daily pastebin goal
7%
SHARE
TWEET

#OPSUDAN SUDANIA24.TV AL1NE3737

a guest Mar 24th, 2019 194 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.   ____                           _          
  2.  |  _ \ _ __ _   _ _____ __ __ _| | ___   _
  3.  | |_) | '__| | | |_  / '__/ _` | |/ / | | |
  4.  |  __/| |  | |_| |/ /| | | (_| |   <| |_| |
  5.  |_|   |_|   \__, /___|_|  \__,_|_|\_\\__, |
  6.              |___/                    |___/
  7.  
  8.  
  9. 24 Sudanês:    http://www.sudania24.tv/
  10.  
  11.  
  12.      dia yang menanam ketidakadilan akan menuai kesengsaraan.
  13.      dia yang menanam ketidakadilan akan menuai kesengsaraan.
  14.      dia yang menanam ketidakadilan akan menuai kesengsaraan.
  15.      dia yang menanam ketidakadilan akan menuai kesengsaraan.
  16.  
  17.  
  18. INFORMATION'S BY: AL1NE3737
  19.  
  20. Somos: Al1ne3737, PopTart, shap3r, Dext3r, Ergo, Mecz1nho, TkaTheGod, Asahi, mxc, Xoha.
  21.  
  22.  
  23. ===================================================================================================
  24. | Domain: http://www.sudania24.tv/
  25. | Server: Apache
  26. | IP: 88.208.206.75
  27. | VirtualHost: webmail.sudania24.tv
  28. | http://www.sudania24.tv/mailman/listinfo
  29. ===================================================================================================
  30.  
  31. The files listed below had the slowest response times measured during the crawling process. The average response
  32. time for this site was 193,47 ms. These files could be targetted in denial of service attacks.
  33.  
  34. 1. /wp, response time 1906 ms
  35.  
  36. ===================================================================================================
  37.  
  38. | File check:
  39. | [+] CODE: 200  URL: http://www.sudania24.tv/index.html                                                                
  40. | [+] CODE: 200  URL: http://www.sudania24.tv/mailman/listinfo                                                          
  41. | [+] CODE: 200  URL: http://www.sudania24.tv/webmail/blank.html                                                        
  42. | [+] CODE: 200  URL: http://www.sudania24.tv/webmail/horde/test.php                                                    
  43. | [+] CODE: 200  URL: http://www.sudania24.tv/webmail/src/configtest.php                                                
  44. | [+] CODE: 200  URL: http://www.sudania24.tv/webmail/src/read_body.php                                                
  45. | [+] CODE: 200  URL: http://www.sudania24.tv/webmail/lib/emailreader_execute_on_each_page.inc.php
  46.  
  47. ===================================================================================================
  48.  
  49.     Found 10 domains hosted on the same web server as www.sudania24.tv (88.208.206.75).
  50.  
  51. phone.addresses.com
  52. phone.intelius.com
  53. sapphiresystems.com.au
  54. server88-208-206-75.live-servers.net
  55. starsinmyeyes.tv
  56. sudania24.net
  57. sudania24.tv
  58. www.ocinkjet.com
  59. www.starsinmyeyes.tvwww.sudania24.tv
  60.  
  61. ===================================================================================================
  62.  
  63. Registrar Info
  64.  
  65. NameTUCOWS, INC.
  66. Whois Serverwhois.tucows.com
  67. Referral URLhttp://tucowsdomains.com
  68. Status clientTransferProhibited
  69. clientUpdateProhibited
  70. Important Dates
  71. Expires On2020-02-14
  72. Registered On2016-02-14
  73. Updated On2019-01-30
  74. Name Servers
  75. ns1.sudania24.net 88.208.206.75
  76. ns2.sudania24.net 88.208.206.75
  77.  
  78. Similar Domains
  79. sudan-4-all.org | sudan-6rab.com | sudan-air.com | sudan-airlines.com | sudan-all.com |
  80. sudan-ap.org | sudan-apartments.com | sudan-archive.com | sudan-archive.org | sudan-b2b.com |
  81. sudan-bazar.com | sudan-blog.com | sudan-bloglink.com | sudan-bucharest.ro | sudan-build.net |
  82. sudan-business-consultants.com | sudan-business-services.com | sudan-business.com | sudan-c-z.com | sudan-c-z.net |
  83.  
  84.  
  85. Registrant Contact Information:
  86.  
  87. NameContact Privacy Inc. Customer 0142349647
  88. OrganizationContact Privacy Inc. Customer 0142349647
  89. Address96 Mowat Ave
  90. CityToronto
  91. State / ProvinceON
  92. Postal CodeM6K 3M1
  93. CountryCA
  94. Phone+1.4165385457
  95. Email
  96.  
  97. Administrative Contact Information:
  98.  
  99. NameContact Privacy Inc. Customer 0142349647
  100. OrganizationContact Privacy Inc. Customer 0142349647
  101. Address96 Mowat Ave
  102. CityToronto
  103. State / ProvinceON
  104. Postal CodeM6K 3M1
  105. CountryCA
  106. Phone+1.4165385457
  107. Email
  108.  
  109. Technical Contact Information:
  110.  
  111. NameContact Privacy Inc. Customer 0142349647
  112. OrganizationContact Privacy Inc. Customer 0142349647
  113. Address96 Mowat Ave
  114. CityToronto
  115. State / ProvinceON
  116. Postal CodeM6K 3M1
  117. CountryCA
  118. Phone+1.4165385457
  119. Email
  120.  
  121. ===================================================================================================
  122.  
  123.     Sub Domains :D
  124.  
  125. www.sudania24.tv
  126. Yahoo: www.sudania24.tv
  127. sudania24.sudania24.tv
  128. www.sudania24.sudania24.tv
  129. sudania24tv.sudania24.tv
  130. www.sudania24tv.sudania24.tv
  131. sudania2ffm.sudania24.tv
  132. www.sudania2ffm.sudania24.tv
  133. cpanel.sudania24.tv
  134. mail.sudania24.tv
  135. webdisk.sudania24.tv
  136. webmail.sudania24.tv
  137. www.sudania24.tv
  138. sudania24tv.sudania24.tv
  139. sudania24.sudania24.tv
  140. webdisk.sudania24.tv
  141. www.sudania24tv.sudania24.tv
  142. www.sudania2ffm.sudania24.tv
  143. webmail.sudania24.tv
  144. cpanel.sudania24.tv
  145. sudania2ffm.sudania24.tv
  146. www.sudania24.sudania24.tv
  147.  
  148. ===================================================================================================
  149.  
  150. List of plugins installed for WordPress /wp/:
  151.  
  152.  
  153. wordpress-importer version 0.6.1 (latest N/A)
  154.  
  155. contact-form-7 version 4.4.2 (latest N/A)
  156.  
  157. woocommerce version 2.6.1 (latest N/A)
  158.  
  159. instanow version (latest N/A)
  160.  
  161. taqyeem version (latest N/A)
  162.  
  163. taqyeem-buttons version (latest N/A)
  164.  
  165. ===================================================================================================
  166.  
  167. ============================== VULNERABILITY ======================================================
  168.  
  169.  
  170.  
  171.     HOST HEADER ATTACK
  172.  
  173.      <link href="http://_SERVER['HOST']"    (Joomla)
  174. ...and append secret keys and tokens to links containing it:
  175.     <a href="http://_SERVER['HOST']?token=topsecret">  (Django, Gallery, others)
  176. ....and even directly import scripts from it:
  177.       <script src="http://_SERVER['HOST']/misc/jquery.js?v=1.4.4">  (Various)
  178. This vulnerability affects /style.css.
  179. Discovered by: Scripting (Host_Header_Attack.script).
  180. Attack details
  181. Host header evilhost6s0VX1ca.com was reflected inside a A tag (href attribute).
  182.  
  183. GET /style.css HTTP/1.1
  184. Host: evilhost6s0VX1ca.com
  185. X-Forwarded-Host: www.sudania24.tv
  186. Connection: Keep-alive
  187. Accept-Encoding: gzip,deflate
  188. User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
  189. Accept: */*
  190.  
  191. ===================================================================================================
  192.  
  193.     HOST HEADER ATTACK
  194.  
  195.      <link href="http://_SERVER['HOST']"    (Joomla)
  196. ...and append secret keys and tokens to links containing it:
  197.     <a href="http://_SERVER['HOST']?token=topsecret">  (Django, Gallery, others)
  198. ....and even directly import scripts from it:
  199.       <script src="http://_SERVER['HOST']/misc/jquery.js?v=1.4.4">  (Various)
  200. This vulnerability affects /js/main.js.
  201. Discovered by: Scripting (Host_Header_Attack.script).
  202. Attack details
  203. Host header evilhostrz1T6mvw.com was reflected inside a A tag (href attribute).
  204.  
  205. GET /js/main.js HTTP/1.1
  206. Host: evilhostrz1T6mvw.com
  207. X-Forwarded-Host: www.sudania24.tv
  208. Connection: Keep-alive
  209. Accept-Encoding: gzip,deflate
  210. User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
  211. Accept: */*
  212.  
  213. ===================================================================================================
  214.  
  215.     HOST HEADER ATTACK
  216.  
  217.      <link href="http://_SERVER['HOST']"    (Joomla)
  218. ...and append secret keys and tokens to links containing it:
  219.     <a href="http://_SERVER['HOST']?token=topsecret">  (Django, Gallery, others)
  220. ....and even directly import scripts from it:
  221.       <script src="http://_SERVER['HOST']/misc/jquery.js?v=1.4.4">  (Various)
  222. This vulnerability affects /js/jquery.min.js.
  223. Discovered by: Scripting (Host_Header_Attack.script).
  224. Attack details
  225. Host header evilhostKVrGZC3C.com was reflected inside a A tag (href attribute).
  226.  
  227. GET /js/jquery.min.js HTTP/1.1
  228. Host: evilhostKVrGZC3C.com
  229. X-Forwarded-Host: www.sudania24.tv
  230. Connection: Keep-alive
  231. Accept-Encoding: gzip,deflate
  232. User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
  233. Accept: */*
  234.  
  235. ===================================================================================================
  236.  
  237.     HOST HEADER ATTACK
  238.  
  239.      <link href="http://_SERVER['HOST']"    (Joomla)
  240. ...and append secret keys and tokens to links containing it:
  241.     <a href="http://_SERVER['HOST']?token=topsecret">  (Django, Gallery, others)
  242. ....and even directly import scripts from it:
  243.       <script src="http://_SERVER['HOST']/misc/jquery.js?v=1.4.4">  (Various)
  244.  
  245. This vulnerability affects /js/html5shiv.min.js.
  246. Discovered by: Scripting (Host_Header_Attack.script).
  247. Attack details
  248. Host header evilhostmtKHkMUs.com was reflected inside a A tag (href attribute).
  249.  
  250. GET /js/html5shiv.min.js HTTP/1.1
  251. Host: evilhostmtKHkMUs.com
  252. X-Forwarded-Host: www.sudania24.tv
  253. Connection: Keep-alive
  254. Accept-Encoding: gzip,deflate
  255. User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
  256. Accept: */*
  257.  
  258. ===================================================================================================
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top