Advertisement
mickojavanese

_+_=-+-

Sep 5th, 2014
740
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Modula 2 39.01 KB | None | 0 0
  1.  
  2. Starting Nmap 6.47 ( http://nmap.org ) at 2014-09-06 02:39 WIB
  3. NSE: Loaded 118 scripts for scanning.
  4. NSE: Script Pre-scanning.
  5. Initiating Ping Scan at 02:39
  6. Scanning www.thekickback.com (192.254.233.20) [4 ports]
  7. Completed Ping Scan at 02:39, 0.03s elapsed (1 total hosts)
  8. Initiating Parallel DNS resolution of 1 host. at 02:39
  9. Completed Parallel DNS resolution of 1 host. at 02:39, 16.50s elapsed
  10. Initiating SYN Stealth Scan at 02:39
  11. Scanning www.thekickback.com (192.254.233.20) [1000 ports]
  12. Discovered open port 143/tcp on 192.254.233.20
  13. Discovered open port 21/tcp on 192.254.233.20
  14. Discovered open port 8080/tcp on 192.254.233.20
  15. Discovered open port 993/tcp on 192.254.233.20
  16. Discovered open port 80/tcp on 192.254.233.20
  17. Discovered open port 53/tcp on 192.254.233.20
  18. Discovered open port 587/tcp on 192.254.233.20
  19. Discovered open port 995/tcp on 192.254.233.20
  20. Discovered open port 110/tcp on 192.254.233.20
  21. Discovered open port 443/tcp on 192.254.233.20
  22. Discovered open port 3306/tcp on 192.254.233.20
  23. Discovered open port 2222/tcp on 192.254.233.20
  24. Discovered open port 465/tcp on 192.254.233.20
  25. Discovered open port 26/tcp on 192.254.233.20
  26. Completed SYN Stealth Scan at 02:39, 17.66s elapsed (1000 total ports)
  27. Initiating Service scan at 02:39
  28. Scanning 14 services on www.thekickback.com (192.254.233.20)
  29. Completed Service scan at 02:40, 23.43s elapsed (14 services on 1 host)
  30. Initiating OS detection (try #1) against www.thekickback.com (192.254.233.20)
  31. Retrying OS detection (try #2) against www.thekickback.com (192.254.233.20)
  32. WARNING: OS didn't match until try #2
  33. Initiating Traceroute at 02:40
  34. Completed Traceroute at 02:40, 0.02s elapsed
  35. Initiating Parallel DNS resolution of 4 hosts. at 02:40
  36. Completed Parallel DNS resolution of 4 hosts. at 02:40, 16.50s elapsed
  37. NSE: Script scanning 192.254.233.20.
  38. Initiating NSE at 02:40
  39. Completed NSE at 02:40, 19.59s elapsed
  40. Nmap scan report for www.thekickback.com (192.254.233.20)
  41. Host is up (0.13s latency).
  42. Not shown: 952 closed ports, 34 filtered ports
  43. PORT     STATE SERVICE    VERSION
  44. 21/tcp   open  ftp        Pure-FTPd
  45. |_ftp-anon: ERROR: Script execution failed (use -d to debug)
  46. |_ftp-bounce: no banner
  47. 26/tcp   open  smtp       Exim smtpd 4.82
  48. | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
  49. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  50. |_ssl-date: 2014-09-05T19:39:37+00:00; -54s from local time.
  51. 53/tcp   open  domain
  52. 80/tcp   open  http-proxy Squid http proxy
  53. |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
  54. |_http-methods: GET HEAD POST OPTIONS
  55. | http-robots.txt: 2 disallowed entries
  56. |_/files/ /images/
  57. |_http-title: Site doesn't have a title (text/html).
  58. 110/tcp  open  pop3       Dovecot pop3d
  59. |_pop3-capabilities: PIPELINING AUTH-RESP-CODE SASL(PLAIN LOGIN) STLS UIDL CAPA USER RESP-CODES TOP
  60. 143/tcp  open  imap       Dovecot imapd
  61. |_imap-capabilities: Pre-login IDLE IMAP4rev1 AUTH=LOGINA0001 capabilities have ENABLE LOGIN-REFERRALS STARTTLS post-login listed OK more NAMESPACE AUTH=PLAIN SASL-IR LITERAL+ ID
  62. 443/tcp  open  http       Apache httpd
  63. |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
  64. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  65. | http-robots.txt: 1 disallowed entry
  66. |_/
  67. |_http-title: thekickback.com
  68. 465/tcp  open  smtps?
  69. | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
  70. |_ Commands supported:
  71. |_ssl-date: 2014-09-05T19:39:35+00:00; -53s from local time.
  72. 587/tcp  open  smtp       Exim smtpd 4.82
  73. | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
  74. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  75. | ssl-cert: Subject: commonName=*.hostgator.com
  76. | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
  77. | Public Key type: rsa
  78. | Public Key bits: 2048
  79. | Not valid before: 2014-04-09T02:56:45+00:00
  80. | Not valid after:  2018-04-10T22:46:45+00:00
  81. | MD5:   626c e2ae 0031 4763 877a 57bc b21f 5dc3
  82. |_SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
  83. |_ssl-date: 2014-09-05T19:39:35+00:00; -54s from local time.
  84. 993/tcp  open  ssl/imap   Dovecot imapd
  85. |_imap-capabilities: Pre-login IDLE IMAP4rev1 AUTH=LOGINA0001 capabilities have ENABLE LOGIN-REFERRALS post-login listed OK more NAMESPACE AUTH=PLAIN SASL-IR LITERAL+ ID
  86. | ssl-cert: Subject: commonName=*.hostgator.com
  87. | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
  88. | Public Key type: rsa
  89. | Public Key bits: 2048
  90. | Not valid before: 2014-04-09T02:56:45+00:00
  91. | Not valid after:  2018-04-10T22:46:45+00:00
  92. | MD5:   626c e2ae 0031 4763 877a 57bc b21f 5dc3
  93. |_SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
  94. |_ssl-date: 2014-09-05T19:39:38+00:00; -53s from local time.
  95. 995/tcp  open  ssl/pop3   Dovecot pop3d
  96. | ssl-cert: Subject: commonName=*.hostgator.com
  97. | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
  98. | Public Key type: rsa
  99. | Public Key bits: 2048
  100. | Not valid before: 2014-04-09T02:56:45+00:00
  101. | Not valid after:  2018-04-10T22:46:45+00:00
  102. | MD5:   626c e2ae 0031 4763 877a 57bc b21f 5dc3
  103. |_SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
  104. |_ssl-date: 2014-09-05T19:39:37+00:00; -54s from local time.
  105. 2222/tcp open  ssh        OpenSSH 5.3 (protocol 2.0)
  106. |_ssh-hostkey:
  107. 3306/tcp open  mysql      MySQL 5.5.37-35.1
  108. | mysql-info:
  109. |   Protocol: 53
  110. |   Version: .5.37-35.1
  111. |   Thread ID: 76603651
  112. |   Capabilities flags: 65535
  113. |   Some Capabilities: Support41Auth, IgnoreSigpipes, DontAllowDatabaseTableColumn, SupportsCompression, SupportsTransactions, Speaks41ProtocolNew, LongColumnFlag, IgnoreSpaceBeforeParenthesis, LongPassword, ConnectWithDatabase, FoundRows, SupportsLoadDataLocal, InteractiveClient, ODBCClient, Speaks41ProtocolOld, SwitchToSSLAfterHandshake
  114. |   Status: Autocommit
  115. |_  Salt: n7cn~PU9[?hosupT2:n<
  116. 8080/tcp open  http       nginx 1.6.1
  117. |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
  118. |_http-methods: GET HEAD POST OPTIONS
  119. | http-robots.txt: 2 disallowed entries
  120. |_/files/ /images/
  121. |_http-title: Site doesn't have a title (text/html).
  122. Device type: WAP|storage-misc
  123. Running: Linux 2.4.X, Netgear RAIDiator 4.X
  124. OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:netgear:raidiator:4
  125. OS details: DD-WRT v23 (Linux 2.4.36), Netgear ReadyNAS Duo NAS device (RAIDiator 4.1.4)
  126. Uptime guess: 67.274 days (since Mon Jun 30 20:06:23 2014)
  127. Network Distance: 4 hops
  128. Service Info: Host: gator3225.hostgator.com
  129.  
  130. TRACEROUTE (using port 80/tcp)
  131. HOP RTT     ADDRESS
  132. 1   0.63 ms 192.168.200.1
  133. 2   1.97 ms 192.168.30.1
  134. 3   2.39 ms 172.16.1.1
  135. 4   7.17 ms 192.254.233.20
  136.  
  137. NSE: Script Post-scanning.
  138. Read data files from: /usr/bin/../share/nmap
  139. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  140. Nmap done: 1 IP address (1 host up) scanned in 101.74 seconds
  141.           Raw packets sent: 1265 (57.732KB) | Rcvd: 1005 (41.723KB)
  142. root@javanese:~# nmap -v -A www.thekickback.com -d
  143.  
  144. Starting Nmap 6.47 ( http://nmap.org ) at 2014-09-06 02:46 WIB
  145. PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0)
  146. --------------- Timing report ---------------
  147.  hostgroups: min 1, max 100000
  148.  rtt-timeouts: init 1000, min 100, max 10000
  149.  max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
  150.  parallelism: min 0, max 0
  151.  max-retries: 10, host-timeout: 0
  152.  min-rate: 0, max-rate: 0
  153. ---------------------------------------------
  154. NSE: Using Lua 5.2.
  155. NSE: Script Arguments seen from CLI:
  156. NSE: Loaded 118 scripts for scanning.
  157. NSE: Script Pre-scanning.
  158. NSE: Starting runlevel 1 (of 2) scan.
  159. NSE: Starting runlevel 2 (of 2) scan.
  160. Initiating Ping Scan at 02:46
  161. Scanning www.thekickback.com (192.254.233.20) [4 ports]
  162. Packet capture filter (device eth0): dst host 192.168.200.23 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 192.254.233.20)))
  163. We got a TCP ping packet back from 192.254.233.20 port 80 (trynum = 0)
  164. Completed Ping Scan at 02:46, 0.09s elapsed (1 total hosts)
  165. Overall sending rates: 44.85 packets / s, 1704.25 bytes / s.
  166. mass_rdns: Using DNS server 192.168.200.1
  167. mass_rdns: Using DNS server 202.134.1.10
  168. mass_rdns: Using DNS server 8.8.8.8
  169. Initiating Parallel DNS resolution of 1 host. at 02:46
  170. mass_rdns: 16.50s 0/1 [#: 3, OK: 0, NX: 0, DR: 0, SF: 0, TR: 6]
  171. Completed Parallel DNS resolution of 1 host. at 02:47, 16.50s elapsed
  172. DNS resolution of 1 IPs took 16.50s. Mode: Async [#: 3, OK: 0, NX: 0, DR: 1, SF: 0, TR: 6, CN: 0]
  173. Initiating SYN Stealth Scan at 02:47
  174. Scanning www.thekickback.com (192.254.233.20) [1000 ports]
  175. Packet capture filter (device eth0): dst host 192.168.200.23 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 192.254.233.20)))
  176. Discovered open port 80/tcp on 192.254.233.20
  177. Discovered open port 8080/tcp on 192.254.233.20
  178. Discovered open port 993/tcp on 192.254.233.20
  179. Discovered open port 53/tcp on 192.254.233.20
  180. Discovered open port 21/tcp on 192.254.233.20
  181. Discovered open port 3306/tcp on 192.254.233.20
  182. Discovered open port 143/tcp on 192.254.233.20
  183. Discovered open port 443/tcp on 192.254.233.20
  184. Discovered open port 110/tcp on 192.254.233.20
  185. Discovered open port 587/tcp on 192.254.233.20
  186. Discovered open port 995/tcp on 192.254.233.20
  187. Increased max_successful_tryno for 192.254.233.20 to 1 (packet drop)
  188. Discovered open port 26/tcp on 192.254.233.20
  189. Increased max_successful_tryno for 192.254.233.20 to 2 (packet drop)
  190. Discovered open port 2222/tcp on 192.254.233.20
  191. Discovered open port 465/tcp on 192.254.233.20
  192. Completed SYN Stealth Scan at 02:47, 21.96s elapsed (1000 total ports)
  193. Overall sending rates: 52.41 packets / s, 2306.06 bytes / s.
  194. Initiating Service scan at 02:47
  195. Scanning 14 services on www.thekickback.com (192.254.233.20)
  196. Got nsock CONNECT response with status ERROR - aborting this service
  197. Completed Service scan at 02:48, 23.51s elapsed (14 services on 1 host)
  198. Packet capture filter (device eth0): dst host 192.168.200.23 and (icmp or (tcp and (src host 192.254.233.20)))
  199. Initiating OS detection (try #1) against www.thekickback.com (192.254.233.20)
  200. OS detection timingRatio() == (1409946481.002 - 1409946480.502) * 1000 / 500 == 1.002
  201. Retrying OS detection (try #2) against www.thekickback.com (192.254.233.20)
  202. Insufficient responses from 192.254.233.20 for TCP sequencing (2), OS detection may be less accurate
  203. OS detection timingRatio() == (1409946484.338 - 1409946483.838) * 1000 / 500 == 1.002
  204. WARNING: OS didn''t receive: EOF
  205. NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:443).
  206. NSE: Finished http-auth against www.thekickback.com (192.254.233.20:8080).
  207. NSE: Finished http-ntlm-info against www.thekickback.com (192.254.233.20:8080).
  208. NSE: ftp-anon against www.thekickback.com (192.254.233.20:21) threw an error!
  209. ERROR
  210. stack traceback:
  211.     [C]: in function 'try'
  212.     /usr/bin/../share/nmap/scripts/ftp-anon.nse:122: in function </usr/bin/../share/nmap/scripts/ftp-anon.nse:99>
  213.     (...tail calls...)
  214.  
  215. NSE: Finished http-title against www.thekickback.com (192.254.233.20:8080).
  216. NSE: Finished http-generator against www.thekickback.com (192.254.233.20:8080).
  217. NSE: GET Request: GET http://www.wikipedia.org HTTP/1.0
  218. Host: www.wikipedia.org
  219.  
  220.  
  221. NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:587).
  222. NSE: GET Request: GET http://www.google.com HTTP/1.0
  223. Host: www.google.com
  224.  
  225.  
  226. NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:995).
  227. NSE: Finished smtp-commands against www.thekickback.com (192.254.233.20:587).
  228. NSE: tls-nextprotoneg: Server does not support TLS NPN extension.
  229. NSE: Finished tls-nextprotoneg against www.thekickback.com (192.254.233.20:465).
  230. NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:995).
  231. NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:21).
  232. NSE: HEAD Request: HEAD http://www.wikipedia.org HTTP/1.0
  233. Host: www.wikipedia.org
  234.  
  235.  
  236. NSE: sslcert.getCertificate error: Failed to connect to server
  237. NSE: Finished ssl-known-key against www.thekickback.com (192.254.233.20:465).
  238. NSE: Finished http-git against www.thekickback.com (192.254.233.20:443).
  239. NSE: Finished pop3-capabilities against www.thekickback.com (192.254.233.20:995).
  240. NSE: Finished smtp-commands against www.thekickback.com (192.254.233.20:465).
  241. NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:993).
  242. NSE: CONNECT Request: CONNECT www.wikipedia.org:80 HTTP/1.0
  243.  
  244.  
  245. NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:26).
  246. NSE: Finished http-favicon against www.thekickback.com (192.254.233.20:80).
  247. NSE: Test 2 - Wikipedia.org
  248. Received valid status codes, but pattern does not match
  249. NSE: GET Request: GET http://www.computerhistory.org HTTP/1.0
  250. Host: www.computerhistory.org
  251.  
  252.  
  253. NSE: Finished pop3-capabilities against www.thekickback.com (192.254.233.20:110).
  254. NSE: Finished http-title against www.thekickback.com (192.254.233.20:443).
  255. NSE: Can't send: ERROR
  256. NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:465).
  257. NSE: Finished http-robots.txt against www.thekickback.com (192.254.233.20:80).
  258. NSE: dns.query() failed to resolve the requested query: id.server
  259. NSE: CONNECT Request: CONNECT www.computerhistory.org:80 HTTP/1.0
  260.  
  261.  
  262. NSE: Finished http-open-proxy against www.thekickback.com (192.254.233.20:80).
  263. NSE: Couldn't receive: EOF
  264. NSE: Finished tls-nextprotoneg against www.thekickback.com (192.254.233.20:443).
  265. NSE: Finished ssl-known-key against www.thekickback.com (192.254.233.20:993).
  266. NSE: HEAD Request: HEAD http://www.google.com HTTP/1.0
  267. Host: www.google.com
  268.  
  269.  
  270. NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:465).
  271. NSE: http-methods.nse: HTTP Status for OPTIONS is 200
  272. NSE: Finished http-methods against www.thekickback.com (192.254.233.20:443).
  273. NSE: Finished sslv2 against www.thekickback.com (192.254.233.20:995).
  274. NSE: Finished http-robots.txt against www.thekickback.com (192.254.233.20:8080).
  275. NSE: sslcert.getCertificate error: Failed to connect to server
  276. NSE: Finished ssl-known-key against www.thekickback.com (192.254.233.20:443).
  277. NSE: Finished ssl-known-key against www.thekickback.com (192.254.233.20:587).
  278. NSE: Finished http-auth against www.thekickback.com (192.254.233.20:443).
  279. NSE: Finished http-ntlm-info against www.thekickback.com (192.254.233.20:443).
  280. NSE: Finished http-generator against www.thekickback.com (192.254.233.20:443).
  281. NSE: CONNECT Request: CONNECT www.google.com:80 HTTP/1.0
  282.  
  283.  
  284. NSE: Finished http-favicon against www.thekickback.com (192.254.233.20:443).
  285. NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:443).
  286. NSE: Test 1 - Google Web Server
  287. Received valid status codes, but pattern does not match
  288. NSE: Finished ssl-known-key against www.thekickback.com (192.254.233.20:995).
  289. NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:993).
  290. NSE: GET Request: GET http://www.wikipedia.org HTTP/1.0
  291. Host: www.wikipedia.org
  292.  
  293.  
  294. NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:26).
  295. NSE: dns.query() failed to resolve the requested query: version.bind
  296. NSE: Finished dns-nsid against www.thekickback.com (192.254.233.20:53).
  297. NSE: Finished http-cors against www.thekickback.com (192.254.233.20:80).
  298. NSE: HEAD Request: HEAD http://www.wikipedia.org HTTP/1.0
  299. Host: www.wikipedia.org
  300.  
  301.  
  302. NSE: Finished sslv2 against www.thekickback.com (192.254.233.20:443).
  303. NSE: CONNECT Request: CONNECT www.wikipedia.org:80 HTTP/1.0
  304.  
  305.  
  306. NSE: Test 2 - Wikipedia.org
  307. Received valid status codes, but pattern does not match
  308. NSE: GET Request: GET http://www.computerhistory.org HTTP/1.0
  309. Host: www.computerhistory.org
  310.  
  311.  
  312. NSE: Couldn't receive: TIMEOUT
  313. NSE: Finished tls-nextprotoneg against www.thekickback.com (192.254.233.20:587).
  314. NSE: CONNECT Request: CONNECT www.computerhistory.org:80 HTTP/1.0
  315.  
  316.  
  317. NSE: Finished http-cors against www.thekickback.com (192.254.233.20:8080).
  318. NSE: Finished http-open-proxy against www.thekickback.com (192.254.233.20:8080).
  319. NSE: Finished http-cors against www.thekickback.com (192.254.233.20:443).
  320. NSE Timing: About 98.65% done; ETC: 02:48 (0:00:00 remaining)
  321. NSE: rpc-grind: isRPC didn't receive response.
  322. NSE: Target port 465 is not a RPC port.
  323. NSE: Finished rpc-grind against www.thekickback.com (192.254.233.20:465).
  324. Completed NSE at 02:48, 31.29s elapsed
  325. NSE: Starting runlevel 2 (of 2) scan.
  326. Nmap scan report for www.thekickback.com (192.254.233.20)
  327. Host is up, received reset (0.17s latency).
  328. Scanned at 2014-09-06 02:46:58 WIB for 116s
  329. Not shown: 952 closed ports
  330. Reason: 952 resets
  331. PORT      STATE    SERVICE        REASON      VERSION
  332. 1/tcp     filtered tcpmux         no-response
  333. 3/tcp     filtered compressnet    no-response
  334. 4/tcp     filtered unknown        no-response
  335. 6/tcp     filtered unknown        no-response
  336. 7/tcp     filtered echo           no-response
  337. 9/tcp     filtered discard        no-response
  338. 13/tcp    filtered daytime        no-response
  339. 17/tcp    filtered qotd           no-response
  340. 19/tcp    filtered chargen        no-response
  341. 21/tcp    open     ftp            syn-ack     Pure-FTPd
  342. 22/tcp    filtered ssh            no-response
  343. 23/tcp    filtered telnet         no-response
  344. 25/tcp    filtered smtp           no-response
  345. 26/tcp    open     smtp           syn-ack     Exim smtpd 4.82
  346. | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
  347. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  348. |_ssl-date: 2014-09-05T19:47:33+00:00; -54s from local time.
  349. 53/tcp    open     domain         syn-ack
  350. 80/tcp    open     http-proxy     syn-ack     Squid http proxy
  351. |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
  352. |_http-methods: GET HEAD POST OPTIONS
  353. |_http-open-proxy: Proxy might be redirecting requests
  354. | http-robots.txt: 2 disallowed entries
  355. |_/files/ /images/
  356. |_http-title: Site doesn't have a title (text/html).
  357. 110/tcp   open     pop3           syn-ack     Dovecot pop3d
  358. |_pop3-capabilities: PIPELINING AUTH-RESP-CODE UIDL TOP RESP-CODES STLS USER SASL(PLAIN LOGIN) CAPA
  359. 111/tcp   filtered rpcbind        no-response
  360. 135/tcp   filtered msrpc          no-response
  361. 139/tcp   filtered netbios-ssn    no-response
  362. 143/tcp   open     imap           syn-ack     Dovecot imapd
  363. |_imap-capabilities: IDLE SASL-IR Pre-login listed AUTH=LOGINA0001 IMAP4rev1 LITERAL+ more have post-login capabilities ENABLE NAMESPACE AUTH=PLAIN ID OK STARTTLS LOGIN-REFERRALS
  364. 179/tcp   filtered bgp            no-response
  365. 443/tcp   open     http           syn-ack     Apache httpd
  366. |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
  367. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  368. | http-robots.txt: 1 disallowed entry
  369. |_/
  370. |_http-title: thekickback.com
  371. 445/tcp   filtered microsoft-ds   no-response
  372. 465/tcp   open     smtps?         syn-ack
  373. | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
  374. |_ Commands supported:
  375. 514/tcp   filtered shell          no-response
  376. 587/tcp   open     smtp           syn-ack     Exim smtpd 4.82
  377. | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
  378. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  379. | ssl-cert: Subject: commonName=*.hostgator.com/serialNumber=Ua2imiD94EQbAgrLVmkdAdyb1udBOJfs/organizationalUnitName=Domain Control Validated - RapidSSL(R)
  380. | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
  381. | Public Key type: rsa
  382. | Public Key bits: 2048
  383. | Not valid before: 2014-04-09T02:56:45+00:00
  384. | Not valid after:  2018-04-10T22:46:45+00:00
  385. | MD5:   626c e2ae 0031 4763 877a 57bc b21f 5dc3
  386. | SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
  387. | -----BEGIN CERTIFICATE-----
  388. | MIIFMzCCBBugAwIBAgIDEeu0MA0GCSqGSIb3DQEBBQUAMDwxCzAJBgNVBAYTAlVT
  389. | MRcwFQYDVQQKEw5HZW9UcnVzdCwgSW5jLjEUMBIGA1UEAxMLUmFwaWRTU0wgQ0Ew
  390. | HhcNMTQwNDA5MDI1NjQ1WhcNMTgwNDEwMjI0NjQ1WjCBvjEpMCcGA1UEBRMgVWEy
  391. | aW1pRDk0RVFiQWdyTFZta2RBZHliMXVkQk9KZnMxEzARBgNVBAsTCkdUNzExNzA3
  392. | NDQxMTAvBgNVBAsTKFNlZSB3d3cucmFwaWRzc2wuY29tL3Jlc291cmNlcy9jcHMg
  393. | KGMpMTQxLzAtBgNVBAsTJkRvbWFpbiBDb250cm9sIFZhbGlkYXRlZCAtIFJhcGlk
  394. | U1NMKFIpMRgwFgYDVQQDDA8qLmhvc3RnYXRvci5jb20wggEiMA0GCSqGSIb3DQEB
  395. | AQUAA4IBDwAwggEKAoIBAQDPCBITp5OXDZne7xN+gULA8Py5/M0DP+Xah9cf8lRp
  396. | 0W6jDHBybwb8SRWi2OOJdBHvF/2DYlJGdT9YtIGc/L2VqUND7lQOXuFL5AXsxLfb
  397. | YTaSZ6tEuWftx/+96buRj7iC/iM7lOtOF1EmKV8y9ZKg4Worr+SW0AO20+pfFf6p
  398. | 6g/3Zdgo+uBwYeVHecCYwcHhS8kSz2uhgvVhdiKrY72Hjw6ms2Zbm8/bzicCitmP
  399. | HARCEcJictLq8N+wnXuLhbxWB9wsWX7bqrFoLiCBexVfvasm8nTzlf9f6QKdtwMe
  400. | EehSlDOXjSsxOG/eKJeqz1ZT6A2qZfPtniZiFXBQaGMLAgMBAAGjggG5MIIBtTAf
  401. | BgNVHSMEGDAWgBRraT1qGEJK3Y8CZTn9NSSGeJEWMDAOBgNVHQ8BAf8EBAMCBaAw
  402. | HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMCkGA1UdEQQiMCCCDyouaG9z
  403. | dGdhdG9yLmNvbYINaG9zdGdhdG9yLmNvbTBDBgNVHR8EPDA6MDigNqA0hjJodHRw
  404. | Oi8vcmFwaWRzc2wtY3JsLmdlb3RydXN0LmNvbS9jcmxzL3JhcGlkc3NsLmNybDAd
  405. | BgNVHQ4EFgQUSNecfnT/4/Fd/A0rZCZWatA0+K4wDAYDVR0TAQH/BAIwADB4Bggr
  406. | BgEFBQcBAQRsMGowLQYIKwYBBQUHMAGGIWh0dHA6Ly9yYXBpZHNzbC1vY3NwLmdl
  407. | b3RydXN0LmNvbTA5BggrBgEFBQcwAoYtaHR0cDovL3JhcGlkc3NsLWFpYS5nZW90
  408. | cnVzdC5jb20vcmFwaWRzc2wuY3J0MEwGA1UdIARFMEMwQQYKYIZIAYb4RQEHNjAz
  409. | MDEGCCsGAQUFBwIBFiVodHRwOi8vd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMv
  410. | Y3BzMA0GCSqGSIb3DQEBBQUAA4IBAQBoMTZsQUynM42kxtaHLjRR5IVbclOlfcMQ
  411. | gnFG5oximAbhP54P3Qb5V9aum11G4mwmU3gVFTPSPyO6Jvu37NCxqj16p7IpAHeN
  412. | FQx1kX0jLfW5lwPo9xEuPKb3dUOZeeDfXToN7OjaZSWIzg3BNur85mzvPgChlTt9
  413. | 7S6KM7DXgy3YOo8CTwAl7ck7MaCwIIxpJNUnNUpLeha4wiVYIR1N/1p9WztwlYsT
  414. | +J02fpQ1rxo+8TWbM33LD0gtX6501hoAdnYlM3b9k0gycae/JjjSCV2OpDJLFljT
  415. | /bstAqDjUAhxCoEvDeiC+cRxM68MYXfcMRDMdEXkzYIzO1AZK6mD
  416. |_-----END CERTIFICATE-----
  417. |_ssl-date: 2014-09-05T19:47:32+00:00; -54s from local time.
  418. 593/tcp   filtered http-rpc-epmap no-response
  419. 993/tcp   open     ssl/imap       syn-ack     Dovecot imapd
  420. |_imap-capabilities: IDLE ENABLE Pre-login listed AUTH=LOGINA0001 IMAP4rev1 LITERAL+ more have capabilities post-login NAMESPACE AUTH=PLAIN ID SASL-IR OK LOGIN-REFERRALS
  421. | ssl-cert: Subject: commonName=*.hostgator.com/serialNumber=Ua2imiD94EQbAgrLVmkdAdyb1udBOJfs/organizationalUnitName=Domain Control Validated - RapidSSL(R)
  422. | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
  423. | Public Key type: rsa
  424. | Public Key bits: 2048
  425. | Not valid before: 2014-04-09T02:56:45+00:00
  426. | Not valid after:  2018-04-10T22:46:45+00:00
  427. | MD5:   626c e2ae 0031 4763 877a 57bc b21f 5dc3
  428. | SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
  429. | -----BEGIN CERTIFICATE-----
  430. | MIIFMzCCBBugAwIBAgIDEeu0MA0GCSqGSIb3DQEBBQUAMDwxCzAJBgNVBAYTAlVT
  431. | MRcwFQYDVQQKEw5HZW9UcnVzdCwgSW5jLjEUMBIGA1UEAxMLUmFwaWRTU0wgQ0Ew
  432. | HhcNMTQwNDA5MDI1NjQ1WhcNMTgwNDEwMjI0NjQ1WjCBvjEpMCcGA1UEBRMgVWEy
  433. | aW1pRDk0RVFiQWdyTFZta2RBZHliMXVkQk9KZnMxEzARBgNVBAsTCkdUNzExNzA3
  434. | NDQxMTAvBgNVBAsTKFNlZSB3d3cucmFwaWRzc2wuY29tL3Jlc291cmNlcy9jcHMg
  435. | KGMpMTQxLzAtBgNVBAsTJkRvbWFpbiBDb250cm9sIFZhbGlkYXRlZCAtIFJhcGlk
  436. | U1NMKFIpMRgwFgYDVQQDDA8qLmhvc3RnYXRvci5jb20wggEiMA0GCSqGSIb3DQEB
  437. | AQUAA4IBDwAwggEKAoIBAQDPCBITp5OXDZne7xN+gULA8Py5/M0DP+Xah9cf8lRp
  438. | 0W6jDHBybwb8SRWi2OOJdBHvF/2DYlJGdT9YtIGc/L2VqUND7lQOXuFL5AXsxLfb
  439. | YTaSZ6tEuWftx/+96buRj7iC/iM7lOtOF1EmKV8y9ZKg4Worr+SW0AO20+pfFf6p
  440. | 6g/3Zdgo+uBwYeVHecCYwcHhS8kSz2uhgvVhdiKrY72Hjw6ms2Zbm8/bzicCitmP
  441. | HARCEcJictLq8N+wnXuLhbxWB9wsWX7bqrFoLiCBexVfvasm8nTzlf9f6QKdtwMe
  442. | EehSlDOXjSsxOG/eKJeqz1ZT6A2qZfPtniZiFXBQaGMLAgMBAAGjggG5MIIBtTAf
  443. | BgNVHSMEGDAWgBRraT1qGEJK3Y8CZTn9NSSGeJEWMDAOBgNVHQ8BAf8EBAMCBaAw
  444. | HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMCkGA1UdEQQiMCCCDyouaG9z
  445. | dGdhdG9yLmNvbYINaG9zdGdhdG9yLmNvbTBDBgNVHR8EPDA6MDigNqA0hjJodHRw
  446. | Oi8vcmFwaWRzc2wtY3JsLmdlb3RydXN0LmNvbS9jcmxzL3JhcGlkc3NsLmNybDAd
  447. | BgNVHQ4EFgQUSNecfnT/4/Fd/A0rZCZWatA0+K4wDAYDVR0TAQH/BAIwADB4Bggr
  448. | BgEFBQcBAQRsMGowLQYIKwYBBQUHMAGGIWh0dHA6Ly9yYXBpZHNzbC1vY3NwLmdl
  449. | b3RydXN0LmNvbTA5BggrBgEFBQcwAoYtaHR0cDovL3JhcGlkc3NsLWFpYS5nZW90
  450. | cnVzdC5jb20vcmFwaWRzc2wuY3J0MEwGA1UdIARFMEMwQQYKYIZIAYb4RQEHNjAz
  451. | MDEGCCsGAQUFBwIBFiVodHRwOi8vd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMv
  452. | Y3BzMA0GCSqGSIb3DQEBBQUAA4IBAQBoMTZsQUynM42kxtaHLjRR5IVbclOlfcMQ
  453. | gnFG5oximAbhP54P3Qb5V9aum11G4mwmU3gVFTPSPyO6Jvu37NCxqj16p7IpAHeN
  454. | FQx1kX0jLfW5lwPo9xEuPKb3dUOZeeDfXToN7OjaZSWIzg3BNur85mzvPgChlTt9
  455. | 7S6KM7DXgy3YOo8CTwAl7ck7MaCwIIxpJNUnNUpLeha4wiVYIR1N/1p9WztwlYsT
  456. | +J02fpQ1rxo+8TWbM33LD0gtX6501hoAdnYlM3b9k0gycae/JjjSCV2OpDJLFljT
  457. | /bstAqDjUAhxCoEvDeiC+cRxM68MYXfcMRDMdEXkzYIzO1AZK6mD
  458. |_-----END CERTIFICATE-----
  459. |_ssl-date: 2014-09-05T19:47:33+00:00; -54s from local time.
  460. 995/tcp   open     ssl/pop3       syn-ack     Dovecot pop3d
  461. |_pop3-capabilities: PIPELINING SASL(PLAIN LOGIN) RESP-CODES AUTH-RESP-CODE USER UIDL CAPA TOP
  462. | ssl-cert: Subject: commonName=*.hostgator.com/serialNumber=Ua2imiD94EQbAgrLVmkdAdyb1udBOJfs/organizationalUnitName=Domain Control Validated - RapidSSL(R)
  463. | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
  464. | Public Key type: rsa
  465. | Public Key bits: 2048
  466. | Not valid before: 2014-04-09T02:56:45+00:00
  467. | Not valid after:  2018-04-10T22:46:45+00:00
  468. | MD5:   626c e2ae 0031 4763 877a 57bc b21f 5dc3
  469. | SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
  470. | -----BEGIN CERTIFICATE-----
  471. | MIIFMzCCBBugAwIBAgIDEeu0MA0GCSqGSIb3DQEBBQUAMDwxCzAJBgNVBAYTAlVT
  472. | MRcwFQYDVQQKEw5HZW9UcnVzdCwgSW5jLjEUMBIGA1UEAxMLUmFwaWRTU0wgQ0Ew
  473. | HhcNMTQwNDA5MDI1NjQ1WhcNMTgwNDEwMjI0NjQ1WjCBvjEpMCcGA1UEBRMgVWEy
  474. | aW1pRDk0RVFiQWdyTFZta2RBZHliMXVkQk9KZnMxEzARBgNVBAsTCkdUNzExNzA3
  475. | NDQxMTAvBgNVBAsTKFNlZSB3d3cucmFwaWRzc2wuY29tL3Jlc291cmNlcy9jcHMg
  476. | KGMpMTQxLzAtBgNVBAsTJkRvbWFpbiBDb250cm9sIFZhbGlkYXRlZCAtIFJhcGlk
  477. | U1NMKFIpMRgwFgYDVQQDDA8qLmhvc3RnYXRvci5jb20wggEiMA0GCSqGSIb3DQEB
  478. | AQUAA4IBDwAwggEKAoIBAQDPCBITp5OXDZne7xN+gULA8Py5/M0DP+Xah9cf8lRp
  479. | 0W6jDHBybwb8SRWi2OOJdBHvF/2DYlJGdT9YtIGc/L2VqUND7lQOXuFL5AXsxLfb
  480. | YTaSZ6tEuWftx/+96buRj7iC/iM7lOtOF1EmKV8y9ZKg4Worr+SW0AO20+pfFf6p
  481. | 6g/3Zdgo+uBwYeVHecCYwcHhS8kSz2uhgvVhdiKrY72Hjw6ms2Zbm8/bzicCitmP
  482. | HARCEcJictLq8N+wnXuLhbxWB9wsWX7bqrFoLiCBexVfvasm8nTzlf9f6QKdtwMe
  483. | EehSlDOXjSsxOG/eKJeqz1ZT6A2qZfPtniZiFXBQaGMLAgMBAAGjggG5MIIBtTAf
  484. | BgNVHSMEGDAWgBRraT1qGEJK3Y8CZTn9NSSGeJEWMDAOBgNVHQ8BAf8EBAMCBaAw
  485. | HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMCkGA1UdEQQiMCCCDyouaG9z
  486. | dGdhdG9yLmNvbYINaG9zdGdhdG9yLmNvbTBDBgNVHR8EPDA6MDigNqA0hjJodHRw
  487. | Oi8vcmFwaWRzc2wtY3JsLmdlb3RydXN0LmNvbS9jcmxzL3JhcGlkc3NsLmNybDAd
  488. | BgNVHQ4EFgQUSNecfnT/4/Fd/A0rZCZWatA0+K4wDAYDVR0TAQH/BAIwADB4Bggr
  489. | BgEFBQcBAQRsMGowLQYIKwYBBQUHMAGGIWh0dHA6Ly9yYXBpZHNzbC1vY3NwLmdl
  490. | b3RydXN0LmNvbTA5BggrBgEFBQcwAoYtaHR0cDovL3JhcGlkc3NsLWFpYS5nZW90
  491. | cnVzdC5jb20vcmFwaWRzc2wuY3J0MEwGA1UdIARFMEMwQQYKYIZIAYb4RQEHNjAz
  492. | MDEGCCsGAQUFBwIBFiVodHRwOi8vd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMv
  493. | Y3BzMA0GCSqGSIb3DQEBBQUAA4IBAQBoMTZsQUynM42kxtaHLjRR5IVbclOlfcMQ
  494. | gnFG5oximAbhP54P3Qb5V9aum11G4mwmU3gVFTPSPyO6Jvu37NCxqj16p7IpAHeN
  495. | FQx1kX0jLfW5lwPo9xEuPKb3dUOZeeDfXToN7OjaZSWIzg3BNur85mzvPgChlTt9
  496. | 7S6KM7DXgy3YOo8CTwAl7ck7MaCwIIxpJNUnNUpLeha4wiVYIR1N/1p9WztwlYsT
  497. | +J02fpQ1rxo+8TWbM33LD0gtX6501hoAdnYlM3b9k0gycae/JjjSCV2OpDJLFljT
  498. | /bstAqDjUAhxCoEvDeiC+cRxM68MYXfcMRDMdEXkzYIzO1AZK6mD
  499. |_-----END CERTIFICATE-----
  500. |_ssl-date: 2014-09-05T19:47:32+00:00; -54s from local time.
  501. 1024/tcp  filtered kdm            no-response
  502. 1025/tcp  filtered NFS-or-IIS     no-response
  503. 1026/tcp  filtered LSA-or-nterm   no-response
  504. 1027/tcp  filtered IIS            no-response
  505. 1028/tcp  filtered unknown        no-response
  506. 1029/tcp  filtered ms-lsa         no-response
  507. 1030/tcp  filtered iad1           no-response
  508. 1080/tcp  filtered socks          no-response
  509. 1433/tcp  filtered ms-sql-s       no-response
  510. 1434/tcp  filtered ms-sql-m       no-response
  511. 2049/tcp  filtered nfs            no-response
  512. 2222/tcp  open     ssh            syn-ack     OpenSSH 5.3 (protocol 2.0)
  513. |_ssh-hostkey:
  514. 3306/tcp  open     mysql          syn-ack     MySQL 5.5.37-35.1
  515. | mysql-info:
  516. |   Protocol: 53
  517. |   Version: .5.37-35.1
  518. |   Thread ID: 76616283
  519. |   Capabilities flags: 65535
  520. |   Some Capabilities: Support41Auth, Speaks41ProtocolOld, ConnectWithDatabase, FoundRows, IgnoreSpaceBeforeParenthesis, SupportsTransactions, IgnoreSigpipes, LongPassword, SupportsLoadDataLocal, LongColumnFlag, InteractiveClient, Speaks41ProtocolNew, SwitchToSSLAfterHandshake, SupportsCompression, ODBCClient, DontAllowDatabaseTableColumn
  521. |   Status: Autocommit
  522. |_  Salt: `Z%Fnz<X*d<=[56OkO'q
  523. 4444/tcp  filtered krb524         no-response
  524. 5050/tcp  filtered mmcc           no-response
  525. 8080/tcp  open     http           syn-ack     nginx 1.6.1
  526. |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
  527. |_http-methods: GET HEAD POST OPTIONS
  528. | http-robots.txt: 2 disallowed entries
  529. |_/files/ /images/
  530. |_http-title: Site doesn't have a title (text/html).
  531. 9898/tcp  filtered monkeycom      no-response
  532. 12345/tcp filtered netbus         no-response
  533. Device type: WAP|storage-misc
  534. Running: Linux 2.4.X, Netgear RAIDiator 4.X
  535. OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:netgear:raidiator:4
  536. OS details: DD-WRT v23 (Linux 2.4.36), Netgear ReadyNAS Duo NAS device (RAIDiator 4.1.4)
  537. TCP/IP fingerprint:
  538. OS:SCAN(V=6.47%E=4%D=9/6%OT=21%CT=20%CU=31104%PV=N%DS=4%DC=T%G=N%TM=540A13A
  539. OS:6%P=i686-pc-linux-gnu)SEQ(SP=104%GCD=1%ISR=10D%TI=Z%II=I%TS=7)SEQ(II=I%T
  540. OS:S=7)OPS(O1=M5A0ST11NW7%O2=M5A0ST11NW7%O3=M5A0NNT11NW7%O4=M5A0ST11NW7%O5=
  541. OS:M5A0ST11NW7%O6=M5A0ST11)WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7
  542. OS:120)ECN(R=Y%DF=Y%T=40%W=7210%O=M5A0NNSNW7%CC=Y%Q=)ECN(R=N)T1(R=Y%DF=Y%T=
  543. OS:40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=N)T5(R=Y%DF=Y%T=40%W=0%S=Z%A
  544. OS:=S+%F=AR%O=%RD=0%Q=)T6(R=N)T7(R=N)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%R
  545. OS:ID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
  546.  
  547. Uptime guess: 67.280 days (since Mon Jun 30 20:06:23 2014)
  548. Network Distance: 4 hops
  549. Service Info: Host: gator3225.hostgator.com
  550.  
  551. TRACEROUTE (using port 80/tcp)
  552. HOP RTT      ADDRESS
  553. 1   0.67 ms  192.168.200.1
  554. 2   44.01 ms 192.168.30.1
  555. 3   44.24 ms 172.16.1.1
  556. 4   44.60 ms 192.254.233.20
  557. Final times for host: srtt: 165300 rttvar: 109984  to: 605236
  558.  
  559. NSE: Script Post-scanning.
  560. NSE: Starting runlevel 1 (of 2) scan.
  561. NSE: Starting runlevel 2 (of 2) scan.
  562. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes nmap-services.
  563. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  564. Nmap done: 1 IP address (1 host up) scanned in 117.75 seconds
  565.            Raw packets sent: 1251 (57.112KB
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement