Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ____ _
- | _ \ _ __ _ _ _____ __ __ _| | ___ _
- | |_) | '__| | | |_ / '__/ _` | |/ / | | |
- | __/| | | |_| |/ /| | | (_| | <| |_| |
- |_| |_| \__, /___|_| \__,_|_|\_\\__, |
- |___/ |___/
- 24 Sudanês: http://www.sudania24.tv/
- dia yang menanam ketidakadilan akan menuai kesengsaraan.
- dia yang menanam ketidakadilan akan menuai kesengsaraan.
- dia yang menanam ketidakadilan akan menuai kesengsaraan.
- dia yang menanam ketidakadilan akan menuai kesengsaraan.
- INFORMATION'S BY: AL1NE3737
- Somos: Al1ne3737, PopTart, shap3r, Dext3r, Ergo, Mecz1nho, TkaTheGod, Asahi, mxc, Xoha.
- ===================================================================================================
- | Domain: http://www.sudania24.tv/
- | Server: Apache
- | IP: 88.208.206.75
- | VirtualHost: webmail.sudania24.tv
- | http://www.sudania24.tv/mailman/listinfo
- ===================================================================================================
- The files listed below had the slowest response times measured during the crawling process. The average response
- time for this site was 193,47 ms. These files could be targetted in denial of service attacks.
- 1. /wp, response time 1906 ms
- ===================================================================================================
- | File check:
- | [+] CODE: 200 URL: http://www.sudania24.tv/index.html
- | [+] CODE: 200 URL: http://www.sudania24.tv/mailman/listinfo
- | [+] CODE: 200 URL: http://www.sudania24.tv/webmail/blank.html
- | [+] CODE: 200 URL: http://www.sudania24.tv/webmail/horde/test.php
- | [+] CODE: 200 URL: http://www.sudania24.tv/webmail/src/configtest.php
- | [+] CODE: 200 URL: http://www.sudania24.tv/webmail/src/read_body.php
- | [+] CODE: 200 URL: http://www.sudania24.tv/webmail/lib/emailreader_execute_on_each_page.inc.php
- ===================================================================================================
- Found 10 domains hosted on the same web server as www.sudania24.tv (88.208.206.75).
- phone.addresses.com
- phone.intelius.com
- sapphiresystems.com.au
- server88-208-206-75.live-servers.net
- starsinmyeyes.tv
- sudania24.net
- sudania24.tv
- www.ocinkjet.com
- www.starsinmyeyes.tvwww.sudania24.tv
- ===================================================================================================
- Registrar Info
- NameTUCOWS, INC.
- Whois Serverwhois.tucows.com
- Referral URLhttp://tucowsdomains.com
- Status clientTransferProhibited
- clientUpdateProhibited
- Important Dates
- Expires On2020-02-14
- Registered On2016-02-14
- Updated On2019-01-30
- Name Servers
- ns1.sudania24.net 88.208.206.75
- ns2.sudania24.net 88.208.206.75
- Similar Domains
- sudan-4-all.org | sudan-6rab.com | sudan-air.com | sudan-airlines.com | sudan-all.com |
- sudan-ap.org | sudan-apartments.com | sudan-archive.com | sudan-archive.org | sudan-b2b.com |
- sudan-bazar.com | sudan-blog.com | sudan-bloglink.com | sudan-bucharest.ro | sudan-build.net |
- sudan-business-consultants.com | sudan-business-services.com | sudan-business.com | sudan-c-z.com | sudan-c-z.net |
- Registrant Contact Information:
- NameContact Privacy Inc. Customer 0142349647
- OrganizationContact Privacy Inc. Customer 0142349647
- Address96 Mowat Ave
- CityToronto
- State / ProvinceON
- Postal CodeM6K 3M1
- CountryCA
- Phone+1.4165385457
- Email
- Administrative Contact Information:
- NameContact Privacy Inc. Customer 0142349647
- OrganizationContact Privacy Inc. Customer 0142349647
- Address96 Mowat Ave
- CityToronto
- State / ProvinceON
- Postal CodeM6K 3M1
- CountryCA
- Phone+1.4165385457
- Email
- Technical Contact Information:
- NameContact Privacy Inc. Customer 0142349647
- OrganizationContact Privacy Inc. Customer 0142349647
- Address96 Mowat Ave
- CityToronto
- State / ProvinceON
- Postal CodeM6K 3M1
- CountryCA
- Phone+1.4165385457
- Email
- ===================================================================================================
- Sub Domains :D
- www.sudania24.tv
- Yahoo: www.sudania24.tv
- sudania24.sudania24.tv
- www.sudania24.sudania24.tv
- sudania24tv.sudania24.tv
- www.sudania24tv.sudania24.tv
- sudania2ffm.sudania24.tv
- www.sudania2ffm.sudania24.tv
- cpanel.sudania24.tv
- mail.sudania24.tv
- webdisk.sudania24.tv
- webmail.sudania24.tv
- www.sudania24.tv
- sudania24tv.sudania24.tv
- sudania24.sudania24.tv
- webdisk.sudania24.tv
- www.sudania24tv.sudania24.tv
- www.sudania2ffm.sudania24.tv
- webmail.sudania24.tv
- cpanel.sudania24.tv
- sudania2ffm.sudania24.tv
- www.sudania24.sudania24.tv
- ===================================================================================================
- List of plugins installed for WordPress /wp/:
- wordpress-importer version 0.6.1 (latest N/A)
- contact-form-7 version 4.4.2 (latest N/A)
- woocommerce version 2.6.1 (latest N/A)
- instanow version (latest N/A)
- taqyeem version (latest N/A)
- taqyeem-buttons version (latest N/A)
- ===================================================================================================
- ============================== VULNERABILITY ======================================================
- HOST HEADER ATTACK
- <link href="http://_SERVER['HOST']" (Joomla)
- ...and append secret keys and tokens to links containing it:
- <a href="http://_SERVER['HOST']?token=topsecret"> (Django, Gallery, others)
- ....and even directly import scripts from it:
- <script src="http://_SERVER['HOST']/misc/jquery.js?v=1.4.4"> (Various)
- This vulnerability affects /style.css.
- Discovered by: Scripting (Host_Header_Attack.script).
- Attack details
- Host header evilhost6s0VX1ca.com was reflected inside a A tag (href attribute).
- GET /style.css HTTP/1.1
- Host: evilhost6s0VX1ca.com
- X-Forwarded-Host: www.sudania24.tv
- Connection: Keep-alive
- Accept-Encoding: gzip,deflate
- User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
- Accept: */*
- ===================================================================================================
- HOST HEADER ATTACK
- <link href="http://_SERVER['HOST']" (Joomla)
- ...and append secret keys and tokens to links containing it:
- <a href="http://_SERVER['HOST']?token=topsecret"> (Django, Gallery, others)
- ....and even directly import scripts from it:
- <script src="http://_SERVER['HOST']/misc/jquery.js?v=1.4.4"> (Various)
- This vulnerability affects /js/main.js.
- Discovered by: Scripting (Host_Header_Attack.script).
- Attack details
- Host header evilhostrz1T6mvw.com was reflected inside a A tag (href attribute).
- GET /js/main.js HTTP/1.1
- Host: evilhostrz1T6mvw.com
- X-Forwarded-Host: www.sudania24.tv
- Connection: Keep-alive
- Accept-Encoding: gzip,deflate
- User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
- Accept: */*
- ===================================================================================================
- HOST HEADER ATTACK
- <link href="http://_SERVER['HOST']" (Joomla)
- ...and append secret keys and tokens to links containing it:
- <a href="http://_SERVER['HOST']?token=topsecret"> (Django, Gallery, others)
- ....and even directly import scripts from it:
- <script src="http://_SERVER['HOST']/misc/jquery.js?v=1.4.4"> (Various)
- This vulnerability affects /js/jquery.min.js.
- Discovered by: Scripting (Host_Header_Attack.script).
- Attack details
- Host header evilhostKVrGZC3C.com was reflected inside a A tag (href attribute).
- GET /js/jquery.min.js HTTP/1.1
- Host: evilhostKVrGZC3C.com
- X-Forwarded-Host: www.sudania24.tv
- Connection: Keep-alive
- Accept-Encoding: gzip,deflate
- User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
- Accept: */*
- ===================================================================================================
- HOST HEADER ATTACK
- <link href="http://_SERVER['HOST']" (Joomla)
- ...and append secret keys and tokens to links containing it:
- <a href="http://_SERVER['HOST']?token=topsecret"> (Django, Gallery, others)
- ....and even directly import scripts from it:
- <script src="http://_SERVER['HOST']/misc/jquery.js?v=1.4.4"> (Various)
- This vulnerability affects /js/html5shiv.min.js.
- Discovered by: Scripting (Host_Header_Attack.script).
- Attack details
- Host header evilhostmtKHkMUs.com was reflected inside a A tag (href attribute).
- GET /js/html5shiv.min.js HTTP/1.1
- Host: evilhostmtKHkMUs.com
- X-Forwarded-Host: www.sudania24.tv
- Connection: Keep-alive
- Accept-Encoding: gzip,deflate
- User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
- Accept: */*
- ===================================================================================================
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement