Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/contact-form-7/readme.txt
- [+] easy-weather-widget
- | Location: http://www.audit.gov.sd/wp-content/plugins/easy-weather-widget/
- | Latest Version: 3.2.5 (up to date)
- | Last Updated: 2017-12-30T02:11:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 3.2.5 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/easy-weather-widget/readme.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/easy-weather-widget/readme.txt
- [+] everest-forms
- | Location: http://www.audit.gov.sd/wp-content/plugins/everest-forms/
- | Last Updated: 2019-05-28T12:02:00.000Z
- | [!] The version is out of date, the latest version is 1.4.9
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.4.8 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/everest-forms/readme.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/everest-forms/readme.txt
- [+] jm-breaking-news
- | Location: http://www.audit.gov.sd/wp-content/plugins/jm-breaking-news/
- | Latest Version: 1.8.1 (up to date)
- | Last Updated: 2017-11-14T00:24:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.8.1 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/jm-breaking-news/readme.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/jm-breaking-news/readme.txt
- [+] job-manager
- | Location: http://www.audit.gov.sd/wp-content/plugins/job-manager/
- | Latest Version: 0.7.25 (up to date)
- | Last Updated: 2015-08-25T22:44:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | [!] 1 vulnerability identified:
- |
- | [!] Title: Job Manager <= 0.7.25 - Insecure Direct Object Reference
- | References:
- | - https://wpvulndb.com/vulnerabilities/8167
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6668
- | - https://vagmour.eu/cve-2015-6668-cv-filename-disclosure-on-job-manager-wordpress-plugin/
- |
- | Version: 7.2.5 (80% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/job-manager/readme.txt
- [+] multilanguage
- | Location: http://www.audit.gov.sd/wp-content/plugins/multilanguage/
- | Latest Version: 1.3.3 (up to date)
- | Last Updated: 2019-05-02T11:09:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.3.3 (100% confidence)
- | Detected By: Query Parameter (Passive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/multilanguage/css/style.css?ver=1.3.3
- | Confirmed By:
- | Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/multilanguage/readme.txt
- | Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/multilanguage/readme.txt
- [+] page-visit-counter
- | Location: http://www.audit.gov.sd/wp-content/plugins/page-visit-counter/
- | Last Updated: 2019-06-25T11:56:00.000Z
- | [!] The version is out of date, the latest version is 5.3
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 5.2 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/page-visit-counter/README.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/page-visit-counter/README.txt
- [+] sassy-social-share
- | Location: http://www.audit.gov.sd/wp-content/plugins/sassy-social-share/
- | Last Updated: 2019-06-19T04:10:00.000Z
- | [!] The version is out of date, the latest version is 3.2.26
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 3.2.24 (100% confidence)
- | Detected By: Query Parameter (Passive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/sassy-social-share/public/css/sassy-social-share-public.css?ver=3.2.24
- | - http://www.audit.gov.sd/wp-content/plugins/sassy-social-share/public/js/sassy-social-share-public.js?ver=3.2.24
- | Confirmed By:
- | Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/sassy-social-share/readme.txt
- | Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/sassy-social-share/readme.txt
- [+] shortcodes-ultimate
- | Location: http://www.audit.gov.sd/wp-content/plugins/shortcodes-ultimate/
- | Latest Version: 5.3.0 (up to date)
- | Last Updated: 2019-05-07T21:05:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 5.3.0 (50% confidence)
- | Detected By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/shortcodes-ultimate/readme.txt
- [+] wp-advanced-pdf
- | Location: http://www.audit.gov.sd/wp-content/plugins/wp-advanced-pdf/
- | Latest Version: 1.1.6 (up to date)
- | Last Updated: 2018-09-07T10:42:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.1.6 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/wp-advanced-pdf/readme.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/wp-advanced-pdf/readme.txt
- [+] wp-spry-menu
- | Location: http://www.audit.gov.sd/wp-content/plugins/wp-spry-menu/
- | Latest Version: 1.5.2 (up to date)
- | Last Updated: 2014-08-10T19:04:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.5.2 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/wp-spry-menu/readme.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/wp-spry-menu/readme.txt
- [+] wp-symposium-toolbar
- | Location: http://www.audit.gov.sd/wp-content/plugins/wp-symposium-toolbar/
- | Latest Version: 0.33.0 (up to date)
- | Last Updated: 2015-09-21T17:11:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 0.33.0 (80% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://www.audit.gov.sd/wp-content/plugins/wp-symposium-toolbar/readme.txt
- [+] Enumerating Config Backups (via Passive and Aggressive Methods)
- Checking Config Backups - Time: 00:00:02 <=============> (21 / 21) 100.00% Time: 00:00:02
- [i] No Config Backups Found.
- [+] Finished: Sun Jun 30 15:18:02 2019
- [+] Requests Done: 86
- [+] Cached Requests: 6
- [+] Data Sent: 26.702 KB
- [+] Data Received: 740.899 KB
- [+] Memory used: 193.613 MB
- [+] Elapsed time: 00:01:33
- #######################################################################################################################################
- [+] URL: http://www.audit.gov.sd/
- [+] Effective URL: http://www.audit.gov.sd/?lang=ar
- [+] Started: Sun Jun 30 15:16:13 2019
- Interesting Finding(s):
- [+] http://www.audit.gov.sd/?lang=ar
- | Interesting Entries:
- | - Server: Apache
- | - X-Powered-By: PHP/5.6.40
- | - Referrer-Policy: unsafe-url
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://www.audit.gov.sd/robots.txt
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://www.audit.gov.sd/xmlrpc.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
- [+] http://www.audit.gov.sd/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] http://www.audit.gov.sd/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 5.1.1 identified (Latest, released on 2019-03-13).
- | Detected By: Rss Generator (Passive Detection)
- | - http://www.audit.gov.sd/?feed=rss2&lang=ar, <generator>https://wordpress.org/?v=5.1.1</generator>
- | Confirmed By: Emoji Settings (Passive Detection)
- | - http://www.audit.gov.sd/?lang=ar, Match: 'wp-includes\/js\/wp-emoji-release.min.js?ver=5.1.1'
- [+] WordPress theme in use: silver
- | Location: http://www.audit.gov.sd/wp-content/themes/silver/
- | Style URL: http://www.audit.gov.sd/wp-content/plugins/wp-spry-menu/themes/silver/style.css?ver=1.5.2
- |
- | Detected By: Css Style (Passive Detection)
- |
- | The version could not be determined.
- [+] Enumerating Users (via Passive and Aggressive Methods)
- Brute Forcing Author IDs - Time: 00:00:34 <==> (10 / 10) 100.00% Time: 00:00:34
- [i] User(s) Identified:
- [+] audit
- | Detected By: Author Posts - Display Name (Passive Detection)
- | Confirmed By: Rss Generator (Passive Detection)
- [+] Finished: Sun Jun 30 15:17:58 2019
- [+] Requests Done: 66
- [+] Cached Requests: 5
- [+] Data Sent: 22.656 KB
- [+] Data Received: 496.464 KB
- [+] Memory used: 92.117 MB
- [+] Elapsed time: 00:01:44
- #######################################################################################################################################
- [+] URL: http://www.audit.gov.sd/?lang=ar/
- [+] Started: Sun Jun 30 16:12:08 2019
- Interesting Finding(s):
- [+] http://www.audit.gov.sd/?lang=ar/
- | Interesting Entries:
- | - Server: Apache
- | - X-Powered-By: PHP/5.6.40
- | - Referrer-Policy: unsafe-url
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://www.audit.gov.sd/robots.txt
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://www.audit.gov.sd/xmlrpc.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
- [+] http://www.audit.gov.sd/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] http://www.audit.gov.sd/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 5.1.1 identified (Latest, released on 2019-03-13).
- | Detected By: Rss Generator (Passive Detection)
- | - http://www.audit.gov.sd/?feed=rss2&lang=ar, <generator>https://wordpress.org/?v=5.1.1</generator>
- | Confirmed By: Emoji Settings (Passive Detection)
- | - http://www.audit.gov.sd/?lang=ar/, Match: 'wp-includes\/js\/wp-emoji-release.min.js?ver=5.1.1'
- [+] WordPress theme in use: silver
- | Location: http://www.audit.gov.sd/wp-content/themes/silver/
- | Style URL: http://www.audit.gov.sd/wp-content/plugins/wp-spry-menu/themes/silver/style.css?ver=1.5.2
- |
- | Detected By: Css Style (Passive Detection)
- |
- | The version could not be determined.
- [+] Enumerating Users (via Passive and Aggressive Methods)
- Brute Forcing Author IDs - Time: 00:00:33 <============> (10 / 10) 100.00% Time: 00:00:33
- [i] User(s) Identified:
- [+] audit
- | Detected By: Author Posts - Display Name (Passive Detection)
- | Confirmed By: Rss Generator (Passive Detection)
- [+] Finished: Sun Jun 30 16:13:44 2019
- [+] Requests Done: 64
- [+] Cached Requests: 7
- [+] Data Sent: 22.679 KB
- [+] Data Received: 494.064 KB
- [+] Memory used: 92.25 MB
- #######################################################################################################################################
- [-] Date & Time: 30/06/2019 15:16:19
- [I] Threads: 5
- [-] Target: http://www.audit.gov.sd/?lang=ar (138.128.160.2)
- [M] Website Not in HTTPS: http://www.audit.gov.sd/?lang=ar
- [I] Server: Apache
- [I] X-Powered-By: PHP/5.6.40
- [L] X-Frame-Options: Not Enforced
- [I] Strict-Transport-Security: Not Enforced
- [I] X-Content-Security-Policy: Not Enforced
- [L] No Robots.txt Found
- [I] CMS Detection: WordPress
- [I] Wordpress Version: 5.1.1
- [I] Wordpress Theme: colormag
- [H] Configuration File Found: http://www.audit.gov.sd/?lang=ar/wp-config
- [H] Configuration File Found: http://www.audit.gov.sd/?lang=ar/wp-config.php-old
- [H] Configuration File Found: http://www.audit.gov.sd/?lang=ar/wp-config.php.old
- [H] Configuration File Found: http://www.audit.gov.sd/?lang=ar/wp-config.original
- [M] XML-RPC services are enabled
- [I] Autocomplete Off Not Found: http://www.audit.gov.sd/?lang=ar/wp-login.php
- [-] Default WordPress Files:
- [I] http://www.audit.gov.sd/?lang=ar/wp-content/themes/twentyfourteen/genericons/README.txt
- [I] http://www.audit.gov.sd/?lang=ar/wp-content/themes/twentynineteen/readme.txt
- [I] http://www.audit.gov.sd/?lang=ar/wp-content/themes/twentyseventeen/README.txt
- [I] http://www.audit.gov.sd/?lang=ar/wp-content/themes/twentyten/license.txt
- [I] http://www.audit.gov.sd/?lang=ar/wp-content/themes/twentyten/readme.txt
- [I] http://www.audit.gov.sd/?lang=ar/wp-content/themes/twentytwelve/readme.txt
- [I] http://www.audit.gov.sd/?lang=ar/wp-includes/ID3/license.commercial.txt
- [-] Searching Wordpress Plugins ...
- [I] 1-flash-gallery
- [M] EDB-ID: 17801 "WordPress Plugin 1 Flash Gallery 1.30 < 1.5.7a - Arbitrary File Upload (Metasploit)"
- [I] 1-jquery-photo-gallery-slideshow-flash
- [M] EDB-ID: 36382 "WordPress Plugin 1-jquery-photo-gallery-Slideshow-flash 1.01 - Cross-Site Scripting"
- [I] 2-click-socialmedia-buttons
- [M] EDB-ID: 37178 "WordPress Plugin 2 Click Social Media Buttons 0.32.2 - Multiple Cross-Site Scripting Vulnerabilities"
- [I] Calendar
- [M] EDB-ID: 21715 "WordPress Plugin spider Calendar - Multiple Vulnerabilities"
- [I] Calendar-Script
- [M] EDB-ID: 38018 "WordPress Plugin PHP Event Calendar - 'cid' SQL Injection"
- [I] Lead-Octopus-Power
- [M] EDB-ID: 39269 "WordPress Plugin Lead Octopus Power - 'id' SQL Injection"
- [I] Premium_Gallery_Manager
- [M] EDB-ID: 34538 "WordPress Plugin Premium Gallery Manager - Configuration Access"
- [M] EDB-ID: 39111 "WordPress Plugin Premium Gallery Manager - Arbitrary File Upload"
- [I] Tevolution
- [M] EDB-ID: 40976 "WordPress Plugin Slider Templatic Tevolution < 2.3.6 - Arbitrary File Upload"
- [I] a-gallery
- [M] EDB-ID: 17872 "Multiple WordPress Plugins - 'timthumb.php' File Upload"
- [I] a-to-z-category-listing
- [M] EDB-ID: 17809 "WordPress Plugin A to Z Category Listing 1.3 - SQL Injection"
- [I] acf-frontend-display
- [I] ad-wizz
- [M] EDB-ID: 35561 "WordPress Plugin WPwizz AdWizz Plugin 1.0 - 'link' Cross-Site Scripting"
- [I] adminimize
- [M] EDB-ID: 36325 "WordPress Plugin Adminimize 1.7.21 - 'page' Cross-Site Scripting"
- [I] ads-box
- [M] EDB-ID: 38060 "WordPress Plugin Ads Box - 'count' SQL Injection"
- [I] ads-wp-site-count
- [I] advanced-dewplayer
- [M] EDB-ID: 38936 "WordPress Plugin Advanced Dewplayer - 'download-file.php' Script Directory Traversal"
- [I] advanced-text-widget
- [M] EDB-ID: 36324 "WordPress Plugin Advanced Text Widget 2.0 - 'page' Cross-Site Scripting"
- [I] advanced-uploader
- [M] EDB-ID: 38867 "WordPress Plugin Advanced uploader 2.10 - Multiple Vulnerabilities"
- [I] advertizer
- [M] EDB-ID: 17750 "WordPress Plugin Advertizer 1.0 - SQL Injection"
- [I] age-verification
- [M] EDB-ID: 18350 "WordPress Plugin Age Verification 0.4 - Open Redirect"
- [M] EDB-ID: 36540 "WordPress Plugin Age Verification 0.4 - 'redirect_to' Open Redirection"
- [I] ajax-store-locator-wordpress_0
- [M] EDB-ID: 35493 "WordPress Plugin Ajax Store Locator 1.2 - Arbitrary File Download"
- [I] ajaxgallery
- [M] EDB-ID: 17686 "WordPress Plugin Ajax Gallery 3.0 - SQL Injection"
- [I] all-in-one-event-calendar
- [M] EDB-ID: 37075 "WordPress Plugin All-in-One Event Calendar 1.4 - 'agenda-widget-form.php?title' Cross-Site Scripting"
- [M] EDB-ID: 37076 "WordPress Plugin All-in-One Event Calendar 1.4 - 'box_publish_button.php?button_value' Cross-Site Scripting"
- [M] EDB-ID: 37077 "WordPress Plugin All-in-One Event Calendar 1.4 - 'save_successful.php?msg' Cross-Site Scripting"
- [M] EDB-ID: 37078 "WordPress Plugin All-in-One Event Calendar 1.4 - 'agenda-widget.php' Multiple Cross-Site Scripting Vulnerabilities"
- [I] all-in-one-wp-security-and-firewall
- [M] EDB-ID: 34854 "WordPress Plugin All In One WP Security & Firewall 3.8.3 - Persistent Cross-Site Scripting"
- [I] all-video-gallery
- [M] EDB-ID: 22427 "WordPress Plugin All Video Gallery 1.1 - SQL Injection"
- [I] allow-php-in-posts-and-pages
- [M] EDB-ID: 17688 "WordPress Plugin Allow PHP in Posts and Pages 2.0.0.RC1 - SQL Injection"
- [I] allwebmenus-wordpress-menu-plugin
- [M] EDB-ID: 17861 "WordPress Plugin AllWebMenus 1.1.3 - Remote File Inclusion"
- [M] EDB-ID: 18407 "WordPress Plugin AllWebMenus < 1.1.9 Menu Plugin - Arbitrary File Upload"
- [I] alo-easymail
- [I] annonces
- [M] EDB-ID: 17863 "WordPress Plugin Annonces 1.2.0.0 - Remote File Inclusion"
- [I] answer-my-question
- [M] EDB-ID: 40771 "WordPress Plugin Answer My Question 1.3 - SQL Injection"
- [I] appointment-booking-calendar
- [M] EDB-ID: 39309 "WordPress Plugin Booking Calendar Contact Form 1.1.23 - SQL Injection"
- [M] EDB-ID: 39319 "WordPress Plugin Booking Calendar Contact Form 1.1.23 - Shortcode SQL Injection"
- [M] EDB-ID: 39341 "WordPress Plugin Booking Calendar Contact Form 1.1.24 - Multiple Vulnerabilities"
- [M] EDB-ID: 39342 "WordPress Plugin Booking Calendar Contact Form 1.1.24 - addslashes SQL Injection"
- [I] asset-manager
- [M] EDB-ID: 18993 "WordPress Plugin Asset Manager 0.2 - Arbitrary File Upload"
- [I] audio
- [M] EDB-ID: 35258 "WordPress Plugin Audio 0.5.1 - 'showfile' Cross-Site Scripting"
- [I] audio-player
- [M] EDB-ID: 38300 "WordPress Plugin Audio Player - 'playerID' Cross-Site Scripting"
- [I] auto-attachments
- [I] aviary-image-editor-add-on-for-gravity-forms
- [M] EDB-ID: 37275 "WordPress Plugin Aviary Image Editor Addon For Gravity Forms 3.0 Beta - Arbitrary File Upload"
- [I] awesome-weather
- [I] backwpup
- [M] EDB-ID: 35400 "WordPress Plugin BackWPup 1.4 - Multiple Information Disclosure Vulnerabilities"
- [I] baggage-freight
- [M] EDB-ID: 46061 "WordPress Plugin Baggage Freight Shipping Australia 0.1.0 - Arbitrary File Upload"
- [I] baggage_shipping
- [I] bbpress
- [M] EDB-ID: 22396 "WordPress Plugin bbPress - Multiple Vulnerabilities"
- [I] bezahlcode-generator
- [M] EDB-ID: 35286 "WordPress Plugin BezahlCode Generator 1.0 - 'gen_name' Cross-Site Scripting"
- [I] booking
- [M] EDB-ID: 27399 "WordPress Plugin Booking Calendar 4.1.4 - Cross-Site Request Forgery"
- [I] booking-calendar-contact-form
- [M] EDB-ID: 37003 "WordPress Plugin Booking Calendar Contact Form 1.0.2 - Multiple Vulnerabilities"
- [I] bookx
- [M] EDB-ID: 39251 "WordPress Plugin BookX 1.7 - 'bookx_export.php' Local File Inclusion"
- [I] brandfolder
- [M] EDB-ID: 39591 "WordPress Plugin Brandfolder 3.0 - Local/Remote File Inclusion"
- [I] catalog
- [M] EDB-ID: 25724 "WordPress Plugin Spider Catalog 1.4.6 - Multiple Vulnerabilities"
- [M] EDB-ID: 38639 "WordPress Plugin miniBB - SQL Injection / Multiple Cross-Site Scripting Vulnerabilities"
- [I] category-list-portfolio-page
- [I] cevhershare
- [M] EDB-ID: 17891 "WordPress Plugin CevherShare 2.0 - SQL Injection"
- [I] cforms
- [M] EDB-ID: 34946 "WordPress Plugin cformsII 11.5/13.1 - 'lib_ajax.php' Multiple Cross-Site Scripting Vulnerabilities"
- [I] chenpress
- [M] EDB-ID: 37522 "WordPress Plugin chenpress - Arbitrary File Upload"
- [I] church-admin
- [M] EDB-ID: 37483 "WordPress Plugin church_admin - 'id' Cross-Site Scripting"
- [I] cimy-counter
- [M] EDB-ID: 14057 "WordPress Plugin Cimy Counter - Full Path Disclosure / Redirector / Cross-Site Scripting / HTTP Response Spitting"
- [M] EDB-ID: 34195 "WordPress Plugin Cimy Counter 0.9.4 - HTTP Response Splitting / Cross-Site Scripting"
- [I] clickdesk-live-support-chat
- [M] EDB-ID: 36338 "WordPress Plugin ClickDesk Live Support 2.0 - 'cdwidget' Cross-Site Scripting"
- [I] cloudsafe365-for-wp
- [M] EDB-ID: 37681 "WordPress Plugin Cloudsafe365 - 'file' Remote File Disclosure"
- [I] cm-download-manager
- [M] EDB-ID: 35324 "WordPress Plugin CM Download Manager 2.0.0 - Code Injection"
- [I] cms-pack
- [I] cnhk-slideshow
- [M] EDB-ID: 39190 "WordPress Plugin cnhk-Slideshow - Arbitrary File Upload"
- [I] comment-rating
- [M] EDB-ID: 16221 "WordPress Plugin Comment Rating 2.9.23 - Multiple Vulnerabilities"
- [M] EDB-ID: 24552 "WordPress Plugin Comment Rating 2.9.32 - Multiple Vulnerabilities"
- [M] EDB-ID: 36487 "WordPress Plugin Comment Rating 2.9.20 - 'path' Cross-Site Scripting"
- [I] contact-form-7
- [I] contact-form-wordpress
- [M] EDB-ID: 17980 "WordPress Plugin Contact Form 2.7.5 - SQL Injection"
- [I] contus-hd-flv-player
- [M] EDB-ID: 17678 "WordPress Plugin Contus HD FLV Player 1.3 - SQL Injection"
- [M] EDB-ID: 37377 "WordPress Plugin HD FLV Player - 'uploadVideo.php' Arbitrary File Upload"
- [I] contus-video-gallery
- [M] EDB-ID: 34161 "WordPress Plugin Video Gallery 2.5 - Multiple Vulnerabilities"
- [I] contus-video-galleryversion-10
- [M] EDB-ID: 37373 "WordPress Plugin Contus Video Gallery - 'upload1.php' Arbitrary File Upload"
- [I] copyright-licensing-tools
- [M] EDB-ID: 17749 "WordPress Plugin iCopyright(R) Article Tools 1.1.4 - SQL Injection"
- [I] count-per-day
- [M] EDB-ID: 17857 "WordPress Plugin Count per Day 2.17 - SQL Injection"
- [M] EDB-ID: 18355 "WordPress Plugin Count Per Day - Multiple Vulnerabilities"
- [M] EDB-ID: 20862 "WordPress Plugin Count Per Day 3.2.3 - Cross-Site Scripting"
- [I] couponer
- [M] EDB-ID: 17759 "WordPress Plugin Couponer 1.2 - SQL Injection"
- [I] cp-polls
- [M] EDB-ID: 39513 "WordPress Plugin CP Polls 1.0.8 - Multiple Vulnerabilities"
- [I] cp-reservation-calendar
- [M] EDB-ID: 38187 "WordPress Plugin CP Reservation Calendar 1.1.6 - SQL Injection"
- [I] cpl
- [M] EDB-ID: 11458 "WordPress Plugin Copperleaf Photolog 0.16 - SQL Injection"
- [I] crawlrate-tracker
- [M] EDB-ID: 17755 "WordPress Plugin Crawl Rate Tracker 2.0.2 - SQL Injection"
- [I] crayon-syntax-highlighter
- [M] EDB-ID: 37946 "WordPress Plugin Crayon Syntax Highlighter - 'wp_load' Remote File Inclusion"
- [I] custom-content-type-manager
- [M] EDB-ID: 19058 "WordPress Plugin Custom Content Type Manager 0.9.5.13-pl - Arbitrary File Upload"
- [I] custom-tables
- [M] EDB-ID: 37482 "WordPress Plugin custom tables - 'key' Cross-Site Scripting"
- [I] cysteme-finder
- [M] EDB-ID: 40295 "WordPress Plugin CYSTEME Finder 1.3 - Arbitrary File Disclosure/Arbitrary File Upload"
- [I] db-backup
- [M] EDB-ID: 35378 "WordPress Plugin DB Backup - Arbitrary File Download"
- [I] disclosure-policy-plugin
- [M] EDB-ID: 17865 "WordPress Plugin Disclosure Policy 1.0 - Remote File Inclusion"
- [I] dm-albums
- [M] EDB-ID: 9043 "Adobe Flash Selection.SetSelection - Use-After-Free"
- [M] EDB-ID: 9048 "Adobe Flash TextField.replaceText - Use-After-Free"
- [I] downloads-manager
- [M] EDB-ID: 6127 "Pixel Studio 2.17 - Denial of Service (PoC)"
- [I] dp-thumbnail
- [I] drag-drop-file-uploader
- [M] EDB-ID: 19057 "WordPress Plugin drag and drop file upload 0.1 - Arbitrary File Upload"
- [I] dukapress
- [M] EDB-ID: 35346 "WordPress Plugin DukaPress 2.5.2 - Directory Traversal"
- [I] dzs-zoomsounds
- [M] EDB-ID: 37166 "WordPress Plugin dzs-zoomsounds 2.0 - Arbitrary File Upload"
- [I] easy-contact-form-lite
- [M] EDB-ID: 17680 "WordPress Plugin Easy Contact Form Lite 1.0.7 - SQL Injection"
- [I] easy-weather-widget
- [I] ebook-download
- [M] EDB-ID: 39575 "WordPress Plugin eBook Download 1.1 - Directory Traversal"
- [I] editormonkey
- [M] EDB-ID: 17284 "WordPress Plugin EditorMonkey 2.5 - 'FCKeditor' Arbitrary File Upload"
- [I] email-newsletter
- [M] EDB-ID: 37356 "WordPress Plugin Email NewsLetter 8.0 - 'option' Information Disclosure"
- [I] evarisk
- [M] EDB-ID: 17738 "WordPress Plugin Evarisk 5.1.3.6 - SQL Injection"
- [M] EDB-ID: 37399 "WordPress Plugin Evarisk - 'uploadPhotoApres.php' Arbitrary File Upload"
- [I] event-registration
- [M] EDB-ID: 17751 "WordPress Plugin Event Registration 5.4.3 - SQL Injection"
- [I] eventify
- [M] EDB-ID: 17794 "WordPress Plugin Eventify - Simple Events 1.7.f SQL Injection"
- [I] everest-forms
- [I] extend-wordpress
- [I] fbgorilla
- [M] EDB-ID: 39283 "WordPress Plugin FB Gorilla - 'game_play.php' SQL Injection"
- [I] fbpromotions
- [M] EDB-ID: 17737 "WordPress Plugin Facebook Promotions 1.3.3 - SQL Injection"
- [I] feature-slideshow
- [M] EDB-ID: 35285 "WordPress Plugin Feature Slideshow 1.0.6 - 'src' Cross-Site Scripting"
- [I] featurific-for-wordpress
- [M] EDB-ID: 36339 "WordPress Plugin Featurific For WordPress 1.6.2 - 'snum' Cross-Site Scripting"
- [I] feedlist
- [M] EDB-ID: 34973 "WordPress Plugin FeedList 2.61.01 - 'handler_image.php' Cross-Site Scripting"
- [I] feedweb
- [M] EDB-ID: 38414 "WordPress Plugin Feedweb - 'wp_post_id' Cross-Site Scripting"
- [I] fgallery
- [M] EDB-ID: 4993 "GitList 0.6.0 - Argument Injection (Metasploit)"
- [I] file-groups
- [M] EDB-ID: 17677 "WordPress Plugin File Groups 1.1.2 - SQL Injection"
- [I] finder
- [M] EDB-ID: 37677 "WordPress Plugin Finder - 'order' Cross-Site Scripting"
- [I] firestats
- [M] EDB-ID: 14308 "WordPress Plugin Firestats - Remote Configuration File Download"
- [M] EDB-ID: 33367 "WordPress Plugin Firestats 1.0.2 - Multiple Cross-Site Scripting / Authentication Bypass Vulnerabilities (1)"
- [M] EDB-ID: 33368 "WordPress Plugin Firestats 1.0.2 - Multiple Cross-Site Scripting / Authentication Bypass Vulnerabilities (2)"
- [I] flash-album-gallery
- [M] EDB-ID: 16947 "WordPress Plugin GRAND Flash Album Gallery 0.55 - Multiple Vulnerabilities"
- [M] EDB-ID: 36383 "WordPress Plugin flash-album-gallery - 'facebook.php' Cross-Site Scripting"
- [M] EDB-ID: 36434 "WordPress Plugin GRAND FlAGallery 1.57 - 'flagshow.php' Cross-Site Scripting"
- [M] EDB-ID: 36444 "WordPress Plugin flash-album-gallery - 'flagshow.php' Cross-Site Scripting"
- [I] flexible-custom-post-type
- [M] EDB-ID: 36317 "WordPress Plugin Flexible Custom Post Type - 'id' Cross-Site Scripting"
- [I] flipbook
- [M] EDB-ID: 37452 "WordPress Plugin Flip Book - 'PHP.php' Arbitrary File Upload"
- [I] font-uploader
- [M] EDB-ID: 18994 "WordPress Plugin Font Uploader 1.2.4 - Arbitrary File Upload"
- [I] forum-server
- [M] EDB-ID: 16235 "WordPress Plugin Forum Server 1.6.5 - SQL Injection"
- [M] EDB-ID: 17828 "WordPress Plugin Forum Server 1.7 - SQL Injection"
- [I] foxypress
- [M] EDB-ID: 18991 "WordPress Plugin Foxypress 0.4.1.1 < 0.4.2.1 - Arbitrary File Upload"
- [M] EDB-ID: 22374 "WordPress Plugin foxypress 0.4.2.5 - Multiple Vulnerabilities"
- [I] front-end-upload
- [M] EDB-ID: 19008 "WordPress Plugin Front End Upload 0.5.3 - Arbitrary File Upload"
- [I] front-file-manager
- [M] EDB-ID: 19012 "WordPress Plugin Front File Manager 0.1 - Arbitrary File Upload"
- [I] fs-real-estate-plugin
- [M] EDB-ID: 22071 "WordPress Plugin FireStorm Professional Real Estate 2.06.01 - SQL Injection"
- [I] gallery-images
- [M] EDB-ID: 34524 "WordPress Plugin Huge-IT Image Gallery 1.0.1 - (Authenticated) SQL Injection"
- [M] EDB-ID: 39807 "WordPress Plugin Huge-IT Image Gallery 1.8.9 - Multiple Vulnerabilities"
- [I] gd-star-rating
- [M] EDB-ID: 17973 "WordPress Plugin GD Star Rating 1.9.10 - SQL Injection"
- [M] EDB-ID: 35373 "WordPress Plugin GD Star Rating 1.9.7 - 'wpfn' Cross-Site Scripting"
- [M] EDB-ID: 35835 "WordPress Plugin GD Star Rating - 'votes' SQL Injection"
- [I] global-flash-galleries
- [M] EDB-ID: 39059 "WordPress Plugin Global Flash Gallery - 'swfupload.php' Arbitrary File Upload"
- [I] google-mp3-audio-player
- [M] EDB-ID: 35460 "WordPress Plugin CodeArt Google MP3 Player - File Disclosure Download"
- [I] grapefile
- [M] EDB-ID: 17760 "WordPress Plugin grapefile 1.1 - Arbitrary File Upload"
- [I] gwolle-gb
- [M] EDB-ID: 38861 "WordPress Plugin Gwolle Guestbook 1.5.3 - Remote File Inclusion"
- [I] hb-audio-gallery-lite
- [M] EDB-ID: 39589 "WordPress Plugin HB Audio Gallery Lite 1.0.0 - Arbitrary File Download"
- [I] hd-webplayer
- [M] EDB-ID: 20918 "WordPress Plugin HD Webplayer 1.1 - SQL Injection"
- [I] hitasoft_player
- [M] EDB-ID: 38012 "WordPress Plugin FLV Player - 'id' SQL Injection"
- [I] html5avmanager
- [M] EDB-ID: 18990 "WordPress Plugin HTML5 AV Manager 0.2.7 - Arbitrary File Upload"
- [I] igit-posts-slider-widget
- [M] EDB-ID: 35392 "WordPress Plugin IGIT Posts Slider Widget 1.0 - 'src' Cross-Site Scripting"
- [I] image-gallery-with-slideshow
- [M] EDB-ID: 17761 "WordPress Plugin image Gallery with Slideshow 1.5 - Multiple Vulnerabilities"
- [I] imdb-widget
- [M] EDB-ID: 39621 "WordPress Plugin IMDb Profile Widget 1.0.8 - Local File Inclusion"
- [I] inboundio-marketing
- [M] EDB-ID: 36478 "WordPress Plugin InBoundio Marketing 1.0 - Arbitrary File Upload"
- [I] inline-gallery
- [M] EDB-ID: 35418 "WordPress Plugin Inline Gallery 0.3.9 - 'do' Cross-Site Scripting"
- [I] invit0r
- [M] EDB-ID: 37403 "WordPress Plugin Invit0r - 'ofc_upload_image.php' Arbitrary File Upload"
- [I] ip-logger
- [M] EDB-ID: 17673 "WordPress Plugin IP-Logger 3.0 - SQL Injection"
- [I] is-human
- [M] EDB-ID: 17299 "WordPress Plugin Is-human 1.4.2 - Remote Command Execution"
- [I] iwant-one-ihave-one
- [M] EDB-ID: 16236 "WordPress Plugin IWantOneButton 3.0.1 - Multiple Vulnerabilities"
- [I] jetpack
- [M] EDB-ID: 18126 "WordPress Plugin jetpack - 'sharedaddy.php' ID SQL Injection"
- [I] jm-breaking-news
- [I] job-manager
- [I] joliprint
- [M] EDB-ID: 37176 "WordPress Plugin PDF & Print Button Joliprint 1.3.0 - Multiple Cross-Site Scripting Vulnerabilities"
- [I] jquery-mega-menu
- [M] EDB-ID: 16250 "WordPress Plugin jQuery Mega Menu 1.0 - Local File Inclusion"
- [I] jrss-widget
- [M] EDB-ID: 34977 "WordPress Plugin jRSS Widget 1.1.1 - 'url' Information Disclosure"
- [I] js-appointment
- [M] EDB-ID: 17724 "WordPress Plugin Js-appointment 1.5 - SQL Injection"
- [I] jtrt-responsive-tables
- [M] EDB-ID: 43110 "WordPress Plugin JTRT Responsive Tables 4.1 - SQL Injection"
- [I] kino-gallery
- [I] kish-guest-posting
- [I] kittycatfish
- [M] EDB-ID: 41919 "WordPress Plugin KittyCatfish 2.2 - SQL Injection"
- [I] knews
- [M] EDB-ID: 37484 "WordPress Plugin Knews Multilingual Newsletters - Cross-Site Scripting"
- [I] knr-author-list-widget
- [M] EDB-ID: 17791 "WordPress Plugin KNR Author List Widget 2.0.0 - SQL Injection"
- [I] lanoba-social-plugin
- [M] EDB-ID: 36326 "WordPress Plugin Lanoba Social 1.0 - 'action' Cross-Site Scripting"
- [I] lazy-content-slider
- [M] EDB-ID: 40070 "WordPress Plugin Lazy Content Slider 3.4 - Cross-Site Request Forgery (Add Catetory)"
- [I] lazy-seo
- [M] EDB-ID: 28452 "WordPress Plugin Lazy SEO 1.1.9 - Arbitrary File Upload"
- [I] lazyest-gallery
- [M] EDB-ID: 35435 "WordPress Plugin Lazyest Gallery 1.0.26 - 'image' Cross-Site Scripting"
- [I] lb-mixed-slideshow
- [M] EDB-ID: 37418 "WordPress Plugin LB Mixed Slideshow - 'upload.php' Arbitrary File Upload"
- [I] leaguemanager
- [M] EDB-ID: 24789 "WordPress Plugin LeagueManager 3.8 - SQL Injection"
- [I] leenkme
- [I] levelfourstorefront
- [M] EDB-ID: 38158 "WordPress Plugin Shopping Cart for WordPress - '/wp-content/plugins/levelfourstorefront/scripts/administration/exportsubscribers.php? reqID' SQL Injection"
- [M] EDB-ID: 38159 "WordPress Plugin Shopping Cart for WordPress - '/wp-content/plugins/levelfourstorefront/scripts/administration/backup.php?reqID' SQL Injection"
- [M] EDB-ID: 38160 "WordPress Plugin Shopping Cart for WordPress - '/wp-content/plugins/levelfourstorefront/scripts/administration/exportaccounts.php?reqID' SQL Injection"
- [I] like-dislike-counter-for-posts-pages-and-comments
- [M] EDB-ID: 34553 "WordPress Plugin Like Dislike Counter 1.2.3 - SQL Injection"
- [I] link-library
- [M] EDB-ID: 17887 "WordPress Plugin Link Library 5.2.1 - SQL Injection"
- [I] lisl-last-image-slider
- [I] livesig
- [M] EDB-ID: 17864 "WordPress Plugin Livesig 0.4 - Remote File Inclusion"
- [I] localize-my-post
- [M] EDB-ID: 45439 "WordPress Plugin Localize My Post 1.0 - Local File Inclusion"
- [I] mac-dock-gallery
- [M] EDB-ID: 19056 "WordPress Plugin Mac Photo Gallery 2.7 - Arbitrary File Upload"
- [I] madebymilk
- [M] EDB-ID: 38041 "WordPress Theme Madebymilk - 'id' SQL Injection"
- [I] mail-masta
- [M] EDB-ID: 40290 "WordPress Plugin Mail Masta 1.0 - Local File Inclusion"
- [M] EDB-ID: 41438 "WordPress Plugin Mail Masta 1.0 - SQL Injection"
- [I] mailz
- [M] EDB-ID: 17866 "WordPress Plugin Mailing List 1.3.2 - Remote File Inclusion"
- [M] EDB-ID: 18276 "WordPress Plugin Mailing List - Arbitrary File Download"
- [I] media-library-categories
- [M] EDB-ID: 17628 "WordPress Plugin Media Library Categories 1.0.6 - SQL Injection"
- [I] meenews
- [M] EDB-ID: 36340 "WordPress Plugin NewsLetter Meenews 5.1 - 'idnews' Cross-Site Scripting"
- [I] membership-simplified-for-oap-members-only
- [M] EDB-ID: 41622 "Wordpress Plugin Membership Simplified 1.58 - Arbitrary File Download"
- [I] mingle-forum
- [M] EDB-ID: 15943 "WordPress Plugin mingle forum 1.0.26 - Multiple Vulnerabilities"
- [M] EDB-ID: 17894 "WordPress Plugin Mingle Forum 1.0.31 - SQL Injection"
- [I] mm-forms-community
- [M] EDB-ID: 17725 "WordPress Plugin MM Forms Community 1.2.3 - SQL Injection"
- [M] EDB-ID: 18997 "WordPress Plugin MM Forms Community 2.2.6 - Arbitrary File Upload"
- [I] monsters-editor-10-for-wp-super-edit
- [M] EDB-ID: 37654 "WordPress Plugin Monsters Editor for WP Super Edit - Arbitrary File Upload"
- [I] mukioplayer-for-wordpress
- [M] EDB-ID: 38755 "WordPress Plugin mukioplayer4wp - 'cid' SQL Injection"
- [I] multilanguage
- [I] myflash
- [M] EDB-ID: 3828 "Microsoft Windows Kernel - 'NtGdiStretchBlt' Pool Buffer Overflow (MS15-097)"
- [I] mystat
- [M] EDB-ID: 17740 "WordPress Plugin mySTAT 2.6 - SQL Injection"
- [I] nextgen-gallery
- [M] EDB-ID: 12098 "WordPress Plugin NextGEN Gallery 1.5.1 - Cross-Site Scripting"
- [M] EDB-ID: 38178 "WordPress Plugin NextGEN Gallery - 'test-head' Cross-Site Scripting"
- [M] EDB-ID: 39100 "WordPress Plugin NextGEN Gallery - 'jqueryFileTree.php' Directory Traversal"
- [I] nextgen-smooth-gallery
- [M] EDB-ID: 14541 "WordPress Plugin NextGEN Smooth Gallery 0.12 - Blind SQL Injection"
- [I] ocim-mp3
- [M] EDB-ID: 39498 "WordPress Plugin Ocim MP3 - SQL Injection"
- [I] odihost-newsletter-plugin
- [M] EDB-ID: 17681 "WordPress Plugin OdiHost NewsLetter 1.0 - SQL Injection"
- [I] old-post-spinner
- [M] EDB-ID: 16251 "WordPress Plugin OPS Old Post Spinner 2.2.1 - Local File Inclusion"
- [I] olimometer
- [M] EDB-ID: 40804 "WordPress Plugin Olimometer 2.56 - SQL Injection"
- [I] omni-secure-files
- [M] EDB-ID: 19009 "WordPress Plugin Omni Secure Files 0.1.13 - Arbitrary File Upload"
- [I] oqey-gallery
- [M] EDB-ID: 17779 "WordPress Plugin oQey Gallery 0.4.8 - SQL Injection"
- [M] EDB-ID: 35288 "WordPress Plugin oQey-Gallery 0.2 - 'tbpv_domain' Cross-Site Scripting"
- [I] oqey-headers
- [M] EDB-ID: 17730 "WordPress Plugin oQey Headers 0.3 - SQL Injection"
- [I] page-flip-image-gallery
- [M] EDB-ID: 30084 "WordPress Plugin page-flip-image-gallery - Arbitrary File Upload"
- [M] EDB-ID: 7543 "Linux Kernel 2.6.x - 'rds_recvmsg()' Local Information Disclosure"
- [I] page-visit-counter
- [I] paid-downloads
- [M] EDB-ID: 17797 "WordPress Plugin Paid Downloads 2.01 - SQL Injection"
- [M] EDB-ID: 36135 "WordPress Plugin Auctions 1.8.8 - 'wpa_id' SQL Injection"
- [I] participants-database
- [I] pay-with-tweet.php
- [M] EDB-ID: 18330 "WordPress Plugin Pay with Tweet 1.1 - Multiple Vulnerabilities"
- [I] paypal-currency-converter-basic-for-woocommerce
- [M] EDB-ID: 37253 "WordPress Plugin Paypal Currency Converter Basic For WooCommerce - File Read"
- [I] peugeot-music-plugin
- [M] EDB-ID: 44737 "WordPress Plugin Peugeot Music - Arbitrary File Upload"
- [I] photocart-link
- [M] EDB-ID: 39623 "WordPress Plugin Photocart Link 1.6 - Local File Inclusion"
- [I] photoracer
- [M] EDB-ID: 17720 "WordPress Plugin Photoracer 1.0 - SQL Injection"
- [M] EDB-ID: 17731 "WordPress Plugin Photoracer 1.0 - Multiple Vulnerabilities"
- [M] EDB-ID: 8961 "WordPress Plugin Photoracer 1.0 - 'id' SQL Injection"
- [I] photosmash-galleries
- [M] EDB-ID: 35429 "WordPress Plugin PhotoSmash Galleries 1.0.x - 'action' Cross-Site Scripting"
- [M] EDB-ID: 38872 "WordPress Plugin PhotoSmash Galleries - 'bwbps-uploader.php' Arbitrary File Upload"
- [I] php_speedy_wp
- [I] phpfreechat
- [M] EDB-ID: 37485 "WordPress Plugin PHPFreeChat - 'url' Cross-Site Scripting"
- [I] pica-photo-gallery
- [M] EDB-ID: 19016 "WordPress Plugin PICA Photo Gallery 1.0 - Remote File Disclosure"
- [M] EDB-ID: 19055 "WordPress Plugin Pica Photo Gallery 1.0 - Arbitrary File Upload"
- [I] pictpress
- [M] EDB-ID: 4695 "Karaoke Video Creator 2.2.8 - Denial of Service"
- [I] picturesurf-gallery
- [M] EDB-ID: 37371 "WordPress Plugin Picturesurf Gallery - 'upload.php' Arbitrary File Upload"
- [I] placester
- [M] EDB-ID: 35562 "WordPress Plugin Placester 0.1 - 'ajax_action' Cross-Site Scripting"
- [I] player
- [M] EDB-ID: 38458 "WordPress Plugin Spider Video Player - 'theme' SQL Injection"
- [I] plg_novana
- [I] plugin-dir
- [M] EDB-ID: 22853 "WordPress Plugin Facebook Survey 1.0 - SQL Injection"
- [I] plugin-newsletter
- [M] EDB-ID: 19018 "WordPress Plugin NewsLetter 1.5 - Remote File Disclosure"
- [I] podpress
- [M] EDB-ID: 38376 "WordPress Plugin podPress - 'playerID' Cross-Site Scripting"
- [I] portable-phpmyadmin
- [M] EDB-ID: 23356 "WordPress Plugin Portable phpMyAdmin - Authentication Bypass"
- [I] post-highlights
- [M] EDB-ID: 17790 "WordPress Plugin post highlights 2.2 - SQL Injection"
- [I] post-recommendations-for-wordpress
- [M] EDB-ID: 37506 "WordPress Plugin Post Recommendations - 'abspath' Remote File Inclusion"
- [I] powerhouse-museum-collection-image-grid
- [M] EDB-ID: 35287 "WordPress Plugin Powerhouse Museum Collection Image Grid 0.9.1.1 - 'tbpv_username' Cross-Site Scripting"
- [I] premium_gallery_manager
- [I] pretty-link
- [M] EDB-ID: 36233 "WordPress Plugin Pretty Link 1.4.56 - Multiple Cross-Site Scripting Vulnerabilities"
- [M] EDB-ID: 36408 "WordPress Plugin Pretty Link 1.5.2 - 'pretty-bar.php' Cross-Site Scripting"
- [M] EDB-ID: 37196 "WordPress Plugin Pretty Link Lite 1.5.2 - SQL Injection / Cross-Site Scripting"
- [M] EDB-ID: 38324 "WordPress Plugin Pretty Link - Cross-Site Scripting"
- [I] profiles
- [M] EDB-ID: 17739 "WordPress Plugin Profiles 2.0 RC1 - SQL Injection"
- [I] proplayer
- [M] EDB-ID: 17616 "WordPress Plugin ProPlayer 4.7.7 - SQL Injection"
- [M] EDB-ID: 25605 "WordPress Plugin ProPlayer 4.7.9.1 - SQL Injection"
- [I] pure-html
- [M] EDB-ID: 17758 "WordPress Plugin PureHTML 1.0.0 - SQL Injection"
- [I] q-and-a-focus-plus-faq
- [M] EDB-ID: 39806 "WordPress Plugin Q and A (Focus Plus) FAQ 1.3.9.7 - Multiple Vulnerabilities"
- [I] radykal-fancy-gallery
- [M] EDB-ID: 19398 "WordPress Plugin Fancy Gallery 1.2.4 - Arbitrary File Upload"
- [I] rating-widget
- [I] rb-agency
- [M] EDB-ID: 40333 "WordPress Plugin RB Agency 2.4.7 - Local File Disclosure"
- [I] rbxgallery
- [M] EDB-ID: 19019 "WordPress Plugin RBX Gallery 2.1 - Arbitrary File Upload"
- [I] real3d-flipbook
- [M] EDB-ID: 40055 "WordPress Plugin Real3D FlipBook - Multiple Vulnerabilities"
- [I] really-easy-slider
- [I] really-simple-guest-post
- [M] EDB-ID: 37209 "WordPress Plugin Really Simple Guest Post 1.0.6 - Local File Inclusion"
- [I] recent-backups
- [M] EDB-ID: 37752 "WordPress Plugin Recent Backups 0.7 - Arbitrary File Download"
- [I] recipe
- [M] EDB-ID: 31228 "WordPress Plugin Recipes Blog - 'id' SQL Injection"
- [I] reciply
- [M] EDB-ID: 35265 "WordPress Plugin Recip.ly 1.1.7 - 'uploadImage.php' Arbitrary File Upload"
- [I] reflex-gallery
- [M] EDB-ID: 36374 "WordPress Plugin Reflex Gallery 3.1.3 - Arbitrary File Upload"
- [I] rekt-slideshow
- [I] related-sites
- [M] EDB-ID: 9054 "Adobe Flash TextField.tabIndex Setter - Use-After-Free"
- [I] relocate-upload
- [M] EDB-ID: 17869 "WordPress Plugin Relocate Upload 0.14 - Remote File Inclusion"
- [I] rent-a-car
- [I] resume-submissions-job-postings
- [M] EDB-ID: 19791 "WordPress Plugin Resume Submissions & Job Postings 2.5.1 - Unrestricted Arbitrary File Upload"
- [I] rich-widget
- [M] EDB-ID: 37653 "WordPress Plugin Rich Widget - Arbitrary File Upload"
- [I] ripe-hd-player
- [M] EDB-ID: 24229 "WordPress Plugin Ripe HD FLV Player - SQL Injection"
- [I] robotcpa
- [M] EDB-ID: 37252 "WordPress Plugin RobotCPA V5 - Local File Inclusion"
- [I] rss-feed-reader
- [M] EDB-ID: 35261 "WordPress Plugin RSS Feed Reader 0.1 - 'rss_url' Cross-Site Scripting"
- [I] s3bubble-amazon-s3-html-5-video-with-adverts
- [M] EDB-ID: 37494 "WordPress Plugin S3Bubble Cloud Video With Adverts & Analytics 0.7 - Arbitrary File Download"
- [I] sassy-social-share
- [I] scormcloud
- [M] EDB-ID: 17793 "WordPress Plugin SCORM Cloud 1.0.6.6 - SQL Injection"
- [I] se-html5-album-audio-player
- [M] EDB-ID: 37274 "WordPress Plugin SE HTML5 Album Audio Player 1.1.0 - Directory Traversal"
- [I] search-autocomplete
- [M] EDB-ID: 17767 "WordPress Plugin SearchAutocomplete 1.0.8 - SQL Injection"
- [I] securimage-wp
- [M] EDB-ID: 38510 "WordPress Plugin Securimage-WP - 'siwp_test.php' Cross-Site Scripting"
- [I] sell-downloads
- [M] EDB-ID: 38868 "WordPress Plugin Sell Download 1.0.16 - Local File Disclosure"
- [I] sendit
- [M] EDB-ID: 17716 "WordPress Plugin SendIt 1.5.9 - Blind SQL Injection"
- [I] seo-automatic-seo-tools
- [M] EDB-ID: 34975 "WordPress Plugin SEO Tools 3.0 - 'file' Directory Traversal"
- [I] seo-watcher
- [M] EDB-ID: 38782 "WordPress Plugin SEO Watcher - 'ofc_upload_image.php' Arbitrary PHP Code Execution"
- [I] sermon-browser
- [M] EDB-ID: 17214 "WordPress Plugin SermonBrowser 0.43 - SQL Injection"
- [M] EDB-ID: 35657 "WordPress Plugin Sermon Browser 0.43 - Cross-Site Scripting / SQL Injection"
- [I] sexy-contact-form
- [M] EDB-ID: 34922 "WordPress Plugin Creative Contact Form 0.9.7 - Arbitrary File Upload"
- [M] EDB-ID: 35057 "WordPress Plugin 0.9.7 / Joomla! Component 2.0.0 Creative Contact Form - Arbitrary File Upload"
- [I] sf-booking
- [M] EDB-ID: 43475 "WordPress Plugin Service Finder Booking < 3.2 - Local File Disclosure"
- [I] sfbrowser
- [M] EDB-ID: 19054 "WordPress Plugin SfBrowser 1.4.5 - Arbitrary File Upload"
- [I] sfwd-lms
- [I] sh-slideshow
- [M] EDB-ID: 17748 "WordPress Plugin SH Slideshow 3.1.4 - SQL Injection"
- [I] sharebar
- [M] EDB-ID: 37201 "WordPress Plugin Sharebar 1.2.1 - SQL Injection / Cross-Site Scripting"
- [I] shortcodes-ultimate
- [I] si-contact-form
- [M] EDB-ID: 36050 "WordPress Plugin Fast Secure Contact Form 3.0.3.1 - 'index.php' Cross-Site Scripting"
- [I] simple-ads-manager
- [M] EDB-ID: 36613 "WordPress Plugin Simple Ads Manager - Multiple SQL Injections"
- [M] EDB-ID: 36614 "WordPress Plugin Simple Ads Manager 2.5.94 - Arbitrary File Upload"
- [M] EDB-ID: 36615 "WordPress Plugin Simple Ads Manager - Information Disclosure"
- [M] EDB-ID: 39133 "WordPress Plugin Simple Ads Manager 2.9.4.116 - SQL Injection"
- [I] simple-download-button-shortcode
- [M] EDB-ID: 19020 "WordPress Plugin Simple Download Button ShortCode 1.0 - Remote File Disclosure"
- [I] simple-fields
- [M] EDB-ID: 44425 "WordPress Plugin Simple Fields 0.2 - 0.3.5 - Local/Remote File Inclusion / Remote Code Execution"
- [I] simple-forum
- [I] site-editor
- [M] EDB-ID: 44340 "Wordpress Plugin Site Editor 1.1.1 - Local File Inclusion"
- [I] site-import
- [M] EDB-ID: 39558 "WordPress Plugin Site Import 1.0.1 - Local/Remote File Inclusion"
- [I] skysa-official
- [M] EDB-ID: 36363 "WordPress Plugin Skysa App Bar - 'idnews' Cross-Site Scripting"
- [I] slider-image
- [M] EDB-ID: 37361 "WordPress Plugin Huge-IT Slider 2.7.5 - Multiple Vulnerabilities"
- [I] slideshow-gallery-2
- [M] EDB-ID: 36631 "WordPress Plugin Slideshow Gallery 1.1.x - 'border' Cross-Site Scripting"
- [I] slideshow-jquery-image-gallery
- [M] EDB-ID: 37948 "WordPress Plugin Slideshow - Multiple Cross-Site Scripting Vulnerabilities"
- [I] smart-flv
- [M] EDB-ID: 38331 "WordPress Plugin Smart Flv - 'jwplayer.swf' Multiple Cross-Site Scripting Vulnerabilities"
- [I] smart-google-code-inserter
- [I] sniplets
- [M] EDB-ID: 5194 "Wansview 1.0.2 - Denial of Service (PoC)"
- [I] social-discussions
- [M] EDB-ID: 22158 "WordPress Plugin social discussions 6.1.1 - Multiple Vulnerabilities"
- [I] social-slider-2
- [M] EDB-ID: 17617 "WordPress Plugin Social Slider 5.6.5 - SQL Injection"
- [I] socialfit
- [M] EDB-ID: 37481 "WordPress Plugin SocialFit - 'msg' Cross-Site Scripting"
- [I] sodahead-polls
- [I] sp-client-document-manager
- [M] EDB-ID: 35313 "WordPress Plugin SP Client Document Manager 2.4.1 - SQL Injection"
- [M] EDB-ID: 36576 "WordPress Plugin SP Project & Document Manager 2.5.3 - Blind SQL Injection"
- [I] spicy-blogroll
- [M] EDB-ID: 26804 "WordPress Plugin Spicy Blogroll - Local File Inclusion"
- [I] spider-event-calendar
- [M] EDB-ID: 25723 "WordPress Plugin Spider Event Calendar 1.3.0 - Multiple Vulnerabilities"
- [I] spiffy
- [M] EDB-ID: 38441 "WordPress Plugin Spiffy XSPF Player - 'playlist_id' SQL Injection"
- [I] st_newsletter
- [M] EDB-ID: 31096 "WordPress Plugin ShiftThis NewsLetter - SQL Injection"
- [M] EDB-ID: 6777 "Free Download Manager 2.5 Build 758 - Remote Control Server Buffer Overflow (Metasploit)"
- [I] store-locator-le
- [M] EDB-ID: 18989 "WordPress Plugin Google Maps via Store Locator 2.7.1 < 3.0.1 - Multiple Vulnerabilities"
- [I] taggator
- [I] taggedalbums
- [M] EDB-ID: 38023 "WordPress Plugin Tagged Albums - 'id' SQL Injection"
- [I] tagninja
- [M] EDB-ID: 35300 "WordPress Plugin TagNinja 1.0 - 'id' Cross-Site Scripting"
- [I] tera-charts
- [M] EDB-ID: 39256 "WordPress Plugin Tera Charts (tera-charts) - '/charts/treemap.php?fn' Directory Traversal"
- [M] EDB-ID: 39257 "WordPress Plugin Tera Charts (tera-charts) - '/charts/zoomabletreemap.php?fn' Directory Traversal"
- [I] the-welcomizer
- [M] EDB-ID: 36445 "WordPress Plugin The Welcomizer 1.3.9.4 - 'twiz-index.php' Cross-Site Scripting"
- [I] thecartpress
- [M] EDB-ID: 17860 "WordPress Plugin TheCartPress 1.1.1 - Remote File Inclusion"
- [M] EDB-ID: 36481 "WordPress Plugin TheCartPress 1.6 - 'OptionsPostsList.php' Cross-Site Scripting"
- [M] EDB-ID: 38869 "WordPress Plugin TheCartPress 1.4.7 - Multiple Vulnerabilities"
- [I] thinkun-remind
- [M] EDB-ID: 19021 "WordPress Plugin Thinkun Remind 1.1.3 - Remote File Disclosure"
- [I] tinymce-thumbnail-gallery
- [M] EDB-ID: 19022 "WordPress Plugin TinyMCE Thumbnail Gallery 1.0.7 - Remote File Disclosure"
- [I] topquark
- [M] EDB-ID: 19053 "WordPress Plugin Top Quark Architecture 2.10 - Arbitrary File Upload"
- [I] track-that-stat
- [M] EDB-ID: 37204 "WordPress Plugin Track That Stat 1.0.8 - Cross-Site Scripting"
- [I] trafficanalyzer
- [M] EDB-ID: 38439 "WordPress Plugin Traffic Analyzer - 'aoid' Cross-Site Scripting"
- [I] tune-library
- [M] EDB-ID: 17816 "WordPress Plugin Tune Library 2.17 - SQL Injection"
- [I] ucan-post
- [M] EDB-ID: 18390 "WordPress Plugin ucan post 1.0.09 - Persistent Cross-Site Scripting"
- [I] ultimate-product-catalogue
- [M] EDB-ID: 36823 "WordPress Plugin Ultimate Product Catalogue - SQL Injection (1)"
- [M] EDB-ID: 36824 "WordPress Plugin Ultimate Product Catalogue - SQL Injection (2)"
- [M] EDB-ID: 36907 "WordPress Plugin Ultimate Product Catalogue 3.1.2 - Multiple Persistent Cross-Site Scripting / Cross-Site Request Forgery / Arbitrary File Upload Vulnerabilities"
- [M] EDB-ID: 39974 "WordPress Plugin Ultimate Product Catalog 3.8.1 - Privilege Escalation"
- [M] EDB-ID: 40012 "WordPress Plugin Ultimate Product Catalog 3.8.6 - Arbitrary File Upload"
- [M] EDB-ID: 40174 "WordPress Plugin Ultimate Product Catalog 3.9.8 - do_shortcode via ajax Blind SQL Injection"
- [I] ungallery
- [M] EDB-ID: 17704 "WordPress Plugin UnGallery 1.5.8 - Local File Disclosure"
- [I] uploader
- [M] EDB-ID: 35255 "WordPress Plugin Uploader 1.0 - 'num' Cross-Site Scripting"
- [M] EDB-ID: 38163 "WordPress Plugin Uploader - Arbitrary File Upload"
- [M] EDB-ID: 38355 "WordPress Plugin Uploader - 'blog' Cross-Site Scripting"
- [I] uploadify-integration
- [M] EDB-ID: 37070 "WordPress Plugin Uploadify Integration 0.9.6 - Multiple Cross-Site Scripting Vulnerabilities"
- [I] uploads
- [I] upm-polls
- [M] EDB-ID: 17627 "WordPress Plugin UPM Polls 1.0.3 - SQL Injection"
- [I] user-avatar
- [I] user-meta
- [M] EDB-ID: 19052 "WordPress Plugin User Meta 1.1.1 - Arbitrary File Upload"
- [I] userpro
- [M] EDB-ID: 46083 "Wordpress Plugin UserPro < 4.9.21 - User Registration Privilege Escalation"
- [I] users-ultra
- [I] verve-meta-boxes
- [I] videowhisper-live-streaming-integration
- [M] EDB-ID: 31986 "WordPress Plugin VideoWhisper 4.27.3 - Multiple Vulnerabilities"
- [I] videowhisper-video-conference-integration
- [M] EDB-ID: 36617 "WordPress Plugin VideoWhisper Video Presentation 3.31.17 - Arbitrary File Upload"
- [M] EDB-ID: 36618 "WordPress Plugin VideoWhisper Video Conference Integration 4.91.8 - Arbitrary File Upload"
- [I] videowhisper-video-presentation
- [M] EDB-ID: 17771 "WordPress Plugin VideoWhisper Video Presentation 1.1 - SQL Injection"
- [M] EDB-ID: 37357 "WordPress Plugin VideoWhisper Video Presentation 3.17 - 'vw_upload.php' Arbitrary File Upload"
- [I] vk-gallery
- [I] vodpod-video-gallery
- [M] EDB-ID: 34976 "WordPress Plugin Vodpod Video Gallery 3.1.5 - 'vodpod_gallery_thumbs.php' Cross-Site Scripting"
- [I] wassup
- [I] webinar_plugin
- [M] EDB-ID: 22300 "WordPress Plugin Easy Webinar - Blind SQL Injection"
- [I] webplayer
- [I] website-contact-form-with-file-upload
- [M] EDB-ID: 36952 "WordPress Plugin N-Media Website Contact Form with File Upload 1.5 - Local File Inclusion"
- [I] website-faq
- [M] EDB-ID: 19400 "WordPress Plugin Website FAQ 1.0 - SQL Injection"
- [I] wechat-broadcast
- [M] EDB-ID: 45438 "WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion"
- [I] woocommerce
- [M] EDB-ID: 43196 "WordPress Plugin WooCommerce 2.0/3.0 - Directory Traversal"
- [I] woopra
- [M] EDB-ID: 38783 "WordPress Plugin Woopra Analytics - 'ofc_upload_image.php' Arbitrary PHP Code Execution"
- [I] wordpress-donation-plugin-with-goals-and-paypal-ipn-by-nonprofitcmsorg
- [M] EDB-ID: 17763 "Microsoft Edge 44.17763.1.0 - NULL Pointer Dereference"
- [I] wordpress-member-private-conversation
- [M] EDB-ID: 37353 "WordPress Plugin Nmedia WordPress Member Conversation 1.35.0 - 'doupload.php' Arbitrary File Upload"
- [I] wordpress-processing-embed
- [M] EDB-ID: 35066 "WordPress Plugin Processing Embed 0.5 - 'pluginurl' Cross-Site Scripting"
- [I] wordtube
- [M] EDB-ID: 3825 "GoodiWare GoodReader iPhone - '.XLS' Denial of Service"
- [I] work-the-flow-file-upload
- [M] EDB-ID: 36640 "WordPress Plugin Work The Flow File Upload 2.5.2 - Arbitrary File Upload"
- [I] wp-adserve
- [I] wp-advanced-pdf
- [I] wp-audio-gallery-playlist
- [M] EDB-ID: 17756 "WordPress Plugin Audio Gallery Playlist 0.12 - SQL Injection"
- [I] wp-automatic
- [M] EDB-ID: 19187 "WordPress Plugin Automatic 2.0.3 - SQL Injection"
- [I] wp-autosuggest
- [M] EDB-ID: 45977 "WordPress Plugin AutoSuggest 0.24 - 'wpas_keys' SQL Injection"
- [I] wp-autoyoutube
- [M] EDB-ID: 18353 "WordPress Plugin wp-autoyoutube - Blind SQL Injection"
- [I] wp-bannerize
- [M] EDB-ID: 17764 "WordPress Plugin Bannerize 2.8.6 - SQL Injection"
- [M] EDB-ID: 17906 "WordPress Plugin Bannerize 2.8.7 - SQL Injection"
- [M] EDB-ID: 36193 "WordPress Plugin WP Bannerize 2.8.7 - 'ajax_sorter.php' SQL Injection"
- [I] wp-banners-lite
- [M] EDB-ID: 38410 "WordPress Plugin Banners Lite - 'wpbanners_show.php' HTML Injection"
- [I] wp-booking-calendar
- [M] EDB-ID: 44769 "Wordpress Plugin Booking Calendar 3.0.0 - SQL Injection / Cross-Site Scripting"
- [I] wp-business-intelligence
- [M] EDB-ID: 36600 "WordPress Plugin Business Intelligence - SQL Injection (Metasploit)"
- [I] wp-business-intelligence-lite
- [I] wp-cal
- [M] EDB-ID: 4992 "Sun xVM VirtualBox 2.2 < 3.0.2 r49928 - Local Host Reboot (Denial of Service) (PoC)"
- [I] wp-comment-remix
- [I] wp-content
- [M] EDB-ID: 37123 "WordPress Plugin WPsc MijnPress - 'rwflush' Cross-Site Scripting"
- [I] wp-copysafe-pdf
- [M] EDB-ID: 39254 "WordPress Plugin CopySafe PDF Protection - Arbitrary File Upload"
- [I] wp-cumulus
- [M] EDB-ID: 10228 "WordPress Plugin WP-Cumulus 1.20 - Full Path Disclosure / Cross-Site Scripting"
- [M] EDB-ID: 33371 "WordPress Plugin WP-Cumulus 1.x - 'tagcloud.swf' Cross-Site Scripting"
- [I] wp-custom-pages
- [M] EDB-ID: 17119 "WordPress Plugin Custom Pages 0.5.0.1 - Local File Inclusion"
- [I] wp-ds-faq
- [M] EDB-ID: 17683 "WordPress Plugin DS FAQ 1.3.2 - SQL Injection"
- [I] wp-e-commerce
- [M] EDB-ID: 36018 "WordPress Plugin WP E-Commerce 3.8.6 - 'cart_messages[]' Cross-Site Scripting"
- [I] wp-easycart
- [M] EDB-ID: 35730 "WordPress Plugin Shopping Cart 3.0.4 - Unrestricted Arbitrary File Upload"
- [I] wp-ecommerce-shop-styling
- [M] EDB-ID: 37530 "WordPress Plugin WP E-Commerce Shop Styling 2.5 - Arbitrary File Download"
- [I] wp-events-calendar
- [M] EDB-ID: 44785 "WordPress Plugin Events Calendar - SQL Injection"
- [I] wp-featured-post-with-thumbnail
- [M] EDB-ID: 35262 "WordPress Plugin WP Featured Post with Thumbnail 3.0 - 'src' Cross-Site Scripting"
- [I] wp-filebase
- [M] EDB-ID: 17808 "WordPress Plugin WP-Filebase Download Manager 0.2.9 - SQL Injection"
- [I] wp-filemanager
- [M] EDB-ID: 25440 "WordPress Plugin wp-FileManager - Arbitrary File Download"
- [M] EDB-ID: 38515 "WordPress Plugin wp-FileManager - 'path' Arbitrary File Download"
- [M] EDB-ID: 4844 "STDU Explorer 1.0.201 - 'dwmapi.dll' DLL Loading Arbitrary Code Execution"
- [I] wp-footnotes
- [M] EDB-ID: 31092 "WordPress Plugin WP-Footnotes 2.2 - Multiple Remote Vulnerabilities"
- [I] wp-forum
- [M] EDB-ID: 7738 "WordPress Plugin WP-Forum 1.7.8 - SQL Injection"
- [I] wp-glossary
- [M] EDB-ID: 18055 "WordPress Plugin Glossary - SQL Injection"
- [I] wp-google-drive
- [M] EDB-ID: 44435 "WordPress Plugin Google Drive 2.2 - Remote Code Execution"
- [I] wp-gpx-maps
- [M] EDB-ID: 19050 "WordPress Plugin wp-gpx-map 1.1.21 - Arbitrary File Upload"
- [I] wp-imagezoom
- [M] EDB-ID: 37243 "WordPress Plugin Wp-ImageZoom 1.1.0 - Multiple Vulnerabilities"
- [M] EDB-ID: 37419 "WordPress Plugin Wp-ImageZoom - 'file' Remote File Disclosure"
- [M] EDB-ID: 38063 "WordPress Theme Wp-ImageZoom - 'id' SQL Injection"
- [I] wp-livephp
- [M] EDB-ID: 36483 "WordPress Plugin WP Live.php 1.2.1 - 's' Cross-Site Scripting"
- [I] wp-lytebox
- [I] wp-marketplace
- [I] wp-menu-creator
- [M] EDB-ID: 17689 "WordPress Plugin Menu Creator 1.1.7 - SQL Injection"
- [I] wp-mobile-detector
- [M] EDB-ID: 39891 "WordPress Plugin WP Mobile Detector 3.5 - Arbitrary File Upload"
- [I] wp-people
- [M] EDB-ID: 31230 "WordPress Plugin wp-people 2.0 - 'wp-people-popup.php' SQL Injection"
- [I] wp-polls
- [M] EDB-ID: 10256 "WordPress Plugin WP-Polls 2.x - Incorrect Flood Filter"
- [I] wp-property
- [M] EDB-ID: 18987 "WordPress Plugin WP-Property 1.35.0 - Arbitrary File Upload"
- [I] wp-publication-archive
- [M] EDB-ID: 35263 "WordPress Plugin WP Publication Archive 2.0.1 - 'file' Information Disclosure"
- [I] wp-realty
- [M] EDB-ID: 29021 "WordPress Plugin Realty - Blind SQL Injection"
- [M] EDB-ID: 38808 "WordPress Plugin WP-Realty - 'listing_id' SQL Injection"
- [M] EDB-ID: 39109 "WordPress Plugin Relevanssi - 'category_name' SQL Injection"
- [I] wp-responsive-thumbnail-slider
- [M] EDB-ID: 45099 "WordPress Plugin Responsive Thumbnail Slider - Arbitrary File Upload (Metasploit)"
- [I] wp-safe-search
- [M] EDB-ID: 35067 "WordPress Plugin Safe Search - 'v1' Cross-Site Scripting"
- [I] wp-shopping-cart
- [M] EDB-ID: 6867 "Huawei eSpace 1.1.11.103 - Image File Format Handling Buffer Overflow"
- [I] wp-source-control
- [M] EDB-ID: 39287 "WordPress Plugin WP Content Source Control - 'download.php' Directory Traversal"
- [I] wp-spamfree
- [M] EDB-ID: 17970 "WordPress Plugin WP-SpamFree Spam Plugin - SQL Injection"
- [I] wp-spry-menu
- [I] wp-starsratebox
- [M] EDB-ID: 35634 "WordPress Plugin WP-StarsRateBox 1.1 - 'j' SQL Injection"
- [I] wp-stats-dashboard
- [I] wp-support-plus-responsive-ticket-system
- [M] EDB-ID: 34589 "SCO UnixWare < 7.1.4 p534589 - 'pkgadd' Local Privilege Escalation"
- [I] wp-survey-and-quiz-tool
- [M] EDB-ID: 34974 "WordPress Plugin WP Survey And Quiz Tool 1.2.1 - Cross-Site Scripting"
- [I] wp-swimteam
- [M] EDB-ID: 37601 "WordPress Plugin Swim Team 1.44.10777 - Arbitrary File Download"
- [I] wp-symposium
- [M] EDB-ID: 17679 "WordPress Plugin Symposium 0.64 - SQL Injection"
- [M] EDB-ID: 35505 "WordPress Plugin Symposium 14.10 - SQL Injection"
- [M] EDB-ID: 35543 "WordPress Plugin WP Symposium 14.11 - Arbitrary File Upload"
- [M] EDB-ID: 37822 "WordPress Plugin WP Symposium 15.1 - Blind SQL Injection"
- [M] EDB-ID: 37824 "WordPress Plugin WP Symposium 15.1 - 'get_album_item.php' SQL Injection"
- [I] wp-symposium-toolbar
- [I] wp-syntax
- [M] EDB-ID: 9431 "Adobe Photoshop CC / Bridge CC - '.iff' Parsing Memory Corruption"
- [I] wp-table
- [M] EDB-ID: 3824 "Office^2 iPhone - '.XLS' Denial of Service"
- [I] wp-table-reloaded
- [M] EDB-ID: 38251 "WordPress Plugin WP-Table Reloaded - 'id' Cross-Site Scripting"
- [I] wp-twitter-feed
- [M] EDB-ID: 35084 "WordPress Plugin Twitter Feed - 'url' Cross-Site Scripting"
- [I] wp-whois
- [M] EDB-ID: 36488 "WordPress Plugin WHOIS 1.4.2 3 - 'domain' Cross-Site Scripting"
- [I] wp-with-spritz
- [M] EDB-ID: 44544 "WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion"
- [I] wpSS
- [M] EDB-ID: 39279 "WordPress Plugin wpSS - 'ss_handler.php' SQL Injection"
- [M] EDB-ID: 5486 "PHP < 5.3.6 'OpenSSL' Extension - 'openssl_encrypt' Plaintext Data Memory Leak Denial of Service"
- [I] wp_rokintroscroller
- [M] EDB-ID: 38767 "WordPress Plugin RokIntroScroller - 'thumb.php' Multiple Vulnerabilities"
- [I] wp_rokmicronews
- [M] EDB-ID: 38768 "WordPress Plugin RokMicroNews - 'thumb.php' Multiple Vulnerabilities"
- [I] wp_roknewspager
- [M] EDB-ID: 38756 "WordPress Plugin RokNewsPager - 'thumb.php' Multiple Vulnerabilities"
- [I] wp_rokstories
- [M] EDB-ID: 38757 "WordPress Plugin RokStories - 'thumb.php' Multiple Vulnerabilities"
- [I] wpeasystats
- [M] EDB-ID: 17862 "WordPress Plugin WPEasyStats 1.8 - Remote File Inclusion"
- [I] wpforum
- [M] EDB-ID: 17684 "WordPress Plugin Forum 1.7.8 - SQL Injection"
- [I] wpmarketplace
- [M] EDB-ID: 18988 "WordPress Plugin Marketplace Plugin 1.5.0 < 1.6.1 - Arbitrary File Upload"
- [I] wpsite-background-takeover
- [M] EDB-ID: 44417 "WordPress Plugin Background Takeover < 4.1.4 - Directory Traversal"
- [I] wpstorecart
- [M] EDB-ID: 19023 "ActivePDF Toolkit < 8.1.0.19023 - Multiple Memory Corruptions"
- [I] wptf-image-gallery
- [M] EDB-ID: 37751 "WordPress Plugin WPTF Image Gallery 1.03 - Arbitrary File Download"
- [I] wptouch
- [M] EDB-ID: 18039 "WordPress Plugin wptouch - SQL Injection"
- [I] x7host-videox7-ugc-plugin
- [M] EDB-ID: 35257 "WordPress Plugin Videox7 UGC 2.5.3.2 - 'listid' Cross-Site Scripting"
- [M] EDB-ID: 35264 "WordPress Plugin Featured Content 0.0.1 - 'listid' Cross-Site Scripting"
- [I] xcloner-backup-and-restore
- [M] EDB-ID: 16246 "Joomla! Component com_xcloner-backupandrestore - Remote Command Execution"
- [I] xerte-online
- [M] EDB-ID: 38157 "WordPress Plugin Xerte Online - 'save.php' Arbitrary File Upload"
- [I] xml-and-csv-import-in-article-content
- [M] EDB-ID: 39576 "WordPress Plugin Import CSV 1.0 - Directory Traversal"
- [I] xorbin-analog-flash-clock
- [M] EDB-ID: 38608 "WordPress Plugin Xorbin Analog Flash Clock - 'widgetUrl' Cross-Site Scripting"
- [I] xorbin-digital-flash-clock
- [M] EDB-ID: 38621 "WordPress Plugin Xorbin Digital Flash Clock - 'widgetUrl' Cross-Site Scripting"
- [I] yolink-search
- [M] EDB-ID: 17757 "WordPress Plugin yolink Search 1.1.4 - SQL Injection"
- [I] yousaytoo-auto-publishing-plugin
- [M] EDB-ID: 36620 "WordPress Plugin YouSayToo auto-publishing 1.0 - 'submit' Cross-Site Scripting"
- [I] yt-audio-streaming-audio-from-youtube
- [M] EDB-ID: 35394 "WordPress Plugin YT-Audio 1.7 - 'v' Cross-Site Scripting"
- [I] zarzadzanie_kontem
- [M] EDB-ID: 38050 "WordPress Plugin Zarzadzonie Kontem - 'ajaxfilemanager.php' Script Arbitrary File Upload"
- [I] zingiri-forum
- [M] EDB-ID: 38101 "WordPress Plugin Zingiri Forums - 'language' Local File Inclusion"
- [I] zingiri-web-shop
- [M] EDB-ID: 17867 "WordPress Plugin Zingiri Web Shop 2.2.0 - Remote File Inclusion"
- [M] EDB-ID: 37406 "WordPress Plugin Zingiri Web Shop 2.4.3 - 'uploadfilexd.php' Arbitrary File Upload"
- [M] EDB-ID: 38046 "WordPress Plugin Zingiri Web Shop - 'path' Arbitrary File Upload"
- [I] zotpress
- [M] EDB-ID: 17778 "WordPress Plugin Zotpress 4.4 - SQL Injection"
- [I] Checking for Directory Listing Enabled ...
- [-] Date & Time: 30/06/2019 16:48:49
- [-] Completed in: 1:32:29
- #######################################################################################################################################
- [INFO] Date: 30/06/19 | Time: 16:32:47
- [INFO] ------TARGET info------
- [*] TARGET: http://www.audit.gov.sd/?lang=ar
- [*] TARGET IP: 138.128.160.2
- [INFO] NO load balancer detected for www.audit.gov.sd...
- [*] DNS servers: audit.gov.sd.
- [*] TARGET server: Apache
- [*] CC: US
- [*] Country: United States
- [*] RegionCode: FL
- [*] RegionName: Florida
- [*] City: Orlando
- [*] ASN: AS33182
- [*] BGP_PREFIX: 138.128.160.0/19
- [*] ISP: DIMENOC - HostDime.com, Inc., US
- [INFO] DNS enumeration:
- [*] ftp.audit.gov.sd 138.128.160.2
- [*] mail.audit.gov.sd 212.0.136.50
- [*] webmail.audit.gov.sd 138.128.160.2
- [INFO] Possible abuse mails are:
- [*] abuse@audit.gov.sd
- [*] abuse@www.audit.gov.sd
- [*] spamcop@dimenoc.com
- [INFO] NO PAC (Proxy Auto Configuration) file FOUND
- [ALERT] robots.txt file FOUND in http://www.audit.gov.sd/robots.txt
- [INFO] Checking for HTTP status codes recursively from http://www.audit.gov.sd/robots.txt
- [INFO] Status code Folders
- [INFO] Starting FUZZing in http://www.audit.gov.sd/FUzZzZzZzZz...
- [INFO] Status code Folders
- [ALERT] Look in the source code. It may contain passwords
- [INFO] Links found from http://www.audit.gov.sd/?lang=ar http://138.128.160.2/:
- [*] http://138.128.160.2/cgi-sys/defaultwebpage.cgi
- [*] https://plus.google.com/112988279842067073128
- [*] https://themegrill.com/themes/colormag
- [*] https://web.facebook.com/SudanAuditChamber/?ref=aymt_homepage_panel
- [*] https://wordpress.org/
- [*] https://www.youtube.com/channel/UCl5Q-D82P_4bXy87aoqdNvg
- [*] http://www.afrosai-e.org.za/
- [*] http://www.afrosai.org/
- [*] http://www.arabosai.org/
- [*] http://www.audit.gov.sd/?cat=27&lang=ar
- [*] http://www.audit.gov.sd/?cat=28&lang=ar
- [*] http://www.audit.gov.sd/?cat=33&lang=ar
- [*] http://www.audit.gov.sd/?cat=35&lang=ar
- [*] http://www.audit.gov.sd/?cat=56&lang=ar
- [*] http://www.audit.gov.sd/?cat=57&lang=ar
- [*] http://www.audit.gov.sd/?cat=59&lang=ar
- [*] http://www.audit.gov.sd/?cat=5&lang=ar
- [*] http://www.audit.gov.sd/?cat=6&lang=ar
- [*] http://www.audit.gov.sd/?feed=rss2&lang=ar
- [*] http://www.audit.gov.sd/?feed=rss2&lang=ar?post_type=jm_breaking_news
- [*] http://www.audit.gov.sd/?lang=ar
- [*] http://www.audit.gov.sd/?lang=ar&author=1
- [*] http://www.audit.gov.sd/?lang=ar#masthead
- [*] http://www.audit.gov.sd/?p=2197&lang=ar
- [*] http://www.audit.gov.sd/?p=2260&lang=ar
- [*] http://www.audit.gov.sd/?p=2482&lang=ar
- [*] http://www.audit.gov.sd/?p=2737&lang=ar
- [*] http://www.audit.gov.sd/?p=3076&lang=ar
- [*] http://www.audit.gov.sd/?p=3096&lang=ar
- [*] http://www.audit.gov.sd/?p=3098&lang=ar
- [*] http://www.audit.gov.sd/?p=3105&lang=ar
- [*] http://www.audit.gov.sd/?p=3123&lang=ar
- [*] http://www.audit.gov.sd/?p=3133&lang=ar
- [*] http://www.audit.gov.sd/?p=3145&lang=ar
- [*] http://www.audit.gov.sd/?p=3159&lang=ar
- [*] http://www.audit.gov.sd/?p=3169&lang=ar
- [*] http://www.audit.gov.sd/?p=3186&lang=ar
- [*] http://www.audit.gov.sd/?p=3195&lang=ar
- [*] http://www.audit.gov.sd/?p=3206&lang=ar
- [*] http://www.audit.gov.sd/?p=3483&lang=ar
- [*] http://www.audit.gov.sd/?p=3489&lang=ar
- [*] http://www.audit.gov.sd/?p=3500&lang=ar
- [*] http://www.audit.gov.sd/?p=3506&lang=ar
- [*] http://www.audit.gov.sd/?p=3512&lang=ar
- [*] http://www.audit.gov.sd/?p=3524&lang=ar
- [*] http://www.audit.gov.sd/?p=3529&lang=ar
- [*] http://www.audit.gov.sd/?p=3533&lang=ar
- [*] http://www.audit.gov.sd/?p=3538&lang=ar
- [*] http://www.audit.gov.sd/?p=3542&lang=ar
- [*] http://www.audit.gov.sd/?p=3544&lang=ar
- [*] http://www.audit.gov.sd/?p=3551&lang=ar
- [*] http://www.audit.gov.sd/?p=3558&lang=ar
- [*] http://www.audit.gov.sd/?p=3559&lang=ar
- [*] http://www.audit.gov.sd/?p=3564&lang=ar
- [*] http://www.audit.gov.sd/?p=3642&lang=ar
- [*] http://www.audit.gov.sd/?p=3657&lang=ar
- [*] http://www.audit.gov.sd/?p=3686&lang=ar
- [*] http://www.audit.gov.sd/?p=3702&lang=ar
- [*] http://www.audit.gov.sd/?page_id=212&lang=ar
- [*] http://www.audit.gov.sd/?page_id=215&lang=ar
- [*] http://www.audit.gov.sd/?page_id=227&lang=ar
- [*] http://www.audit.gov.sd/?page_id=232&lang=ar
- [*] http://www.audit.gov.sd/?page_id=236&lang=ar
- [*] http://www.audit.gov.sd/?page_id=2612&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3057&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3230&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3253&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3290&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3299&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3301&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3306&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3310&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3314&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3318&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3330&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3338&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3349&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3356&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3362&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3388&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3393&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3409&lang=ar
- [*] http://www.audit.gov.sd/?page_id=3627&lang=ar
- [*] http://www.audit.gov.sd/?page_id=562&lang=ar
- [*] http://www.intosai.org/
- [INFO] GOOGLE has 47,400,000 results (0.31 seconds) for www.audit.gov.sd about http://www.audit.gov.sd/
- [INFO] Shodan detected the following opened ports on 138.128.160.2:
- [*] 110
- [*] 2082
- [*] 2083
- [*] 2086
- [*] 2087
- [*] 21
- [*] 443
- [*] 465
- [*] 53
- [*] 587
- [*] 80
- [*] 995
- [INFO] ------VirusTotal SECTION------
- [INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
- [INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
- [INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
- [INFO] ------Alexa Rank SECTION------
- [INFO] Percent of Visitors Rank in Country:
- [INFO] Percent of Search Traffic:
- [INFO] Percent of Unique Visits:
- [INFO] Total Sites Linking In:
- [*] Total Sites
- [INFO] Useful links related to www.audit.gov.sd - 138.128.160.2:
- [*] https://www.virustotal.com/pt/ip-address/138.128.160.2/information/
- [*] https://www.hybrid-analysis.com/search?host=138.128.160.2
- [*] https://www.shodan.io/host/138.128.160.2
- [*] https://www.senderbase.org/lookup/?search_string=138.128.160.2
- [*] https://www.alienvault.com/open-threat-exchange/ip/138.128.160.2
- [*] http://pastebin.com/search?q=138.128.160.2
- [*] http://urlquery.net/search.php?q=138.128.160.2
- [*] http://www.alexa.com/siteinfo/www.audit.gov.sd
- [*] http://www.google.com/safebrowsing/diagnostic?site=www.audit.gov.sd
- [*] https://censys.io/ipv4/138.128.160.2
- [*] https://www.abuseipdb.com/check/138.128.160.2
- [*] https://urlscan.io/search/#138.128.160.2
- [*] https://github.com/search?q=138.128.160.2&type=Code
- [INFO] Useful links related to AS33182 - 138.128.160.0/19:
- [*] http://www.google.com/safebrowsing/diagnostic?site=AS:33182
- [*] https://www.senderbase.org/lookup/?search_string=138.128.160.0/19
- [*] http://bgp.he.net/AS33182
- [*] https://stat.ripe.net/AS33182
- [INFO] Date: 30/06/19 | Time: 16:34:33
- [INFO] Total time: 1 minute(s) and 46 second(s)
- #######################################################################################################################################
- Anonymous JTSEC #OpSudan Full Recon #97
Add Comment
Please, Sign In to add comment