Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ISIS WEBSITE TESTING SECURITY
- http://wthker.com/
- Test sécurité ISIS Site
- http://wthker.com/
- http://twitter.com/wthkercom
- #OpISIS #OpParis #OpIceISIS #OpISRAEL
- @NoxSquad_Anon
- TESTS BY NOXSQUAD 18/12/2015
- OpenSSL 1.0.2e-dev xx XXX xxxx
- [*] SSLScan:
- [*] SSLScan: Testing SSL server wthker.com on port 443
- [*] SSLScan:
- [*] SSLScan: TLS renegotiation:
- [*] SSLScan: Secure session renegotiation supported
- [*] SSLScan:
- [*] SSLScan: TLS Compression:
- [*] SSLScan: Compression disabled
- [*] SSLScan:
- [*] SSLScan: Heartbleed:
- [*] SSLScan: TLS 1.0 not vulnerable to heartbleed
- [*] SSLScan: TLS 1.1 not vulnerable to heartbleed
- [*] SSLScan: TLS 1.2 not vulnerable to heartbleed
- [*] SSLScan:
- [*] SSLScan: Supported Server Cipher(s):
- [*] SSLScan: Accepted SSLv2 128 bits RC2-CBC-MD5
- [*] SSLScan: Accepted SSLv2 128 bits RC4-MD5
- [*] SSLScan: Accepted SSLv2 112 bits DES-CBC3-MD5
- [*] SSLScan: Accepted SSLv2 56 bits DES-CBC-MD5
- [*] SSLScan: Accepted SSLv3 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- [*] SSLScan: Accepted SSLv3 256 bits AES256-SHA
- [*] SSLScan: Accepted SSLv3 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- [*] SSLScan: Accepted SSLv3 128 bits AES128-SHA
- [*] SSLScan: Accepted SSLv3 128 bits RC4-SHA
- [*] SSLScan: Accepted SSLv3 128 bits RC4-MD5
- [*] SSLScan: Accepted SSLv3 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- [*] SSLScan: Accepted SSLv3 112 bits DES-CBC3-SHA
- [*] SSLScan: Accepted SSLv3 56 bits EDH-RSA-DES-CBC-SHA DHE 2048 bits
- [*] SSLScan: Accepted SSLv3 56 bits DES-CBC-SHA
- [*] SSLScan: Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- [*] SSLScan: Accepted TLSv1.0 256 bits AES256-SHA
- [*] SSLScan: Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- [*] SSLScan: Accepted TLSv1.0 128 bits AES128-SHA
- [*] SSLScan: Accepted TLSv1.0 128 bits RC4-SHA
- [*] SSLScan: Accepted TLSv1.0 128 bits RC4-MD5
- [*] SSLScan: Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- [*] SSLScan: Accepted TLSv1.0 112 bits DES-CBC3-SHA
- [*] SSLScan: Accepted TLSv1.0 56 bits EDH-RSA-DES-CBC-SHA DHE 2048 bits
- [*] SSLScan: Accepted TLSv1.0 56 bits DES-CBC-SHA
- [*] SSLScan:
- [*] SSLScan: Preferred Server Cipher(s):
- [*] SSLScan: SSLv2 128 bits RC2-CBC-MD5
- [*] SSLScan: SSLv3 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- [*] SSLScan: TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- [*] SSLScan:
- [*] SSLScan: SSL Certificate:
- [*] SSLScan: Signature Algorithm: sha256WithRSAEncryption
- [*] SSLScan: RSA Key Strength: 2048
- [*] SSLScan:
- [*] SSLScan: Subject: xen.giza1.com
- [*] SSLScan: Issuer: xen.giza1.com
- [*] SSLScan: SSLScan scan finished in 106.624881029 seconds for target: wthker.com
- [!] SSLScan: 'NoneType' object has no attribute 'group'
- [*] SSLScan: Found 1 SSL vulnerabilities.
- [*] Nikto: Launching Nikto against: wthker.com
- [*] Nikto: - Nikto v2.1.5
- [*] Nikto: ---------------------------------------------------------------------------
- [*] Nikto: + Target IP: 148.251.229.131
- [*] Nikto: + Target Hostname: wthker.com
- [*] Nikto: + Target Port: 80
- [*] Nikto: + Start Time: 2015-12-17 23:22:08 (GMT-5)
- [*] Nikto: ---------------------------------------------------------------------------
- [*] Nikto: + Server: Apache/2.2.31 (Unix) mod_ssl/2.2.31 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
- [*] Nmap: SYN Stealth Scan Timing: About 56.79% done; ETC: 23:23 (0:01:41 remaining)
- [*] DNS Bruteforcer: 17.82% percent done...
- [*] DNS Bruteforcer: 18.87% percent done...
- [*] DNS Bruteforcer: 19.92% percent done...
- [*] Nmap: SYN Stealth Scan Timing: About 66.09% done; ETC: 23:24 (0:01:24 remaining)
- [*] DNS Bruteforcer: 20.97% percent done...
- [*] Nikto: + 6493 items checked: 0 error(s) and 0 item(s) reported on remote host
- [*] Nikto: + End Time: 2015-12-17 23:22:49 (GMT-5) (41 seconds)
- [*] Nikto: ---------------------------------------------------------------------------
- [*] Nikto: + 1 host(s) tested
- [*] Nikto: Nikto found 0 vulnerabilities for host: wthker.com
- 12 services on node1.t4mod.com (148.251.229.131)
- NMAP SECTION:
- [*] Nmap: Completed NSE at 23:27, 40.37s elapsed
- [*] Nmap: NSE: Starting runlevel 2 (of 2) scan.
- [*] Nmap: Initiating NSE at 23:27
- [*] Nmap: Completed NSE at 23:27, 0.00s elapsed
- [*] Nmap: Nmap scan report for node1.t4mod.com (148.251.229.131)
- [*] Nmap: Host is up, received user-set (0.11s latency).
- [*] Nmap: Scanned at 2015-12-17 23:19:57 EST for 468s
- [*] Nmap: Not shown: 984 closed ports
- [*] Nmap: Reason: 984 resets
- [*] Nmap: PORT STATE SERVICE REASON VERSION
- [*] Nmap: 21/tcp open ftp? syn-ack ttl 44
- [*] Nmap: |_ftp-bounce: no banner
- [*] Nmap: 25/tcp filtered smtp no-response
- [*] Nmap: 53/tcp open domain syn-ack ttl 44 ISC BIND 9.3.6-25.P1.el5_11.4
- [*] Nmap: | dns-nsid:
- [*] Nmap: |_ bind.version: 9.3.6-P1-RedHat-9.3.6-25.P1.el5_11.4
- [*] Nmap: 80/tcp open http syn-ack ttl 44 Apache httpd 2.2.31 ((Unix) mod_ssl/2.2.31 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4)
- [*] Nmap: | http-methods: POST OPTIONS GET HEAD TRACE
- [*] Nmap: | Potentially risky methods: TRACE
- [*] Nmap: |_See http://nmap.org/nsedoc/scripts/http-methods.html
- [*] Nmap: |_http-server-header: Apache/2.2.31 (Unix) mod_ssl/2.2.31 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
- [*] Nmap: |_http-title: Site doesn't have a title (text/html).
- [*] Nmap: 110/tcp open pop3 syn-ack ttl 44 Courier pop3d
- [*] Nmap: |_pop3-capabilities: LOGIN-DELAY(10) USER STLS UIDL TOP IMPLEMENTATION(Courier Mail Server) PIPELINING
- [*] Nmap: | ssl-cert: Subject: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Issuer: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Public Key type: rsa
- [*] Nmap: | Public Key bits: 2048
- [*] Nmap: | Signature Algorithm: sha256WithRSAEncryption
- [*] Nmap: | Not valid before: 2015-08-20T14:05:23
- [*] Nmap: | Not valid after: 2016-08-19T14:05:23
- [*] Nmap: | MD5: 75cb d19f c9ae 7bc8 6e0a e521 37d4 817a
- [*] Nmap: | SHA-1: f3e1 4eba d6ba 0417 d212 e5f2 c30b 0a4b cf8e 75b7
- [*] Nmap: | -----BEGIN CERTIFICATE-----
- [*] Nmap: | MIIDQDCCAiigAwIBAgIFAPxdE/EwDQYJKoZIhvcNAQELBQAwOjEWMBQGA1UEAwwN
- [*] Nmap: | eGVuLmdpemExLmNvbTEgMB4GCSqGSIb3DQEJARYRc3NsQHhlbi5naXphMS5jb20w
- [*] Nmap: | HhcNMTUwODIwMTQwNTIzWhcNMTYwODE5MTQwNTIzWjA6MRYwFAYDVQQDDA14ZW4u
- [*] Nmap: | Z2l6YTEuY29tMSAwHgYJKoZIhvcNAQkBFhFzc2xAeGVuLmdpemExLmNvbTCCASIw
- [*] Nmap: | DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKp25+q4pcdFxMjWb+5n0jrRowTi
- [*] Nmap: | f0r3T7HawvoLGylp+xHBtFMHCKAfLs+enGwgo4iT8gNlCy0ACa/2lbcKBwjir/rX
- [*] Nmap: | LGOz/oBuFdU3v4ASepuKdKHuGz+E8ZpU9mUtn47dVRokd0vTJJV4PJwauZBxctK0
- [*] Nmap: | 9srN8Y6qr51fN1/DPHFokfH/zpXqIvGGEUhkV1cc//+eII46xgKO/ko+I55eTCVY
- [*] Nmap: | e5gYjbu61vWk6ndQvOay9fIUNt+9o0AdQPfR0bQMmCmpZHjNWRuzb7p4LlUtZ3dW
- [*] Nmap: | ZEaqLyxOtmkkAVhfe8UOsU64Pm57TrGt6zqVG7FKFNm3By781ww/MZYI6W8CAwEA
- [*] Nmap: | AaNNMEswHQYDVR0OBBYEFFMh/qvBlOd2KfbZUlr6OWraOxVJMB8GA1UdIwQYMBaA
- [*] Nmap: | FFMh/qvBlOd2KfbZUlr6OWraOxVJMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQAD
- [*] Nmap: | ggEBAAH27TXoKACeq6nmslfm2zvNGSgikKCGZMGd+iOrpEvAXRy0VwonPE/ANw3f
- [*] Nmap: | EU2YeTB0hGOriIizaclgRq3UkOw+fArMaiGuAiHlONttptYoVj0xC1aDn1Jm+SZV
- [*] Nmap: | WDv/OkcUkcvHV0m1R78GsTJYvPZdghrEgQaZuRqBXKT3QB845bW/JOP019vK6fpm
- [*] Nmap: | MleZEW0+GhfaEi/Xg9HUzcHehfOTo5kBxh3YWlBKefP6HJ5T4YDQ580+7Y6jQqVW
- [*] Nmap: | qPcNf0+/syyHkJROh/SPgJjEWAjZZqBCyBprdPdygNQOMnFt7e6d4KaLwBnBMxM6
- [*] Nmap: | hFOD3DIUZFbDu4v+9uDi41zquwM=
- [*] Nmap: |_-----END CERTIFICATE-----
- [*] Nmap: |_ssl-date: 2015-12-18T04:27:21+00:00; +14s from scanner time.
- [*] Nmap: 135/tcp filtered msrpc no-response
- [*] Nmap: 139/tcp filtered netbios-ssn no-response
- [*] Nmap: 143/tcp open imap syn-ack ttl 44 Courier Imapd (released 2015)
- [*] Nmap: |_imap-capabilities: UIDPLUS STARTTLSA0001 completed IMAP4rev1 QUOTA OK THREAD=REFERENCES ACL2=UNION THREAD=ORDEREDSUBJECT CAPABILITY IDLE SORT ACL NAMESPACE CHILDREN
- [*] Nmap: | ssl-cert: Subject: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Issuer: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Public Key type: rsa
- [*] Nmap: | Public Key bits: 2048
- [*] Nmap: | Signature Algorithm: sha256WithRSAEncryption
- [*] Nmap: | Not valid before: 2015-08-20T14:05:22
- [*] Nmap: | Not valid after: 2016-08-19T14:05:22
- [*] Nmap: | MD5: 2a9b e8ec 76cc 93d0 b208 1d71 696c cb60
- [*] Nmap: | SHA-1: 1037 0626 b193 fe83 dd69 bbb0 2acf 665a ddcd 3821
- [*] Nmap: | -----BEGIN CERTIFICATE-----
- [*] Nmap: | MIIDQDCCAiigAwIBAgIFAk1LkcUwDQYJKoZIhvcNAQELBQAwOjEWMBQGA1UEAwwN
- [*] Nmap: | eGVuLmdpemExLmNvbTEgMB4GCSqGSIb3DQEJARYRc3NsQHhlbi5naXphMS5jb20w
- [*] Nmap: | HhcNMTUwODIwMTQwNTIyWhcNMTYwODE5MTQwNTIyWjA6MRYwFAYDVQQDDA14ZW4u
- [*] Nmap: | Z2l6YTEuY29tMSAwHgYJKoZIhvcNAQkBFhFzc2xAeGVuLmdpemExLmNvbTCCASIw
- [*] Nmap: | DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMETjE5WzNJgS8P9vSuE0+oEXIs0
- [*] Nmap: | UHgr23buDvJ5j99k0wugfMkYK2OqFcFPXK7JCQeiWeQs3fNaONP0QIo8WSFjwRVm
- [*] Nmap: | zeVD6uR0jrd3tMW2UStQegn86c7dwCgc1izry21ViUnGIBSnQx/0XyoAYn28iFy1
- [*] Nmap: | tXGquBSNyWvWoPFamW1mqQ/hvQxVJUUnCGh6H4yoRbTgZUOOz63OtaY5JkiDAwxY
- [*] Nmap: | vKssiN3c5QtjKumQekN4SloiPa6kG1yO60fXkBaLGOcDSwl/BMYqEh9DVf7CL9AZ
- [*] Nmap: | dcJOnvVgUqgegW+eqTXeIXBB4ZK1W5UQiDusI/z5+i2zPW2j2brjzHz4gccCAwEA
- [*] Nmap: | AaNNMEswHQYDVR0OBBYEFLwcUUXDVAOIJ3Ldtn+iCo3ILQ8tMB8GA1UdIwQYMBaA
- [*] Nmap: | FLwcUUXDVAOIJ3Ldtn+iCo3ILQ8tMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQAD
- [*] Nmap: | ggEBAJt3CgQTiTK83MFa/w2cQEcUso1xyrawRLrhJE9mEeD5ydfjepBZk1aFmxAv
- [*] Nmap: | tPlcY3g5GDO49wT7aigQv7+SQlB+oQp9kbUhj5eCxBgals3sp35khK5jwopsMA8C
- [*] Nmap: | JPQFVpuWmpD1RB+Zr0SnXQlGGNknrdH+7ZMunA5/2A/LMJYb7tPOsk2pPGsq/b6J
- [*] Nmap: | H1RfaseUsrMWMozvMJs4456eQrmdT5PChV6Zh2ji8UgTKa0bN05+6U7BxsE5SPV+
- [*] Nmap: | G56KxyuwiN+4HDdjY8VeQcz7VttnIhH6IxQFRMvm7l3s9F7BZYp/U7PNkswbkO7d
- [*] Nmap: | f4Ot93t3503e5M5MGL4U717LeFI=
- [*] Nmap: |_-----END CERTIFICATE-----
- [*] Nmap: |_ssl-date: 2015-12-18T04:27:21+00:00; +14s from scanner time.
- [*] Nmap: 443/tcp open ssl/http syn-ack ttl 44 Apache httpd 2.2.31 ((Unix) mod_ssl/2.2.31 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4)
- [*] Nmap: | http-cisco-anyconnect:
- [*] Nmap: |_ ERROR: Not a Cisco ASA or unsupported version
- [*] Nmap: |_http-server-header: Apache/2.2.31 (Unix) mod_ssl/2.2.31 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
- [*] Nmap: |_http-title: Site doesn't have a title (text/html).
- [*] Nmap: | ssl-cert: Subject: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Issuer: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Public Key type: rsa
- [*] Nmap: | Public Key bits: 2048
- [*] Nmap: | Signature Algorithm: sha256WithRSAEncryption
- [*] Nmap: | Not valid before: 2015-08-20T12:49:47
- [*] Nmap: | Not valid after: 2016-08-19T12:49:47
- [*] Nmap: | MD5: c8a1 880e 0be7 fd86 6455 09bd 758b d9b6
- [*] Nmap: | SHA-1: bce6 1be0 c54a 4bf8 903d 6946 1ea6 ed89 0376 58a6
- [*] Nmap: | -----BEGIN CERTIFICATE-----
- [*] Nmap: | MIIDQDCCAiigAwIBAgIFASASH5wwDQYJKoZIhvcNAQELBQAwOjEWMBQGA1UEAwwN
- [*] Nmap: | eGVuLmdpemExLmNvbTEgMB4GCSqGSIb3DQEJARYRc3NsQHhlbi5naXphMS5jb20w
- [*] Nmap: | HhcNMTUwODIwMTI0OTQ3WhcNMTYwODE5MTI0OTQ3WjA6MRYwFAYDVQQDDA14ZW4u
- [*] Nmap: | Z2l6YTEuY29tMSAwHgYJKoZIhvcNAQkBFhFzc2xAeGVuLmdpemExLmNvbTCCASIw
- [*] Nmap: | DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANeFJRDNvYwhOjeI8HwhRcya47QP
- [*] Nmap: | 6AD8pu6aXHyvsEPvgMd66azqL1KU99yqh/j27GTlcFxj85TX3bL+wWYMF+h1HhJA
- [*] Nmap: | dMjUnmnwb8WLjqWpuiFxnHtnxTBdTKbTH04+fAuILjZeFf6V8mzjMmr2i9N+tOPL
- [*] Nmap: | wqSl/i88yLkn0ONemKBsszB9JYnvqm6uJJLehyrOMIBeK4YAAFTluHd+2zlM5/EM
- [*] Nmap: | Q8S1wLXE4XqotovfWCb1VkPBSe1pGQRTg8kwq8jE2iBdATzJudgql8Jrzm3+vX9K
- [*] Nmap: | XAdTczTNBSOT1+HdYRt7pYn3mWWFxcvfVfWQdrsGeJgMDxse6oB/mLxj0qsCAwEA
- [*] Nmap: | AaNNMEswHQYDVR0OBBYEFEiRyomXGowJPv+bcIXBSXGeCtH3MB8GA1UdIwQYMBaA
- [*] Nmap: | FEiRyomXGowJPv+bcIXBSXGeCtH3MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQAD
- [*] Nmap: | ggEBAF++AEcR0QaygqJRnohVolUXd4V2MySMKzeWIkHDd/linjkmPIZW3D6khfdD
- [*] Nmap: | t8TfXfQCPMSiyi5eK0F1BD8pf3RZ12clTSfytbL2Ov+nQFcEuV8soxhX6tNKrHpK
- [*] Nmap: | UUurJNuRURshPTRQBlJARM/ZcEzQmjPz10m8fd5nKUS4Orzmy8xMdo3OicC0uTtp
- [*] Nmap: | UiCVIRiHa7EHBoLgGFFEEE3dUREzqqwNqkZ1rcnpXQ/E9LiUsqpNoQTOAL/xFdRl
- [*] Nmap: | 1eivYqFojOefxYweO8cOFn9W5HfCaQV+v10NRtsnzsOlHOm11f/YzaK0d51Fm4Qy
- [*] Nmap: | vNpZzKt9Do1NhOkg/3mCAPjdSBY=
- [*] Nmap: |_-----END CERTIFICATE-----
- [*] Nmap: |_ssl-date: 2015-12-18T04:27:21+00:00; +14s from scanner time.
- [*] Nmap: | sslv2:
- [*] Nmap: | SSLv2 supported
- [*] Nmap: | ciphers:
- [*] Nmap: | SSL2_DES_192_EDE3_CBC_WITH_MD5
- [*] Nmap: | SSL2_RC2_CBC_128_CBC_WITH_MD5
- [*] Nmap: | SSL2_RC4_128_WITH_MD5
- [*] Nmap: |_ SSL2_DES_64_CBC_WITH_MD5
- [*] Nmap: 445/tcp filtered microsoft-ds no-response
- [*] Nmap: 465/tcp open ssl/smtp syn-ack ttl 44 Exim smtpd 4.86
- [*] Nmap: | smtp-commands: xen.giza1.com Hello stjnpq9312w-lp130-01-2925385236.dsl.bell.ca [174.93.214.20], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
- [*] Nmap: |_ Commands supported:
- [*] Nmap: | ssl-cert: Subject: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Issuer: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Public Key type: rsa
- [*] Nmap: | Public Key bits: 2048
- [*] Nmap: | Signature Algorithm: sha256WithRSAEncryption
- [*] Nmap: | Not valid before: 2015-08-20T12:49:46
- [*] Nmap: | Not valid after: 2016-08-19T12:49:46
- [*] Nmap: | MD5: 28b7 a52d 4370 d985 9232 efa5 c530 c521
- [*] Nmap: | SHA-1: 462e d625 e3fb 99b3 9bfb 2ad8 576f afbe 74ce 3354
- [*] Nmap: | -----BEGIN CERTIFICATE-----
- [*] Nmap: | MIIDQDCCAiigAwIBAgIFAfGjHm4wDQYJKoZIhvcNAQELBQAwOjEWMBQGA1UEAwwN
- [*] Nmap: | eGVuLmdpemExLmNvbTEgMB4GCSqGSIb3DQEJARYRc3NsQHhlbi5naXphMS5jb20w
- [*] Nmap: | HhcNMTUwODIwMTI0OTQ2WhcNMTYwODE5MTI0OTQ2WjA6MRYwFAYDVQQDDA14ZW4u
- [*] Nmap: | Z2l6YTEuY29tMSAwHgYJKoZIhvcNAQkBFhFzc2xAeGVuLmdpemExLmNvbTCCASIw
- [*] Nmap: | DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANdOCXTW9HNq/n9AXvywkMyA9RBg
- [*] Nmap: | VXDN00x1GVrXkFAwafyFd5d44eJEAX+h1W/6sxBAxR5atEgyO4zIAdBAB0WywD4K
- [*] Nmap: | zczmFazra7YtcGzIoc84xk+2ZYwIuoPcY8vSVyd0XsFCPEpWoL5bDpGKdCb4AKzR
- [*] Nmap: | V+06NNpoOYfOnuPx7lfWZ/M9DH7h3IKKnixuwyF+OmAj7V+SDGyeoX8i9lcMtNxN
- [*] Nmap: | wKaETUca+UGJ983E/Q3Huf1vKEEpUzMER/UKpaDPBSGvEXDBEoAp+B4iOlkuWqEB
- [*] Nmap: | +zTXoxFNK1Hm7Qetkr6KoVNw3ABjPpgUZf8FF0fo2ZiS+mir+dJu1lryFR0CAwEA
- [*] Nmap: | AaNNMEswHQYDVR0OBBYEFAZdM5FoYC2vVn4JvrWMF3pU5lg1MB8GA1UdIwQYMBaA
- [*] Nmap: | FAZdM5FoYC2vVn4JvrWMF3pU5lg1MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQAD
- [*] Nmap: | ggEBAHvYm3R0MVTTdUV+o9sBPJluT6lXOws5DMTaJEvQXv2/oFmNw8LL/nZexCjL
- [*] Nmap: | es4Hfd82U2XhSoNMQORyDiAGRYWnKJiIPlrhbXxfDgmu29Bv4ynUa8GASTSk3dZX
- [*] Nmap: | aCLuxLl1BylAdy/SO90fbPSr3OM4xHnknkRK2unSPyhKPyAhh6edypqKV0S5WgsL
- [*] Nmap: | LQKT7hHnp60Uf7WLnJPKAITgmwYpaHQ6bbQy0XR0UmsUQovfqMg/VSET67EM1XJr
- [*] Nmap: | mEx+rK27KHulz90VZI53PkmGhuYBQHiTo+Rjv1OeDXyfz3dVhiQcj102b+vKLV8b
- [*] Nmap: | h4tMjF4m651hKw8ug0Je33xP4xk=
- [*] Nmap: |_-----END CERTIFICATE-----
- [*] Nmap: |_ssl-date: 2015-12-18T04:27:21+00:00; +14s from scanner time.
- [*] Nmap: 587/tcp open smtp syn-ack ttl 44 Exim smtpd 4.86
- [*] Nmap: | smtp-commands: xen.giza1.com Hello stjnpq9312w-lp130-01-2925385236.dsl.bell.ca [174.93.214.20], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- [*] Nmap: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- [*] Nmap: | ssl-cert: Subject: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Issuer: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Public Key type: rsa
- [*] Nmap: | Public Key bits: 2048
- [*] Nmap: | Signature Algorithm: sha256WithRSAEncryption
- [*] Nmap: | Not valid before: 2015-08-20T12:49:46
- [*] Nmap: | Not valid after: 2016-08-19T12:49:46
- [*] Nmap: | MD5: 28b7 a52d 4370 d985 9232 efa5 c530 c521
- [*] Nmap: | SHA-1: 462e d625 e3fb 99b3 9bfb 2ad8 576f afbe 74ce 3354
- [*] Nmap: | -----BEGIN CERTIFICATE-----
- [*] Nmap: | MIIDQDCCAiigAwIBAgIFAfGjHm4wDQYJKoZIhvcNAQELBQAwOjEWMBQGA1UEAwwN
- [*] Nmap: | eGVuLmdpemExLmNvbTEgMB4GCSqGSIb3DQEJARYRc3NsQHhlbi5naXphMS5jb20w
- [*] Nmap: | HhcNMTUwODIwMTI0OTQ2WhcNMTYwODE5MTI0OTQ2WjA6MRYwFAYDVQQDDA14ZW4u
- [*] Nmap: | Z2l6YTEuY29tMSAwHgYJKoZIhvcNAQkBFhFzc2xAeGVuLmdpemExLmNvbTCCASIw
- [*] Nmap: | DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANdOCXTW9HNq/n9AXvywkMyA9RBg
- [*] Nmap: | VXDN00x1GVrXkFAwafyFd5d44eJEAX+h1W/6sxBAxR5atEgyO4zIAdBAB0WywD4K
- [*] Nmap: | zczmFazra7YtcGzIoc84xk+2ZYwIuoPcY8vSVyd0XsFCPEpWoL5bDpGKdCb4AKzR
- [*] Nmap: | V+06NNpoOYfOnuPx7lfWZ/M9DH7h3IKKnixuwyF+OmAj7V+SDGyeoX8i9lcMtNxN
- [*] Nmap: | wKaETUca+UGJ983E/Q3Huf1vKEEpUzMER/UKpaDPBSGvEXDBEoAp+B4iOlkuWqEB
- [*] Nmap: | +zTXoxFNK1Hm7Qetkr6KoVNw3ABjPpgUZf8FF0fo2ZiS+mir+dJu1lryFR0CAwEA
- [*] Nmap: | AaNNMEswHQYDVR0OBBYEFAZdM5FoYC2vVn4JvrWMF3pU5lg1MB8GA1UdIwQYMBaA
- [*] Nmap: | FAZdM5FoYC2vVn4JvrWMF3pU5lg1MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQAD
- [*] Nmap: | ggEBAHvYm3R0MVTTdUV+o9sBPJluT6lXOws5DMTaJEvQXv2/oFmNw8LL/nZexCjL
- [*] Nmap: | es4Hfd82U2XhSoNMQORyDiAGRYWnKJiIPlrhbXxfDgmu29Bv4ynUa8GASTSk3dZX
- [*] Nmap: | aCLuxLl1BylAdy/SO90fbPSr3OM4xHnknkRK2unSPyhKPyAhh6edypqKV0S5WgsL
- [*] Nmap: | LQKT7hHnp60Uf7WLnJPKAITgmwYpaHQ6bbQy0XR0UmsUQovfqMg/VSET67EM1XJr
- [*] Nmap: | mEx+rK27KHulz90VZI53PkmGhuYBQHiTo+Rjv1OeDXyfz3dVhiQcj102b+vKLV8b
- [*] Nmap: | h4tMjF4m651hKw8ug0Je33xP4xk=
- [*] Nmap: |_-----END CERTIFICATE-----
- [*] Nmap: |_ssl-date: 2015-12-18T04:27:22+00:00; +14s from scanner time.
- [*] Nmap: 993/tcp open ssl/imap syn-ack ttl 44 Courier Imapd (released 2015)
- [*] Nmap: |_imap-capabilities: UIDPLUS completed AUTH=PLAIN ACL2=UNIONA0001 QUOTA OK THREAD=REFERENCES IMAP4rev1 THREAD=ORDEREDSUBJECT CAPABILITY IDLE SORT ACL NAMESPACE CHILDREN
- [*] Nmap: | ssl-cert: Subject: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Issuer: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Public Key type: rsa
- [*] Nmap: | Public Key bits: 2048
- [*] Nmap: | Signature Algorithm: sha256WithRSAEncryption
- [*] Nmap: | Not valid before: 2015-08-20T14:05:22
- [*] Nmap: | Not valid after: 2016-08-19T14:05:22
- [*] Nmap: | MD5: 2a9b e8ec 76cc 93d0 b208 1d71 696c cb60
- [*] Nmap: | SHA-1: 1037 0626 b193 fe83 dd69 bbb0 2acf 665a ddcd 3821
- [*] Nmap: | -----BEGIN CERTIFICATE-----
- [*] Nmap: | MIIDQDCCAiigAwIBAgIFAk1LkcUwDQYJKoZIhvcNAQELBQAwOjEWMBQGA1UEAwwN
- [*] Nmap: | eGVuLmdpemExLmNvbTEgMB4GCSqGSIb3DQEJARYRc3NsQHhlbi5naXphMS5jb20w
- [*] Nmap: | HhcNMTUwODIwMTQwNTIyWhcNMTYwODE5MTQwNTIyWjA6MRYwFAYDVQQDDA14ZW4u
- [*] Nmap: | Z2l6YTEuY29tMSAwHgYJKoZIhvcNAQkBFhFzc2xAeGVuLmdpemExLmNvbTCCASIw
- [*] Nmap: | DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMETjE5WzNJgS8P9vSuE0+oEXIs0
- [*] Nmap: | UHgr23buDvJ5j99k0wugfMkYK2OqFcFPXK7JCQeiWeQs3fNaONP0QIo8WSFjwRVm
- [*] Nmap: | zeVD6uR0jrd3tMW2UStQegn86c7dwCgc1izry21ViUnGIBSnQx/0XyoAYn28iFy1
- [*] Nmap: | tXGquBSNyWvWoPFamW1mqQ/hvQxVJUUnCGh6H4yoRbTgZUOOz63OtaY5JkiDAwxY
- [*] Nmap: | vKssiN3c5QtjKumQekN4SloiPa6kG1yO60fXkBaLGOcDSwl/BMYqEh9DVf7CL9AZ
- [*] Nmap: | dcJOnvVgUqgegW+eqTXeIXBB4ZK1W5UQiDusI/z5+i2zPW2j2brjzHz4gccCAwEA
- [*] Nmap: | AaNNMEswHQYDVR0OBBYEFLwcUUXDVAOIJ3Ldtn+iCo3ILQ8tMB8GA1UdIwQYMBaA
- [*] Nmap: | FLwcUUXDVAOIJ3Ldtn+iCo3ILQ8tMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQAD
- [*] Nmap: | ggEBAJt3CgQTiTK83MFa/w2cQEcUso1xyrawRLrhJE9mEeD5ydfjepBZk1aFmxAv
- [*] Nmap: | tPlcY3g5GDO49wT7aigQv7+SQlB+oQp9kbUhj5eCxBgals3sp35khK5jwopsMA8C
- [*] Nmap: | JPQFVpuWmpD1RB+Zr0SnXQlGGNknrdH+7ZMunA5/2A/LMJYb7tPOsk2pPGsq/b6J
- [*] Nmap: | H1RfaseUsrMWMozvMJs4456eQrmdT5PChV6Zh2ji8UgTKa0bN05+6U7BxsE5SPV+
- [*] Nmap: | G56KxyuwiN+4HDdjY8VeQcz7VttnIhH6IxQFRMvm7l3s9F7BZYp/U7PNkswbkO7d
- [*] Nmap: | f4Ot93t3503e5M5MGL4U717LeFI=
- [*] Nmap: |_-----END CERTIFICATE-----
- [*] Nmap: |_ssl-date: 2015-12-18T04:27:22+00:00; +14s from scanner time.
- [*] Nmap: | sslv2:
- [*] Nmap: | SSLv2 supported
- [*] Nmap: |_ ciphers: none
- [*] Nmap: 995/tcp open ssl/pop3 syn-ack ttl 44 Courier pop3d
- [*] Nmap: | ssl-cert: Subject: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Issuer: commonName=xen.giza1.com/emailAddress=ssl@xen.giza1.com
- [*] Nmap: | Public Key type: rsa
- [*] Nmap: | Public Key bits: 2048
- [*] Nmap: | Signature Algorithm: sha256WithRSAEncryption
- [*] Nmap: | Not valid before: 2015-08-20T14:05:23
- [*] Nmap: | Not valid after: 2016-08-19T14:05:23
- [*] Nmap: | MD5: 75cb d19f c9ae 7bc8 6e0a e521 37d4 817a
- [*] Nmap: | SHA-1: f3e1 4eba d6ba 0417 d212 e5f2 c30b 0a4b cf8e 75b7
- [*] Nmap: | -----BEGIN CERTIFICATE-----
- [*] Nmap: | MIIDQDCCAiigAwIBAgIFAPxdE/EwDQYJKoZIhvcNAQELBQAwOjEWMBQGA1UEAwwN
- [*] Nmap: | eGVuLmdpemExLmNvbTEgMB4GCSqGSIb3DQEJARYRc3NsQHhlbi5naXphMS5jb20w
- [*] Nmap: | HhcNMTUwODIwMTQwNTIzWhcNMTYwODE5MTQwNTIzWjA6MRYwFAYDVQQDDA14ZW4u
- [*] Nmap: | Z2l6YTEuY29tMSAwHgYJKoZIhvcNAQkBFhFzc2xAeGVuLmdpemExLmNvbTCCASIw
- [*] Nmap: | DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKp25+q4pcdFxMjWb+5n0jrRowTi
- [*] Nmap: | f0r3T7HawvoLGylp+xHBtFMHCKAfLs+enGwgo4iT8gNlCy0ACa/2lbcKBwjir/rX
- [*] Nmap: | LGOz/oBuFdU3v4ASepuKdKHuGz+E8ZpU9mUtn47dVRokd0vTJJV4PJwauZBxctK0
- [*] Nmap: | 9srN8Y6qr51fN1/DPHFokfH/zpXqIvGGEUhkV1cc//+eII46xgKO/ko+I55eTCVY
- [*] Nmap: | e5gYjbu61vWk6ndQvOay9fIUNt+9o0AdQPfR0bQMmCmpZHjNWRuzb7p4LlUtZ3dW
- [*] Nmap: | ZEaqLyxOtmkkAVhfe8UOsU64Pm57TrGt6zqVG7FKFNm3By781ww/MZYI6W8CAwEA
- [*] Nmap: | AaNNMEswHQYDVR0OBBYEFFMh/qvBlOd2KfbZUlr6OWraOxVJMB8GA1UdIwQYMBaA
- [*] Nmap: | FFMh/qvBlOd2KfbZUlr6OWraOxVJMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQAD
- [*] Nmap: | ggEBAAH27TXoKACeq6nmslfm2zvNGSgikKCGZMGd+iOrpEvAXRy0VwonPE/ANw3f
- [*] Nmap: | EU2YeTB0hGOriIizaclgRq3UkOw+fArMaiGuAiHlONttptYoVj0xC1aDn1Jm+SZV
- [*] Nmap: | WDv/OkcUkcvHV0m1R78GsTJYvPZdghrEgQaZuRqBXKT3QB845bW/JOP019vK6fpm
- [*] Nmap: | MleZEW0+GhfaEi/Xg9HUzcHehfOTo5kBxh3YWlBKefP6HJ5T4YDQ580+7Y6jQqVW
- [*] Nmap: | qPcNf0+/syyHkJROh/SPgJjEWAjZZqBCyBprdPdygNQOMnFt7e6d4KaLwBnBMxM6
- [*] Nmap: | hFOD3DIUZFbDu4v+9uDi41zquwM=
- [*] Nmap: |_-----END CERTIFICATE-----
- [*] Nmap: |_ssl-date: 2015-12-18T04:27:22+00:00; +14s from scanner time.
- [*] Nmap: | sslv2:
- [*] Nmap: | SSLv2 supported
- [*] Nmap: |_ ciphers: none
- [*] Nmap: 3003/tcp open ssh syn-ack ttl 44 OpenSSH 4.3 (protocol 2.0)
- [*] Nmap: | ssh-hostkey:
- [*] Nmap: | 1024 92:9b:7f:d5:50:7f:79:0c:06:95:91:72:83:4d:d3:60 (DSA)
- [*] Nmap: | ssh-dss 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
- [*] Nmap: | 2048 55:08:84:70:2a:f8:61:02:a8:08:e5:c1:ab:d4:62:01 (RSA)
- [*] Nmap: |_ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAxImURQN311R2BHBge54fMlzNk9i3N7imYUOyZVnNFB5ij54mnpVZrpoDD/C4GUSTw7TKyhopLVsUthQzRUK2RkPjOKVyVcISt4zcQ8sPD27muQk/y0XYCQBwUwxtIqOrLtlUW7770YZJvI7eMEEVsI1wWOzl3WjJh3G7hqNKrRZZdQlkEKZga7YvWlh0eW+weUHHgxC62CWgR+y87W8jIMeWzATICU8j53rpcx2y8rqVQPsocnJ9791b7oYYdamH7S8u23yloVecg5GfoZE9W5uriXXUxOhCG0YJcCeYm/ZAt55G9H8y5XKqaUEuak2I18oskBd1kwCdLOKbecGKNw==
- [*] Nmap: 3306/tcp open mysql syn-ack ttl 44 MySQL (unauthorized)
- [*] Nmap: 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- [*] Nmap: SF-Port21-TCP:V=6.49BETA4%I=7%D=12/17%Time=56738A9E%P=i586-pc-linux-gnu%r(
- [*] Nmap: SF:GetRequest,2B,"421\x20Too\x20many\x20connections\x20\(8\)\x20from\x20th
- [*] Nmap: SF:is\x20IP\r\n");
- [*] Nmap: OS fingerprint not ideal because: Host distance (16 network hops) is greater than five
- [*] Nmap: Aggressive OS guesses: Asus RT-AC66U router (Linux 2.6) (95%), Asus RT-N16 WAP (Linux 2.6) (95%), Asus RT-N66U WAP (Linux 2.6) (95%), Tomato 1.28 (Linux 2.6.22) (95%), DD-WRT v24-sp1 (Linux 2.4.36) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (94%), Peplink Balance 380 router (94%), D-Link DIR-300 NRU router (Linux 2.6.21) (94%)
- [*] Nmap: No exact OS matches for host (test conditions non-ideal).
- [*] Nmap: TCP/IP fingerprint:
- [*] Nmap: SCAN(V=6.49BETA4%E=4%D=12/17%OT=21%CT=1%CU=32630%PV=N%DS=16%DC=T%G=N%TM=56738B41%P=i586-pc-linux-gnu)
- [*] Nmap: SEQ(SP=107%GCD=1%ISR=10E%TI=Z%CI=Z%TS=8)
- [*] Nmap: OPS(O1=M5ACST11NW7%O2=M5ACST11NW7%O3=M5ACNNT11NW7%O4=M5ACST11NW7%O5=M5ACST11NW7%O6=M5ACST11)
- [*] Nmap: WIN(W1=16A0%W2=16A0%W3=16A0%W4=16A0%W5=16A0%W6=16A0)
- [*] Nmap: ECN(R=Y%DF=Y%T=3B%W=16D0%O=M5ACNNSNW7%CC=N%Q=)
- [*] Nmap: T1(R=Y%DF=Y%T=3B%S=O%A=S+%F=AS%RD=0%Q=)
- [*] Nmap: T2(R=N)
- [*] Nmap: T3(R=N)
- [*] Nmap: T4(R=Y%DF=Y%T=3B%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
- [*] Nmap: T5(R=Y%DF=Y%T=3B%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
- [*] Nmap: T6(R=Y%DF=Y%T=3B%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
- [*] Nmap: T7(R=N)
- [*] Nmap: U1(R=Y%DF=N%T=3B%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
- [*] Nmap: IE(R=Y%DFI=N%T=3B%CD=S)
- [*] Nmap:
- [*] Nmap: Uptime guess: 0.254 days (since Thu Dec 17 17:22:00 2015)
- [*] Nmap: Network Distance: 16 hops
- [*] Nmap: TCP Sequence Prediction: Difficulty=263 (Good luck!)
- [*] Nmap: IP ID Sequence Generation: All zeros
- [*] Nmap: Service Info: Host: xen.giza1.com; OS: Red Hat Enterprise Linux; CPE: cpe:/o:redhat:enterprise_linux
- [*] Nmap:
- [*] Nmap: TRACEROUTE (using port 199/tcp)
- [*] Nmap: HOP RTT ADDRESS
- [*] Nmap: 1 4.00 ms mynetwork (192.168.2.1)
- [*] Nmap: 2 31.70 ms 10.11.17.49
- [*] Nmap: 3 10.53 ms 10.178.206.158
- [*] Nmap: 4 12.66 ms 10.178.206.159
- [*] Nmap: 5 9.80 ms agg1-montreal02_7-2-0.net.bell.ca (64.230.32.14)
- [*] Nmap: 6 13.02 ms core4-montreal02_xe0-8-2-0_core.net.bell.ca (64.230.170.253)
- [*] Nmap: 7 11.27 ms bx4-montreal02_pos3-1-0.net.bell.ca (64.230.169.190)
- [*] Nmap: 8 11.15 ms peer_Level3_bx4-montreal02.net.bell.ca (67.69.246.126)
- [*] Nmap: 9 96.34 ms ae-2-70.edge7.Frankfurt1.Level3.net (4.69.154.75)
- [*] Nmap: 10 102.79 ms 195.16.162.254
- [*] Nmap: 11 102.82 ms core12.hetzner.de (213.239.245.25)
- [*] Nmap: 12 106.84 ms core21.hetzner.de (213.239.245.30)
- [*] Nmap: 13 104.91 ms juniper2.rz19.hetzner.de (213.239.245.138)
- [*] Nmap: 14 104.96 ms hos-tr2.ex3k12.rz19.hetzner.de (213.239.242.173)
- [*] Nmap: 15 106.69 ms node1.t4mod.com (144.76.29.110)
- [*] Nmap: 16 107.10 ms node1.t4mod.com (148.251.229.131)
- [*] Nmap:
- [*] Nmap: NSE: Script Post-scanning.
- [*] Nmap: NSE: Starting runlevel 1 (of 2) scan.
- [*] Nmap: Initiating NSE at 23:27
- [*] Nmap: Completed NSE at 23:27, 0.00s elapsed
- [*] Nmap: NSE: Starting runlevel 2 (of 2) scan.
- [*] Nmap: Initiating NSE at 23:27
- [*] Nmap: Completed NSE at 23:27, 0.00s elapsed
- [*] Nmap: Read data files from: /usr/bin/../share/nmap
- [*] Nmap: OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- [*] Nmap: Nmap done: 1 IP address (1 host up) scanned in 469.89 seconds
- [*] Nmap: Raw packets sent: 1336 (62.756KB) | Rcvd: 4451 (409.818KB)
- [*] Nmap: Nmap scan finished in 470.544016123 seconds for target: 148.251.229.131
- OpenSSL 1.0.2e-dev xx XXX xxxx
- [*] SSLScan:
- [*] SSLScan: Testing SSL server wthker.com on port 443
- [*] SSLScan:
- [*] SSLScan: TLS renegotiation:
- [*] SSLScan: Secure session renegotiation supported
- [*] SSLScan:
- [*] SSLScan: TLS Compression:
- [*] SSLScan: Compression disabled
- [*] SSLScan:
- [*] SSLScan: Heartbleed:
- [*] SSLScan: TLS 1.0 not vulnerable to heartbleed
- [*] SSLScan: TLS 1.1 not vulnerable to heartbleed
- [*] SSLScan: TLS 1.2 not vulnerable to heartbleed
- [*] SSLScan:
- [*] SSLScan: Supported Server Cipher(s):
- [*] SSLScan: Accepted SSLv2 128 bits RC2-CBC-MD5
- [*] SSLScan: Accepted SSLv2 128 bits RC4-MD5
- [*] SSLScan: Accepted SSLv2 112 bits DES-CBC3-MD5
- [*] SSLScan: Accepted SSLv2 56 bits DES-CBC-MD5
- [*] SSLScan: Accepted SSLv3 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- [*] SSLScan: Accepted SSLv3 256 bits AES256-SHA
- [*] SSLScan: Accepted SSLv3 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- [*] SSLScan: Accepted SSLv3 128 bits AES128-SHA
- [*] SSLScan: Accepted SSLv3 128 bits RC4-SHA
- [*] SSLScan: Accepted SSLv3 128 bits RC4-MD5
- [*] SSLScan: Accepted SSLv3 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- [*] SSLScan: Accepted SSLv3 112 bits DES-CBC3-SHA
- [*] SSLScan: Accepted SSLv3 56 bits EDH-RSA-DES-CBC-SHA DHE 2048 bits
- [*] SSLScan: Accepted SSLv3 56 bits DES-CBC-SHA
- [*] SSLScan: Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- [*] SSLScan: Accepted TLSv1.0 256 bits AES256-SHA
- [*] SSLScan: Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- [*] SSLScan: Accepted TLSv1.0 128 bits AES128-SHA
- [*] SSLScan: Accepted TLSv1.0 128 bits RC4-SHA
- [*] SSLScan: Accepted TLSv1.0 128 bits RC4-MD5
- [*] SSLScan: Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- [*] SSLScan: Accepted TLSv1.0 112 bits DES-CBC3-SHA
- [*] SSLScan: Accepted TLSv1.0 56 bits EDH-RSA-DES-CBC-SHA DHE 2048 bits
- [*] SSLScan: Accepted TLSv1.0 56 bits DES-CBC-SHA
- [*] SSLScan:
- [*] SSLScan: Preferred Server Cipher(s):
- [*] SSLScan: SSLv2 128 bits RC2-CBC-MD5
- [*] SSLScan: SSLv3 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- [*] SSLScan: TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- [*] SSLScan:
- [*] SSLScan: SSL Certificate:
- [*] SSLScan: Signature Algorithm: sha256WithRSAEncryption
- [*] SSLScan: RSA Key Strength: 2048
- [*] SSLScan:
- [*] SSLScan: Subject: xen.giza1.com
- [*] SSLScan: Issuer: xen.giza1.com
- [*] SSLScan: SSLScan scan finished in 106.624881029 seconds for target: wthker.com
- [!] SSLScan: 'NoneType' object has no attribute 'group'
- [*] SSLScan: Found 1 SSL vulnerabilities.
- [*] Nikto: Launching Nikto against: wthker.com
- [*] Nikto: - Nikto v2.1.5
- [*] Nikto: ---------------------------------------------------------------------------
- [*] Nikto: + Target IP: 148.251.229.131
- [*] Nikto: + Target Hostname: wthker.com
- [*] Nikto: + Target Port: 80
- [*] Nikto: + Start Time: 2015-12-17 23:22:08 (GMT-5)
- [*] Nikto: ---------------------------------------------------------------------------
- [*] Nikto: + Server: Apache/2.2.31 (Unix) mod_ssl/2.2.31 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
- OTHER:
- ---------------------------------------------------------------------------
- + Target IP: 148.251.229.131
- + Target Hostname: wthker.com
- + Target Port: 80
- + Start Time: 2015-12-17 23:51:20 (GMT-5)
- ---------------------------------------------------------------------------
- + Server: Apache/2.2.31 (Unix) mod_ssl/2.2.31 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
- + Server leaks inodes via ETags, header found with file /, inode: 12615977, size: 9500, mtime: Sat Aug 29 17:08:10 2015
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Apache/2.2.31 appears to be outdated (current is at least Apache/2.4.12). Apache 2.0.65 (final release) and 2.2.29 are also current.
- + mod_ssl/2.2.31 appears to be outdated (current is at least 2.8.31) (may depend on server version)
- + OpenSSL/0.9.8e-fips-rhel5 appears to be outdated (current is at least 1.0.1j). OpenSSL 1.0.0o and 0.9.8zc are also current.
- + Allowed HTTP Methods: POST, OPTIONS, GET, HEAD, TRACE
- + OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
- + mod_ssl/2.2.31 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0082, OSVDB-756.
- + Cookie PHPSESSID created without the httponly flag
- + Retrieved x-powered-by header: PHP/5.3.29
- + /cgi-sys/guestbook.cgi: May allow attackers to execute commands as the web daemon.
- + /cgi-sys/Count.cgi: This may allow attackers to execute arbitrary commands on the server
- + OSVDB-3233: /mailman/listinfo: Mailman was found on the server.
- + OSVDB-3092: /cgi-sys/entropysearch.cgi?query=asdfasdf&user=root&basehref=%2F%2Fwww.yourdomain.com/: CPanel's Entropy Search allows username enumeration via the user parameter.
- + OSVDB-3092: /cgi-sys/scgiwrap: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
- + OSVDB-3268: /img/: Directory indexing found.
- + OSVDB-3092: /img/: This might be interesting...
- + 9221 requests: 3 error(s) and 19 item(s) reported on remote host
- + End Time: 2015-12-18 00:12:03 (GMT-5) (1243 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- FIERCING:
- 148.251.229.131 ftp.wthker.com
- 127.0.0.1 localhost.wthker.com
- 148.251.229.131 mail.wthker.com
- 148.251.229.131 webmail.wthker.com
- 148.251.229.131 www.wthker.com
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement