Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- =======================================================================================================================================
- Hostname accounting.gov.sd ISP NICDC
- Continent Africa Flag
- SD
- Country Sudan Country Code SD
- Region Unknown Local time 12 Feb 2019 02:34 CAT
- City Unknown Postal Code Unknown
- IP Address 62.12.101.14 Latitude 15
- Longitude 30
- =======================================================================================================================================
- #######################################################################################################################################
- > accounting.gov.sd
- Server: 38.132.106.139
- Address: 38.132.106.139#53
- Non-authoritative answer:
- Name: accounting.gov.sd
- Address: 62.12.101.14
- >
- #######################################################################################################################################
- HostIP:62.12.101.14
- HostName:accounting.gov.sd
- Gathered Inet-whois information for 62.12.101.14
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 62.12.96.0 - 62.12.127.255
- netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
- descr: IPv4 address block not managed by the RIPE NCC
- remarks: ------------------------------------------------------
- remarks:
- remarks: For registration information,
- remarks: you can consult the following sources:
- remarks:
- remarks: IANA
- remarks: http://www.iana.org/assignments/ipv4-address-space
- remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
- remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
- remarks:
- remarks: AFRINIC (Africa)
- remarks: http://www.afrinic.net/ whois.afrinic.net
- remarks:
- remarks: APNIC (Asia Pacific)
- remarks: http://www.apnic.net/ whois.apnic.net
- remarks:
- remarks: ARIN (Northern America)
- remarks: http://www.arin.net/ whois.arin.net
- remarks:
- remarks: LACNIC (Latin America and the Carribean)
- remarks: http://www.lacnic.net/ whois.lacnic.net
- remarks:
- remarks: ------------------------------------------------------
- country: EU # Country is really world wide
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- status: ALLOCATED UNSPECIFIED
- mnt-by: RIPE-NCC-HM-MNT
- created: 2019-01-07T10:46:54Z
- last-modified: 2019-01-07T10:46:54Z
- source: RIPE
- role: Internet Assigned Numbers Authority
- address: see http://www.iana.org.
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- nic-hdl: IANA1-RIPE
- remarks: For more information on IANA services
- remarks: go to IANA web site at http://www.iana.org.
- mnt-by: RIPE-NCC-MNT
- created: 1970-01-01T00:00:00Z
- last-modified: 2001-09-22T09:31:27Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.92.6 (HEREFORD)
- Gathered Inic-whois information for accounting.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Error: Unable to connect - Invalid Host
- ERROR: Connection to InicWhois Server sd.whois-servers.net failed
- close error
- Gathered Netcraft information for accounting.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for accounting.gov.sd
- Netcraft.com Information gathered
- Gathered Subdomain information for accounting.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- HostName:www.accounting.gov.sd
- HostIP:62.12.101.14
- Searching Altavista.com:80...
- Found 1 possible subdomain(s) for host accounting.gov.sd, Searched 0 pages containing 0 results
- Gathered E-Mail information for accounting.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host accounting.gov.sd, Searched 0 pages containing 0 results
- Gathered TCP Port information for 62.12.101.14
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 22/tcp open
- 80/tcp open
- Portscan Finished: Scanned 150 ports, 6 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: http://accounting.gov.sd
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: الرئيسية - ديوان الحسابات
- [+] IP address: 62.12.101.14
- [+] Web Server: Could Not Detect
- [+] CMS: Joomla
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- # If the Joomla site is installed within a folder such as at
- # e.g. www.example.com/joomla/ the robots.txt file MUST be
- # moved to the site root at e.g. www.example.com/robots.txt
- # AND the joomla folder name MUST be prefixed to the disallowed
- # path, e.g. the Disallow rule for the /administrator/ folder
- # MUST be changed to read Disallow: /joomla/administrator/
- #
- # For more information about the robots.txt standard, see:
- # http://www.robotstxt.org/orig.html
- #
- # For syntax checking, see:
- # http://www.sxw.org.uk/computing/robots/check.html
- User-agent: *
- Disallow: /administrator/
- Disallow: /cache/
- Disallow: /cli/
- Disallow: /components/
- Disallow: /images/
- Disallow: /includes/
- Disallow: /installation/
- Disallow: /language/
- Disallow: /libraries/
- Disallow: /logs/
- Disallow: /media/
- Disallow: /modules/
- Disallow: /plugins/
- Disallow: /templates/
- Disallow: /tmp/
- -----------[end of contents]-------------
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 62.12.101.14
- [i] Country: Sudan
- [i] State:
- [i] City:
- [i] Latitude: 15.0
- [i] Longitude: 30.0
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Date: Tue, 12 Feb 2019 01:42:48 GMT
- [i] X-Powered-By: PHP/5.6.18
- [i] Set-Cookie: 38fe2784091f2c2f81131c445ff0bfb3=jl5n6emrjg8597otilf4jkohk2; path=/; HttpOnly
- [i] X-Logged-In: False
- [i] P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
- [i] Expires: Mon, 1 Jan 2001 00:00:00 GMT
- [i] Last-Modified: Tue, 12 Feb 2019 01:42:48 GMT
- [i] Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- [i] Pragma: no-cache
- [i] Content-Type: text/html; charset=utf-8
- [i] Connection: close
- D N S L O O K U P
- =======================================================================================================================================
- accounting.gov.sd. 21599 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2018021300 10800 900 604800 86400
- accounting.gov.sd. 21599 IN NS ns0.ndc.gov.sd.
- accounting.gov.sd. 21599 IN NS ns1.ndc.gov.sd.
- accounting.gov.sd. 21599 IN A 62.12.101.14
- accounting.gov.sd. 21599 IN MX 10 f03-web01.nic.gov.sd.
- accounting.gov.sd. 21599 IN TXT "v=spf1 mx -all"
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 62.12.101.14
- Network = 62.12.101.14 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 62.12.101.14 - 62.12.101.14 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2019-02-12 01:42 UTC
- Nmap scan report for accounting.gov.sd (62.12.101.14)
- Host is up (0.21s latency).
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp closed pop3
- 143/tcp closed imap
- 443/tcp filtered https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 3.40 seconds
- #######################################################################################################################################
- [?] Enter the target: example( http://domain.com )
- http://accounting.gov.sd/
- [!] IP Address : 62.12.101.14
- [!] accounting.gov.sd doesn't seem to use a CMS
- [+] Honeypot Probabilty: 0%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for accounting.gov.sd
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/accounting.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp closed pop3
- 143/tcp closed imap
- 443/tcp filtered https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 2.25 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- ns1.ndc.gov.sd. (62.12.109.3) Egypt Egypt
- ns0.ndc.gov.sd. (62.12.109.2) Egypt Egypt
- [+] MX Records
- 10 (62.12.105.3) Egypt Egypt
- [+] Host Records (A)
- accounting.gov.sd (62.12.101.14) Egypt Egypt
- [+] TXT Records
- "v=spf1 mx -all"
- [+] DNS Map: https://dnsdumpster.com/static/map/accounting.gov.sd.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- [+] Emails found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- pixel-1549936113434480-web-@accounting.gov.sd
- pixel-1549936115493260-web-@accounting.gov.sd
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- 62.12.101.14:www.accounting.gov.sd
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- ######################################################################################################################################
- Reverse IP With YouGetSignal 'accounting.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [*] IP: 62.12.101.14
- [*] Domain: accounting.gov.sd
- [*] Total Domains: 1
- [+] accounting.gov.sd
- #######################################################################################################################################
- Geo IP Lookup 'accounting.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] IP Address: 62.12.101.14
- [+] Country: Sudan
- [+] State:
- [+] City:
- [+] Latitude: 15.0
- [+] Longitude: 30.0
- #######################################################################################################################################
- DNS Lookup 'accounting.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] accounting.gov.sd. 20701 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2018021300 10800 900 604800 86400
- [+] accounting.gov.sd. 20701 IN NS ns0.ndc.gov.sd.
- [+] accounting.gov.sd. 20701 IN NS ns1.ndc.gov.sd.
- [+] accounting.gov.sd. 20701 IN A 62.12.101.14
- [+] accounting.gov.sd. 20701 IN MX 10 f03-web01.nic.gov.sd.
- [+] accounting.gov.sd. 20701 IN TXT "v=spf1 mx -all"
- #######################################################################################################################################
- Show HTTP Header 'accounting.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] HTTP/1.1 200 OK
- [+] Date: Tue, 12 Feb 2019 01:57:49 GMT
- [+] Server: Apache/2.2.15 (CentOS)
- [+] X-Powered-By: PHP/5.6.18
- [+] Set-Cookie: 38fe2784091f2c2f81131c445ff0bfb3=080q50tbjtdmp2bco2sp758j10; path=/; HttpOnly
- [+] X-Logged-In: False
- [+] P3P: CP=NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM
- [+] Expires: Mon, 1 Jan 2001 00:00:00 GMT
- [+] Last-Modified: Tue, 12 Feb 2019 01:57:49 GMT
- [+] Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- [+] Pragma: no-cache
- [+] Connection: close
- [+] Content-Type: text/html; charset=utf-8
- #######################################################################################################################################
- Port Scan 'accounting.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Starting Nmap 7.40 ( https://nmap.org ) at 2019-02-12 01:57 UTC
- Nmap scan report for accounting.gov.sd (62.12.101.14)
- Host is up (0.21s latency).
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp closed pop3
- 143/tcp closed imap
- 443/tcp filtered https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 2.27 seconds
- #######################################################################################################################################
- Robot.txt 'accounting.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- # If the Joomla site is installed within a folder such as at
- # e.g. www.example.com/joomla/ the robots.txt file MUST be
- # moved to the site root at e.g. www.example.com/robots.txt
- # AND the joomla folder name MUST be prefixed to the disallowed
- # path, e.g. the Disallow rule for the /administrator/ folder
- # MUST be changed to read Disallow: /joomla/administrator/
- #
- # For more information about the robots.txt standard, see:
- # http://www.robotstxt.org/orig.html
- #
- # For syntax checking, see:
- # http://www.sxw.org.uk/computing/robots/check.html
- User-agent: *
- Disallow: /administrator/
- Disallow: /cache/
- Disallow: /cli/
- Disallow: /components/
- Disallow: /images/
- Disallow: /includes/
- Disallow: /installation/
- Disallow: /language/
- Disallow: /libraries/
- Disallow: /logs/
- Disallow: /media/
- Disallow: /modules/
- Disallow: /plugins/
- Disallow: /templates/
- Disallow: /tmp/
- #######################################################################################################################################
- Traceroute 'accounting.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Start: 2019-02-12T01:58:00+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.202 0.0% 3 0.7 0.7 0.7 0.9 0.1
- 2.|-- 45.79.12.2 0.0% 3 0.8 0.7 0.5 0.9 0.2
- 3.|-- ix-et-5-1-2-0.tcore1.dt8-dallas.as6453.net 0.0% 3 1.3 1.9 1.3 3.0 0.9
- 4.|-- if-ae-2-2.tcore2.dt8-dallas.as6453.net 0.0% 3 140.5 140.1 139.8 140.5 0.3
- 5.|-- if-ae-34-2.tcore1.lvw-los-angeles.as6453.net 0.0% 3 139.9 145.6 139.9 156.7 9.6
- 6.|-- if-ae-2-2.tcore2.lvw-los-angeles.as6453.net 0.0% 3 141.7 148.1 141.5 161.2 11.4
- 7.|-- if-et-53-2.hcore2.kv8-chiba.as6453.net 0.0% 3 144.4 145.6 144.4 148.1 2.1
- 8.|-- if-ae-24-2.tcore2.tv2-tokyo.as6453.net 0.0% 3 145.7 145.7 145.7 145.8 0.0
- 9.|-- 180.87.181.34 0.0% 3 140.0 139.7 139.5 140.0 0.2
- 10.|-- ae0.0.pjr02.wad001.flagtel.com 0.0% 3 288.7 289.5 288.7 290.9 1.2
- 11.|-- ge-4-0-0.0.pjr02.hkg005.flagtel.com 0.0% 3 292.9 291.6 288.7 293.2 2.5
- 12.|-- so-3-0-0.0.pjr02.mmb004.flagtel.com 0.0% 3 291.7 291.1 290.8 291.7 0.5
- 13.|-- xe-8-3-0.0.pjr04.mmb004.flagtel.com 0.0% 3 267.1 265.7 264.8 267.1 1.2
- 14.|-- xe-11-0-1.0.pjr04.dxb001.flagtel.com 0.0% 3 289.1 289.0 288.7 289.2 0.3
- 15.|-- 80.77.2.42 0.0% 3 265.6 265.4 264.6 266.1 0.7
- 16.|-- 196.29.177.113 0.0% 3 267.7 267.4 267.2 267.7 0.2
- 17.|-- 197.254.196.62 0.0% 3 275.9 276.0 275.9 276.1 0.1
- 18.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- #######################################################################################################################################
- Ping 'accounting.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-02-12 01:58 UTC
- SENT (0.2929s) ICMP [104.237.144.6 > 62.12.101.14 Echo request (type=8/code=0) id=12827 seq=1] IP [ttl=64 id=58426 iplen=28 ]
- SENT (1.2933s) ICMP [104.237.144.6 > 62.12.101.14 Echo request (type=8/code=0) id=12827 seq=2] IP [ttl=64 id=58426 iplen=28 ]
- SENT (2.2945s) ICMP [104.237.144.6 > 62.12.101.14 Echo request (type=8/code=0) id=12827 seq=3] IP [ttl=64 id=58426 iplen=28 ]
- SENT (3.2958s) ICMP [104.237.144.6 > 62.12.101.14 Echo request (type=8/code=0) id=12827 seq=4] IP [ttl=64 id=58426 iplen=28 ]
- Max rtt: N/A | Min rtt: N/A | Avg rtt: N/A
- Raw packets sent: 4 (112B) | Rcvd: 0 (0B) | Lost: 4 (100.00%)
- Nping done: 1 IP address pinged in 4.30 seconds
- #######################################################################################################################################
- Page Admin Finder 'accounting.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Avilable Links :
- Find Page >> http://accounting.gov.sd/administrator/
- Find Page >> http://accounting.gov.sd/administrator/index.php
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P1-1-Debian <<>> accounting.gov.sd
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44165
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;accounting.gov.sd. IN A
- ;; ANSWER SECTION:
- accounting.gov.sd. 80623 IN A 62.12.101.14
- ;; Query time: 100 msec
- ;; SERVER: 38.132.106.139#53(38.132.106.139)
- ;; WHEN: lun fév 11 21:10:41 EST 2019
- ;; MSG SIZE rcvd: 62
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P1-1-Debian <<>> +trace accounting.gov.sd
- ;; global options: +cmd
- . 83450 IN NS b.root-servers.net.
- . 83450 IN NS a.root-servers.net.
- . 83450 IN NS i.root-servers.net.
- . 83450 IN NS j.root-servers.net.
- . 83450 IN NS d.root-servers.net.
- . 83450 IN NS e.root-servers.net.
- . 83450 IN NS l.root-servers.net.
- . 83450 IN NS g.root-servers.net.
- . 83450 IN NS m.root-servers.net.
- . 83450 IN NS k.root-servers.net.
- . 83450 IN NS c.root-servers.net.
- . 83450 IN NS f.root-servers.net.
- . 83450 IN NS h.root-servers.net.
- . 83450 IN RRSIG NS 8 0 518400 20190224210000 20190211200000 16749 . tEqTYjnGNdEMjbRhQuqyrYHf9Os8fIrDGcYmTDK7LXipePbmYbROzjUI aCcgYAggiQFfCIIFjLjEw7rElADY6FYV/GjjWTzT2711+k943xFNUJtM IrF/1uu7cD7GzdPxooLqONSS85o/ba5WWyCD4W8e/zw1ZNl+pBVkFhMR aa72fpCfTRKXQd9ulhgM7Ep6E7YJ4dP5TZMdAmTyevu4QUt/RWFS8xYb X2KdZuu7F+WRyqQ3svmGZ+vU5XwyX2Eh9CzB4b/RGuLkMdouiBVOR6tc r1jgUduo2hndsqzFTSLE1xjikal8FQg0pRqycTzjv9Zs+ARAR+AT5TKQ recy/A==
- ;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 98 ms
- sd. 172800 IN NS ns-sd.afrinic.net.
- sd. 172800 IN NS ans2.canar.sd.
- sd. 172800 IN NS ns1.uaenic.ae.
- sd. 172800 IN NS ns2.uaenic.ae.
- sd. 172800 IN NS ans1.sis.sd.
- sd. 172800 IN NS ans1.canar.sd.
- sd. 172800 IN NS sd.cctld.authdns.ripe.net.
- sd. 86400 IN NSEC se. NS RRSIG NSEC
- sd. 86400 IN RRSIG NSEC 8 1 86400 20190224210000 20190211200000 16749 . ONqvCCUFLMIYLZ5yw57cxBhCT/wUS6hp7Bn2m8QUh9MCo8CNvKy6ci/g mhGedeItUlqwl05oKQCJFMMGMaPp72bj7ApafOB6fByBfGBMElT6cqSG lt+k4/DYComzvMU9BUIX3uSsbp97ei3MVZ7b07TOQl3kWTDuC/WPfSjF BAt2cphkFLcrjasuGHiscoBeONRKXxDaEfnYYl9Fg0435tnxxyI+sooe reolb7qKdtyauHRjRny93S0Y1oWNbM3t/oURKzQPwphrxllXJtsHkQ0o 0lyRHFVwvB+qUjcBaTi9QGOqGEbRp5cXWOR+i64rI1Rlw71//uBxvEeO dh4wIw==
- ;; Received 732 bytes from 2001:500:200::b#53(b.root-servers.net) in 69 ms
- ;; Received 74 bytes from 213.42.0.226#53(ns1.uaenic.ae) in 285 ms
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: accounting.gov.sd
- [-] DNSSEC is not configured for accounting.gov.sd
- [*] SOA ns0.ndc.gov.sd 62.12.109.2
- [*] NS ns0.ndc.gov.sd 62.12.109.2
- [*] Bind Version for 62.12.109.2 you guess!
- [*] NS ns1.ndc.gov.sd 62.12.109.3
- [*] Bind Version for 62.12.109.3 you guess!
- [*] MX f03-web01.nic.gov.sd 62.12.105.3
- [*] A accounting.gov.sd 62.12.101.14
- [*] TXT accounting.gov.sd v=spf1 mx -all
- [*] Enumerating SRV Records
- [-] No SRV Records Found for accounting.gov.sd
- [+] 0 Records Found
- #######################################################################################################################################
- [*] Processing domain accounting.gov.sd
- [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
- [+] Getting nameservers
- 62.12.109.2 - ns0.ndc.gov.sd
- [+] Zone transfer sucessful using nameserver ns0.ndc.gov.sd
- accounting.gov.sd. 86400 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2018021300 10800 900 604800 86400
- accounting.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
- accounting.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
- accounting.gov.sd. 86400 IN A 62.12.101.14
- accounting.gov.sd. 86400 IN MX 10 f03-web01.nic.gov.sd.
- accounting.gov.sd. 86400 IN TXT "v=spf1 mx -all"
- mail.accounting.gov.sd. 86400 IN A 62.12.105.3
- mail.accounting.gov.sd. 86400 IN MX 10 mail.accounting.gov.sd.
- mailclient.accounting.gov.sd. 86400 IN A 62.12.101.14
- mssql.accounting.gov.sd. 86400 IN A 62.12.105.3
- ticket.accounting.gov.sd. 86400 IN A 62.12.101.14
- webmail.accounting.gov.sd. 86400 IN CNAME mail.accounting.gov.sd.
- www.accounting.gov.sd. 86400 IN A 62.12.101.14
- #######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 62.12.105.3 200 host mail.accounting.gov.sd Microsoft-IIS/8.5
- 62.12.101.14 200 host mailclient.accounting.gov.sd Apache/2.2.15 (CentOS)
- 62.12.105.3 200 host mssql.accounting.gov.sd Microsoft-IIS/8.5
- 62.12.101.14 200 host ticket.accounting.gov.sd Apache/2.2.15 (CentOS)
- 62.12.105.3 302 alias webmail.accounting.gov.sd Microsoft-IIS/8.5
- 62.12.105.3 302 host mail.accounting.gov.sd Microsoft-IIS/8.5
- 62.12.101.14 200 host www.accounting.gov.sd Apache/2.2.15 (CentOS)
- #######################################################################################################################################
- [+] Testing domain
- www.accounting.gov.sd 62.12.101.14
- [+] Dns resolving
- Domain name Ip address Name server
- No address associated with hostname accounting.gov.sd
- [+] Testing wildcard
- Ok, no wildcard found.
- [+] Scanning for subdomain on accounting.gov.sd
- [!] Wordlist not specified. I scannig with my internal wordlist...
- Estimated time about 154.52 seconds
- Subdomain Ip address Name server
- mail.accounting.gov.sd 62.12.105.3 f03-web01.nic.gov.sd
- mssql.accounting.gov.sd 62.12.105.3 f03-web01.nic.gov.sd
- webmail.accounting.gov.sd 62.12.105.3 f03-web01.nic.gov.sd
- #######################################################################################################################################
- =======================================================================================================================================
- | E-mails:
- | [+] E-mail Found: kevinh@kevcom.com
- | [+] E-mail Found: mike@hyperreal.org
- | [+] E-mail Found: admin@accounting.gov.sd
- | [+] E-mail Found: shamoco@mail.net
- | [+] E-mail Found: info@joomla-monster.com
- =======================================================================================================================================
- | External hosts:
- | [+] External Host Found: http://httpd.apache.org
- =======================================================================================================================================
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- accounting.gov.sd -----
- Host's addresses:
- __________________
- accounting.gov.sd. 80773 IN A 62.12.101.14
- Name Servers:
- ______________
- ns0.ndc.gov.sd. 8772 IN A 62.12.109.2
- ns1.ndc.gov.sd. 8772 IN A 62.12.109.3
- Mail (MX) Servers:
- ___________________
- f03-web01.nic.gov.sd. 86400 IN A 62.12.105.3
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for accounting.gov.sd on ns0.ndc.gov.sd ...
- accounting.gov.sd. 86400 IN SOA (
- accounting.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
- accounting.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
- accounting.gov.sd. 86400 IN A 62.12.101.14
- accounting.gov.sd. 86400 IN MX 10
- accounting.gov.sd. 86400 IN TXT "v=spf1
- mail.accounting.gov.sd. 86400 IN A 62.12.105.3
- mail.accounting.gov.sd. 86400 IN MX 10
- mailclient.accounting.gov.sd. 86400 IN A 62.12.101.14
- mssql.accounting.gov.sd. 86400 IN A 62.12.105.3
- ticket.accounting.gov.sd. 86400 IN A 62.12.101.14
- webmail.accounting.gov.sd. 86400 IN CNAME mail.accounting.gov.sd.
- www.accounting.gov.sd. 86400 IN A 62.12.101.14
- Trying Zone Transfer for accounting.gov.sd on ns1.ndc.gov.sd ...
- accounting.gov.sd. 86400 IN SOA (
- accounting.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
- accounting.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
- accounting.gov.sd. 86400 IN A 62.12.101.14
- accounting.gov.sd. 86400 IN MX 10
- accounting.gov.sd. 86400 IN TXT "v=spf1
- mail.accounting.gov.sd. 86400 IN A 62.12.105.3
- mail.accounting.gov.sd. 86400 IN MX 10
- mailclient.accounting.gov.sd. 86400 IN A 62.12.101.14
- mssql.accounting.gov.sd. 86400 IN A 62.12.105.3
- ticket.accounting.gov.sd. 86400 IN A 62.12.101.14
- webmail.accounting.gov.sd. 86400 IN CNAME mail.accounting.gov.sd.
- www.accounting.gov.sd. 86400 IN A 62.12.101.14
- brute force file not specified, bay.
- #######################################################################################################################################
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [-] Enumerating subdomains now for accounting.gov.sd
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- Virustotal: www.accounting.gov.sd
- Bing: webmail.accounting.gov.sd
- Yahoo: www.accounting.gov.sd
- Yahoo: webmail.accounting.gov.sd
- Google: ticket.accounting.gov.sd
- Google: webmail.accounting.gov.sd
- [-] Saving results to file: /usr/share/sniper/loot//domains/domains-accounting.gov.sd.txt
- [-] Total Unique Subdomains Found: 3
- www.accounting.gov.sd
- ticket.accounting.gov.sd
- webmail.accounting.gov.sd
- #######################################################################################################################################
- ===============================================
- -=Subfinder v1.1.3 github.com/subfinder/subfinder
- ===============================================
- Running Source: Ask
- Running Source: Archive.is
- Running Source: Baidu
- Running Source: Bing
- Running Source: CertDB
- Running Source: CertificateTransparency
- Running Source: Certspotter
- Running Source: Commoncrawl
- Running Source: Crt.sh
- Running Source: Dnsdb
- Running Source: DNSDumpster
- Running Source: DNSTable
- Running Source: Dogpile
- Running Source: Exalead
- Running Source: Findsubdomains
- Running Source: Googleter
- Running Source: Hackertarget
- Running Source: Ipv4Info
- Running Source: PTRArchive
- Running Source: Sitedossier
- Running Source: Threatcrowd
- Running Source: ThreatMiner
- Running Source: WaybackArchive
- Running Source: Yahoo
- Running enumeration on accounting.gov.sd
- dnsdb: Unexpected return status 503
- waybackarchive: Get https://web.archive.org/cdx/search/cdx?url=*.accounting.gov.sd/*&output=json&fl=original&collapse=urlkey&page=: net/http: invalid header field value "http://web.archive.org/cdx/search/cdx?url=*.accounting.gov.sd/*&output=json&fl=original&collapse=urlkey&page=\x00" for key Referer
- Starting Bruteforcing of accounting.gov.sd with 9985 words
- Total 9 Unique subdomains found for accounting.gov.sd
- .accounting.gov.sd
- mail.accounting.gov.sd
- mail.accounting.gov.sd
- mssql.accounting.gov.sd
- ticket.accounting.gov.sd
- webmail.accounting.gov.sd
- webmail.accounting.gov.sd
- www.accounting.gov.sd
- www.accounting.gov.sd
- #######################################################################################################################################
- [*] Processing domain accounting.gov.sd
- [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
- [+] Getting nameservers
- 62.12.109.2 - ns0.ndc.gov.sd
- [+] Zone transfer sucessful using nameserver ns0.ndc.gov.sd
- accounting.gov.sd. 86400 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2018021300 10800 900 604800 86400
- accounting.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
- accounting.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
- accounting.gov.sd. 86400 IN A 62.12.101.14
- accounting.gov.sd. 86400 IN MX 10 f03-web01.nic.gov.sd.
- accounting.gov.sd. 86400 IN TXT "v=spf1 mx -all"
- mail.accounting.gov.sd. 86400 IN A 62.12.105.3
- mail.accounting.gov.sd. 86400 IN MX 10 mail.accounting.gov.sd.
- mailclient.accounting.gov.sd. 86400 IN A 62.12.101.14
- mssql.accounting.gov.sd. 86400 IN A 62.12.105.3
- ticket.accounting.gov.sd. 86400 IN A 62.12.101.14
- webmail.accounting.gov.sd. 86400 IN CNAME mail.accounting.gov.sd.
- www.accounting.gov.sd. 86400 IN A 62.12.101.14
- #######################################################################################################################################
- [*] Found SPF record:
- [*] v=spf1 mx -all
- [*] SPF record contains an All item: -all
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for accounting.gov.sd!
- #######################################################################################################################################
- INFO[0000] Starting to process queue....
- INFO[0000] Starting to process permutations....
- INFO[0000] FORBIDDEN http://accounting.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://accounting-backup.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://backup-accounting.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://accounting-reports.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://gcp-accounting.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://ec2-accounting.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://data-accounting.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://accounting-data.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://accounting-logs.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://accounting-test.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://s3-accounting.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://accounting-uploads.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://accounting-tools.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://staging-accounting.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://test-accounting.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://dev-accounting.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0000] PUBLIC http://accounting-dev.s3-ap-northeast-1.amazonaws.com/ (http://accounting.gov.sd)
- INFO[0000] FORBIDDEN http://aws-accounting.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0001] FORBIDDEN http://accounting-bucket.s3.amazonaws.com (http://accounting.gov.sd)
- INFO[0001] FORBIDDEN http://accounting-scripts.s3.amazonaws.com (http://accounting.gov.sd)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:13 EST
- Nmap scan report for accounting.gov.sd (62.12.101.14)
- Host is up (0.33s latency).
- Not shown: 468 filtered ports, 6 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 22/tcp open ssh
- 80/tcp open http
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:16 EST
- Nmap scan report for accounting.gov.sd (62.12.101.14)
- Host is up (0.064s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- # general
- (gen) banner: SSH-2.0-OpenSSH_5.3
- (gen) software: OpenSSH 5.3
- (gen) compatibility: OpenSSH 5.9-6.6, Dropbear SSH 2013.56+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 2.1.0
- (enc) rijndael-cbc@lysator.liu.se -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- # message authentication code algorithms
- (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.5.0
- (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.1.0
- (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
- (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0
- # algorithm recommendations (for OpenSSH 5.3)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -ssh-dss -- key algorithm to remove
- (rec) -arcfour -- enc algorithm to remove
- (rec) -rijndael-cbc@lysator.liu.se -- enc algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -arcfour256 -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -arcfour128 -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-md5-96 -- mac algorithm to remove
- (rec) -hmac-ripemd160 -- mac algorithm to remove
- (rec) -hmac-sha1-96 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5 -- mac algorithm to remove
- (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:17 EST
- NSE: [ssh-run] Failed to specify credentials and command to run.
- NSE: [ssh-brute] Trying username/password pair: root:root
- NSE: [ssh-brute] Trying username/password pair: admin:admin
- NSE: [ssh-brute] Trying username/password pair: administrator:administrator
- NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
- NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
- NSE: [ssh-brute] Trying username/password pair: guest:guest
- NSE: [ssh-brute] Trying username/password pair: user:user
- NSE: [ssh-brute] Trying username/password pair: web:web
- NSE: [ssh-brute] Trying username/password pair: test:test
- NSE: [ssh-brute] Trying username/password pair: root:
- NSE: [ssh-brute] Trying username/password pair: admin:
- NSE: [ssh-brute] Trying username/password pair: administrator:
- NSE: [ssh-brute] Trying username/password pair: webadmin:
- NSE: [ssh-brute] Trying username/password pair: sysadmin:
- NSE: [ssh-brute] Trying username/password pair: netadmin:
- NSE: [ssh-brute] Trying username/password pair: guest:
- NSE: [ssh-brute] Trying username/password pair: user:
- NSE: [ssh-brute] Trying username/password pair: web:
- NSE: [ssh-brute] Trying username/password pair: test:
- NSE: [ssh-brute] Trying username/password pair: root:123456
- NSE: [ssh-brute] Trying username/password pair: admin:123456
- NSE: [ssh-brute] Trying username/password pair: administrator:123456
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456
- NSE: [ssh-brute] Trying username/password pair: guest:123456
- NSE: [ssh-brute] Trying username/password pair: user:123456
- NSE: [ssh-brute] Trying username/password pair: web:123456
- NSE: [ssh-brute] Trying username/password pair: test:123456
- NSE: [ssh-brute] Trying username/password pair: root:12345
- NSE: [ssh-brute] Trying username/password pair: admin:12345
- NSE: [ssh-brute] Trying username/password pair: administrator:12345
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345
- NSE: [ssh-brute] Trying username/password pair: guest:12345
- NSE: [ssh-brute] Trying username/password pair: user:12345
- NSE: [ssh-brute] Trying username/password pair: web:12345
- NSE: [ssh-brute] Trying username/password pair: test:12345
- NSE: [ssh-brute] Trying username/password pair: root:123456789
- NSE: [ssh-brute] Trying username/password pair: admin:123456789
- NSE: [ssh-brute] Trying username/password pair: administrator:123456789
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: guest:123456789
- NSE: [ssh-brute] Trying username/password pair: user:123456789
- NSE: [ssh-brute] Trying username/password pair: web:123456789
- NSE: [ssh-brute] Trying username/password pair: test:123456789
- NSE: [ssh-brute] Trying username/password pair: root:password
- NSE: [ssh-brute] Trying username/password pair: admin:password
- NSE: [ssh-brute] Trying username/password pair: administrator:password
- NSE: [ssh-brute] Trying username/password pair: webadmin:password
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password
- NSE: [ssh-brute] Trying username/password pair: netadmin:password
- NSE: [ssh-brute] Trying username/password pair: guest:password
- NSE: [ssh-brute] Trying username/password pair: user:password
- NSE: [ssh-brute] Trying username/password pair: web:password
- NSE: [ssh-brute] Trying username/password pair: test:password
- NSE: [ssh-brute] Trying username/password pair: root:iloveyou
- NSE: [ssh-brute] Trying username/password pair: admin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: guest:iloveyou
- NSE: [ssh-brute] Trying username/password pair: user:iloveyou
- NSE: [ssh-brute] Trying username/password pair: web:iloveyou
- NSE: [ssh-brute] Trying username/password pair: test:iloveyou
- NSE: [ssh-brute] Trying username/password pair: root:princess
- NSE: [ssh-brute] Trying username/password pair: admin:princess
- NSE: [ssh-brute] Trying username/password pair: administrator:princess
- NSE: [ssh-brute] Trying username/password pair: webadmin:princess
- NSE: [ssh-brute] Trying username/password pair: sysadmin:princess
- NSE: [ssh-brute] Trying username/password pair: netadmin:princess
- NSE: [ssh-brute] Trying username/password pair: guest:princess
- NSE: [ssh-brute] Trying username/password pair: user:princess
- NSE: [ssh-brute] Trying username/password pair: web:princess
- NSE: [ssh-brute] Trying username/password pair: test:princess
- NSE: [ssh-brute] Trying username/password pair: root:12345678
- NSE: [ssh-brute] Trying username/password pair: admin:12345678
- NSE: [ssh-brute] Trying username/password pair: administrator:12345678
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: guest:12345678
- NSE: [ssh-brute] Trying username/password pair: user:12345678
- NSE: [ssh-brute] Trying username/password pair: web:12345678
- NSE: [ssh-brute] Trying username/password pair: test:12345678
- NSE: [ssh-brute] Trying username/password pair: root:1234567
- NSE: [ssh-brute] Trying username/password pair: admin:1234567
- NSE: [ssh-brute] Trying username/password pair: administrator:1234567
- NSE: [ssh-brute] Trying username/password pair: webadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: netadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: guest:1234567
- NSE: [ssh-brute] Trying username/password pair: user:1234567
- NSE: [ssh-brute] Trying username/password pair: web:1234567
- NSE: [ssh-brute] Trying username/password pair: test:1234567
- NSE: [ssh-brute] Trying username/password pair: root:abc123
- NSE: [ssh-brute] Trying username/password pair: admin:abc123
- NSE: [ssh-brute] Trying username/password pair: administrator:abc123
- NSE: [ssh-brute] Trying username/password pair: webadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: sysadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: netadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: guest:abc123
- NSE: [ssh-brute] Trying username/password pair: user:abc123
- NSE: [ssh-brute] Trying username/password pair: web:abc123
- NSE: [ssh-brute] Trying username/password pair: test:abc123
- NSE: [ssh-brute] Trying username/password pair: root:nicole
- NSE: [ssh-brute] Trying username/password pair: admin:nicole
- NSE: [ssh-brute] Trying username/password pair: administrator:nicole
- NSE: [ssh-brute] Trying username/password pair: webadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: sysadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: netadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: guest:nicole
- NSE: [ssh-brute] Trying username/password pair: user:nicole
- NSE: [ssh-brute] Trying username/password pair: web:nicole
- NSE: [ssh-brute] Trying username/password pair: test:nicole
- NSE: [ssh-brute] Trying username/password pair: root:daniel
- NSE: [ssh-brute] Trying username/password pair: admin:daniel
- NSE: [ssh-brute] Trying username/password pair: administrator:daniel
- NSE: [ssh-brute] Trying username/password pair: webadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: sysadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: netadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: guest:daniel
- NSE: [ssh-brute] Trying username/password pair: user:daniel
- NSE: [ssh-brute] Trying username/password pair: web:daniel
- NSE: [ssh-brute] Trying username/password pair: test:daniel
- NSE: [ssh-brute] Trying username/password pair: root:monkey
- NSE: [ssh-brute] Trying username/password pair: admin:monkey
- NSE: [ssh-brute] Trying username/password pair: administrator:monkey
- NSE: [ssh-brute] Trying username/password pair: webadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: sysadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: netadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: guest:monkey
- NSE: [ssh-brute] Trying username/password pair: user:monkey
- NSE: [ssh-brute] Trying username/password pair: web:monkey
- NSE: [ssh-brute] Trying username/password pair: test:monkey
- NSE: [ssh-brute] Trying username/password pair: root:babygirl
- NSE: [ssh-brute] Trying username/password pair: admin:babygirl
- NSE: [ssh-brute] Trying username/password pair: administrator:babygirl
- NSE: [ssh-brute] Trying username/password pair: webadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: sysadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: netadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: guest:babygirl
- NSE: [ssh-brute] Trying username/password pair: user:babygirl
- NSE: [ssh-brute] Trying username/password pair: web:babygirl
- NSE: [ssh-brute] Trying username/password pair: test:babygirl
- NSE: [ssh-brute] Trying username/password pair: root:qwerty
- NSE: [ssh-brute] Trying username/password pair: admin:qwerty
- NSE: [ssh-brute] Trying username/password pair: administrator:qwerty
- NSE: [ssh-brute] Trying username/password pair: webadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: sysadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: netadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: guest:qwerty
- NSE: [ssh-brute] Trying username/password pair: user:qwerty
- NSE: [ssh-brute] Trying username/password pair: web:qwerty
- NSE: [ssh-brute] Trying username/password pair: test:qwerty
- NSE: [ssh-brute] Trying username/password pair: root:lovely
- NSE: [ssh-brute] Trying username/password pair: admin:lovely
- NSE: [ssh-brute] Trying username/password pair: administrator:lovely
- NSE: [ssh-brute] Trying username/password pair: webadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: sysadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: netadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: guest:lovely
- NSE: [ssh-brute] Trying username/password pair: user:lovely
- NSE: [ssh-brute] Trying username/password pair: web:lovely
- NSE: [ssh-brute] Trying username/password pair: test:lovely
- NSE: [ssh-brute] Trying username/password pair: root:654321
- NSE: [ssh-brute] Trying username/password pair: admin:654321
- NSE: [ssh-brute] Trying username/password pair: administrator:654321
- NSE: [ssh-brute] Trying username/password pair: webadmin:654321
- NSE: [ssh-brute] Trying username/password pair: sysadmin:654321
- NSE: [ssh-brute] Trying username/password pair: netadmin:654321
- NSE: [ssh-brute] Trying username/password pair: guest:654321
- NSE: [ssh-brute] Trying username/password pair: user:654321
- NSE: [ssh-brute] Trying username/password pair: web:654321
- NSE: [ssh-brute] Trying username/password pair: test:654321
- NSE: [ssh-brute] Trying username/password pair: root:michael
- NSE: [ssh-brute] Trying username/password pair: admin:michael
- NSE: [ssh-brute] Trying username/password pair: administrator:michael
- NSE: [ssh-brute] Trying username/password pair: webadmin:michael
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michael
- NSE: [ssh-brute] Trying username/password pair: netadmin:michael
- NSE: [ssh-brute] Trying username/password pair: guest:michael
- NSE: [ssh-brute] Trying username/password pair: user:michael
- NSE: [ssh-brute] Trying username/password pair: web:michael
- NSE: [ssh-brute] Trying username/password pair: test:michael
- NSE: [ssh-brute] Trying username/password pair: root:jessica
- NSE: [ssh-brute] Trying username/password pair: admin:jessica
- NSE: [ssh-brute] Trying username/password pair: administrator:jessica
- NSE: [ssh-brute] Trying username/password pair: webadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: netadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: guest:jessica
- NSE: [ssh-brute] Trying username/password pair: user:jessica
- NSE: [ssh-brute] Trying username/password pair: web:jessica
- NSE: [ssh-brute] Trying username/password pair: test:jessica
- NSE: [ssh-brute] Trying username/password pair: root:111111
- NSE: [ssh-brute] Trying username/password pair: admin:111111
- NSE: [ssh-brute] Trying username/password pair: administrator:111111
- NSE: [ssh-brute] Trying username/password pair: webadmin:111111
- NSE: [ssh-brute] Trying username/password pair: sysadmin:111111
- NSE: [ssh-brute] Trying username/password pair: netadmin:111111
- NSE: [ssh-brute] Trying username/password pair: guest:111111
- NSE: [ssh-brute] Trying username/password pair: user:111111
- NSE: [ssh-brute] Trying username/password pair: web:111111
- NSE: [ssh-brute] Trying username/password pair: test:111111
- NSE: [ssh-brute] Trying username/password pair: root:ashley
- NSE: [ssh-brute] Trying username/password pair: admin:ashley
- NSE: [ssh-brute] Trying username/password pair: administrator:ashley
- NSE: [ssh-brute] Trying username/password pair: webadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: sysadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: netadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: guest:ashley
- NSE: [ssh-brute] Trying username/password pair: user:ashley
- NSE: [ssh-brute] Trying username/password pair: web:ashley
- NSE: [ssh-brute] Trying username/password pair: test:ashley
- NSE: [ssh-brute] Trying username/password pair: root:000000
- NSE: [ssh-brute] Trying username/password pair: admin:000000
- NSE: [ssh-brute] Trying username/password pair: administrator:000000
- NSE: [ssh-brute] Trying username/password pair: webadmin:000000
- NSE: [ssh-brute] Trying username/password pair: sysadmin:000000
- NSE: [ssh-brute] Trying username/password pair: netadmin:000000
- NSE: [ssh-brute] Trying username/password pair: guest:000000
- NSE: [ssh-brute] Trying username/password pair: user:000000
- NSE: [ssh-brute] Trying username/password pair: web:000000
- NSE: [ssh-brute] Trying username/password pair: test:000000
- NSE: [ssh-brute] Trying username/password pair: root:iloveu
- NSE: [ssh-brute] Trying username/password pair: admin:iloveu
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveu
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: guest:iloveu
- NSE: [ssh-brute] Trying username/password pair: user:iloveu
- NSE: [ssh-brute] Trying username/password pair: web:iloveu
- NSE: [ssh-brute] Trying username/password pair: test:iloveu
- NSE: [ssh-brute] Trying username/password pair: root:michelle
- NSE: [ssh-brute] Trying username/password pair: admin:michelle
- NSE: [ssh-brute] Trying username/password pair: administrator:michelle
- NSE: [ssh-brute] Trying username/password pair: webadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: netadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: guest:michelle
- NSE: [ssh-brute] Trying username/password pair: user:michelle
- NSE: [ssh-brute] Trying username/password pair: web:michelle
- NSE: [ssh-brute] Trying username/password pair: test:michelle
- NSE: [ssh-brute] Trying username/password pair: root:tigger
- NSE: [ssh-brute] Trying username/password pair: admin:tigger
- NSE: [ssh-brute] Trying username/password pair: administrator:tigger
- NSE: [ssh-brute] Trying username/password pair: webadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: sysadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: netadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: guest:tigger
- NSE: [ssh-brute] Trying username/password pair: user:tigger
- NSE: [ssh-brute] Trying username/password pair: web:tigger
- NSE: [ssh-brute] Trying username/password pair: test:tigger
- NSE: [ssh-brute] Trying username/password pair: root:sunshine
- NSE: [ssh-brute] Trying username/password pair: admin:sunshine
- NSE: [ssh-brute] Trying username/password pair: administrator:sunshine
- NSE: [ssh-brute] Trying username/password pair: webadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: netadmin:sunshine
- NSE: [ssh-brute] Trying username/password pair: guest:sunshine
- NSE: [ssh-brute] Trying username/password pair: user:sunshine
- NSE: [ssh-brute] Trying username/password pair: web:sunshine
- NSE: [ssh-brute] Trying username/password pair: test:sunshine
- NSE: [ssh-brute] Trying username/password pair: root:chocolate
- NSE: [ssh-brute] Trying username/password pair: admin:chocolate
- NSE: [ssh-brute] Trying username/password pair: administrator:chocolate
- NSE: [ssh-brute] Trying username/password pair: webadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: sysadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: netadmin:chocolate
- NSE: [ssh-brute] Trying username/password pair: guest:chocolate
- NSE: [ssh-brute] Trying username/password pair: user:chocolate
- NSE: [ssh-brute] Trying username/password pair: web:chocolate
- NSE: [ssh-brute] Trying username/password pair: test:chocolate
- NSE: [ssh-brute] Trying username/password pair: root:password1
- NSE: [ssh-brute] Trying username/password pair: admin:password1
- NSE: [ssh-brute] Trying username/password pair: administrator:password1
- NSE: [ssh-brute] Trying username/password pair: webadmin:password1
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password1
- NSE: [ssh-brute] Trying username/password pair: netadmin:password1
- NSE: [ssh-brute] Trying username/password pair: guest:password1
- NSE: [ssh-brute] Trying username/password pair: user:password1
- NSE: [ssh-brute] Trying username/password pair: web:password1
- NSE: [ssh-brute] Trying username/password pair: test:password1
- NSE: [ssh-brute] Trying username/password pair: root:soccer
- NSE: [ssh-brute] Trying username/password pair: admin:soccer
- NSE: [ssh-brute] Trying username/password pair: administrator:soccer
- NSE: [ssh-brute] Trying username/password pair: webadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: sysadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: netadmin:soccer
- NSE: [ssh-brute] Trying username/password pair: guest:soccer
- NSE: [ssh-brute] Trying username/password pair: user:soccer
- NSE: [ssh-brute] Trying username/password pair: web:soccer
- NSE: [ssh-brute] Trying username/password pair: test:soccer
- NSE: [ssh-brute] Trying username/password pair: root:anthony
- NSE: [ssh-brute] Trying username/password pair: admin:anthony
- NSE: [ssh-brute] Trying username/password pair: administrator:anthony
- NSE: [ssh-brute] Trying username/password pair: webadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: sysadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: netadmin:anthony
- NSE: [ssh-brute] Trying username/password pair: guest:anthony
- NSE: [ssh-brute] Trying username/password pair: user:anthony
- NSE: [ssh-brute] Trying username/password pair: web:anthony
- NSE: [ssh-brute] Trying username/password pair: test:anthony
- NSE: [ssh-brute] Trying username/password pair: root:friends
- NSE: [ssh-brute] Trying username/password pair: admin:friends
- NSE: [ssh-brute] Trying username/password pair: administrator:friends
- NSE: [ssh-brute] Trying username/password pair: webadmin:friends
- NSE: [ssh-brute] Trying username/password pair: sysadmin:friends
- NSE: [ssh-brute] Trying username/password pair: netadmin:friends
- NSE: [ssh-brute] Trying username/password pair: guest:friends
- NSE: [ssh-brute] Trying username/password pair: user:friends
- NSE: [ssh-brute] Trying username/password pair: web:friends
- NSE: [ssh-brute] Trying username/password pair: test:friends
- NSE: [ssh-brute] Trying username/password pair: root:purple
- NSE: [ssh-brute] Trying username/password pair: admin:purple
- NSE: [ssh-brute] Trying username/password pair: administrator:purple
- NSE: [ssh-brute] Trying username/password pair: webadmin:purple
- NSE: [ssh-brute] Trying username/password pair: sysadmin:purple
- NSE: [ssh-brute] Trying username/password pair: netadmin:purple
- NSE: [ssh-brute] Trying username/password pair: guest:purple
- NSE: [ssh-brute] Trying username/password pair: user:purple
- NSE: [ssh-brute] Trying username/password pair: web:purple
- NSE: [ssh-brute] Trying username/password pair: test:purple
- NSE: [ssh-brute] Trying username/password pair: root:angel
- NSE: [ssh-brute] Trying username/password pair: admin:angel
- NSE: [ssh-brute] Trying username/password pair: administrator:angel
- Nmap scan report for accounting.gov.sd (62.12.101.14)
- Host is up (0.33s latency).
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
- | ssh-auth-methods:
- | Supported authentication methods:
- | publickey
- | gssapi-keyex
- | gssapi-with-mic
- |_ password
- | ssh-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 333 guesses in 181 seconds, average tps: 2.2
- | ssh-hostkey:
- | 1024 e4:f9:da:cf:9a:e4:fa:b9:38:74:3e:88:f4:41:3c:e7 (DSA)
- |_ 2048 8c:0d:43:e9:5f:4c:24:ac:a2:b5:84:66:ae:7e:12:6a (RSA)
- | ssh-publickey-acceptance:
- |_ Accepted Public Keys: No public keys accepted
- |_ssh-run: Failed to specify credentials and command to run.
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 22/tcp)
- HOP RTT ADDRESS
- 1 65.63 ms 10.237.200.1
- 2 65.83 ms 193.37.252.209
- 3 65.66 ms vlan2905.bb1.mia1.us.m247.com (82.102.29.174)
- 4 66.07 ms mai-b1-link.telia.net (213.248.68.36)
- 5 92.52 ms 62.115.119.230
- 6 191.30 ms prs-bb3-link.telia.net (80.91.251.242)
- 7 191.67 ms mei-b2-link.telia.net (62.115.133.175)
- 8 197.93 ms mei-b2-link.telia.net (62.115.133.183)
- 9 226.43 ms flagtelecom-ic-324599-mei-b2.c.telia.net (213.248.72.190)
- 10 211.40 ms ae3.0.cjr02.prs001.flagtel.com (62.216.128.209)
- 11 358.95 ms xe-11-1-1.0.pjr04.dxb001.flagtel.com (85.95.25.162)
- 12 213.23 ms ae3.0.cjr02.prs001.flagtel.com (62.216.128.209)
- 13 323.56 ms 196.29.177.113
- 14 320.62 ms 197.254.196.62
- 15 ...
- 16 331.78 ms 62.12.101.14
- #######################################################################################################################################
- USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- RHOSTS => accounting.gov.sd
- RHOST => accounting.gov.sd
- [*] 62.12.101.14:22 - SSH - Using malformed packet technique
- [*] 62.12.101.14:22 - SSH - Starting scan
- [-] 62.12.101.14:22 - SSH - User 'admin' not found
- [-] 62.12.101.14:22 - SSH - User 'administrator' not found
- [-] 62.12.101.14:22 - SSH - User 'anonymous' not found
- [-] 62.12.101.14:22 - SSH - User 'backup' not found
- [-] 62.12.101.14:22 - SSH - User 'bee' not found
- [+] 62.12.101.14:22 - SSH - User 'ftp' found
- [-] 62.12.101.14:22 - SSH - User 'guest' not found
- [-] 62.12.101.14:22 - SSH - User 'GUEST' not found
- [-] 62.12.101.14:22 - SSH - User 'info' not found
- [+] 62.12.101.14:22 - SSH - User 'mail' found
- [-] 62.12.101.14:22 - SSH - User 'mailadmin' not found
- [-] 62.12.101.14:22 - SSH - User 'msfadmin' not found
- [+] 62.12.101.14:22 - SSH - User 'mysql' found
- [+] 62.12.101.14:22 - SSH - User 'nobody' found
- [-] 62.12.101.14:22 - SSH - User 'oracle' not found
- [-] 62.12.101.14:22 - SSH - User 'owaspbwa' not found
- [+] 62.12.101.14:22 - SSH - User 'postfix' found
- [-] 62.12.101.14:22 - SSH - User 'postgres' not found
- [-] 62.12.101.14:22 - SSH - User 'private' not found
- [-] 62.12.101.14:22 - SSH - User 'proftpd' not found
- [-] 62.12.101.14:22 - SSH - User 'public' not found
- [+] 62.12.101.14:22 - SSH - User 'root' found
- [-] 62.12.101.14:22 - SSH - User 'superadmin' not found
- [-] 62.12.101.14:22 - SSH - User 'support' not found
- [-] 62.12.101.14:22 - SSH - User 'sys' not found
- [-] 62.12.101.14:22 - SSH - User 'system' not found
- [-] 62.12.101.14:22 - SSH - User 'systemadmin' not found
- [-] 62.12.101.14:22 - SSH - User 'systemadministrator' not found
- [-] 62.12.101.14:22 - SSH - User 'test' not found
- [+] 62.12.101.14:22 - SSH - User 'tomcat' found
- [-] 62.12.101.14:22 - SSH - User 'user' not found
- [-] 62.12.101.14:22 - SSH - User 'webmaster' not found
- [-] 62.12.101.14:22 - SSH - User 'www-data' not found
- [-] 62.12.101.14:22 - SSH - User 'Fortimanager_Access' not found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- #######################################################################################################################################
- http://accounting.gov.sd [200 OK] Apache[2.2,2.2.15], Cookies[38fe2784091f2c2f81131c445ff0bfb3], HTML5, HTTPServer[CentOS][Apache/2.2.15 (CentOS)], HttpOnly[38fe2784091f2c2f81131c445ff0bfb3], IP[62.12.101.14], JQuery, maybe Joomla, Meta-Author[Super User], MetaGenerator[Joomla! - Open Source Content Management], OpenSearch[http://accounting.gov.sd/index.php/component/search/?id=86&Itemid=470&format=opensearch], PHP[5.6.18], Script[text/javascript], Title[الرئيسية - ديوان الحسابات], UncommonHeaders[x-logged-in], X-Powered-By[PHP/5.6.18]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://accounting.gov.sd...
- ___________________________________________ SITE INFO ____________________________________________
- IP Title
- 62.12.101.14 الرئيسية - ديوان الحسابات
- ____________________________________________ VERSION _____________________________________________
- Name Versions Type
- Joomla! 3.4.4 | 3.4.4-rc | 3.4.4-rc2 | 3.4.5 | 3.4.6 | 3.4.7 | 3.4.8 CMS
- 3.4.8-rc
- Apache 2.2.15 Platform
- PHP 5.6.18 Platform
- CentOS 6.6 | 6.8 OS
- __________________________________________ INTERESTING ___________________________________________
- URL Note Type
- /robots.txt robots.txt index Interesting
- _____________________________________________ TOOLS ______________________________________________
- Name Link Software
- CMSmap https://github.com/Dionach/CMSmap Joomla!
- joomscan http://sourceforge.net/projects/joomscan/ Joomla!
- __________________________________________________________________________________________________
- Time: 101.1 sec Urls: 845 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Tue, 12 Feb 2019 02:25:05 GMT
- Server: Apache/2.2.15 (CentOS)
- X-Powered-By: PHP/5.6.18
- Set-Cookie: 38fe2784091f2c2f81131c445ff0bfb3=cfssrnih0ueihqn0k2lvcuh705; path=/; HttpOnly
- X-Logged-In: False
- P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
- Expires: Mon, 1 Jan 2001 00:00:00 GMT
- Last-Modified: Tue, 12 Feb 2019 02:25:06 GMT
- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- Pragma: no-cache
- Connection: close
- Content-Type: text/html; charset=utf-8
- HTTP/1.1 200 OK
- Date: Tue, 12 Feb 2019 02:25:06 GMT
- Server: Apache/2.2.15 (CentOS)
- X-Powered-By: PHP/5.6.18
- Set-Cookie: 38fe2784091f2c2f81131c445ff0bfb3=p9ipj07dnlv3kg85d0dksgeo44; path=/; HttpOnly
- X-Logged-In: False
- P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
- Expires: Mon, 1 Jan 2001 00:00:00 GMT
- Last-Modified: Tue, 12 Feb 2019 02:25:07 GMT
- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- Pragma: no-cache
- Connection: close
- Content-Type: text/html; charset=utf-8
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:09 EST
- Nmap scan report for 62.12.101.14
- Host is up (0.14s latency).
- Not shown: 467 filtered ports, 6 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 22/tcp open ssh
- 80/tcp open http
- 443/tcp open https
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:09 EST
- Nmap scan report for 62.12.101.14
- Host is up (0.066s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- # general
- (gen) banner: SSH-2.0-OpenSSH_5.3
- (gen) software: OpenSSH 5.3
- (gen) compatibility: OpenSSH 5.9-6.6, Dropbear SSH 2013.56+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 2.1.0
- (enc) rijndael-cbc@lysator.liu.se -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- # message authentication code algorithms
- (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.5.0
- (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.1.0
- (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
- (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0
- # algorithm recommendations (for OpenSSH 5.3)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -ssh-dss -- key algorithm to remove
- (rec) -arcfour -- enc algorithm to remove
- (rec) -rijndael-cbc@lysator.liu.se -- enc algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -arcfour256 -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -arcfour128 -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-md5-96 -- mac algorithm to remove
- (rec) -hmac-ripemd160 -- mac algorithm to remove
- (rec) -hmac-sha1-96 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5 -- mac algorithm to remove
- (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:09 EST
- NSE: [ssh-run] Failed to specify credentials and command to run.
- NSE: [ssh-brute] Trying username/password pair: root:root
- NSE: [ssh-brute] Trying username/password pair: admin:admin
- NSE: [ssh-brute] Trying username/password pair: administrator:administrator
- NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
- NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
- NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
- NSE: [ssh-brute] Trying username/password pair: guest:guest
- NSE: [ssh-brute] Trying username/password pair: user:user
- NSE: [ssh-brute] Trying username/password pair: web:web
- NSE: [ssh-brute] Trying username/password pair: test:test
- NSE: [ssh-brute] Trying username/password pair: root:
- NSE: [ssh-brute] Trying username/password pair: admin:
- NSE: [ssh-brute] Trying username/password pair: administrator:
- NSE: [ssh-brute] Trying username/password pair: webadmin:
- NSE: [ssh-brute] Trying username/password pair: sysadmin:
- NSE: [ssh-brute] Trying username/password pair: netadmin:
- NSE: [ssh-brute] Trying username/password pair: guest:
- NSE: [ssh-brute] Trying username/password pair: user:
- NSE: [ssh-brute] Trying username/password pair: web:
- NSE: [ssh-brute] Trying username/password pair: test:
- NSE: [ssh-brute] Trying username/password pair: root:123456
- NSE: [ssh-brute] Trying username/password pair: admin:123456
- NSE: [ssh-brute] Trying username/password pair: administrator:123456
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456
- NSE: [ssh-brute] Trying username/password pair: guest:123456
- NSE: [ssh-brute] Trying username/password pair: user:123456
- NSE: [ssh-brute] Trying username/password pair: web:123456
- NSE: [ssh-brute] Trying username/password pair: test:123456
- NSE: [ssh-brute] Trying username/password pair: root:12345
- NSE: [ssh-brute] Trying username/password pair: admin:12345
- NSE: [ssh-brute] Trying username/password pair: administrator:12345
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345
- NSE: [ssh-brute] Trying username/password pair: guest:12345
- NSE: [ssh-brute] Trying username/password pair: user:12345
- NSE: [ssh-brute] Trying username/password pair: web:12345
- NSE: [ssh-brute] Trying username/password pair: test:12345
- NSE: [ssh-brute] Trying username/password pair: root:123456789
- NSE: [ssh-brute] Trying username/password pair: admin:123456789
- NSE: [ssh-brute] Trying username/password pair: administrator:123456789
- NSE: [ssh-brute] Trying username/password pair: webadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: sysadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: netadmin:123456789
- NSE: [ssh-brute] Trying username/password pair: guest:123456789
- NSE: [ssh-brute] Trying username/password pair: user:123456789
- NSE: [ssh-brute] Trying username/password pair: web:123456789
- NSE: [ssh-brute] Trying username/password pair: test:123456789
- NSE: [ssh-brute] Trying username/password pair: root:password
- NSE: [ssh-brute] Trying username/password pair: admin:password
- NSE: [ssh-brute] Trying username/password pair: administrator:password
- NSE: [ssh-brute] Trying username/password pair: webadmin:password
- NSE: [ssh-brute] Trying username/password pair: sysadmin:password
- NSE: [ssh-brute] Trying username/password pair: netadmin:password
- NSE: [ssh-brute] Trying username/password pair: guest:password
- NSE: [ssh-brute] Trying username/password pair: user:password
- NSE: [ssh-brute] Trying username/password pair: web:password
- NSE: [ssh-brute] Trying username/password pair: test:password
- NSE: [ssh-brute] Trying username/password pair: root:iloveyou
- NSE: [ssh-brute] Trying username/password pair: admin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveyou
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveyou
- NSE: [ssh-brute] Trying username/password pair: guest:iloveyou
- NSE: [ssh-brute] Trying username/password pair: user:iloveyou
- NSE: [ssh-brute] Trying username/password pair: web:iloveyou
- NSE: [ssh-brute] Trying username/password pair: test:iloveyou
- NSE: [ssh-brute] Trying username/password pair: root:princess
- NSE: [ssh-brute] Trying username/password pair: admin:princess
- NSE: [ssh-brute] Trying username/password pair: administrator:princess
- NSE: [ssh-brute] Trying username/password pair: webadmin:princess
- NSE: [ssh-brute] Trying username/password pair: sysadmin:princess
- NSE: [ssh-brute] Trying username/password pair: netadmin:princess
- NSE: [ssh-brute] Trying username/password pair: guest:princess
- NSE: [ssh-brute] Trying username/password pair: user:princess
- NSE: [ssh-brute] Trying username/password pair: web:princess
- NSE: [ssh-brute] Trying username/password pair: test:princess
- NSE: [ssh-brute] Trying username/password pair: root:12345678
- NSE: [ssh-brute] Trying username/password pair: admin:12345678
- NSE: [ssh-brute] Trying username/password pair: administrator:12345678
- NSE: [ssh-brute] Trying username/password pair: webadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: sysadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: netadmin:12345678
- NSE: [ssh-brute] Trying username/password pair: guest:12345678
- NSE: [ssh-brute] Trying username/password pair: user:12345678
- NSE: [ssh-brute] Trying username/password pair: web:12345678
- NSE: [ssh-brute] Trying username/password pair: test:12345678
- NSE: [ssh-brute] Trying username/password pair: root:1234567
- NSE: [ssh-brute] Trying username/password pair: admin:1234567
- NSE: [ssh-brute] Trying username/password pair: administrator:1234567
- NSE: [ssh-brute] Trying username/password pair: webadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: netadmin:1234567
- NSE: [ssh-brute] Trying username/password pair: guest:1234567
- NSE: [ssh-brute] Trying username/password pair: user:1234567
- NSE: [ssh-brute] Trying username/password pair: web:1234567
- NSE: [ssh-brute] Trying username/password pair: test:1234567
- NSE: [ssh-brute] Trying username/password pair: root:abc123
- NSE: [ssh-brute] Trying username/password pair: admin:abc123
- NSE: [ssh-brute] Trying username/password pair: administrator:abc123
- NSE: [ssh-brute] Trying username/password pair: webadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: sysadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: netadmin:abc123
- NSE: [ssh-brute] Trying username/password pair: guest:abc123
- NSE: [ssh-brute] Trying username/password pair: user:abc123
- NSE: [ssh-brute] Trying username/password pair: web:abc123
- NSE: [ssh-brute] Trying username/password pair: test:abc123
- NSE: [ssh-brute] Trying username/password pair: root:nicole
- NSE: [ssh-brute] Trying username/password pair: admin:nicole
- NSE: [ssh-brute] Trying username/password pair: administrator:nicole
- NSE: [ssh-brute] Trying username/password pair: webadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: sysadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: netadmin:nicole
- NSE: [ssh-brute] Trying username/password pair: guest:nicole
- NSE: [ssh-brute] Trying username/password pair: user:nicole
- NSE: [ssh-brute] Trying username/password pair: web:nicole
- NSE: [ssh-brute] Trying username/password pair: test:nicole
- NSE: [ssh-brute] Trying username/password pair: root:daniel
- NSE: [ssh-brute] Trying username/password pair: admin:daniel
- NSE: [ssh-brute] Trying username/password pair: administrator:daniel
- NSE: [ssh-brute] Trying username/password pair: webadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: sysadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: netadmin:daniel
- NSE: [ssh-brute] Trying username/password pair: guest:daniel
- NSE: [ssh-brute] Trying username/password pair: user:daniel
- NSE: [ssh-brute] Trying username/password pair: web:daniel
- NSE: [ssh-brute] Trying username/password pair: test:daniel
- NSE: [ssh-brute] Trying username/password pair: root:monkey
- NSE: [ssh-brute] Trying username/password pair: admin:monkey
- NSE: [ssh-brute] Trying username/password pair: administrator:monkey
- NSE: [ssh-brute] Trying username/password pair: webadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: sysadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: netadmin:monkey
- NSE: [ssh-brute] Trying username/password pair: guest:monkey
- NSE: [ssh-brute] Trying username/password pair: user:monkey
- NSE: [ssh-brute] Trying username/password pair: web:monkey
- NSE: [ssh-brute] Trying username/password pair: test:monkey
- NSE: [ssh-brute] Trying username/password pair: root:babygirl
- NSE: [ssh-brute] Trying username/password pair: admin:babygirl
- NSE: [ssh-brute] Trying username/password pair: administrator:babygirl
- NSE: [ssh-brute] Trying username/password pair: webadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: sysadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: netadmin:babygirl
- NSE: [ssh-brute] Trying username/password pair: guest:babygirl
- NSE: [ssh-brute] Trying username/password pair: user:babygirl
- NSE: [ssh-brute] Trying username/password pair: web:babygirl
- NSE: [ssh-brute] Trying username/password pair: test:babygirl
- NSE: [ssh-brute] Trying username/password pair: root:qwerty
- NSE: [ssh-brute] Trying username/password pair: admin:qwerty
- NSE: [ssh-brute] Trying username/password pair: administrator:qwerty
- NSE: [ssh-brute] Trying username/password pair: webadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: sysadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: netadmin:qwerty
- NSE: [ssh-brute] Trying username/password pair: guest:qwerty
- NSE: [ssh-brute] Trying username/password pair: user:qwerty
- NSE: [ssh-brute] Trying username/password pair: web:qwerty
- NSE: [ssh-brute] Trying username/password pair: test:qwerty
- NSE: [ssh-brute] Trying username/password pair: root:lovely
- NSE: [ssh-brute] Trying username/password pair: admin:lovely
- NSE: [ssh-brute] Trying username/password pair: administrator:lovely
- NSE: [ssh-brute] Trying username/password pair: webadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: sysadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: netadmin:lovely
- NSE: [ssh-brute] Trying username/password pair: guest:lovely
- NSE: [ssh-brute] Trying username/password pair: user:lovely
- NSE: [ssh-brute] Trying username/password pair: web:lovely
- NSE: [ssh-brute] Trying username/password pair: test:lovely
- NSE: [ssh-brute] Trying username/password pair: root:654321
- NSE: [ssh-brute] Trying username/password pair: admin:654321
- NSE: [ssh-brute] Trying username/password pair: administrator:654321
- NSE: [ssh-brute] Trying username/password pair: webadmin:654321
- NSE: [ssh-brute] Trying username/password pair: sysadmin:654321
- NSE: [ssh-brute] Trying username/password pair: netadmin:654321
- NSE: [ssh-brute] Trying username/password pair: guest:654321
- NSE: [ssh-brute] Trying username/password pair: user:654321
- NSE: [ssh-brute] Trying username/password pair: web:654321
- NSE: [ssh-brute] Trying username/password pair: test:654321
- NSE: [ssh-brute] Trying username/password pair: root:michael
- NSE: [ssh-brute] Trying username/password pair: admin:michael
- NSE: [ssh-brute] Trying username/password pair: administrator:michael
- NSE: [ssh-brute] Trying username/password pair: webadmin:michael
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michael
- NSE: [ssh-brute] Trying username/password pair: netadmin:michael
- NSE: [ssh-brute] Trying username/password pair: guest:michael
- NSE: [ssh-brute] Trying username/password pair: user:michael
- NSE: [ssh-brute] Trying username/password pair: web:michael
- NSE: [ssh-brute] Trying username/password pair: test:michael
- NSE: [ssh-brute] Trying username/password pair: root:jessica
- NSE: [ssh-brute] Trying username/password pair: admin:jessica
- NSE: [ssh-brute] Trying username/password pair: administrator:jessica
- NSE: [ssh-brute] Trying username/password pair: webadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: sysadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: netadmin:jessica
- NSE: [ssh-brute] Trying username/password pair: guest:jessica
- NSE: [ssh-brute] Trying username/password pair: user:jessica
- NSE: [ssh-brute] Trying username/password pair: web:jessica
- NSE: [ssh-brute] Trying username/password pair: test:jessica
- NSE: [ssh-brute] Trying username/password pair: root:111111
- NSE: [ssh-brute] Trying username/password pair: admin:111111
- NSE: [ssh-brute] Trying username/password pair: administrator:111111
- NSE: [ssh-brute] Trying username/password pair: webadmin:111111
- NSE: [ssh-brute] Trying username/password pair: sysadmin:111111
- NSE: [ssh-brute] Trying username/password pair: netadmin:111111
- NSE: [ssh-brute] Trying username/password pair: guest:111111
- NSE: [ssh-brute] Trying username/password pair: user:111111
- NSE: [ssh-brute] Trying username/password pair: web:111111
- NSE: [ssh-brute] Trying username/password pair: test:111111
- NSE: [ssh-brute] Trying username/password pair: root:ashley
- NSE: [ssh-brute] Trying username/password pair: admin:ashley
- NSE: [ssh-brute] Trying username/password pair: administrator:ashley
- NSE: [ssh-brute] Trying username/password pair: webadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: sysadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: netadmin:ashley
- NSE: [ssh-brute] Trying username/password pair: guest:ashley
- NSE: [ssh-brute] Trying username/password pair: user:ashley
- NSE: [ssh-brute] Trying username/password pair: web:ashley
- NSE: [ssh-brute] Trying username/password pair: test:ashley
- NSE: [ssh-brute] Trying username/password pair: root:000000
- NSE: [ssh-brute] Trying username/password pair: admin:000000
- NSE: [ssh-brute] Trying username/password pair: administrator:000000
- NSE: [ssh-brute] Trying username/password pair: webadmin:000000
- NSE: [ssh-brute] Trying username/password pair: sysadmin:000000
- NSE: [ssh-brute] Trying username/password pair: netadmin:000000
- NSE: [ssh-brute] Trying username/password pair: guest:000000
- NSE: [ssh-brute] Trying username/password pair: user:000000
- NSE: [ssh-brute] Trying username/password pair: web:000000
- NSE: [ssh-brute] Trying username/password pair: test:000000
- NSE: [ssh-brute] Trying username/password pair: root:iloveu
- NSE: [ssh-brute] Trying username/password pair: admin:iloveu
- NSE: [ssh-brute] Trying username/password pair: administrator:iloveu
- NSE: [ssh-brute] Trying username/password pair: webadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: netadmin:iloveu
- NSE: [ssh-brute] Trying username/password pair: guest:iloveu
- NSE: [ssh-brute] Trying username/password pair: user:iloveu
- NSE: [ssh-brute] Trying username/password pair: web:iloveu
- NSE: [ssh-brute] Trying username/password pair: test:iloveu
- NSE: [ssh-brute] Trying username/password pair: root:michelle
- NSE: [ssh-brute] Trying username/password pair: admin:michelle
- NSE: [ssh-brute] Trying username/password pair: administrator:michelle
- NSE: [ssh-brute] Trying username/password pair: webadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: sysadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: netadmin:michelle
- NSE: [ssh-brute] Trying username/password pair: guest:michelle
- NSE: [ssh-brute] Trying username/password pair: user:michelle
- NSE: [ssh-brute] Trying username/password pair: web:michelle
- NSE: [ssh-brute] Trying username/password pair: test:michelle
- NSE: [ssh-brute] Trying username/password pair: root:tigger
- NSE: [ssh-brute] Trying username/password pair: admin:tigger
- NSE: [ssh-brute] Trying username/password pair: administrator:tigger
- NSE: [ssh-brute] Trying username/password pair: webadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: sysadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: netadmin:tigger
- NSE: [ssh-brute] Trying username/password pair: guest:tigger
- NSE: [ssh-brute] Trying username/password pair: user:tigger
- NSE: [ssh-brute] Trying username/password pair: web:tigger
- NSE: [ssh-brute] Trying username/password pair: test:tigger
- NSE: [ssh-brute] Trying username/password pair: root:sunshine
- NSE: [ssh-brute] Trying username/password pair: admin:sunshine
- Nmap scan report for 62.12.101.14
- Host is up (0.29s latency).
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
- | ssh-auth-methods:
- | Supported authentication methods:
- | publickey
- | gssapi-keyex
- | gssapi-with-mic
- |_ password
- | ssh-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 262 guesses in 182 seconds, average tps: 1.4
- | ssh-hostkey:
- | 1024 e4:f9:da:cf:9a:e4:fa:b9:38:74:3e:88:f4:41:3c:e7 (DSA)
- |_ 2048 8c:0d:43:e9:5f:4c:24:ac:a2:b5:84:66:ae:7e:12:6a (RSA)
- | ssh-publickey-acceptance:
- |_ Accepted Public Keys: No public keys accepted
- |_ssh-run: Failed to specify credentials and command to run.
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 22/tcp)
- HOP RTT ADDRESS
- 1 64.45 ms 10.237.200.1
- 2 64.89 ms 193.37.252.209
- 3 64.85 ms vlan2905.bb1.mia1.us.m247.com (82.102.29.174)
- 4 65.27 ms mai-b1-link.telia.net (213.248.68.36)
- 5 90.65 ms ash-bb4-link.telia.net (62.115.120.176)
- 6 190.06 ms prs-bb3-link.telia.net (62.115.112.243)
- 7 188.25 ms mei-b2-link.telia.net (62.115.133.177)
- 8 184.76 ms flagtelecom-ic-324599-mei-b2.c.telia.net (213.248.72.190)
- 9 351.58 ms ae0.0.cjr01.mrs002.flagtel.com (62.216.131.145)
- 10 198.74 ms flagtelecom-ic-324599-mei-b2.c.telia.net (213.248.72.190)
- 11 354.49 ms xe-0-0-1.0.pjr04.dxb001.flagtel.com (85.95.25.94)
- 12 355.96 ms xe-11-1-1.0.pjr04.dxb001.flagtel.com (85.95.25.162)
- 13 320.81 ms 196.29.177.113
- 14 315.82 ms 197.254.196.62
- 15 ...
- 16 330.41 ms 62.12.101.14
- #######################################################################################################################################
- USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- RHOSTS => 62.12.101.14
- RHOST => 62.12.101.14
- [*] 62.12.101.14:22 - SSH - Using malformed packet technique
- [*] 62.12.101.14:22 - SSH - Starting scan
- [-] 62.12.101.14:22 - SSH - User 'admin' not found
- [-] 62.12.101.14:22 - SSH - User 'administrator' not found
- [-] 62.12.101.14:22 - SSH - User 'anonymous' not found
- [-] 62.12.101.14:22 - SSH - User 'backup' not found
- [-] 62.12.101.14:22 - SSH - User 'bee' not found
- [+] 62.12.101.14:22 - SSH - User 'ftp' found
- [-] 62.12.101.14:22 - SSH - User 'guest' not found
- [-] 62.12.101.14:22 - SSH - User 'GUEST' not found
- [-] 62.12.101.14:22 - SSH - User 'info' not found
- [+] 62.12.101.14:22 - SSH - User 'mail' found
- [-] 62.12.101.14:22 - SSH - User 'mailadmin' not found
- [-] 62.12.101.14:22 - SSH - User 'msfadmin' not found
- [+] 62.12.101.14:22 - SSH - User 'mysql' found
- [+] 62.12.101.14:22 - SSH - User 'nobody' found
- [-] 62.12.101.14:22 - SSH - User 'oracle' not found
- [-] 62.12.101.14:22 - SSH - User 'owaspbwa' not found
- [+] 62.12.101.14:22 - SSH - User 'postfix' found
- [-] 62.12.101.14:22 - SSH - User 'postgres' not found
- [-] 62.12.101.14:22 - SSH - User 'private' not found
- [-] 62.12.101.14:22 - SSH - User 'proftpd' not found
- [-] 62.12.101.14:22 - SSH - User 'public' not found
- [+] 62.12.101.14:22 - SSH - User 'root' found
- [-] 62.12.101.14:22 - SSH - User 'superadmin' not found
- [-] 62.12.101.14:22 - SSH - User 'support' not found
- [-] 62.12.101.14:22 - SSH - User 'sys' not found
- [-] 62.12.101.14:22 - SSH - User 'system' not found
- [-] 62.12.101.14:22 - SSH - User 'systemadmin' not found
- [-] 62.12.101.14:22 - SSH - User 'systemadministrator' not found
- [-] 62.12.101.14:22 - SSH - User 'test' not found
- [+] 62.12.101.14:22 - SSH - User 'tomcat' found
- [-] 62.12.101.14:22 - SSH - User 'user' not found
- [-] 62.12.101.14:22 - SSH - User 'webmaster' not found
- [-] 62.12.101.14:22 - SSH - User 'www-data' not found
- [-] 62.12.101.14:22 - SSH - User 'Fortimanager_Access' not found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:15 EST
- Nmap scan report for 62.12.101.14
- Host is up.
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 65.29 ms 10.237.200.1
- 2 65.74 ms 193.37.252.209
- 3 65.69 ms vlan2905.bb1.mia1.us.m247.com (82.102.29.174)
- 4 66.13 ms mai-b1-link.telia.net (213.248.68.36)
- 5 92.12 ms 62.115.119.230
- 6 185.78 ms prs-bb3-link.telia.net (80.91.251.242)
- 7 185.77 ms mei-b2-link.telia.net (62.115.133.175)
- 8 191.96 ms flagtelecom-ic-324599-mei-b2.c.telia.net (213.248.72.190)
- 9 351.46 ms ae1.0.cjr01.mrs002.flagtel.com (62.216.131.149)
- 10 207.82 ms ae3.0.cjr02.prs001.flagtel.com (62.216.128.209)
- 11 360.99 ms xe-11-1-1.0.pjr04.dxb001.flagtel.com (85.95.25.162)
- 12 322.93 ms 80.77.2.42
- 13 330.29 ms 196.29.177.113
- 14 325.52 ms 197.254.196.62
- 15 ... 30
- ######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:17 EST
- Nmap scan report for 62.12.101.14
- Host is up.
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 65.30 ms 10.237.200.1
- 2 66.95 ms 193.37.252.209
- 3 66.93 ms vlan2905.bb1.mia1.us.m247.com (82.102.29.174)
- 4 67.07 ms mai-b1-link.telia.net (213.248.68.36)
- 5 97.56 ms 62.115.119.230
- 6 186.32 ms prs-bb3-link.telia.net (80.91.251.242)
- 7 186.35 ms mei-b2-link.telia.net (62.115.133.175)
- 8 192.38 ms flagtelecom-ic-324599-mei-b2.c.telia.net (213.248.72.190)
- 9 352.12 ms ae1.0.cjr01.mrs002.flagtel.com (62.216.131.149)
- 10 208.12 ms ae3.0.cjr02.prs001.flagtel.com (62.216.128.209)
- 11 351.54 ms xe-11-1-1.0.pjr04.dxb001.flagtel.com (85.95.25.162)
- 12 313.56 ms 80.77.2.42
- 13 320.69 ms 196.29.177.113
- 14 316.68 ms 197.254.196.62
- 15 ... 30
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:19 EST
- Nmap scan report for 62.12.101.14
- Host is up.
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 65.35 ms 10.237.200.1
- 2 65.74 ms 193.37.252.209
- 3 108.80 ms vlan2905.bb1.mia1.us.m247.com (82.102.29.174)
- 4 66.18 ms mai-b1-link.telia.net (213.248.68.36)
- 5 92.16 ms 62.115.119.230
- 6 186.49 ms prs-bb3-link.telia.net (80.91.251.242)
- 7 186.47 ms mei-b2-link.telia.net (62.115.133.175)
- 8 193.19 ms flagtelecom-ic-324599-mei-b2.c.telia.net (213.248.72.190)
- 9 351.63 ms ae1.0.cjr01.mrs002.flagtel.com (62.216.131.149)
- 10 206.78 ms ae3.0.cjr02.prs001.flagtel.com (62.216.128.209)
- 11 351.07 ms xe-11-1-1.0.pjr04.dxb001.flagtel.com (85.95.25.162)
- 12 313.08 ms 80.77.2.42
- 13 321.46 ms 196.29.177.113
- 14 314.86 ms 197.254.196.62
- 15 ... 30
- #######################################################################################################################################
- http://62.12.101.14 [200 OK] Apache[2.2,2.2.15], Cookies[38fe2784091f2c2f81131c445ff0bfb3], HTML5, HTTPServer[CentOS][Apache/2.2.15 (CentOS)], HttpOnly[38fe2784091f2c2f81131c445ff0bfb3], IP[62.12.101.14], JQuery, maybe Joomla, Meta-Author[Super User], MetaGenerator[Joomla! - Open Source Content Management], OpenSearch[http://62.12.101.14/index.php/component/search/?id=86&Itemid=470&format=opensearch], PHP[5.6.18], Script[text/javascript], Title[الرئيسية - ديوان الحسابات], UncommonHeaders[x-logged-in], X-Powered-By[PHP/5.6.18]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://62.12.101.14...
- ___________________________________________ SITE INFO ___________________________________________
- IP Title
- 62.12.101.14 الرئيسية - ديوان الحسابات
- ____________________________________________ VERSION ____________________________________________
- Name Versions Type
- Joomla! 3.4.4 | 3.4.4-rc | 3.4.4-rc2 | 3.4.5 | 3.4.6 | 3.4.7 | 3.4.8 CMS
- 3.4.8-rc
- Apache 2.2.15 Platform
- PHP 5.6.18 Platform
- CentOS 6.6 | 6.8 OS
- __________________________________________ INTERESTING __________________________________________
- URL Note Type
- /robots.txt robots.txt index Interesting
- _____________________________________________ TOOLS _____________________________________________
- Name Link Software
- CMSmap https://github.com/Dionach/CMSmap Joomla!
- joomscan http://sourceforge.net/projects/joomscan/ Joomla!
- _________________________________________________________________________________________________
- Time: 86.1 sec Urls: 845 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Tue, 12 Feb 2019 02:24:23 GMT
- Server: Apache/2.2.15 (CentOS)
- X-Powered-By: PHP/5.6.18
- Set-Cookie: 38fe2784091f2c2f81131c445ff0bfb3=vidnijf644bi2rvokl4s4e55p7; path=/; HttpOnly
- X-Logged-In: False
- P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
- Expires: Mon, 1 Jan 2001 00:00:00 GMT
- Last-Modified: Tue, 12 Feb 2019 02:24:24 GMT
- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- Pragma: no-cache
- Connection: close
- Content-Type: text/html; charset=utf-8
- HTTP/1.1 200 OK
- Date: Tue, 12 Feb 2019 02:24:25 GMT
- Server: Apache/2.2.15 (CentOS)
- X-Powered-By: PHP/5.6.18
- Set-Cookie: 38fe2784091f2c2f81131c445ff0bfb3=nlqf082l45vm0ulr90manomoj0; path=/; HttpOnly
- X-Logged-In: False
- P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
- Expires: Mon, 1 Jan 2001 00:00:00 GMT
- Last-Modified: Tue, 12 Feb 2019 02:24:25 GMT
- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
- Pragma: no-cache
- Connection: close
- Content-Type: text/html; charset=utf-8
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:24 EST
- Nmap scan report for 62.12.101.14
- Host is up.
- PORT STATE SERVICE VERSION
- 123/udp open|filtered ntp
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 65.64 ms 10.237.200.1
- 2 65.70 ms 193.37.252.209
- 3 65.69 ms vlan2905.bb1.mia1.us.m247.com (82.102.29.174)
- 4 66.42 ms mai-b1-link.telia.net (213.248.68.36)
- 5 92.50 ms 62.115.119.230
- 6 186.86 ms prs-bb3-link.telia.net (80.91.251.242)
- 7 186.89 ms mei-b2-link.telia.net (62.115.133.175)
- 8 192.43 ms flagtelecom-ic-324599-mei-b2.c.telia.net (213.248.72.190)
- 9 351.81 ms ae1.0.cjr01.mrs002.flagtel.com (62.216.131.149)
- 10 208.95 ms ae3.0.cjr02.prs001.flagtel.com (62.216.128.209)
- 11 350.69 ms xe-11-1-1.0.pjr04.dxb001.flagtel.com (85.95.25.162)
- 12 312.44 ms 80.77.2.42
- 13 320.49 ms 196.29.177.113
- 14 315.43 ms 197.254.196.62
- 15 ... 30
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:32 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 21:32
- Completed NSE at 21:32, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 21:32
- Completed NSE at 21:32, 0.00s elapsed
- Initiating Ping Scan at 21:32
- Scanning 62.12.101.14 [4 ports]
- Completed Ping Scan at 21:32, 2.04s elapsed (1 total hosts)
- Nmap scan report for 62.12.101.14 [host down, received no-response]
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 21:32
- Completed NSE at 21:32, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 21:32
- Completed NSE at 21:32, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
- Nmap done: 1 IP address (0 hosts up) scanned in 2.57 seconds
- Raw packets sent: 8 (304B) | Rcvd: 379 (58.742KB)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 21:32 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 21:32
- Completed NSE at 21:32, 0.00s elapsed
- Initiating NSE at 21:32
- Completed NSE at 21:32, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 21:32
- Completed Parallel DNS resolution of 1 host. at 21:32, 0.02s elapsed
- Initiating UDP Scan at 21:32
- Scanning 62.12.101.14 [14 ports]
- Completed UDP Scan at 21:32, 2.13s elapsed (14 total ports)
- Initiating Service scan at 21:32
- Scanning 12 services on 62.12.101.14
- Service scan Timing: About 8.33% done; ETC: 21:51 (0:17:58 remaining)
- Completed Service scan at 21:34, 102.57s elapsed (12 services on 1 host)
- Initiating OS detection (try #1) against 62.12.101.14
- Retrying OS detection (try #2) against 62.12.101.14
- Initiating Traceroute at 21:34
- Completed Traceroute at 21:34, 7.21s elapsed
- Initiating Parallel DNS resolution of 1 host. at 21:34
- Completed Parallel DNS resolution of 1 host. at 21:34, 0.02s elapsed
- NSE: Script scanning 62.12.101.14.
- Initiating NSE at 21:34
- Completed NSE at 21:34, 20.31s elapsed
- Initiating NSE at 21:34
- Completed NSE at 21:34, 1.03s elapsed
- Nmap scan report for 62.12.101.14
- Host is up (0.065s latency).
- PORT STATE SERVICE VERSION
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 137/udp)
- HOP RTT ADDRESS
- 1 63.94 ms 10.237.200.1
- 2 ... 3
- 4 65.05 ms 10.237.200.1
- 5 69.21 ms 10.237.200.1
- 6 69.20 ms 10.237.200.1
- 7 69.19 ms 10.237.200.1
- 8 69.19 ms 10.237.200.1
- 9 69.18 ms 10.237.200.1
- 10 69.18 ms 10.237.200.1
- 11 ... 18
- 19 64.20 ms 10.237.200.1
- 20 65.36 ms 10.237.200.1
- 21 ... 27
- 28 64.83 ms 10.237.200.1
- 29 67.37 ms 10.237.200.1
- 30 63.43 ms 10.237.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 21:34
- Completed NSE at 21:34, 0.00s elapsed
- Initiating NSE at 21:34
- Completed NSE at 21:34, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 137.05 seconds
- Raw packets sent: 148 (13.692KB) | Rcvd: 3638 (1.044MB)
- #######################################################################################################################################
- [+] FireWall Detector
- [++] Firewall not detected
- [+] Detecting Joomla Version
- [++] Joomla 3.4.8
- [+] Core Joomla Vulnerability
- [++] Target Joomla core is not vulnerable
- [+] Checking apache info/status files
- [++] Readable info/status files are not found
- [+] admin finder
- [++] Admin page : http://accounting.gov.sd/administrator/
- [+] Checking robots.txt existing
- [++] robots.txt is found
- path : http://accounting.gov.sd/robots.txt
- Interesting path found from robots.txt
- http://accounting.gov.sd/joomla/administrator/
- http://accounting.gov.sd/administrator/
- http://accounting.gov.sd/cache/
- http://accounting.gov.sd/cli/
- http://accounting.gov.sd/components/
- http://accounting.gov.sd/images/
- http://accounting.gov.sd/includes/
- http://accounting.gov.sd/installation/
- http://accounting.gov.sd/language/
- http://accounting.gov.sd/libraries/
- http://accounting.gov.sd/logs/
- http://accounting.gov.sd/media/
- http://accounting.gov.sd/modules/
- http://accounting.gov.sd/plugins/
- http://accounting.gov.sd/templates/
- http://accounting.gov.sd/tmp/
- [+] Finding common backup files name
- [++] Backup files are not found
- [+] Finding common log files name
- [++] error log is not found
- [+] Checking user registration
- [++] registration is enabled
- http://accounting.gov.sd/index.php?option=com_users&view=registration
- [+] Checking sensitive config.php.x file
- [++] Readable config files are not found
- #######################################################################################################################################
- [-] Date & Time: 11/02/2019 19:39:54
- [I] Threads: 5
- [-] Target: http://accounting.gov.sd (62.12.101.14)
- [M] Website Not in HTTPS: http://accounting.gov.sd
- [I] X-Powered-By: PHP/5.6.18
- [L] X-Frame-Options: Not Enforced
- [I] Strict-Transport-Security: Not Enforced
- [I] X-Content-Security-Policy: Not Enforced
- [I] X-Content-Type-Options: Not Enforced
- [L] Robots.txt Found: http://accounting.gov.sd/robots.txt
- [I] CMS Detection: Joomla
- [I] Joomla Version: 3.4.8
- [M] EDB-ID: 46200 "Joomla! Core 3.9.1 - Persistent Cross-Site Scripting in Global Configuration Textfilter Settings"
- [M] EDB-ID: 42033 "Joomla! 3.7.0 - 'com_fields' SQL Injection"
- [M] EDB-ID: 40637 "Joomla! 3.4.4 < 3.6.4 - Account Creation / Privilege Escalation"
- [M] EDB-ID: 41157 "Joomla! < 3.6.4 - Admin Takeover"
- [I] Joomla Website Template: accounting
- [I] Autocomplete Off Not Found: http://accounting.gov.sd/administrator/index.php
- [-] Joomla Default Files:
- [-] Joomla is likely to have a large number of default files
- [-] Would you like to list them all?
- [y/N]: y
- [I] http://accounting.gov.sd/LICENSE.txt
- [I] http://accounting.gov.sd/README.txt
- [I] http://accounting.gov.sd/administrator/cache/index.html
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.0-2011-12-06.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.0-2011-12-16.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.0-2011-12-19.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.0-2011-12-20.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.0-2011-12-21-1.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.0-2011-12-21-2.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.0-2011-12-22.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.0-2011-12-23.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.0-2011-12-24.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.0-2012-01-10.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.0-2012-01-14.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.1-2012-01-26.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.2-2012-03-05.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.3-2012-03-13.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.4-2012-03-18.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.4-2012-03-19.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.5.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.6.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/2.5.7.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.0.0.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.0.1.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.0.2.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.0.3.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.1.0.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.1.1.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.1.2.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.1.3.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.1.4.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.1.5.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.2.0.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.2.1.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.2.2-2013-12-22.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.2.2-2013-12-28.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.2.2-2014-01-08.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.2.2-2014-01-15.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.2.2-2014-01-18.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.2.2-2014-01-23.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.2.3-2014-02-20.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.3.0-2014-02-16.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.3.0-2014-04-02.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.3.4-2014-08-03.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.3.6-2014-09-30.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.4.0-2014-08-24.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.4.0-2014-09-01.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.4.0-2014-09-16.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.4.0-2014-10-20.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.4.0-2014-12-03.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.4.0-2015-01-21.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/mysql/3.4.0-2015-02-26.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.0.0.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.0.1.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.0.2.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.0.3.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.1.0.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.1.1.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.1.2.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.1.3.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.1.4.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.1.5.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.2.0.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.2.1.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.2.2-2013-12-22.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.2.2-2013-12-28.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.2.2-2014-01-08.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.2.2-2014-01-15.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.2.2-2014-01-18.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.2.2-2014-01-23.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.2.3-2014-02-20.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.3.0-2013-12-21.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.3.0-2014-02-16.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.3.0-2014-04-02.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.3.4-2014-08-03.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.3.6-2014-09-30.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.4.0-2014-08-24.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.4.0-2014-09-01.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.4.0-2014-09-16.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.4.0-2014-10-20.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.4.0-2014-12-03.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.4.0-2015-01-21.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.4.0-2015-02-26.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/postgresql/3.4.4-2015-07-11.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/2.5.2-2012-03-05.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/2.5.3-2012-03-13.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/2.5.4-2012-03-18.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/2.5.4-2012-03-19.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/2.5.5.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/2.5.6.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/2.5.7.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.0.0.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.0.1.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.0.2.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.0.3.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.1.0.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.1.1.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.1.2.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.1.3.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.1.4.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.1.5.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.2.0.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.2.1.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.2.2-2013-12-22.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.2.2-2013-12-28.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.2.2-2014-01-08.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.2.2-2014-01-15.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.2.2-2014-01-18.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.2.2-2014-01-23.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.2.3-2014-02-20.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.3.0-2014-02-16.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.3.0-2014-04-02.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.3.4-2014-08-03.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.3.6-2014-09-30.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.4.0-2014-08-24.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.4.0-2014-09-01.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.4.0-2014-09-16.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.4.0-2014-10-20.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.4.0-2014-12-03.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.4.0-2015-01-21.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.4.0-2015-02-26.sql
- [I] http://accounting.gov.sd/administrator/components/com_admin/sql/updates/sqlazure/3.4.4-2015-07-11.sql
- [I] http://accounting.gov.sd/administrator/components/com_banners/sql/install.mysql.utf8.sql
- [I] http://accounting.gov.sd/administrator/components/com_banners/sql/uninstall.mysql.utf8.sql
- [I] http://accounting.gov.sd/administrator/components/com_contact/sql/install.mysql.utf8.sql
- [I] http://accounting.gov.sd/administrator/components/com_contact/sql/uninstall.mysql.utf8.sql
- [I] http://accounting.gov.sd/administrator/components/com_finder/sql/install.mysql.sql
- [I] http://accounting.gov.sd/administrator/components/com_finder/sql/install.postgresql.sql
- [I] http://accounting.gov.sd/administrator/components/com_finder/sql/uninstall.mysql.sql
- [I] http://accounting.gov.sd/administrator/components/com_finder/sql/uninstall.postgresql.sql
- [I] http://accounting.gov.sd/administrator/components/com_newsfeeds/sql/install.mysql.utf8.sql
- [I] http://accounting.gov.sd/administrator/components/com_newsfeeds/sql/uninstall.mysql.utf8.sql
- [I] http://accounting.gov.sd/administrator/language/overrides/index.html
- [I] http://accounting.gov.sd/administrator/manifests/packages/index.html
- [I] http://accounting.gov.sd/administrator/templates/hathor/LICENSE.txt
- [I] http://accounting.gov.sd/bin/index.html
- [I] http://accounting.gov.sd/cache/index.html
- [I] http://accounting.gov.sd/cli/index.html
- [I] http://accounting.gov.sd/components/index.html
- [I] http://accounting.gov.sd/htaccess.txt
- [I] http://accounting.gov.sd/images/index.html
- [I] http://accounting.gov.sd/includes/index.html
- [I] http://accounting.gov.sd/language/index.html
- [I] http://accounting.gov.sd/language/overrides/index.html
- [I] http://accounting.gov.sd/layouts/index.html
- [I] http://accounting.gov.sd/libraries/fof/LICENSE.txt
- [I] http://accounting.gov.sd/libraries/fof/version.txt
- [I] http://accounting.gov.sd/libraries/idna_convert/ReadMe.txt
- [I] http://accounting.gov.sd/libraries/index.html
- [I] http://accounting.gov.sd/media/editors/tinymce/changelog.txt
- [I] http://accounting.gov.sd/media/editors/tinymce/license.txt
- [I] http://accounting.gov.sd/media/editors/tinymce/plugins/example/dialog.html
- [I] http://accounting.gov.sd/media/editors/tinymce/templates/layout1.html
- [I] http://accounting.gov.sd/media/editors/tinymce/templates/snippet1.html
- [I] http://accounting.gov.sd/media/index.html
- [I] http://accounting.gov.sd/media/jui/fonts/icomoon-license.txt
- [I] http://accounting.gov.sd/modules/index.html
- [I] http://accounting.gov.sd/plugins/index.html
- [I] http://accounting.gov.sd/templates/index.html
- [I] http://accounting.gov.sd/tmp/index.html
- [I] http://accounting.gov.sd/web.config.txt
- [-] Searching Joomla Components ...
- [I] guarantee.png" alt=""
- /bin/sh: 1: Syntax error: Unterminated quoted string
- [I] icons
- [I] mod_djmegamenu
- [I] mod_jux_news_ticker
- [I] Checking for Directory Listing Enabled ...
- [L] http://accounting.gov.sd/layouts/plugins
- [L] http://accounting.gov.sd/libraries/vendor
- [L] http://accounting.gov.sd/media/com_wrapper
- [L] http://accounting.gov.sd/plugins/installer
- [-] Date & Time: 11/02/2019 20:30:46
- [-] Completed in: 0:50:51
- #######################################################################################################################################
- Anonymous JTSEC #OpSudan Full Recon #5
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement