Advertisement
Guest User

DevDripzie DOX

a guest
Feb 27th, 2018
128
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 140.60 KB | None | 0 0
  1. ==============================================
  2. *********DOXED BY ANONYMOUS*****
  3. ==============================================
  4. Owner: DevDripzie#8879
  5. Email: devdripzieinc@gmail.com
  6. ==============================================
  7. Websites & Profiles:
  8. Old ass: https://odripzieinccontrollers.site123.me/
  9. Old 2017 Website: https://devdripzieinc.wordpress.com/
  10. Website URL: https://skidbooter.com
  11. Profile: https://www.nulled.to/user/1362835-devdripzie
  12. Profile Twitch: https://www.twitch.tv/odripzie
  13. ==============================================
  14. Twitter 1: https://twitter.com/devdripzie
  15. Twitter 2: https://twitter.com/odripzie5
  16. Twitter 3: https://twitter.com/DripzieInc
  17. Twitter 4: https://twitter.com/oDripzieInc
  18. Joined March 2017
  19. "Tweets The latest Tweets from Dev Dripzie
  20. (@DevDripzie). Web Developer
  21. NFO/VPN Seller Xbox Modder NFO Spots -
  22. $5 a Month VPN Spots - $3 a Month Bo2 Recovery
  23. $3 Ghost Camo - $2."
  24. ENJOY FAGGOT!!
  25. ================================================================================================================================
  26. Vulnerability Scan of his website very shitty
  27. ======================================================================================================================================
  28. skidbooter.com
  29. Scan time
  30. Scan started
  31. 2018-02-27 03:44
  32. Scan finished
  33. 2018-02-27 07:12
  34. Finding summary
  35. Email Spoofing / Missing SPF
  36. Record
  37. 1
  38. Login Cross Site Request
  39. Forgery (CSRF/XSRF)
  40. 2
  41. Unencrypted Login Sessions 3
  42. Directory Listing 8
  43. CSRF Token Leakage Through
  44. HTTP GET
  45. 4
  46. Technology Disclosure 2
  47. Script Integrity Attribute Not
  48. Implemented
  49. 4
  50. Invalid HTML Content 2
  51. Referrer-Policy Not
  52. Implemented
  53. 5
  54. Empty Document 2
  55. Crawled URL's 1
  56. Discovered Host(s) 1
  57. Email Enumeration 1
  58. External Resources 2
  59. Fingerprinted Software 2
  60. Scan settings
  61. Scan subdomains Yes
  62. Scan as device Detectify
  63. HTML Comments 2
  64. Lacking DMARC Policy 1
  65. Missing Content Type 6
  66. Remote Administration Portal 4
  67. Service Providers 1
  68. Content Sniffing 34
  69. Email Spoofing / Missing SPF Record
  70. What does this mean?
  71. The domain lacks a DNS SPF policy record. SPF policies must to be applied on every domain
  72. (including subdomains) having either an A, AAAA or MX record.
  73. here (http://support.detectify.com/customer/en/portal/articles/2166468-missing-spf-record).
  74. here
  75. (https://support.detectify.com/customer/en/portal/articles/2466214-missing-insufficient-dmarc-record).
  76. What can happen?
  77. An attacker will be able to spoof emails originating from the domain, allowing for phishing attacks or
  78. other scams.
  79. Summary
  80. Entry Found at CVSS
  81. 1 skidbooter.com 6.2
  82. 1. Email Spoofing / Missing SPF Record
  83. Summary
  84. Found At
  85. skidbooter.com
  86. CVSS
  87. 6.2 of 10.0
  88. Resources
  89. REMEDIATION - Detectify Support Center - Missing/insufficient SPF record
  90. DETECTIFY - Misconfigured email servers open the door to spoofed emails from top domains
  91. DETECTIFY - How to identify a phishing email
  92. MISC - SPF Validator (dmarcanalyzer.com)
  93. Login Cross Site Request Forgery (CSRF/XSRF)
  94. What does this mean?
  95. The web site seems to be lacking CSRF token on a login form.
  96. our knowledge base (http://support.detectify.com/customer/portal/articles/1969819-login-csrf).
  97. What can happen?
  98. An attacker can force an unsuspecting user to sign in to the attacker's account. What can be done
  99. from there depends on the application. Example: An attacker can force an unsuspecting user to login
  100. to the attacker's account and when the user buys something, the credit card is added to the attacker's
  101. account.
  102. Summary
  103. Entry Found at CVSS
  104. 1 http://skidbooter.com/register.php 6.2
  105. 2 https://skidbooter.com/register.php 6.2
  106. 1. Login Cross Site Request Forgery (CSRF/XSRF)
  107. Summary
  108. Found At
  109. http://skidbooter.com/register.php
  110. CVSS
  111. 6.2 of 10.0
  112. Request Headers
  113. GET /register.php HTTP/1.1
  114. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  115. Upgrade-Insecure-Requests1
  116. User-Agent Mozilla/5.0 (compatible; Detectify)
  117. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  118. Accept-Encoding gzip, deflate
  119. Accept-Language en-US
  120. Response Headers
  121. HTTP/ 1.1 200 OK
  122. Transfer-Encoding chunked
  123. Cache-Control no-store, no-cache, must-revalidate
  124. Server cloudflare
  125. CF-RAY 3f383f06059e6a9d-LHR
  126. Connection keep-alive
  127. Content-Encoding gzip
  128. Vary Accept-Encoding
  129. Expires Thu, 19 Nov 1981 08:52:00 GMT
  130. Pragma no-cache
  131. Date Tue, 27 Feb 2018 04:02:01 GMT
  132. Content-Type text/html; charset=UTF-8
  133. <form class="js-validation-register form-horizontal push-50-t push-50" method="post"
  134. novalidate="novalidate">
  135. <div class="form-group">
  136. <div class="col-xs-12">
  137. <div class="form-material form-material-success">
  138. <input required="" class="form-control" type="text"
  139. id="register-username" name="register-username" placeholder="Please enter a username">
  140. <label for="register-username">Username</label>
  141. </div>
  142. </div>
  143. </div>
  144. <div class="form-group">
  145. <div class="col-xs-12">
  146. <div class="form-material form-material-success">
  147. <input required="" class="form-control" type="email"
  148. id="register-email" name="register-email" placeholder="Please provide your email">
  149. <label for="register-email">Email</label>
  150. </div>
  151. </div>
  152. </div>
  153. <div class="form-group">
  154. <div class="col-xs-12">
  155. <div class="form-material form-material-success">
  156. <input required="" class="form-control" type="password"
  157. id="register-password" name="register-password" placeholder="Choose a strong password">
  158. <label for="register-password">Password</label>
  159. </div>
  160. </div>
  161. </div>
  162. <div class="form-group">
  163. <div class="col-xs-12">
  164. <div class="form-material form-material-success">
  165. <input required="" class="form-control" type="password"
  166. id="register-password2" name="register-password2" placeholder="..and confirm it">
  167. <label for="register-password2">Confirm Password</label>
  168. </div>
  169. </div>
  170. </div>
  171. <div class="form-group">
  172. <div class="col-xs-12" style="margin-left: auto; margin-right: auto;">
  173. <div class="g-recaptcha"
  174. data-sitekey="6LdtNkgUAAAAAPsb4DIUmk168GiysqZrZSFOtbnY"></div>
  175. </div>
  176. </div>
  177. <div class="form-group">
  178. <div class="col-xs-12">
  179. <label class="css-input switch switch-sm switch-success">
  180. <input required="" type="checkbox" id="register-terms"
  181. name="register-terms"><span></span> I agree with terms &amp; conditions
  182. </label>
  183. </div>
  184. </div>
  185. <div class="form-group">
  186. <div class="col-xs-12 col-sm-6 col-md-5">
  187. <button name="doCreate" value="create" class="btn btn-block
  188. btn-success" type="submit"><i class="fa fa-plus pull-right"></i> Sign Up</button>
  189. </div>
  190. </div>
  191. </form>
  192. Resources
  193. REMEDIATION - Detectify Support Center - Login CSRF
  194. REMEDIATION - Detectify Support Center - CSRF
  195. STACK OVERFLOW - How to protect against login CSRF?
  196. VIDEO - What is a CSRF?
  197. 1. Login Cross Site Request Forgery (CSRF/XSRF)
  198. Summary
  199. Found At
  200. https://skidbooter.com/register.php
  201. CVSS
  202. 6.2 of 10.0
  203. Request Headers
  204. GET /register.php HTTP/1.1
  205. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  206. Upgrade-Insecure-Requests1
  207. User-Agent Mozilla/5.0 (compatible; Detectify)
  208. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  209. Accept-Encoding gzip, deflate
  210. Accept-Language en-US
  211. Response Headers
  212. HTTP/ 1.1 200 OK
  213. Transfer-Encoding chunked
  214. Server cloudflare
  215. CF-RAY 3f383bd6cb3969d7-LHR
  216. Connection keep-alive
  217. Pragma no-cache
  218. Date Tue, 27 Feb 2018 03:59:50 GMT
  219. Cache-Control no-store, no-cache, must-revalidate
  220. Content-Encoding gzip
  221. Set-Cookie PHPSESSID=18n1ckqomkpbrhklpjhtltpl44; path=/
  222. Vary Accept-Encoding
  223. Expires Thu, 19 Nov 1981 08:52:00 GMT
  224. Content-Type text/html; charset=UTF-8
  225. Expect-CT max-age=604800,
  226. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  227. <form class="js-validation-register form-horizontal push-50-t push-50" method="post"
  228. novalidate="novalidate">
  229. <div class="form-group">
  230. <div class="col-xs-12">
  231. <div class="form-material form-material-success">
  232. <input required="" class="form-control" type="text"
  233. id="register-username" name="register-username" placeholder="Please enter a username">
  234. <label for="register-username">Username</label>
  235. </div>
  236. </div>
  237. </div>
  238. <div class="form-group">
  239. <div class="col-xs-12">
  240. <div class="form-material form-material-success">
  241. <input required="" class="form-control" type="email"
  242. id="register-email" name="register-email" placeholder="Please provide your email">
  243. <label for="register-email">Email</label>
  244. </div>
  245. </div>
  246. </div>
  247. <div class="form-group">
  248. <div class="col-xs-12">
  249. <div class="form-material form-material-success">
  250. <input required="" class="form-control" type="password"
  251. id="register-password" name="register-password" placeholder="Choose a strong password">
  252. <label for="register-password">Password</label>
  253. </div>
  254. </div>
  255. </div>
  256. <div class="form-group">
  257. <div class="col-xs-12">
  258. <div class="form-material form-material-success">
  259. <input required="" class="form-control" type="password"
  260. id="register-password2" name="register-password2" placeholder="..and confirm it">
  261. <label for="register-password2">Confirm Password</label>
  262. </div>
  263. </div>
  264. </div>
  265. <div class="form-group">
  266. <div class="col-xs-12" style="margin-left: auto; margin-right: auto;">
  267. <div class="g-recaptcha"
  268. data-sitekey="6LdtNkgUAAAAAPsb4DIUmk168GiysqZrZSFOtbnY"></div>
  269. </div>
  270. </div>
  271. <div class="form-group">
  272. <div class="col-xs-12">
  273. <label class="css-input switch switch-sm switch-success">
  274. <input required="" type="checkbox" id="register-terms"
  275. name="register-terms"><span></span> I agree with terms &amp; conditions
  276. </label>
  277. </div>
  278. </div>
  279. <div class="form-group">
  280. <div class="col-xs-12 col-sm-6 col-md-5">
  281. <button name="doCreate" value="create" class="btn btn-block
  282. btn-success" type="submit"><i class="fa fa-plus pull-right"></i> Sign Up</button>
  283. </div>
  284. </div>
  285. </form>
  286. Resources
  287. REMEDIATION - Detectify Support Center - Login CSRF
  288. REMEDIATION - Detectify Support Center - CSRF
  289. STACK OVERFLOW - How to protect against login CSRF?
  290. VIDEO - What is a CSRF?
  291. Unencrypted Login Sessions
  292. What does this mean?
  293. The login form isn't using HTTPS.
  294. here (http://support.detectify.com/customer/portal/articles/2792104-unencrypted-login-sessions).
  295. What can happen?
  296. An attacker can, if intercepting the traffic, read login credentials in plain text.
  297. Summary
  298. Entry Found at CVSS
  299. 1 http://skidbooter.com/phpmyadmin/ 5.5
  300. 2 http://skidbooter.com/phpmyadmin/index.php 5.5
  301. 3 http://skidbooter.com/register.php 5.5
  302. 1. Unencrypted Login Sessions
  303. Summary
  304. Found At
  305. http://skidbooter.com/phpmyadmin/
  306. CVSS
  307. 5.5 of 10.0
  308. Request Headers
  309. GET /phpmyadmin/ HTTP/1.1
  310. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  311. Upgrade-Insecure-Requests1
  312. User-Agent Mozilla/5.0 (compatible; Detectify)
  313. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  314. Accept-Encoding gzip, deflate
  315. Accept-Language en-US
  316. Response Headers
  317. HTTP/ 1.1 200 OK
  318. Transfer-Encoding chunked
  319. Server cloudflare
  320. CF-RAY 3f383dcbd49e6ba3-LHR
  321. Connection keep-alive
  322. Last-Modified Tue, 27 Feb 2018 04:02:13 +0000
  323. X-Content-Security-Policy default-src 'self' ;options inline-script eval-script;img-src 'self' data:
  324. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  325. Pragma no-cache
  326. X-ob_mode 0
  327. Date Tue, 27 Feb 2018 04:01:11 GMT
  328. X-WebKit-CSP default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer
  329. no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data:
  330. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  331. X-Frame-Options DENY
  332. Cache-Control no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
  333. Content-Security-Policy default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self'
  334. 'unsafe-inline' ;referrer no-referrer;img-src 'self' data:
  335. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  336. Content-Encoding gzip
  337. Set-Cookie phpMyAdmin=eu17m73p9v9uf8clqgjpmumleeoha6pr; path=/phpmyadmin/;
  338. HttpOnly
  339. Vary Accept-Encoding
  340. Expires Tue, 27 Feb 2018 04:02:13 +0000
  341. Content-Type text/html; charset=utf-8
  342. <form method="post" action="index.php" name="login_form" class="disableAjax login hide
  343. js-show">
  344. <fieldset>
  345. <legend>Log in<a
  346. href="./url.php?url=http%3A%2F%2Fdocs.phpmyadmin.net%2Fen%2Flatest%2Findex.html"
  347. target="documentation"><img src="themes/dot.gif" title="Documentation" alt="Documentation"
  348. class="icon ic_b_help"></a></legend><div class="item">
  349. <label for="input_username">Username:</label>
  350. <input type="text" name="pma_username" id="input_username" value="" size="24"
  351. class="textfield">
  352. </div>
  353. <div class="item">
  354. <label for="input_password">Password:</label>
  355. <input type="password" name="pma_password" id="input_password" value=""
  356. size="24" class="textfield">
  357. </div> <input type="hidden" name="server" value="1"></fieldset>
  358. <fieldset class="tblFooters">
  359. <input value="Go" type="submit" id="input_go"><input type="hidden" name="target"
  360. value="index.php"><input type="hidden" name="lang" value="en"><input type="hidden"
  361. name="collation_connection" value="utf8_general_ci"><input type="hidden" name="token"
  362. value="561988dc337f5e14462e9e1d9d786982"></fieldset>
  363. </form>
  364. Resources
  365. REMEDIATION - Detectify Support Center - Unencrypted Login Sessions
  366. OWASP - Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-003)
  367. 1. Unencrypted Login Sessions
  368. Summary
  369. Found At
  370. http://skidbooter.com/phpmyadmin/index.php
  371. CVSS
  372. 5.5 of 10.0
  373. Request Headers
  374. GET
  375. /phpmyadmin/index.php?db=&table=&token=26ca6934e2761ab5d3c53cf3f82f1f5d&lang=ia
  376. HTTP/1.1
  377. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  378. Upgrade-Insecure-Requests1
  379. User-Agent Mozilla/5.0 (compatible; Detectify)
  380. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  381. Accept-Encoding gzip, deflate
  382. Accept-Language en-US
  383. Response Headers
  384. HTTP/ 1.1 200 OK
  385. Transfer-Encoding chunked
  386. Server cloudflare
  387. CF-RAY 3f383f8332976b55-LHR
  388. Connection keep-alive
  389. Last-Modified Tue, 27 Feb 2018 04:03:24 +0000
  390. X-Content-Security-Policy default-src 'self' ;options inline-script eval-script;img-src 'self' data:
  391. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  392. Pragma no-cache
  393. X-ob_mode 0
  394. Date Tue, 27 Feb 2018 04:02:21 GMT
  395. X-WebKit-CSP default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer
  396. no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data:
  397. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  398. X-Frame-Options DENY
  399. Cache-Control no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
  400. Content-Security-Policy default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self'
  401. 'unsafe-inline' ;referrer no-referrer;img-src 'self' data:
  402. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  403. Content-Encoding gzip
  404. Set-Cookie pma_lang=ia; expires=Thu, 29-Mar-2018 04:03:24 GMT; Max-Age=2592000;
  405. path=/phpmyadmin/; HttpOnly
  406. Vary Accept-Encoding
  407. Expires Tue, 27 Feb 2018 04:03:24 +0000
  408. Content-Type text/html; charset=utf-8
  409. <form method="post" action="index.php" name="login_form" class="disableAjax login hide
  410. js-show">
  411. <fieldset>
  412. <legend>Log in<a
  413. href="./url.php?url=http%3A%2F%2Fdocs.phpmyadmin.net%2Fen%2Flatest%2Findex.html"
  414. target="documentation"><img src="themes/dot.gif" title="Documentation" alt="Documentation"
  415. class="icon ic_b_help"></a></legend><div class="item">
  416. <label for="input_username">Username:</label>
  417. <input type="text" name="pma_username" id="input_username" value="" size="24"
  418. class="textfield">
  419. </div>
  420. <div class="item">
  421. <label for="input_password">Contrasigno:</label>
  422. <input type="password" name="pma_password" id="input_password" value=""
  423. size="24" class="textfield">
  424. </div> <input type="hidden" name="server" value="1"></fieldset>
  425. <fieldset class="tblFooters">
  426. <input value="Vade" type="submit" id="input_go"><input type="hidden" name="target"
  427. value="index.php"><input type="hidden" name="token"
  428. value="ed03f5241d278db93cac7a89eb07c6e2"></fieldset>
  429. </form>
  430. Resources
  431. REMEDIATION - Detectify Support Center - Unencrypted Login Sessions
  432. OWASP - Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-003)
  433. 1. Unencrypted Login Sessions
  434. Summary
  435. Found At
  436. http://skidbooter.com/register.php
  437. CVSS
  438. 5.5 of 10.0
  439. Request Headers
  440. GET /register.php HTTP/1.1
  441. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  442. Upgrade-Insecure-Requests1
  443. User-Agent Mozilla/5.0 (compatible; Detectify)
  444. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  445. Accept-Encoding gzip, deflate
  446. Accept-Language en-US
  447. Response Headers
  448. HTTP/ 1.1 200 OK
  449. Transfer-Encoding chunked
  450. Cache-Control no-store, no-cache, must-revalidate
  451. Server cloudflare
  452. CF-RAY 3f383f06059e6a9d-LHR
  453. Connection keep-alive
  454. Content-Encoding gzip
  455. Vary Accept-Encoding
  456. Expires Thu, 19 Nov 1981 08:52:00 GMT
  457. Pragma no-cache
  458. Date Tue, 27 Feb 2018 04:02:01 GMT
  459. Content-Type text/html; charset=UTF-8
  460. <form class="js-validation-register form-horizontal push-50-t push-50" method="post"
  461. novalidate="novalidate">
  462. <div class="form-group">
  463. <div class="col-xs-12">
  464. <div class="form-material form-material-success">
  465. <input required="" class="form-control" type="text"
  466. id="register-username" name="register-username" placeholder="Please enter a username">
  467. <label for="register-username">Username</label>
  468. </div>
  469. </div>
  470. </div>
  471. <div class="form-group">
  472. <div class="col-xs-12">
  473. <div class="form-material form-material-success">
  474. <input required="" class="form-control" type="email"
  475. id="register-email" name="register-email" placeholder="Please provide your email">
  476. <label for="register-email">Email</label>
  477. </div>
  478. </div>
  479. </div>
  480. <div class="form-group">
  481. <div class="col-xs-12">
  482. <div class="form-material form-material-success">
  483. <input required="" class="form-control" type="password"
  484. id="register-password" name="register-password" placeholder="Choose a strong password">
  485. <label for="register-password">Password</label>
  486. </div>
  487. </div>
  488. </div>
  489. <div class="form-group">
  490. <div class="col-xs-12">
  491. <div class="form-material form-material-success">
  492. <input required="" class="form-control" type="password"
  493. id="register-password2" name="register-password2" placeholder="..and confirm it">
  494. <label for="register-password2">Confirm Password</label>
  495. </div>
  496. </div>
  497. </div>
  498. <div class="form-group">
  499. <div class="col-xs-12" style="margin-left: auto; margin-right: auto;">
  500. <div class="g-recaptcha"
  501. data-sitekey="6LdtNkgUAAAAAPsb4DIUmk168GiysqZrZSFOtbnY"></div>
  502. </div>
  503. </div>
  504. <div class="form-group">
  505. <div class="col-xs-12">
  506. <label class="css-input switch switch-sm switch-success">
  507. <input required="" type="checkbox" id="register-terms"
  508. name="register-terms"><span></span> I agree with terms &amp; conditions
  509. </label>
  510. </div>
  511. </div>
  512. <div class="form-group">
  513. <div class="col-xs-12 col-sm-6 col-md-5">
  514. <button name="doCreate" value="create" class="btn btn-block
  515. btn-success" type="submit"><i class="fa fa-plus pull-right"></i> Sign Up</button>
  516. </div>
  517. </div>
  518. </form>
  519. Resources
  520. REMEDIATION - Detectify Support Center - Unencrypted Login Sessions
  521. OWASP - Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-003)
  522. Directory Listing
  523. What does this mean?
  524. Directory Listing is enabled which means an attacker can see all files in a directory.
  525. What can happen?
  526. An attacker can use this to discover sensitive files.
  527. Summary
  528. Entry Found at CVSS
  529. 1 http://skidbooter.com/assets/ 5
  530. 2 http://skidbooter.com/assets/ 5
  531. 3 http://skidbooter.com/assets/css/ 5
  532. 4 http://skidbooter.com/assets/css/ 5
  533. 5 http://skidbooter.com/assets/fonts/ 5
  534. 6 http://skidbooter.com/assets/fonts/ 5
  535. 7 https://skidbooter.com/ajax/ 5
  536. 8 https://skidbooter.com/ajax/ 5
  537. 1. Directory Listing
  538. Summary
  539. Found At
  540. http://skidbooter.com/assets/
  541. CVSS
  542. 5 of 10.0
  543. Request Headers
  544. GET /assets/ HTTP/1.1
  545. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  546. Upgrade-Insecure-Requests1
  547. User-Agent Mozilla/5.0 (compatible; Detectify)
  548. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  549. Accept-Encoding gzip, deflate
  550. Accept-Language en-US
  551. Response Headers
  552. HTTP/ 1.1 200 OK
  553. Transfer-Encoding chunked
  554. Server cloudflare
  555. CF-RAY 3f383d56b2536ba3-LHR
  556. Connection keep-alive
  557. Content-Encoding gzip
  558. Vary Accept-Encoding
  559. Date Tue, 27 Feb 2018 04:00:52 GMT
  560. Content-Type text/html;charset=UTF-8
  561. Resources
  562. STACKEXCHANGE - Is it dangerous to allow user to view a file directory via web browser?
  563. 1. Directory Listing
  564. Summary
  565. Found At
  566. http://skidbooter.com/assets/
  567. CVSS
  568. 5 of 10.0
  569. Request Headers
  570. GET /assets/?C=D;O=A HTTP/1.1
  571. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  572. Upgrade-Insecure-Requests1
  573. User-Agent Mozilla/5.0 (compatible; Detectify)
  574. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  575. Accept-Encoding gzip, deflate
  576. Accept-Language en-US
  577. Response Headers
  578. HTTP/ 1.1 200 OK
  579. Transfer-Encoding chunked
  580. Server cloudflare
  581. CF-RAY 3f38562e65da6b55-LHR
  582. Connection keep-alive
  583. Content-Encoding gzip
  584. Vary Accept-Encoding
  585. Date Tue, 27 Feb 2018 04:17:49 GMT
  586. Content-Type text/html;charset=UTF-8
  587. Resources
  588. STACKEXCHANGE - Is it dangerous to allow user to view a file directory via web browser?
  589. 1. Directory Listing
  590. Summary
  591. Found At
  592. http://skidbooter.com/assets/css/
  593. CVSS
  594. 5 of 10.0
  595. Request Headers
  596. GET /assets/css/ HTTP/1.1
  597. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  598. Upgrade-Insecure-Requests1
  599. User-Agent Mozilla/5.0 (compatible; Detectify)
  600. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  601. Accept-Encoding gzip, deflate
  602. Accept-Language en-US
  603. Response Headers
  604. HTTP/ 1.1 200 OK
  605. Transfer-Encoding chunked
  606. Server cloudflare
  607. CF-RAY 3f385639e05c6b55-LHR
  608. Connection keep-alive
  609. Content-Encoding gzip
  610. Vary Accept-Encoding
  611. Date Tue, 27 Feb 2018 04:17:51 GMT
  612. Content-Type text/html;charset=UTF-8
  613. Resources
  614. STACKEXCHANGE - Is it dangerous to allow user to view a file directory via web browser?
  615. 1. Directory Listing
  616. Summary
  617. Found At
  618. http://skidbooter.com/assets/css/
  619. CVSS
  620. 5 of 10.0
  621. Request Headers
  622. GET /assets/css/?C=S;O=A HTTP/1.1
  623. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  624. Upgrade-Insecure-Requests1
  625. User-Agent Mozilla/5.0 (compatible; Detectify)
  626. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  627. Accept-Encoding gzip, deflate
  628. Accept-Language en-US
  629. Response Headers
  630. HTTP/ 1.1 200 OK
  631. Transfer-Encoding chunked
  632. Server cloudflare
  633. CF-RAY 3f38566a22bb6b55-LHR
  634. Connection keep-alive
  635. Content-Encoding gzip
  636. Vary Accept-Encoding
  637. Date Tue, 27 Feb 2018 04:17:59 GMT
  638. Content-Type text/html;charset=UTF-8
  639. Resources
  640. STACKEXCHANGE - Is it dangerous to allow user to view a file directory via web browser?
  641. 1. Directory Listing
  642. Summary
  643. Found At
  644. http://skidbooter.com/assets/fonts/
  645. CVSS
  646. 5 of 10.0
  647. Request Headers
  648. GET /assets/fonts/ HTTP/1.1
  649. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  650. Upgrade-Insecure-Requests1
  651. User-Agent Mozilla/5.0 (compatible; Detectify)
  652. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  653. Accept-Encoding gzip, deflate
  654. Accept-Language en-US
  655. Response Headers
  656. HTTP/ 1.1 200 OK
  657. Transfer-Encoding chunked
  658. Server cloudflare
  659. CF-RAY 3f38591856d66b55-LHR
  660. Connection keep-alive
  661. Content-Encoding gzip
  662. Vary Accept-Encoding
  663. Date Tue, 27 Feb 2018 04:19:49 GMT
  664. Content-Type text/html;charset=UTF-8
  665. Resources
  666. STACKEXCHANGE - Is it dangerous to allow user to view a file directory via web browser?
  667. 1. Directory Listing
  668. Summary
  669. Found At
  670. http://skidbooter.com/assets/fonts/
  671. CVSS
  672. 5 of 10.0
  673. Request Headers
  674. GET /assets/fonts/?C=M;O=A HTTP/1.1
  675. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  676. Upgrade-Insecure-Requests1
  677. User-Agent Mozilla/5.0 (compatible; Detectify)
  678. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  679. Accept-Encoding gzip, deflate
  680. Accept-Language en-US
  681. Response Headers
  682. HTTP/ 1.1 200 OK
  683. Transfer-Encoding chunked
  684. Server cloudflare
  685. CF-RAY 3f38593a86e86b55-LHR
  686. Connection keep-alive
  687. Content-Encoding gzip
  688. Vary Accept-Encoding
  689. Date Tue, 27 Feb 2018 04:19:54 GMT
  690. Content-Type text/html;charset=UTF-8
  691. Resources
  692. STACKEXCHANGE - Is it dangerous to allow user to view a file directory via web browser?
  693. 1. Directory Listing
  694. Summary
  695. Found At
  696. https://skidbooter.com/ajax/
  697. CVSS
  698. 5 of 10.0
  699. Request Headers
  700. GET /ajax/ HTTP/1.1
  701. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  702. Upgrade-Insecure-Requests1
  703. User-Agent Mozilla/5.0 (compatible; Detectify)
  704. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  705. Accept-Encoding gzip, deflate
  706. Accept-Language en-US
  707. Response Headers
  708. HTTP/ 1.1 200 OK
  709. Transfer-Encoding chunked
  710. Server cloudflare
  711. CF-RAY 3f383d992b6769fb-LHR
  712. Connection keep-alive
  713. Content-Encoding gzip
  714. Vary Accept-Encoding
  715. Date Tue, 27 Feb 2018 04:01:02 GMT
  716. Content-Type text/html;charset=UTF-8
  717. Expect-CT max-age=604800,
  718. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  719. Resources
  720. STACKEXCHANGE - Is it dangerous to allow user to view a file directory via web browser?
  721. 1. Directory Listing
  722. Summary
  723. Found At
  724. https://skidbooter.com/ajax/
  725. CVSS
  726. 5 of 10.0
  727. Request Headers
  728. GET /ajax/?C=M;O=A HTTP/1.1
  729. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  730. Upgrade-Insecure-Requests1
  731. User-Agent Mozilla/5.0 (compatible; Detectify)
  732. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  733. Accept-Encoding gzip, deflate
  734. Accept-Language en-US
  735. Response Headers
  736. HTTP/ 1.1 200 OK
  737. Transfer-Encoding chunked
  738. Server cloudflare
  739. CF-RAY 3f384cb34fa60b7b-LHR
  740. Connection keep-alive
  741. Content-Encoding gzip
  742. Vary Accept-Encoding
  743. Date Tue, 27 Feb 2018 04:11:21 GMT
  744. Content-Type text/html;charset=UTF-8
  745. Expect-CT max-age=604800,
  746. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  747. Resources
  748. STACKEXCHANGE - Is it dangerous to allow user to view a file directory via web browser?
  749. CSRF Token Leakage Through HTTP GET
  750. What does this mean?
  751. The CSRF token is in the GET-request.
  752. What can happen?
  753. The CSRF token may be leaked in several ways, such as in browser history and/or HTTP log files. If
  754. there is a link to an external site the token may also leak in the Referer header, which means the
  755. external site gets the victim's token.
  756. Summary
  757. Entry Found at CVSS
  758. 1 http://skidbooter.com/phpmyadmin/ 3.9
  759. 2 http://skidbooter.com/phpmyadmin/index.php 3.9
  760. 3 https://skidbooter.com/phpmyadmin/ 3.9
  761. 4 https://skidbooter.com/phpmyadmin/index.php 3.9
  762. 1. CSRF Token Leakage Through HTTP GET
  763. Summary
  764. Found At
  765. http://skidbooter.com/phpmyadmin/
  766. CVSS
  767. 3.9 of 10.0
  768. Request Headers
  769. GET /phpmyadmin/ HTTP/1.1
  770. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  771. Upgrade-Insecure-Requests1
  772. User-Agent Mozilla/5.0 (compatible; Detectify)
  773. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  774. Accept-Encoding gzip, deflate
  775. Accept-Language en-US
  776. Response Headers
  777. HTTP/ 1.1 200 OK
  778. Transfer-Encoding chunked
  779. Server cloudflare
  780. CF-RAY 3f383dcbd49e6ba3-LHR
  781. Connection keep-alive
  782. Last-Modified Tue, 27 Feb 2018 04:02:13 +0000
  783. X-Content-Security-Policy default-src 'self' ;options inline-script eval-script;img-src 'self' data:
  784. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  785. Pragma no-cache
  786. X-ob_mode 0
  787. Date Tue, 27 Feb 2018 04:01:11 GMT
  788. X-WebKit-CSP default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer
  789. no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data:
  790. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  791. X-Frame-Options DENY
  792. Cache-Control no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
  793. Content-Security-Policy default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self'
  794. 'unsafe-inline' ;referrer no-referrer;img-src 'self' data:
  795. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  796. Content-Encoding gzip
  797. Set-Cookie phpMyAdmin=eu17m73p9v9uf8clqgjpmumleeoha6pr; path=/phpmyadmin/;
  798. HttpOnly
  799. Vary Accept-Encoding
  800. Expires Tue, 27 Feb 2018 04:02:13 +0000
  801. Content-Type text/html; charset=utf-8
  802. <form method="get" action="index.php" class="disableAjax"><input type="hidden" name="db"
  803. value=""><input type="hidden" name="table" value=""><input type="hidden" name="lang"
  804. value="en"><input type="hidden" name="collation_connection" value="utf8_general_ci"><input
  805. type="hidden" name="token" value="561988dc337f5e14462e9e1d9d786982"><fieldset><legend
  806. lang="en" dir="ltr">Language</legend><select name="lang" class="autosubmit" lang="en"
  807. dir="ltr" id="sel-lang"><option
  808. value="ar">&#1575;&#1604;&#1593;&#1585;&#1576;&#1610;&#1577; - Arabic<option
  809. value="az">Az&#601;rbaycanca - Azerbaijani<option
  810. value="bg">&#1041;&#1098;&#1083;&#1075;&#1072;&#1088;&#1089;&#1082;&#1080; -
  811. Bulgarian<option value="bn">????? - Bangla<option value="ca">Catal&agrave; -
  812. Catalan<option value="cs">Cestina - Czech<option value="da">Dansk - Danish<option
  813. value="de">Deutsch - German<option
  814. value="el">&Epsilon;&lambda;&lambda;&eta;&nu;&iota;&kappa;&#940; - Greek<option
  815. value="en" selected="selected">English<option value="en_GB">English (United
  816. Kingdom)<option value="es">Espa&ntilde;ol - Spanish<option value="et">Eesti -
  817. Estonian<option value="fi">Suomi - Finnish<option value="fr">Fran&ccedil;ais - French<option
  818. value="gl">Galego - Galician<option
  819. value="hi">&#2361;&#2367;&#2344;&#2381;&#2342;&#2368; - Hindi<option
  820. value="hu">Magyar - Hungarian<option value="ia">Interlingua - Interlingua<option
  821. value="id">Bahasa Indonesia - Indonesian<option value="it">Italiano - Italian<option
  822. value="ja">&#26085;&#26412;&#35486; - Japanese<option
  823. value="ko">&#54620;&#44397;&#50612; - Korean<option value="lt">Lietuvi&#371; -
  824. Lithuanian<option value="nb">Norsk - Norwegian<option value="nl">Nederlands - Dutch<option
  825. value="pl">Polski - Polish<option value="pt">Portugu&ecirc;s - Portuguese<option
  826. value="pt_BR">Portugu&ecirc;s - Brazilian portuguese<option value="ro">Rom&acirc;n&#259; -
  827. Romanian<option value="ru">&#1056;&#1091;&#1089;&#1089;&#1082;&#1080;&#1081; -
  828. Russian<option value="si">&#3523;&#3538;&#3458;&#3524;&#3517; - Sinhala<option
  829. value="sk">Sloven&#269;ina - Slovak<option value="sl">Sloven&scaron;&#269;ina -
  830. Slovenian<option value="sr@latin">Srpski - Serbian latin<option value="sv">Svenska -
  831. Swedish<option value="tr">T&uuml;rk&ccedil;e - Turkish<option
  832. value="uk">&#1059;&#1082;&#1088;&#1072;&#1111;&#1085;&#1089;&#1100;&#1082;&#1072;
  833. - Ukrainian<option value="uz">&#1038;&#1079;&#1073;&#1077;&#1082;&#1095;&#1072; -
  834. Uzbek-cyrillic<option value="uz@latin">O&lsquo;zbekcha - Uzbek-latin<option
  835. value="zh_CN">&#20013;&#25991; - Chinese simplified<option
  836. value="zh_TW">&#20013;&#25991; - Chinese traditional</select></fieldset></form>
  837. Resources
  838. REMEDIATION - Detectify Support Center - CSRF
  839. MISC - Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet
  840. VIDEO - What is a CSRF?
  841. 1. CSRF Token Leakage Through HTTP GET
  842. Summary
  843. Found At
  844. http://skidbooter.com/phpmyadmin/index.php
  845. CVSS
  846. 3.9 of 10.0
  847. Request Headers
  848. GET
  849. /phpmyadmin/index.php?db=&table=&token=26ca6934e2761ab5d3c53cf3f82f1f5d&lang=ia
  850. HTTP/1.1
  851. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  852. Upgrade-Insecure-Requests1
  853. User-Agent Mozilla/5.0 (compatible; Detectify)
  854. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  855. Accept-Encoding gzip, deflate
  856. Accept-Language en-US
  857. Response Headers
  858. HTTP/ 1.1 200 OK
  859. Transfer-Encoding chunked
  860. Server cloudflare
  861. CF-RAY 3f383f8332976b55-LHR
  862. Connection keep-alive
  863. Last-Modified Tue, 27 Feb 2018 04:03:24 +0000
  864. X-Content-Security-Policy default-src 'self' ;options inline-script eval-script;img-src 'self' data:
  865. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  866. Pragma no-cache
  867. X-ob_mode 0
  868. Date Tue, 27 Feb 2018 04:02:21 GMT
  869. X-WebKit-CSP default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer
  870. no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data:
  871. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  872. X-Frame-Options DENY
  873. Cache-Control no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
  874. Content-Security-Policy default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self'
  875. 'unsafe-inline' ;referrer no-referrer;img-src 'self' data:
  876. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  877. Content-Encoding gzip
  878. Set-Cookie pma_lang=ia; expires=Thu, 29-Mar-2018 04:03:24 GMT; Max-Age=2592000;
  879. path=/phpmyadmin/; HttpOnly
  880. Vary Accept-Encoding
  881. Expires Tue, 27 Feb 2018 04:03:24 +0000
  882. Content-Type text/html; charset=utf-8
  883. <form method="get" action="index.php" class="disableAjax"><input type="hidden" name="db"
  884. value=""><input type="hidden" name="table" value=""><input type="hidden" name="token"
  885. value="ed03f5241d278db93cac7a89eb07c6e2"><fieldset><legend lang="en" dir="ltr">Linguage
  886. - <em>Language</em></legend><select name="lang" class="autosubmit" lang="en" dir="ltr"
  887. id="sel-lang"><option value="ar">&#1575;&#1604;&#1593;&#1585;&#1576;&#1610;&#1577; -
  888. Arabic<option value="az">Az&#601;rbaycanca - Azerbaijani<option
  889. value="bg">&#1041;&#1098;&#1083;&#1075;&#1072;&#1088;&#1089;&#1082;&#1080; -
  890. Bulgarian<option value="bn">????? - Bangla<option value="ca">Catal&agrave; -
  891. Catalan<option value="cs">Cestina - Czech<option value="da">Dansk - Danish<option
  892. value="de">Deutsch - German<option
  893. value="el">&Epsilon;&lambda;&lambda;&eta;&nu;&iota;&kappa;&#940; - Greek<option
  894. value="en">English<option value="en_GB">English (United Kingdom)<option
  895. value="es">Espa&ntilde;ol - Spanish<option value="et">Eesti - Estonian<option
  896. value="fi">Suomi - Finnish<option value="fr">Fran&ccedil;ais - French<option
  897. value="gl">Galego - Galician<option
  898. value="hi">&#2361;&#2367;&#2344;&#2381;&#2342;&#2368; - Hindi<option
  899. value="hu">Magyar - Hungarian<option value="ia" selected="selected">Interlingua -
  900. Interlingua<option value="id">Bahasa Indonesia - Indonesian<option value="it">Italiano -
  901. Italian<option value="ja">&#26085;&#26412;&#35486; - Japanese<option
  902. value="ko">&#54620;&#44397;&#50612; - Korean<option value="lt">Lietuvi&#371; -
  903. Lithuanian<option value="nb">Norsk - Norwegian<option value="nl">Nederlands - Dutch<option
  904. value="pl">Polski - Polish<option value="pt">Portugu&ecirc;s - Portuguese<option
  905. value="pt_BR">Portugu&ecirc;s - Brazilian portuguese<option value="ro">Rom&acirc;n&#259; -
  906. Romanian<option value="ru">&#1056;&#1091;&#1089;&#1089;&#1082;&#1080;&#1081; -
  907. Russian<option value="si">&#3523;&#3538;&#3458;&#3524;&#3517; - Sinhala<option
  908. value="sk">Sloven&#269;ina - Slovak<option value="sl">Sloven&scaron;&#269;ina -
  909. Slovenian<option value="sr@latin">Srpski - Serbian latin<option value="sv">Svenska -
  910. Swedish<option value="tr">T&uuml;rk&ccedil;e - Turkish<option
  911. value="uk">&#1059;&#1082;&#1088;&#1072;&#1111;&#1085;&#1089;&#1100;&#1082;&#1072;
  912. - Ukrainian<option value="uz">&#1038;&#1079;&#1073;&#1077;&#1082;&#1095;&#1072; -
  913. Uzbek-cyrillic<option value="uz@latin">O&lsquo;zbekcha - Uzbek-latin<option
  914. value="zh_CN">&#20013;&#25991; - Chinese simplified<option
  915. value="zh_TW">&#20013;&#25991; - Chinese traditional</select></fieldset></form>
  916. Resources
  917. REMEDIATION - Detectify Support Center - CSRF
  918. MISC - Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet
  919. VIDEO - What is a CSRF?
  920. 1. CSRF Token Leakage Through HTTP GET
  921. Summary
  922. Found At
  923. https://skidbooter.com/phpmyadmin/
  924. CVSS
  925. 3.9 of 10.0
  926. Request Headers
  927. GET /phpmyadmin/ HTTP/1.1
  928. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  929. Upgrade-Insecure-Requests1
  930. User-Agent Mozilla/5.0 (compatible; Detectify)
  931. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  932. Accept-Encoding gzip, deflate
  933. Accept-Language en-US
  934. Response Headers
  935. HTTP/ 1.1 200 OK
  936. Transfer-Encoding chunked
  937. Server cloudflare
  938. CF-RAY 3f383c400cd96b6d-LHR
  939. Connection keep-alive
  940. Last-Modified Tue, 27 Feb 2018 04:01:10 +0000
  941. X-Content-Security-Policy default-src 'self' ;options inline-script eval-script;img-src 'self' data: ;
  942. Pragma no-cache
  943. X-ob_mode 0
  944. Date Tue, 27 Feb 2018 04:00:07 GMT
  945. X-WebKit-CSP default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer
  946. no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data: ;
  947. X-Frame-Options DENY
  948. Cache-Control no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
  949. Content-Security-Policy default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self'
  950. 'unsafe-inline' ;referrer no-referrer;img-src 'self' data: ;
  951. Content-Encoding gzip
  952. Set-Cookie phpMyAdmin=7r9g3tef4h2mgv0bi762uhstc86kedon; path=/phpmyadmin/;
  953. secure; HttpOnly
  954. Vary Accept-Encoding
  955. Expires Tue, 27 Feb 2018 04:01:10 +0000
  956. Content-Type text/html; charset=utf-8
  957. Expect-CT max-age=604800,
  958. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  959. <form method="get" action="index.php" class="disableAjax"><input type="hidden" name="db"
  960. value=""><input type="hidden" name="table" value=""><input type="hidden" name="lang"
  961. value="en"><input type="hidden" name="collation_connection" value="utf8_general_ci"><input
  962. type="hidden" name="token" value="bf688cd605ca26c573f7780ba004d76e"><fieldset><legend
  963. lang="en" dir="ltr">Language</legend><select name="lang" class="autosubmit" lang="en"
  964. dir="ltr" id="sel-lang"><option
  965. value="ar">&#1575;&#1604;&#1593;&#1585;&#1576;&#1610;&#1577; - Arabic<option
  966. value="az">Az&#601;rbaycanca - Azerbaijani<option
  967. value="bg">&#1041;&#1098;&#1083;&#1075;&#1072;&#1088;&#1089;&#1082;&#1080; -
  968. Bulgarian<option value="bn">????? - Bangla<option value="ca">Catal&agrave; -
  969. Catalan<option value="cs">Cestina - Czech<option value="da">Dansk - Danish<option
  970. value="de">Deutsch - German<option
  971. value="el">&Epsilon;&lambda;&lambda;&eta;&nu;&iota;&kappa;&#940; - Greek<option
  972. value="en" selected="selected">English<option value="en_GB">English (United
  973. Kingdom)<option value="es">Espa&ntilde;ol - Spanish<option value="et">Eesti -
  974. Estonian<option value="fi">Suomi - Finnish<option value="fr">Fran&ccedil;ais - French<option
  975. value="gl">Galego - Galician<option
  976. value="hi">&#2361;&#2367;&#2344;&#2381;&#2342;&#2368; - Hindi<option
  977. value="hu">Magyar - Hungarian<option value="ia">Interlingua - Interlingua<option
  978. value="id">Bahasa Indonesia - Indonesian<option value="it">Italiano - Italian<option
  979. value="ja">&#26085;&#26412;&#35486; - Japanese<option
  980. value="ko">&#54620;&#44397;&#50612; - Korean<option value="lt">Lietuvi&#371; -
  981. Lithuanian<option value="nb">Norsk - Norwegian<option value="nl">Nederlands - Dutch<option
  982. value="pl">Polski - Polish<option value="pt">Portugu&ecirc;s - Portuguese<option
  983. value="pt_BR">Portugu&ecirc;s - Brazilian portuguese<option value="ro">Rom&acirc;n&#259; -
  984. Romanian<option value="ru">&#1056;&#1091;&#1089;&#1089;&#1082;&#1080;&#1081; -
  985. Russian<option value="si">&#3523;&#3538;&#3458;&#3524;&#3517; - Sinhala<option
  986. value="sk">Sloven&#269;ina - Slovak<option value="sl">Sloven&scaron;&#269;ina -
  987. Slovenian<option value="sr@latin">Srpski - Serbian latin<option value="sv">Svenska -
  988. Swedish<option value="tr">T&uuml;rk&ccedil;e - Turkish<option
  989. value="uk">&#1059;&#1082;&#1088;&#1072;&#1111;&#1085;&#1089;&#1100;&#1082;&#1072;
  990. - Ukrainian<option value="uz">&#1038;&#1079;&#1073;&#1077;&#1082;&#1095;&#1072; -
  991. Uzbek-cyrillic<option value="uz@latin">O&lsquo;zbekcha - Uzbek-latin<option
  992. value="zh_CN">&#20013;&#25991; - Chinese simplified<option
  993. value="zh_TW">&#20013;&#25991; - Chinese traditional</select></fieldset></form>
  994. Resources
  995. REMEDIATION - Detectify Support Center - CSRF
  996. MISC - Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet
  997. VIDEO - What is a CSRF?
  998. 1. CSRF Token Leakage Through HTTP GET
  999. Summary
  1000. Found At
  1001. https://skidbooter.com/phpmyadmin/index.php
  1002. CVSS
  1003. 3.9 of 10.0
  1004. Request Headers
  1005. GET
  1006. /phpmyadmin/index.php?db=&table=&token=5ffe82f52c3eb64dc8d984adc59d613a&lang=ko
  1007. HTTP/1.1
  1008. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1009. Upgrade-Insecure-Requests1
  1010. User-Agent Mozilla/5.0 (compatible; Detectify)
  1011. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1012. Accept-Encoding gzip, deflate
  1013. Accept-Language en-US
  1014. Response Headers
  1015. HTTP/ 1.1 200 OK
  1016. Transfer-Encoding chunked
  1017. Server cloudflare
  1018. CF-RAY 3f384197ae796a67-LHR
  1019. Connection keep-alive
  1020. Last-Modified Tue, 27 Feb 2018 04:04:49 +0000
  1021. X-Content-Security-Policy default-src 'self' ;options inline-script eval-script;img-src 'self' data: ;
  1022. Pragma no-cache
  1023. X-ob_mode 0
  1024. Date Tue, 27 Feb 2018 04:03:46 GMT
  1025. X-WebKit-CSP default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer
  1026. no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data: ;
  1027. X-Frame-Options DENY
  1028. Cache-Control no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
  1029. Content-Security-Policy default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self'
  1030. 'unsafe-inline' ;referrer no-referrer;img-src 'self' data: ;
  1031. Content-Encoding gzip
  1032. Set-Cookie pma_lang=ko; expires=Thu, 29-Mar-2018 04:04:49 GMT; Max-Age=2592000;
  1033. path=/phpmyadmin/; secure; HttpOnly
  1034. Vary Accept-Encoding
  1035. Expires Tue, 27 Feb 2018 04:04:49 +0000
  1036. Content-Type text/html; charset=utf-8
  1037. Expect-CT max-age=604800,
  1038. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  1039. <form method="get" action="index.php" class="disableAjax"><input type="hidden" name="db"
  1040. value=""><input type="hidden" name="table" value=""><input type="hidden" name="token"
  1041. value="846ca674e79a22754971ed20bd51705f"><fieldset><legend lang="en" dir="ltr">?? -
  1042. <em>Language</em></legend><select name="lang" class="autosubmit" lang="en" dir="ltr"
  1043. id="sel-lang"><option value="ar">&#1575;&#1604;&#1593;&#1585;&#1576;&#1610;&#1577; -
  1044. Arabic<option value="az">Az&#601;rbaycanca - Azerbaijani<option
  1045. value="bg">&#1041;&#1098;&#1083;&#1075;&#1072;&#1088;&#1089;&#1082;&#1080; -
  1046. Bulgarian<option value="bn">????? - Bangla<option value="ca">Catal&agrave; -
  1047. Catalan<option value="cs">Cestina - Czech<option value="da">Dansk - Danish<option
  1048. value="de">Deutsch - German<option
  1049. value="el">&Epsilon;&lambda;&lambda;&eta;&nu;&iota;&kappa;&#940; - Greek<option
  1050. value="en">English<option value="en_GB">English (United Kingdom)<option
  1051. value="es">Espa&ntilde;ol - Spanish<option value="et">Eesti - Estonian<option
  1052. value="fi">Suomi - Finnish<option value="fr">Fran&ccedil;ais - French<option
  1053. value="gl">Galego - Galician<option
  1054. value="hi">&#2361;&#2367;&#2344;&#2381;&#2342;&#2368; - Hindi<option
  1055. value="hu">Magyar - Hungarian<option value="ia">Interlingua - Interlingua<option
  1056. value="id">Bahasa Indonesia - Indonesian<option value="it">Italiano - Italian<option
  1057. value="ja">&#26085;&#26412;&#35486; - Japanese<option value="ko"
  1058. selected="selected">&#54620;&#44397;&#50612; - Korean<option value="lt">Lietuvi&#371; -
  1059. Lithuanian<option value="nb">Norsk - Norwegian<option value="nl">Nederlands - Dutch<option
  1060. value="pl">Polski - Polish<option value="pt">Portugu&ecirc;s - Portuguese<option
  1061. value="pt_BR">Portugu&ecirc;s - Brazilian portuguese<option value="ro">Rom&acirc;n&#259; -
  1062. Romanian<option value="ru">&#1056;&#1091;&#1089;&#1089;&#1082;&#1080;&#1081; -
  1063. Russian<option value="si">&#3523;&#3538;&#3458;&#3524;&#3517; - Sinhala<option
  1064. value="sk">Sloven&#269;ina - Slovak<option value="sl">Sloven&scaron;&#269;ina -
  1065. Slovenian<option value="sr@latin">Srpski - Serbian latin<option value="sv">Svenska -
  1066. Swedish<option value="tr">T&uuml;rk&ccedil;e - Turkish<option
  1067. value="uk">&#1059;&#1082;&#1088;&#1072;&#1111;&#1085;&#1089;&#1100;&#1082;&#1072;
  1068. - Ukrainian<option value="uz">&#1038;&#1079;&#1073;&#1077;&#1082;&#1095;&#1072; -
  1069. Uzbek-cyrillic<option value="uz@latin">O&lsquo;zbekcha - Uzbek-latin<option
  1070. value="zh_CN">&#20013;&#25991; - Chinese simplified<option
  1071. value="zh_TW">&#20013;&#25991; - Chinese traditional</select></fieldset></form>
  1072. Resources
  1073. REMEDIATION - Detectify Support Center - CSRF
  1074. MISC - Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet
  1075. VIDEO - What is a CSRF?
  1076. Technology Disclosure
  1077. What does this mean?
  1078. The HTTP server discloses what type of technology that is currently used on the HTTP-server.
  1079. here (http://support.detectify.com/customer/portal/articles/2792281-technology-disclosure).
  1080. What can happen?
  1081. An attacker can use that information to look up known vulnerabilities in the specific technology and
  1082. then use them against the website.
  1083. Summary
  1084. Entry Found at CVSS
  1085. 1 http://skidbooter.com/icons/README 2.9
  1086. 2 https://skidbooter.com/icons/README 2.9
  1087. 1. Technology Disclosure
  1088. Summary
  1089. Found At
  1090. http://skidbooter.com/icons/README
  1091. CVSS
  1092. 2.9 of 10.0
  1093. Request Headers
  1094. GET /icons/README HTTP/1.1
  1095. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1096. User-Agent Mozilla/5.0 (compatible; Detectify)
  1097. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1098. Host skidbooter.com
  1099. Cookie PHPSESSID=ulku1f5lqq47vebo3r7r4roud2; cf_use_ob=0;
  1100. cf_ob_info=521:3f3887c807dd69fb:LHR;
  1101. __cfduid=d46e91a563d84934e6787a1e6f679f93e1519703383
  1102. Cache-Control no-store, no-cache
  1103. Pragma no-cache
  1104. Accept-Encoding gzip, deflate
  1105. Response Headers
  1106. HTTP/ 1.1 200 OK
  1107. Connection keep-alive
  1108. CF-RAY 3f3887df65f76a19-LHR
  1109. Accept-Ranges bytes
  1110. Content-Length 5108
  1111. Date Tue, 27 Feb 2018 04:51:45 GMT
  1112. ETag "13f4-438c034968a80"
  1113. Last-Modified Tue, 28 Aug 2007 10:47:54 GMT
  1114. Server cloudflare
  1115. Technology
  1116. By observing the checksums of the files accessible from /icons/ it's possible to work out what
  1117. versions of Apache that is used. You can reconfigure your Apache setup to disable access to
  1118. /icons/.
  1119. Technology
  1120. Public Domain Icons
  1121. These icons were originally made for Mosaic for X and have been
  1122. included in the NCSA httpd and Apache server distributions in the
  1123. past. They are in the public domain and may be freely included in any
  1124. application. The originals were done by Kevin Hughes (kevinh@kevcom.com).
  1125. Andy Polyakov tuned the icon colors and added a few new images.
  1126. If you'd like to contribute additions to this set, contact the httpd
  1127. documentation project <http://httpd.apache.org/docs-project/>.
  1128. Almost all of these icons are 20x22 pixels in size. There are
  1129. alternative icons in the "small" directory that are 16x16 in size,
  1130. provided by Mike Brown (mike@hyperreal.org).
  1131. Suggested Uses
  1132. The following are a few suggestions, to serve as a starting point for ideas.
  1133. Please feel free to tweak and rename the icons as you like.
  1134. a.gif
  1135. This might be used to represent PostScript or text layout
  1136. languages.
  1137. alert.black.gif, alert.red.gif
  1138. These can be used to highlight any important items, such as a
  1139. README file in a directory.
  1140. back.gif, forward.gif
  1141. These can be used as links to go to previous and next areas.
  1142. ball.gray.gif, ball.red.gif
  1143. These might be used as bullets.
  1144. binary.gif
  1145. This can be used to represent binary files.
  1146. binhex.gif
  1147. This can represent BinHex-encoded data.
  1148. blank.gif
  1149. This can be used as a placeholder or a spacing element.
  1150. bomb.gif
  1151. This can be used to represent core files.
  1152. box1.gif, box2.gif
  1153. These icons can be used to represent generic 3D applications and
  1154. related files.
  1155. broken.gif
  1156. This can represent corrupted data.
  1157. burst.gif
  1158. This can call attention to new and important items.
  1159. c.gif
  1160. This might represent C source code.
  1161. comp.blue.gif, comp.gray.gif
  1162. These little computer icons can stand for telnet or FTP
  1163. sessions.
  1164. compressed.gif
  1165. This may represent compressed data.
  1166. continued.gif
  1167. This can be a link to a continued listing of a directory.
  1168. down.gif, up.gif, left.gif, right.gif
  1169. These can be used to scroll up, down, left and right in a
  1170. listing or may be used to denote items in an outline.
  1171. dir.gif
  1172. Identical to folder.gif below.
  1173. diskimg.gif
  1174. This can represent floppy disk storage.
  1175. dvi.gif
  1176. This can represent DVI files.
  1177. f.gif
  1178. This might represent FORTRAN or Forth source code.
  1179. folder.gif, folder.open.gif, folder.sec.gif
  1180. The folder can represent directories. There is also a version
  1181. that can represent secure directories or directories that cannot
  1182. be viewed.
  1183. generic.gif, generic.sec.gif, generic.red.gif
  1184. These can represent generic files, secure files, and important
  1185. files, respectively.
  1186. hand.right.gif, hand.up.gif
  1187. These can point out important items (pun intended).
  1188. image1.gif, image2.gif, image3.gif
  1189. These can represent image formats of various types.
  1190. index.gif
  1191. This might represent a WAIS index or search facility.
  1192. layout.gif
  1193. This might represent files and formats that contain graphics as
  1194. well as text layout, such as HTML and PDF files.
  1195. link.gif
  1196. This might represent files that are symbolic links.
  1197. movie.gif
  1198. This can represent various movie formats.
  1199. p.gif
  1200. This may stand for Perl or Python source code.
  1201. pie0.gif ... pie8.gif
  1202. These icons can be used in applications where a list of
  1203. documents is returned from a search. The little pie chart images
  1204. can denote how relevant the documents may be to your search
  1205. query.
  1206. patch.gif
  1207. This may stand for patches and diff files.
  1208. portal.gif
  1209. This might be a link to an online service or a 3D world.
  1210. pdf.gif, ps.gif, quill.gif
  1211. These may represent PDF and PostScript files.
  1212. screw1.gif, screw2.gif
  1213. These may represent CAD or engineering data and formats.
  1214. script.gif
  1215. This can represent any of various interpreted languages, such as
  1216. Perl, python, TCL, and shell scripts, as well as server
  1217. configuration files.
  1218. sound1.gif, sound2.gif
  1219. These can represent sound files.
  1220. sphere1.gif, sphere2.gif
  1221. These can represent 3D worlds or rendering applications and
  1222. formats.
  1223. tar.gif
  1224. This can represent TAR archive files.
  1225. tex.gif
  1226. This can represent TeX files.
  1227. text.gif
  1228. This can represent generic (plain) text files.
  1229. transfer.gif
  1230. This can represent FTP transfers or uploads/downloads.
  1231. unknown.gif
  1232. This may represent a file of an unknown type.
  1233. uu.gif, uuencoded.gif
  1234. This can stand for uuencoded data.
  1235. world1.gif, world2.gif
  1236. These can represent 3D worlds or other 3D formats.
  1237. Resources
  1238. REMEDIATION - Detectify Support Center - Technology Disclosure
  1239. MISC - Removal of the /var/www/icons alias from Apache config
  1240. MISC - Hardening an Apache Server
  1241. MISC - Apache hardening cheat sheet
  1242. 1. Technology Disclosure
  1243. Summary
  1244. Found At
  1245. https://skidbooter.com/icons/README
  1246. CVSS
  1247. 2.9 of 10.0
  1248. Request Headers
  1249. GET /icons/README HTTP/1.1
  1250. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1251. User-Agent Mozilla/5.0 (compatible; Detectify)
  1252. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1253. Host skidbooter.com
  1254. Cookie PHPSESSID=ulku1f5lqq47vebo3r7r4roud2; cf_use_ob=0;
  1255. cf_ob_info=521:3f3887e6e64169fb:LHR;
  1256. __cfduid=d46e91a563d84934e6787a1e6f679f93e1519703383
  1257. Cache-Control no-store, no-cache
  1258. Pragma no-cache
  1259. Accept-Encoding gzip, deflate
  1260. Response Headers
  1261. HTTP/ 1.1 200 OK
  1262. Connection keep-alive
  1263. Expect-CT max-age=604800,
  1264. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  1265. CF-RAY 3f3887e928be69fb-LHR
  1266. Accept-Ranges bytes
  1267. Content-Length 5108
  1268. Date Tue, 27 Feb 2018 04:51:46 GMT
  1269. ETag "13f4-438c034968a80"
  1270. Last-Modified Tue, 28 Aug 2007 10:47:54 GMT
  1271. Server cloudflare
  1272. Technology
  1273. By observing the checksums of the files accessible from /icons/ it's possible to work out what
  1274. versions of Apache that is used. You can reconfigure your Apache setup to disable access to
  1275. /icons/.
  1276. Technology
  1277. Public Domain Icons
  1278. These icons were originally made for Mosaic for X and have been
  1279. included in the NCSA httpd and Apache server distributions in the
  1280. past. They are in the public domain and may be freely included in any
  1281. application. The originals were done by Kevin Hughes (kevinh@kevcom.com).
  1282. Andy Polyakov tuned the icon colors and added a few new images.
  1283. If you'd like to contribute additions to this set, contact the httpd
  1284. documentation project <http://httpd.apache.org/docs-project/>.
  1285. Almost all of these icons are 20x22 pixels in size. There are
  1286. alternative icons in the "small" directory that are 16x16 in size,
  1287. provided by Mike Brown (mike@hyperreal.org).
  1288. Suggested Uses
  1289. The following are a few suggestions, to serve as a starting point for ideas.
  1290. Please feel free to tweak and rename the icons as you like.
  1291. a.gif
  1292. This might be used to represent PostScript or text layout
  1293. languages.
  1294. alert.black.gif, alert.red.gif
  1295. These can be used to highlight any important items, such as a
  1296. README file in a directory.
  1297. back.gif, forward.gif
  1298. These can be used as links to go to previous and next areas.
  1299. ball.gray.gif, ball.red.gif
  1300. These might be used as bullets.
  1301. binary.gif
  1302. This can be used to represent binary files.
  1303. binhex.gif
  1304. This can represent BinHex-encoded data.
  1305. blank.gif
  1306. This can be used as a placeholder or a spacing element.
  1307. bomb.gif
  1308. This can be used to represent core files.
  1309. box1.gif, box2.gif
  1310. These icons can be used to represent generic 3D applications and
  1311. related files.
  1312. broken.gif
  1313. This can represent corrupted data.
  1314. burst.gif
  1315. This can call attention to new and important items.
  1316. c.gif
  1317. This might represent C source code.
  1318. comp.blue.gif, comp.gray.gif
  1319. These little computer icons can stand for telnet or FTP
  1320. sessions.
  1321. compressed.gif
  1322. This may represent compressed data.
  1323. continued.gif
  1324. This can be a link to a continued listing of a directory.
  1325. down.gif, up.gif, left.gif, right.gif
  1326. These can be used to scroll up, down, left and right in a
  1327. listing or may be used to denote items in an outline.
  1328. dir.gif
  1329. Identical to folder.gif below.
  1330. diskimg.gif
  1331. This can represent floppy disk storage.
  1332. dvi.gif
  1333. This can represent DVI files.
  1334. f.gif
  1335. This might represent FORTRAN or Forth source code.
  1336. folder.gif, folder.open.gif, folder.sec.gif
  1337. The folder can represent directories. There is also a version
  1338. that can represent secure directories or directories that cannot
  1339. be viewed.
  1340. generic.gif, generic.sec.gif, generic.red.gif
  1341. These can represent generic files, secure files, and important
  1342. files, respectively.
  1343. hand.right.gif, hand.up.gif
  1344. These can point out important items (pun intended).
  1345. image1.gif, image2.gif, image3.gif
  1346. These can represent image formats of various types.
  1347. index.gif
  1348. This might represent a WAIS index or search facility.
  1349. layout.gif
  1350. This might represent files and formats that contain graphics as
  1351. well as text layout, such as HTML and PDF files.
  1352. link.gif
  1353. This might represent files that are symbolic links.
  1354. movie.gif
  1355. This can represent various movie formats.
  1356. p.gif
  1357. This may stand for Perl or Python source code.
  1358. pie0.gif ... pie8.gif
  1359. These icons can be used in applications where a list of
  1360. documents is returned from a search. The little pie chart images
  1361. can denote how relevant the documents may be to your search
  1362. query.
  1363. patch.gif
  1364. This may stand for patches and diff files.
  1365. portal.gif
  1366. This might be a link to an online service or a 3D world.
  1367. pdf.gif, ps.gif, quill.gif
  1368. These may represent PDF and PostScript files.
  1369. screw1.gif, screw2.gif
  1370. These may represent CAD or engineering data and formats.
  1371. script.gif
  1372. This can represent any of various interpreted languages, such as
  1373. Perl, python, TCL, and shell scripts, as well as server
  1374. configuration files.
  1375. sound1.gif, sound2.gif
  1376. These can represent sound files.
  1377. sphere1.gif, sphere2.gif
  1378. These can represent 3D worlds or rendering applications and
  1379. formats.
  1380. tar.gif
  1381. This can represent TAR archive files.
  1382. tex.gif
  1383. This can represent TeX files.
  1384. text.gif
  1385. This can represent generic (plain) text files.
  1386. transfer.gif
  1387. This can represent FTP transfers or uploads/downloads.
  1388. unknown.gif
  1389. This may represent a file of an unknown type.
  1390. uu.gif, uuencoded.gif
  1391. This can stand for uuencoded data.
  1392. world1.gif, world2.gif
  1393. These can represent 3D worlds or other 3D formats.
  1394. Resources
  1395. REMEDIATION - Detectify Support Center - Technology Disclosure
  1396. MISC - Removal of the /var/www/icons alias from Apache config
  1397. MISC - Hardening an Apache Server
  1398. MISC - Apache hardening cheat sheet
  1399. Script Integrity Attribute Not Implemented
  1400. What does this mean?
  1401. JavaScript files loaded from another domain should be verified using the integrity attribute.
  1402. What can happen?
  1403. If the contents loaded from another domain is not verified the browser will execute the contents without
  1404. verifying with a correct hash.
  1405. Summary
  1406. Entry Found at CVSS
  1407. 1 http://skidbooter.com/net/ 2.7
  1408. 2 http://skidbooter.com/register.php 2.7
  1409. 3 https://skidbooter.com/net/ 2.7
  1410. 4 https://skidbooter.com/register.php 2.7
  1411. 1. Script Integrity Attribute Not Implemented
  1412. Summary
  1413. Found At
  1414. http://skidbooter.com/net/
  1415. CVSS
  1416. 2.7 of 10.0
  1417. Script tags with content from domains are not using any integrity attributes.
  1418. <script type="text/javascript" src="https://ipinfo.info/ip/js.php"></script>
  1419. <script src="https://embed.selly.gg"></script>
  1420. Resources
  1421. MOZILLA - Subresource Integrity
  1422. W3 - Subresource Integrity
  1423. MISC - SRI Hash Generator
  1424. MISC - Protecting your embedded content with subresource integrity (SRI)
  1425. 1. Script Integrity Attribute Not Implemented
  1426. Summary
  1427. Found At
  1428. http://skidbooter.com/register.php
  1429. CVSS
  1430. 2.7 of 10.0
  1431. A script tag with content from another domain is not using an integrity attribute.
  1432. <script src='https://www.google.com/recaptcha/api.js'></script>
  1433. Resources
  1434. MOZILLA - Subresource Integrity
  1435. W3 - Subresource Integrity
  1436. MISC - SRI Hash Generator
  1437. MISC - Protecting your embedded content with subresource integrity (SRI)
  1438. 1. Script Integrity Attribute Not Implemented
  1439. Summary
  1440. Found At
  1441. https://skidbooter.com/net/
  1442. CVSS
  1443. 2.7 of 10.0
  1444. Script tags with content from domains are not using any integrity attributes.
  1445. <script type="text/javascript" src="https://ipinfo.info/ip/js.php"></script>
  1446. <script src="https://embed.selly.gg"></script>
  1447. Resources
  1448. MOZILLA - Subresource Integrity
  1449. W3 - Subresource Integrity
  1450. MISC - SRI Hash Generator
  1451. MISC - Protecting your embedded content with subresource integrity (SRI)
  1452. 1. Script Integrity Attribute Not Implemented
  1453. Summary
  1454. Found At
  1455. https://skidbooter.com/register.php
  1456. CVSS
  1457. 2.7 of 10.0
  1458. A script tag with content from another domain is not using an integrity attribute.
  1459. <script src='https://www.google.com/recaptcha/api.js'></script>
  1460. Resources
  1461. MOZILLA - Subresource Integrity
  1462. W3 - Subresource Integrity
  1463. MISC - SRI Hash Generator
  1464. MISC - Protecting your embedded content with subresource integrity (SRI)
  1465. Invalid HTML Content
  1466. What does this mean?
  1467. When creating endpoints for data, it's common to forget to set the Content-Type to a correct one, such
  1468. as application/javascript or application/json. The default Content-Type in common webservers is
  1469. text/html which will try to parse the content as HTML. By not setting the Content-Type yourself, you
  1470. might risk getting the browser to parse data that should not be parsed.
  1471. here (http://support.detectify.com/customer/portal/articles/2792289-invalid-html-content).
  1472. What can happen?
  1473. If an attacker can control the data of this output, and there's no proper sanitization in place, the content
  1474. will render as HTML, thus creating a possibility of Cross-site Scripting. There are also examples where
  1475. the endpoint is able to activate JSONP (which will wrap the JSON-data with a callback function). If this
  1476. callback function, often provided by the GET-parameter ?callback=, is also not properly sanitized in
  1477. combination with wrong Content-Type, you will be able to trigger an XSS just by adding
  1478. ?callback=<script>alert(1)</script> in the URL.
  1479. Summary
  1480. Entry Found at CVSS
  1481. 1 http://skidbooter.com/header.php 1.8
  1482. 2 https://skidbooter.com/header.php 1.8
  1483. 1. Invalid HTML Content
  1484. Summary
  1485. Found At
  1486. http://skidbooter.com/header.php
  1487. CVSS
  1488. 1.8 of 10.0
  1489. Command
  1490. curl "http://skidbooter.com/header.php" | head
  1491. Request Headers
  1492. GET /header.php HTTP/1.1
  1493. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1494. Upgrade-Insecure-Requests1
  1495. User-Agent Mozilla/5.0 (compatible; Detectify)
  1496. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1497. Accept-Encoding gzip, deflate
  1498. Accept-Language en-US
  1499. Response Headers
  1500. HTTP/ 1.1 200 OK
  1501. Transfer-Encoding chunked
  1502. Server cloudflare
  1503. CF-RAY 3f383d9890f16ba3-LHR
  1504. Connection keep-alive
  1505. Content-Encoding gzip
  1506. Date Tue, 27 Feb 2018 04:01:02 GMT
  1507. Content-Type text/html; charset=UTF-8
  1508. Content was returned as HTML but is not valid. This might indicate that the Content Type is wrong.
  1509. Access denied
  1510. Resources
  1511. REMEDIATION - Detectify Support Center - Invalid HTML Content
  1512. 1. Invalid HTML Content
  1513. Summary
  1514. Found At
  1515. https://skidbooter.com/header.php
  1516. CVSS
  1517. 1.8 of 10.0
  1518. Command
  1519. curl "https://skidbooter.com/header.php" | head
  1520. Request Headers
  1521. GET /header.php HTTP/1.1
  1522. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1523. Upgrade-Insecure-Requests1
  1524. User-Agent Mozilla/5.0 (compatible; Detectify)
  1525. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1526. Accept-Encoding gzip, deflate
  1527. Accept-Language en-US
  1528. Response Headers
  1529. HTTP/ 1.1 200 OK
  1530. Transfer-Encoding chunked
  1531. Server cloudflare
  1532. CF-RAY 3f383f81999908d8-LHR
  1533. Connection keep-alive
  1534. Content-Encoding gzip
  1535. Date Tue, 27 Feb 2018 04:02:21 GMT
  1536. Content-Type text/html; charset=UTF-8
  1537. Expect-CT max-age=604800,
  1538. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  1539. Content was returned as HTML but is not valid. This might indicate that the Content Type is wrong.
  1540. Access denied
  1541. Resources
  1542. REMEDIATION - Detectify Support Center - Invalid HTML Content
  1543. Referrer-Policy Not Implemented
  1544. What does this mean?
  1545. No referrer policy was found in the response and browsers will therefore use their default referrer
  1546. policy.
  1547. What can happen?
  1548. Browsers may send sensitive information if it is stored in the URL to external websites.
  1549. Summary
  1550. Entry Found at CVSS
  1551. 1 http://skidbooter.com:2082/ 1.8
  1552. 2 http://skidbooter.com:8080/ 1.8
  1553. 3 http://skidbooter.com:8880/ 1.8
  1554. 4 https://skidbooter.com:2083/ 1.8
  1555. 5 https://skidbooter.com:8443/ 1.8
  1556. 1. Referrer-Policy Not Implemented
  1557. Summary
  1558. Found At
  1559. http://skidbooter.com:2082/
  1560. CVSS
  1561. 1.8 of 10.0
  1562. Request Headers
  1563. GET / HTTP/1.1
  1564. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1565. Upgrade-Insecure-Requests1
  1566. User-Agent Mozilla/5.0 (compatible; Detectify)
  1567. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1568. Accept-Encoding gzip, deflate
  1569. Accept-Language en-US
  1570. Host skidbooter.com:2082
  1571. Cookie PHPSESSID=ulku1f5lqq47vebo3r7r4roud2; cf_use_ob=0;
  1572. cf_ob_info=521:3f388765868669f5:LHR;
  1573. __cfduid=d46e91a563d84934e6787a1e6f679f93e1519703383
  1574. Cache-Control no-store, no-cache
  1575. Pragma no-cache
  1576. Response Headers
  1577. HTTP/ 1.1 521 Origin Down
  1578. Transfer-Encoding chunked
  1579. Connection keep-alive
  1580. Pragma no-cache
  1581. X-Frame-Options SAMEORIGIN
  1582. CF-RAY 3f38876913ae6b6d-LHR
  1583. Cache-Control no-store, no-cache, must-revalidate, post-check=0, pre-check=0
  1584. Content-Type text/html; charset=UTF-8
  1585. Date Tue, 27 Feb 2018 04:51:26 GMT
  1586. Expires Thu, 01 Jan 1970 00:00:01 GMT
  1587. Set-Cookie cf_use_ob=0; expires=Tue, 27-Feb-18 04:51:56 GMT; path=/
  1588. Server cloudflare
  1589. Resources
  1590. OWASP - Referrer-Policy
  1591. MOZILLA - Referrer-Policy
  1592. MOZILLA - Tighter Control Over Your Referrers
  1593. MISC - A new security header: Referrer Policy
  1594. MISC - Using CORS policies to implement CSRF protection
  1595. W3C - Referrer Policy
  1596. 1. Referrer-Policy Not Implemented
  1597. Summary
  1598. Found At
  1599. http://skidbooter.com:8080/
  1600. CVSS
  1601. 1.8 of 10.0
  1602. Request Headers
  1603. GET / HTTP/1.1
  1604. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1605. Upgrade-Insecure-Requests1
  1606. User-Agent Mozilla/5.0 (compatible; Detectify)
  1607. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1608. Accept-Encoding gzip, deflate
  1609. Accept-Language en-US
  1610. Host skidbooter.com:8080
  1611. Cookie PHPSESSID=ulku1f5lqq47vebo3r7r4roud2; cf_use_ob=0;
  1612. cf_ob_info=521:3f38877d243c69f5:LHR;
  1613. __cfduid=d46e91a563d84934e6787a1e6f679f93e1519703383
  1614. Cache-Control no-store, no-cache
  1615. Pragma no-cache
  1616. Response Headers
  1617. HTTP/ 1.1 521 Origin Down
  1618. Transfer-Encoding chunked
  1619. Connection keep-alive
  1620. Pragma no-cache
  1621. X-Frame-Options SAMEORIGIN
  1622. Cache-Control no-store, no-cache, must-revalidate, post-check=0, pre-check=0
  1623. Content-Type text/html; charset=UTF-8
  1624. Date Tue, 27 Feb 2018 04:51:29 GMT
  1625. Expires Thu, 01 Jan 1970 00:00:01 GMT
  1626. Set-Cookie cf_use_ob=8080; expires=Tue, 27-Feb-18 04:51:59 GMT;
  1627. path=/,cf_ob_info=521:3f38877df46a69f5:LHR; expires=Tue, 27-Feb-18
  1628. 04:51:59 GMT; path=/
  1629. Server cloudflare
  1630. CF-RAY 3f38877df46a69f5-LHR
  1631. Resources
  1632. OWASP - Referrer-Policy
  1633. MOZILLA - Referrer-Policy
  1634. MOZILLA - Tighter Control Over Your Referrers
  1635. MISC - A new security header: Referrer Policy
  1636. MISC - Using CORS policies to implement CSRF protection
  1637. W3C - Referrer Policy
  1638. 1. Referrer-Policy Not Implemented
  1639. Summary
  1640. Found At
  1641. http://skidbooter.com:8880/
  1642. CVSS
  1643. 1.8 of 10.0
  1644. Request Headers
  1645. GET / HTTP/1.1
  1646. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1647. Upgrade-Insecure-Requests1
  1648. User-Agent Mozilla/5.0 (compatible; Detectify)
  1649. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1650. Accept-Encoding gzip, deflate
  1651. Accept-Language en-US
  1652. Host skidbooter.com:8880
  1653. Cookie PHPSESSID=ulku1f5lqq47vebo3r7r4roud2; cf_use_ob=0;
  1654. cf_ob_info=521:3f38877df46a69f5:LHR;
  1655. __cfduid=d46e91a563d84934e6787a1e6f679f93e1519703383
  1656. Cache-Control no-store, no-cache
  1657. Pragma no-cache
  1658. Response Headers
  1659. HTTP/ 1.1 521 Origin Down
  1660. Transfer-Encoding chunked
  1661. Connection keep-alive
  1662. Pragma no-cache
  1663. X-Frame-Options SAMEORIGIN
  1664. CF-RAY 3f38877f01ed6abb-LHR
  1665. Cache-Control no-store, no-cache, must-revalidate, post-check=0, pre-check=0
  1666. Content-Type text/html; charset=UTF-8
  1667. Date Tue, 27 Feb 2018 04:51:29 GMT
  1668. Expires Thu, 01 Jan 1970 00:00:01 GMT
  1669. Set-Cookie cf_use_ob=0; expires=Tue, 27-Feb-18 04:51:59 GMT; path=/
  1670. Server cloudflare
  1671. Resources
  1672. OWASP - Referrer-Policy
  1673. MOZILLA - Referrer-Policy
  1674. MOZILLA - Tighter Control Over Your Referrers
  1675. MISC - A new security header: Referrer Policy
  1676. MISC - Using CORS policies to implement CSRF protection
  1677. W3C - Referrer Policy
  1678. 1. Referrer-Policy Not Implemented
  1679. Summary
  1680. Found At
  1681. https://skidbooter.com:2083/
  1682. CVSS
  1683. 1.8 of 10.0
  1684. Request Headers
  1685. GET / HTTP/1.1
  1686. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1687. Upgrade-Insecure-Requests1
  1688. User-Agent Mozilla/5.0 (compatible; Detectify)
  1689. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1690. Accept-Encoding gzip, deflate
  1691. Accept-Language en-US
  1692. Host skidbooter.com:2083
  1693. Cookie PHPSESSID=ulku1f5lqq47vebo3r7r4roud2; cf_use_ob=8080;
  1694. cf_ob_info=521:3f38877d243c69f5:LHR;
  1695. __cfduid=d46e91a563d84934e6787a1e6f679f93e1519703383
  1696. Cache-Control no-store, no-cache
  1697. Pragma no-cache
  1698. Response Headers
  1699. HTTP/ 1.1 521 Origin Down
  1700. Transfer-Encoding chunked
  1701. Connection keep-alive
  1702. Pragma no-cache
  1703. X-Frame-Options SAMEORIGIN
  1704. Expect-CT max-age=604800,
  1705. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  1706. CF-RAY 3f38877dbd226b7f-LHR
  1707. Cache-Control no-store, no-cache, must-revalidate, post-check=0, pre-check=0
  1708. Content-Type text/html; charset=UTF-8
  1709. Date Tue, 27 Feb 2018 04:51:29 GMT
  1710. Expires Thu, 01 Jan 1970 00:00:01 GMT
  1711. Set-Cookie cf_use_ob=0; expires=Tue, 27-Feb-18 04:51:59 GMT; path=/
  1712. Server cloudflare
  1713. Resources
  1714. OWASP - Referrer-Policy
  1715. MOZILLA - Referrer-Policy
  1716. MOZILLA - Tighter Control Over Your Referrers
  1717. MISC - A new security header: Referrer Policy
  1718. MISC - Using CORS policies to implement CSRF protection
  1719. W3C - Referrer Policy
  1720. 1. Referrer-Policy Not Implemented
  1721. Summary
  1722. Found At
  1723. https://skidbooter.com:8443/
  1724. CVSS
  1725. 1.8 of 10.0
  1726. Request Headers
  1727. GET / HTTP/1.1
  1728. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1729. Upgrade-Insecure-Requests1
  1730. User-Agent Mozilla/5.0 (compatible; Detectify)
  1731. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1732. Accept-Encoding gzip, deflate
  1733. Accept-Language en-US
  1734. Host skidbooter.com:8443
  1735. Cookie PHPSESSID=ulku1f5lqq47vebo3r7r4roud2; cf_use_ob=8080;
  1736. cf_ob_info=521:3f388765467669f5:LHR;
  1737. __cfduid=d46e91a563d84934e6787a1e6f679f93e1519703383
  1738. Cache-Control no-store, no-cache
  1739. Pragma no-cache
  1740. Response Headers
  1741. HTTP/ 1.1 521 Origin Down
  1742. Transfer-Encoding chunked
  1743. Connection keep-alive
  1744. Pragma no-cache
  1745. X-Frame-Options SAMEORIGIN
  1746. Expect-CT max-age=604800,
  1747. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  1748. CF-RAY 3f3887658adf6b67-LHR
  1749. Cache-Control no-store, no-cache, must-revalidate, post-check=0, pre-check=0
  1750. Content-Type text/html; charset=UTF-8
  1751. Date Tue, 27 Feb 2018 04:51:25 GMT
  1752. Expires Thu, 01 Jan 1970 00:00:01 GMT
  1753. Set-Cookie cf_use_ob=0; expires=Tue, 27-Feb-18 04:51:55 GMT; path=/
  1754. Server cloudflare
  1755. Resources
  1756. OWASP - Referrer-Policy
  1757. MOZILLA - Referrer-Policy
  1758. MOZILLA - Tighter Control Over Your Referrers
  1759. MISC - A new security header: Referrer Policy
  1760. MISC - Using CORS policies to implement CSRF protection
  1761. W3C - Referrer Policy
  1762. Empty Document
  1763. What does this mean?
  1764. We found resources that appear to be serving HTML, although without any content. This may be an
  1765. indication of backend errors or legacy code.
  1766. here (http://support.detectify.com/customer/portal/articles/2792028-empty-document).
  1767. What can happen?
  1768. There is no risk by serving zero sized documents, but it might be worth noticing that the files exist and
  1769. that they can be externally accessible.
  1770. Summary
  1771. Entry Found at CVSS
  1772. 1 http://skidbooter.com/test.php 0.8
  1773. 2 https://skidbooter.com/test.php 0.8
  1774. 1. Empty Document
  1775. Summary
  1776. Found At
  1777. http://skidbooter.com/test.php
  1778. CVSS
  1779. 0.8 of 10.0
  1780. Request Headers
  1781. GET /test.php HTTP/1.1
  1782. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1783. Upgrade-Insecure-Requests1
  1784. User-Agent Mozilla/5.0 (compatible; Detectify)
  1785. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1786. Accept-Encoding gzip, deflate
  1787. Accept-Language en-US
  1788. Response Headers
  1789. HTTP/ 1.1 200 OK
  1790. Transfer-Encoding chunked
  1791. Server cloudflare
  1792. CF-RAY 3f383dc9d4266ba3-LHR
  1793. Connection keep-alive
  1794. Content-Encoding gzip
  1795. Date Tue, 27 Feb 2018 04:01:10 GMT
  1796. Content-Type text/html; charset=UTF-8
  1797. Resources
  1798. REMEDIATION - Detectify Support Center - Empty Document
  1799. 1. Empty Document
  1800. Summary
  1801. Found At
  1802. https://skidbooter.com/test.php
  1803. CVSS
  1804. 0.8 of 10.0
  1805. Request Headers
  1806. GET /test.php HTTP/1.1
  1807. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  1808. Upgrade-Insecure-Requests1
  1809. User-Agent Mozilla/5.0 (compatible; Detectify)
  1810. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  1811. Accept-Encoding gzip, deflate
  1812. Accept-Language en-US
  1813. Response Headers
  1814. HTTP/ 1.1 200 OK
  1815. Transfer-Encoding chunked
  1816. Server cloudflare
  1817. CF-RAY 3f383d6f5e256b6d-LHR
  1818. Connection keep-alive
  1819. Content-Encoding gzip
  1820. Date Tue, 27 Feb 2018 04:00:56 GMT
  1821. Content-Type text/html; charset=UTF-8
  1822. Expect-CT max-age=604800,
  1823. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  1824. Resources
  1825. REMEDIATION - Detectify Support Center - Empty Document
  1826. Crawled URL's
  1827. What does this mean?
  1828. This finding is generated for debugging purposes. A link is associated with this finding containing a
  1829. CSV file with all crawled URL's.
  1830. What can happen?
  1831. A scan might take too long due to representative content on the application. Vulnerabilities may also
  1832. be missed if Detectify lack coverage in some area of the application. If you suspect Detectify can
  1833. perform better, then take a look at the associated CSV.
  1834. Summary
  1835. Entry Found at CVSS
  1836. 1 skidbooter.com 0
  1837. 1. Crawled URL's
  1838. Summary
  1839. Found At
  1840. skidbooter.com
  1841. CVSS
  1842. 0 of 10.0
  1843. Detectify tried to access 941 URL's, 513 of these were identified as unique during crawling and
  1844. went through further testing.
  1845. Resources
  1846. DETECTIFY - Download Crawled URL's CSV
  1847. Discovered Host(s)
  1848. What does this mean?
  1849. Detectify has found the following hosts. This is in no way a vulnerability, but should be considered an
  1850. indicator for what has been covered.
  1851. here (http://support.detectify.com/customer/portal/articles/2792024-discovered-endpoint).
  1852. Summary
  1853. Entry Found at CVSS
  1854. 1 skidbooter.com 0
  1855. 1. Discovered Host(s)
  1856. Summary
  1857. Found At
  1858. skidbooter.com
  1859. CVSS
  1860. 0 of 10.0
  1861. Detectify found and tried to access 1 domain, and have analyzed it for security flaws.
  1862. skidbooter.com:
  1863. > 104.18.50.60
  1864. 80/tcp open
  1865. 443/tcp open
  1866. 2082/tcp open
  1867. 2083/tcp open
  1868. 8080/tcp open
  1869. 8443/tcp open
  1870. 8880/tcp open
  1871. 1443/tcp closed
  1872. 3000/tcp closed
  1873. 3001/tcp closed
  1874. 3128/tcp closed
  1875. 3790/tcp closed
  1876. 4443/tcp closed
  1877. 4444/tcp closed
  1878. 4502/tcp closed
  1879. 4505/tcp closed
  1880. 4567/tcp closed
  1881. 5000/tcp closed
  1882. 5050/tcp closed
  1883. 5051/tcp closed
  1884. 6443/tcp closed
  1885. 7001/tcp closed
  1886. 8001/tcp closed
  1887. 8069/tcp closed
  1888. 8081/tcp closed
  1889. 8089/tcp closed
  1890. 8090/tcp closed
  1891. 8111/tcp closed
  1892. 8161/tcp closed
  1893. 8181/tcp closed
  1894. 8500/tcp closed
  1895. 8888/tcp closed
  1896. 8983/tcp closed
  1897. 9000/tcp closed
  1898. 9001/tcp closed
  1899. 9002/tcp closed
  1900. 9003/tcp closed
  1901. 9090/tcp closed
  1902. 9200/tcp closed
  1903. 11211/tcp closed
  1904. 16686/tcp closed
  1905. 17000/tcp closed
  1906. 61680/tcp closed
  1907. 61681/tcp closed
  1908. > 104.18.51.60
  1909. 80/tcp open
  1910. 443/tcp open
  1911. 2082/tcp open
  1912. 2083/tcp open
  1913. 8080/tcp open
  1914. 8443/tcp open
  1915. 8880/tcp open
  1916. 1443/tcp closed
  1917. 3000/tcp closed
  1918. 3001/tcp closed
  1919. 3128/tcp closed
  1920. 3790/tcp closed
  1921. 4443/tcp closed
  1922. 4444/tcp closed
  1923. 4502/tcp closed
  1924. 4505/tcp closed
  1925. 4567/tcp closed
  1926. 5000/tcp closed
  1927. 5050/tcp closed
  1928. 5051/tcp closed
  1929. 6443/tcp closed
  1930. 7001/tcp closed
  1931. 8001/tcp closed
  1932. 8069/tcp closed
  1933. 8081/tcp closed
  1934. 8089/tcp closed
  1935. 8090/tcp closed
  1936. 8111/tcp closed
  1937. 8161/tcp closed
  1938. 8181/tcp closed
  1939. 8500/tcp closed
  1940. 8888/tcp closed
  1941. 8983/tcp closed
  1942. 9000/tcp closed
  1943. 9001/tcp closed
  1944. 9002/tcp closed
  1945. 9003/tcp closed
  1946. 9090/tcp closed
  1947. 9200/tcp closed
  1948. 11211/tcp closed
  1949. 16686/tcp closed
  1950. 17000/tcp closed
  1951. 61680/tcp closed
  1952. 61681/tcp closed
  1953. > 2400:cb00:2048:1::6812:323c
  1954. 80/tcp closed
  1955. 443/tcp closed
  1956. 1443/tcp closed
  1957. 2082/tcp closed
  1958. 2083/tcp closed
  1959. 3000/tcp closed
  1960. 3001/tcp closed
  1961. 3128/tcp closed
  1962. 3790/tcp closed
  1963. 4443/tcp closed
  1964. 4444/tcp closed
  1965. 4502/tcp closed
  1966. 4505/tcp closed
  1967. 4567/tcp closed
  1968. 5000/tcp closed
  1969. 5050/tcp closed
  1970. 5051/tcp closed
  1971. 6443/tcp closed
  1972. 7001/tcp closed
  1973. 8001/tcp closed
  1974. 8069/tcp closed
  1975. 8080/tcp closed
  1976. 8081/tcp closed
  1977. 8089/tcp closed
  1978. 8090/tcp closed
  1979. 8111/tcp closed
  1980. 8161/tcp closed
  1981. 8181/tcp closed
  1982. 8443/tcp closed
  1983. 8500/tcp closed
  1984. 8880/tcp closed
  1985. 8888/tcp closed
  1986. 8983/tcp closed
  1987. 9000/tcp closed
  1988. 9001/tcp closed
  1989. 9002/tcp closed
  1990. 9003/tcp closed
  1991. 9090/tcp closed
  1992. 9200/tcp closed
  1993. 11211/tcp closed
  1994. 16686/tcp closed
  1995. 17000/tcp closed
  1996. 61680/tcp closed
  1997. 61681/tcp closed
  1998. > 2400:cb00:2048:1::6812:333c
  1999. 80/tcp closed
  2000. 443/tcp closed
  2001. 1443/tcp closed
  2002. 2082/tcp closed
  2003. 2083/tcp closed
  2004. 3000/tcp closed
  2005. 3001/tcp closed
  2006. 3128/tcp closed
  2007. 3790/tcp closed
  2008. 4443/tcp closed
  2009. 4444/tcp closed
  2010. 4502/tcp closed
  2011. 4505/tcp closed
  2012. 4567/tcp closed
  2013. 5000/tcp closed
  2014. 5050/tcp closed
  2015. 5051/tcp closed
  2016. 6443/tcp closed
  2017. 7001/tcp closed
  2018. 8001/tcp closed
  2019. 8069/tcp closed
  2020. 8080/tcp closed
  2021. 8081/tcp closed
  2022. 8089/tcp closed
  2023. 8090/tcp closed
  2024. 8111/tcp closed
  2025. 8161/tcp closed
  2026. 8181/tcp closed
  2027. 8443/tcp closed
  2028. 8500/tcp closed
  2029. 8880/tcp closed
  2030. 8888/tcp closed
  2031. 8983/tcp closed
  2032. 9000/tcp closed
  2033. 9001/tcp closed
  2034. 9002/tcp closed
  2035. 9003/tcp closed
  2036. 9090/tcp closed
  2037. 9200/tcp closed
  2038. 11211/tcp closed
  2039. 16686/tcp closed
  2040. 17000/tcp closed
  2041. 61680/tcp closed
  2042. 61681/tcp closed
  2043. Email Enumeration
  2044. What does this mean?
  2045. The web site reveals one or more email addresses in plain text.
  2046. here (http://support.detectify.com/customer/portal/articles/2792087-email-enumeration).
  2047. What can happen?
  2048. Spammers can easily gather these email addresess and use them in spam campaigns. An attacker
  2049. may also use those email adressess for spear phishing and other attacks.
  2050. Summary
  2051. Entry Found at CVSS
  2052. 1 http://skidbooter.com/phpmyadmin/js/get_scripts.js.php 0
  2053. 1. Email Enumeration
  2054. Summary
  2055. Found At
  2056. http://skidbooter.com/phpmyadmin/js/get_scripts.js.php
  2057. CVSS
  2058. 0 of 10.0
  2059. Request Headers
  2060. GET /phpmyadmin/js/get_scripts.js.php?token=f10a2fcd6f4ab975dff1359e7001ccb5&scripts%5
  2061. B%5D=jquery/jquery-1.8.3.min.js&scripts%5B%5D=ajax.js&scripts%5B%5D=keyhandler.js&scri
  2062. pts%5B%5D=jquery/jquery-ui-1.9.2.custom.min.js&scripts%5B%5D=jquery/jquery.sprintf.js&scri
  2063. pts%5B%5D=jquery/jquery.cookie.js&scripts%5B%5D=jquery/jquery.mousewheel.js&scripts%5
  2064. B%5D=jquery/jquery.event.drag-2.2.js&scripts%5B%5D=jquery/jquery-ui-timepicker-addon.js&s
  2065. cripts%5B%5D=jquery/jquery.ba-hashchange-1.3.js&scripts%5B%5D=jquery/jquery.debounce-1
  2066. .0.5.js&scripts%5B%5D=jquery/jquery.menuResizer-1.0.js&scripts%5B%5D=cross_framing_prot
  2067. ection.js&scripts%5B%5D=rte.js&scripts%5B%5D=tracekit/tracekit.js&scripts%5B%5D=error_re
  2068. port.js&scripts%5B%5D=doclinks.js&scripts%5B%5D=functions.js&scripts%5B%5D=navigation.
  2069. js&scripts%5B%5D=indexes.js&scripts%5B%5D=common.js&scripts%5B%5D=codemirror/lib/c
  2070. odemirror.js&scripts%5B%5D=codemirror/mode/sql/sql.js&scripts%5B%5D=codemirror/addon/r
  2071. unmode/runmode.js HTTP/1.1
  2072. User-Agent Mozilla/5.0 (compatible; Detectify)
  2073. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2074. Referer http://skidbooter.com/phpmyadmin/index.php?db=&table=&lang=en&collation
  2075. _connection=utf8_general_ci&token=561988dc337f5e14462e9e1d9d786982&
  2076. lang=pt
  2077. Accept-Encoding gzip, deflate
  2078. Accept-Language en-US
  2079. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2080. Upgrade-Insecure-Requests1
  2081. Response Headers
  2082. HTTP/ 1.1 200 OK
  2083. Transfer-Encoding chunked
  2084. Server cloudflare
  2085. CF-RAY 3f38478d343e6a61-LHR
  2086. Connection keep-alive
  2087. Content-Encoding gzip
  2088. Expires Tue, 27 Feb 2018 05:08:53 GMT
  2089. Date Tue, 27 Feb 2018 04:07:50 GMT
  2090. Content-Type text/javascript; charset=UTF-8
  2091. Email
  2092. alpha@zforms.ru
  2093. Email
  2094. klaus.hartl@stilbuero.de
  2095. Resources
  2096. REMEDIATION - Detectify Support Center - Email enumeration
  2097. External Resources
  2098. What does this mean?
  2099. The web site includes resources hosted on an external domain (without utilising SRI).
  2100. knowledge base (https://support.detectify.com/customer/portal/articles/2792106-external-resources).
  2101. here (https://blog.detectify.com/2016/10/27/cdns-minimize-damages-if-the-cdn-is-hacked/), from the
  2102. title 'Integrity attribute' and then the rest of the article.
  2103. What can happen?
  2104. The owner of the domain the resources are loaded from has control of the resources and can change it
  2105. without the owner of the web site knowing. By doing so, the owner of the domain the resources are
  2106. loaded from can also affect the web site loading the resources.
  2107. This could be done by the owner of the external domain or an attacker who manages to hack it.
  2108. Summary
  2109. Entry Found at CVSS
  2110. 1 http://skidbooter.com/net/ 0
  2111. 2 http://skidbooter.com/register.php 0
  2112. 1. External Resources
  2113. Summary
  2114. Found At
  2115. http://skidbooter.com/net/
  2116. CVSS
  2117. 0 of 10.0
  2118. Request Headers
  2119. GET /net/ HTTP/1.1
  2120. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2121. Upgrade-Insecure-Requests1
  2122. User-Agent Mozilla/5.0 (compatible; Detectify)
  2123. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2124. Accept-Encoding gzip, deflate
  2125. Accept-Language en-US
  2126. Response Headers
  2127. HTTP/ 1.1 200 OK
  2128. Transfer-Encoding chunked
  2129. Server cloudflare
  2130. CF-RAY 3f383d7951fd6ba3-LHR
  2131. Connection keep-alive
  2132. Content-Encoding gzip
  2133. Vary Accept-Encoding
  2134. Last-Modified Tue, 27 Feb 2018 00:24:20 GMT
  2135. Date Tue, 27 Feb 2018 04:00:57 GMT
  2136. Content-Type text/html
  2137. https://ipinfo.info/ip/js.php
  2138. https://embed.selly.gg/
  2139. Resources
  2140. REMEDIATION - Detectify Support Center - External Resources
  2141. 1. External Resources
  2142. Summary
  2143. Found At
  2144. http://skidbooter.com/register.php
  2145. CVSS
  2146. 0 of 10.0
  2147. Request Headers
  2148. GET /register.php HTTP/1.1
  2149. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2150. Upgrade-Insecure-Requests1
  2151. User-Agent Mozilla/5.0 (compatible; Detectify)
  2152. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2153. Accept-Encoding gzip, deflate
  2154. Accept-Language en-US
  2155. Response Headers
  2156. HTTP/ 1.1 200 OK
  2157. Transfer-Encoding chunked
  2158. Cache-Control no-store, no-cache, must-revalidate
  2159. Server cloudflare
  2160. CF-RAY 3f383f06059e6a9d-LHR
  2161. Connection keep-alive
  2162. Content-Encoding gzip
  2163. Vary Accept-Encoding
  2164. Expires Thu, 19 Nov 1981 08:52:00 GMT
  2165. Pragma no-cache
  2166. Date Tue, 27 Feb 2018 04:02:01 GMT
  2167. Content-Type text/html; charset=UTF-8
  2168. https://www.google.com/recaptcha/api.js
  2169. Resources
  2170. REMEDIATION - Detectify Support Center - External Resources
  2171. Fingerprinted Software
  2172. What does this mean?
  2173. When Detectify audits an application, it collects various fingerprints that indicate what software is
  2174. running. These fingerprints then allow Detectify to run specific tests when the time is right.
  2175. Please make sure Detectify provide accurate data for these fingerprints, by sending us a message in
  2176. the feedback form on the finding details page.
  2177. What can happen?
  2178. Invalid fingerprints may cause a audit to take longer, and the lack of fingerprints may cause Detectify
  2179. to miss running specific tests.
  2180. Summary
  2181. Entry Found at CVSS
  2182. 1 http://skidbooter.com/ 0
  2183. 2 https://skidbooter.com/ 0
  2184. 1. Fingerprinted Software
  2185. Summary
  2186. Found At
  2187. http://skidbooter.com/
  2188. CVSS
  2189. 0 of 10.0
  2190. Vendor: apache
  2191. Software: http_server
  2192. Confidence: 100
  2193. Software: jquery
  2194. Version: 2.1.4
  2195. Confidence: 100
  2196. Resources
  2197. DETECTIFY - An intelligent way to look for vulnerabilities
  2198. DETECTIFY - What's under the hood
  2199. 1. Fingerprinted Software
  2200. Summary
  2201. Found At
  2202. https://skidbooter.com/
  2203. CVSS
  2204. 0 of 10.0
  2205. Vendor: apache
  2206. Software: http_server
  2207. Confidence: 100
  2208. Software: jquery
  2209. Version: 2.1.4
  2210. Confidence: 100
  2211. Resources
  2212. DETECTIFY - An intelligent way to look for vulnerabilities
  2213. DETECTIFY - What's under the hood
  2214. HTML Comments
  2215. What does this mean?
  2216. knowledge base (http://support.detectify.com/customer/en/portal/articles/2243487-html-comments).
  2217. What can happen?
  2218. The snippets of code within comments will remain inactive until you remove the comment brackets.
  2219. The comments might also contain sensitive information not meant for the public.
  2220. Summary
  2221. Entry Found at CVSS
  2222. 1 http://skidbooter.com/phpmyadmin/ 0
  2223. 2 http://skidbooter.com:8080/cdn-cgi/apps/head/82w_gO4sQ5uV5B0ZGSTWH
  2224. VDRMj0.js
  2225. 0
  2226. 1. HTML Comments
  2227. Summary
  2228. Found At
  2229. http://skidbooter.com/phpmyadmin/
  2230. CVSS
  2231. 0 of 10.0
  2232. <!-- Login form -->
  2233. Resources
  2234. REMEDIATION - Detectify Support Center - HTML Comments
  2235. 1. HTML Comments
  2236. Summary
  2237. Found At
  2238. http://skidbooter.com:8080/cdn-cgi/apps/head/82w_gO4sQ5uV5B0ZGSTWH
  2239. VDRMj0.js
  2240. CVSS
  2241. 0 of 10.0
  2242. <!-- /.error-overview -->
  2243. <!-- /.status-display -->
  2244. <!-- /.section -->
  2245. <!-- /.error-footer -->
  2246. <!-- /#cf-error-details -->
  2247. <!-- /#cf-wrapper -->
  2248. Resources
  2249. REMEDIATION - Detectify Support Center - HTML Comments
  2250. Lacking DMARC Policy
  2251. What does this mean?
  2252. The domain lacks a DMARC policy.
  2253. our knowledge base
  2254. (http://support.detectify.com/customer/en/portal/articles/2466214-missing-insufficient-dmarc-record).
  2255. What can happen?
  2256. An attacker will be able to spoof emails originating from any subdomain having either an A, AAAA or
  2257. MX record. In most clients, this is possible regardless of whether SPF policies are in place.
  2258. Summary
  2259. Entry Found at CVSS
  2260. 1 _dmarc.skidbooter.com 0
  2261. 1. Lacking DMARC Policy
  2262. Summary
  2263. Found At
  2264. _dmarc.skidbooter.com
  2265. CVSS
  2266. 0 of 10.0
  2267. Command
  2268. nslookup.exe -type=TXT _dmarc.skidbooter.com
  2269. Consider adding a DMARC policy on _dmarc.skidbooter.com and set the directive "p" to "reject".
  2270. Resources
  2271. REMEDIATION - Detectify Support Center - Missing/insufficient DMARC record
  2272. DETECTIFY - Misconfigured email servers open the door to spoofed emails from top domains
  2273. DETECTIFY - How to identify a phishing email
  2274. Missing Content Type
  2275. What does this mean?
  2276. The file is being served with a lacking content type header.
  2277. here (http://support.detectify.com/customer/portal/articles/2792285-missing-content-type).
  2278. What can happen?
  2279. It may be possible to conduct XSS attacks against Internet Exporer users, as Internet Explorer
  2280. recognizes files served with lacking content type as HTML.
  2281. Summary
  2282. Entry Found at CVSS
  2283. 1 http://skidbooter.com/assets/fonts/fontawesome-webfont.woff2 0
  2284. 2 http://skidbooter.com/assets/fonts/glyphicons-halflings-regular.woff2 0
  2285. 3 http://skidbooter.com/error.log 0
  2286. 4 http://skidbooter.com/error_log 0
  2287. 5 https://skidbooter.com/error.log 0
  2288. 6 https://skidbooter.com/error_log 0
  2289. 1. Missing Content Type
  2290. Summary
  2291. Found At
  2292. http://skidbooter.com/assets/fonts/fontawesome-webfont.woff2
  2293. CVSS
  2294. 0 of 10.0
  2295. Request Headers
  2296. GET /assets/fonts/fontawesome-webfont.woff2 HTTP/1.1
  2297. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2298. Upgrade-Insecure-Requests1
  2299. User-Agent Mozilla/5.0 (compatible; Detectify)
  2300. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2301. Accept-Encoding gzip, deflate
  2302. Accept-Language en-US
  2303. Response Headers
  2304. HTTP/ 1.1 200 OK
  2305. Accept-Ranges bytes
  2306. CF-Cache-Status MISS
  2307. Cache-Control public, max-age=14400
  2308. Server cloudflare
  2309. CF-RAY 3f38596c864469d7-LHR
  2310. ETag "ddcc-5471db94ce000"
  2311. Connection keep-alive
  2312. Vary Accept-Encoding
  2313. Last-Modified Sat, 28 Jan 2017 01:44:32 GMT
  2314. Expires Tue, 27 Feb 2018 08:20:02 GMT
  2315. Content-Length 56780
  2316. Date Tue, 27 Feb 2018 04:20:02 GMT
  2317. Resources
  2318. REMEDIATION - Detectify Support Center - Missing Content Type
  2319. MOZILLA - Incomplete list of MIME types
  2320. MOZILLA - MIME types
  2321. 1. Missing Content Type
  2322. Summary
  2323. Found At
  2324. http://skidbooter.com/assets/fonts/glyphicons-halflings-regular.woff2
  2325. CVSS
  2326. 0 of 10.0
  2327. Request Headers
  2328. GET /assets/fonts/glyphicons-halflings-regular.woff2 HTTP/1.1
  2329. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2330. Upgrade-Insecure-Requests1
  2331. User-Agent Mozilla/5.0 (compatible; Detectify)
  2332. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2333. Accept-Encoding gzip, deflate
  2334. Accept-Language en-US
  2335. Response Headers
  2336. HTTP/ 1.1 200 OK
  2337. Accept-Ranges bytes
  2338. CF-Cache-Status MISS
  2339. Cache-Control public, max-age=14400
  2340. Server cloudflare
  2341. CF-RAY 3f38596e56a869d7-LHR
  2342. ETag "466c-5471db92e5b80"
  2343. Connection keep-alive
  2344. Vary Accept-Encoding
  2345. Last-Modified Sat, 28 Jan 2017 01:44:30 GMT
  2346. Expires Tue, 27 Feb 2018 08:20:02 GMT
  2347. Content-Length 18028
  2348. Date Tue, 27 Feb 2018 04:20:02 GMT
  2349. Resources
  2350. REMEDIATION - Detectify Support Center - Missing Content Type
  2351. MOZILLA - Incomplete list of MIME types
  2352. MOZILLA - MIME types
  2353. 1. Missing Content Type
  2354. Summary
  2355. Found At
  2356. http://skidbooter.com/error.log
  2357. CVSS
  2358. 0 of 10.0
  2359. Request Headers
  2360. GET /error.log HTTP/1.1
  2361. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2362. Upgrade-Insecure-Requests1
  2363. User-Agent Mozilla/5.0 (compatible; Detectify)
  2364. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2365. Accept-Encoding gzip, deflate
  2366. Accept-Language en-US
  2367. Response Headers
  2368. HTTP/ 1.1 200 OK
  2369. Accept-Ranges bytes
  2370. Server cloudflare
  2371. CF-RAY 3f383d52c1756ba3-LHR
  2372. ETag "3cc-565d91d0074f1"
  2373. Connection keep-alive
  2374. Last-Modified Fri, 23 Feb 2018 03:54:12 GMT
  2375. Content-Length 972
  2376. Date Tue, 27 Feb 2018 04:00:51 GMT
  2377. Resources
  2378. REMEDIATION - Detectify Support Center - Missing Content Type
  2379. MOZILLA - Incomplete list of MIME types
  2380. MOZILLA - MIME types
  2381. 1. Missing Content Type
  2382. Summary
  2383. Found At
  2384. http://skidbooter.com/error_log
  2385. CVSS
  2386. 0 of 10.0
  2387. Request Headers
  2388. GET /error_log HTTP/1.1
  2389. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2390. Upgrade-Insecure-Requests1
  2391. User-Agent Mozilla/5.0 (compatible; Detectify)
  2392. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2393. Accept-Encoding gzip, deflate
  2394. Accept-Language en-US
  2395. Response Headers
  2396. HTTP/ 1.1 200 OK
  2397. Accept-Ranges bytes
  2398. Server cloudflare
  2399. CF-RAY 3f383ee017246a9d-LHR
  2400. ETag "426f7-548d5e793a480"
  2401. Connection keep-alive
  2402. Last-Modified Sat, 18 Feb 2017 22:53:54 GMT
  2403. Content-Length 272119
  2404. Date Tue, 27 Feb 2018 04:01:55 GMT
  2405. Resources
  2406. REMEDIATION - Detectify Support Center - Missing Content Type
  2407. MOZILLA - Incomplete list of MIME types
  2408. MOZILLA - MIME types
  2409. 1. Missing Content Type
  2410. Summary
  2411. Found At
  2412. https://skidbooter.com/error.log
  2413. CVSS
  2414. 0 of 10.0
  2415. Request Headers
  2416. GET /error.log HTTP/1.1
  2417. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2418. Upgrade-Insecure-Requests1
  2419. User-Agent Mozilla/5.0 (compatible; Detectify)
  2420. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2421. Accept-Encoding gzip, deflate
  2422. Accept-Language en-US
  2423. Response Headers
  2424. HTTP/ 1.1 200 OK
  2425. Accept-Ranges bytes
  2426. Server cloudflare
  2427. CF-RAY 3f383ee22ab408d8-LHR
  2428. ETag "3cc-565d91d0074f1"
  2429. Connection keep-alive
  2430. Last-Modified Fri, 23 Feb 2018 03:54:12 GMT
  2431. Content-Length 972
  2432. Date Tue, 27 Feb 2018 04:01:55 GMT
  2433. Expect-CT max-age=604800,
  2434. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  2435. Resources
  2436. REMEDIATION - Detectify Support Center - Missing Content Type
  2437. MOZILLA - Incomplete list of MIME types
  2438. MOZILLA - MIME types
  2439. 1. Missing Content Type
  2440. Summary
  2441. Found At
  2442. https://skidbooter.com/error_log
  2443. CVSS
  2444. 0 of 10.0
  2445. Request Headers
  2446. GET /error_log HTTP/1.1
  2447. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2448. Upgrade-Insecure-Requests1
  2449. User-Agent Mozilla/5.0 (compatible; Detectify)
  2450. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2451. Accept-Encoding gzip, deflate
  2452. Accept-Language en-US
  2453. Response Headers
  2454. HTTP/ 1.1 200 OK
  2455. Accept-Ranges bytes
  2456. Server cloudflare
  2457. CF-RAY 3f383d532d676b6d-LHR
  2458. ETag "426f7-548d5e793a480"
  2459. Connection keep-alive
  2460. Last-Modified Sat, 18 Feb 2017 22:53:54 GMT
  2461. Content-Length 272119
  2462. Date Tue, 27 Feb 2018 04:00:51 GMT
  2463. Expect-CT max-age=604800,
  2464. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  2465. Resources
  2466. REMEDIATION - Detectify Support Center - Missing Content Type
  2467. MOZILLA - Incomplete list of MIME types
  2468. MOZILLA - MIME types
  2469. Remote Administration Portal
  2470. What does this mean?
  2471. A remote administration interface has been found.
  2472. here (http://support.detectify.com/customer/portal/articles/2792091-remote-administration-portal).
  2473. Summary
  2474. Entry Found at CVSS
  2475. 1 http://skidbooter.com/phpmyadmin/ 0
  2476. 2 http://skidbooter.com/phpmyadmin/index.php 0
  2477. 3 https://skidbooter.com/phpmyadmin/ 0
  2478. 4 https://skidbooter.com/phpmyadmin/index.php 0
  2479. 1. Remote Administration Portal
  2480. Summary
  2481. Found At
  2482. http://skidbooter.com/phpmyadmin/
  2483. CVSS
  2484. 0 of 10.0
  2485. Request Headers
  2486. GET /phpmyadmin/ HTTP/1.1
  2487. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2488. Upgrade-Insecure-Requests1
  2489. User-Agent Mozilla/5.0 (compatible; Detectify)
  2490. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2491. Accept-Encoding gzip, deflate
  2492. Accept-Language en-US
  2493. Response Headers
  2494. HTTP/ 1.1 200 OK
  2495. Transfer-Encoding chunked
  2496. Server cloudflare
  2497. CF-RAY 3f383dcbd49e6ba3-LHR
  2498. Connection keep-alive
  2499. Last-Modified Tue, 27 Feb 2018 04:02:13 +0000
  2500. X-Content-Security-Policy default-src 'self' ;options inline-script eval-script;img-src 'self' data:
  2501. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  2502. Pragma no-cache
  2503. X-ob_mode 0
  2504. Date Tue, 27 Feb 2018 04:01:11 GMT
  2505. X-WebKit-CSP default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer
  2506. no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data:
  2507. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  2508. X-Frame-Options DENY
  2509. Cache-Control no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
  2510. Content-Security-Policy default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self'
  2511. 'unsafe-inline' ;referrer no-referrer;img-src 'self' data:
  2512. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  2513. Content-Encoding gzip
  2514. Set-Cookie phpMyAdmin=eu17m73p9v9uf8clqgjpmumleeoha6pr; path=/phpmyadmin/;
  2515. HttpOnly
  2516. Vary Accept-Encoding
  2517. Expires Tue, 27 Feb 2018 04:02:13 +0000
  2518. Content-Type text/html; charset=utf-8
  2519. <form method="post" action="index.php" name="login_form" class="disableAjax login hide
  2520. js-show">
  2521. <fieldset>
  2522. <legend>Log in<a
  2523. href="./url.php?url=http%3A%2F%2Fdocs.phpmyadmin.net%2Fen%2Flatest%2Findex.html"
  2524. target="documentation"><img src="themes/dot.gif" title="Documentation" alt="Documentation"
  2525. class="icon ic_b_help"></a></legend><div class="item">
  2526. <label for="input_username">Username:</label>
  2527. <input type="text" name="pma_username" id="input_username" value="" size="24"
  2528. class="textfield">
  2529. </div>
  2530. <div class="item">
  2531. <label for="input_password">Password:</label>
  2532. <input type="password" name="pma_password" id="input_password" value=""
  2533. size="24" class="textfield">
  2534. </div> <input type="hidden" name="server" value="1"></fieldset>
  2535. <fieldset class="tblFooters">
  2536. <input value="Go" type="submit" id="input_go"><input type="hidden" name="target"
  2537. value="index.php"><input type="hidden" name="lang" value="en"><input type="hidden"
  2538. name="collation_connection" value="utf8_general_ci"><input type="hidden" name="token"
  2539. value="561988dc337f5e14462e9e1d9d786982"></fieldset>
  2540. </form>
  2541. Resources
  2542. REMEDIATION - Detectify Support Center - Remote Administration Portal
  2543. 1. Remote Administration Portal
  2544. Summary
  2545. Found At
  2546. http://skidbooter.com/phpmyadmin/index.php
  2547. CVSS
  2548. 0 of 10.0
  2549. Request Headers
  2550. GET
  2551. /phpmyadmin/index.php?db=&table=&token=26ca6934e2761ab5d3c53cf3f82f1f5d&lang=ia
  2552. HTTP/1.1
  2553. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2554. Upgrade-Insecure-Requests1
  2555. User-Agent Mozilla/5.0 (compatible; Detectify)
  2556. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2557. Accept-Encoding gzip, deflate
  2558. Accept-Language en-US
  2559. Response Headers
  2560. HTTP/ 1.1 200 OK
  2561. Transfer-Encoding chunked
  2562. Server cloudflare
  2563. CF-RAY 3f383f8332976b55-LHR
  2564. Connection keep-alive
  2565. Last-Modified Tue, 27 Feb 2018 04:03:24 +0000
  2566. X-Content-Security-Policy default-src 'self' ;options inline-script eval-script;img-src 'self' data:
  2567. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  2568. Pragma no-cache
  2569. X-ob_mode 0
  2570. Date Tue, 27 Feb 2018 04:02:21 GMT
  2571. X-WebKit-CSP default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer
  2572. no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data:
  2573. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  2574. X-Frame-Options DENY
  2575. Cache-Control no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
  2576. Content-Security-Policy default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self'
  2577. 'unsafe-inline' ;referrer no-referrer;img-src 'self' data:
  2578. *.tile.openstreetmap.org *.tile.opencyclemap.org ;
  2579. Content-Encoding gzip
  2580. Set-Cookie pma_lang=ia; expires=Thu, 29-Mar-2018 04:03:24 GMT; Max-Age=2592000;
  2581. path=/phpmyadmin/; HttpOnly
  2582. Vary Accept-Encoding
  2583. Expires Tue, 27 Feb 2018 04:03:24 +0000
  2584. Content-Type text/html; charset=utf-8
  2585. <form method="post" action="index.php" name="login_form" class="disableAjax login hide
  2586. js-show">
  2587. <fieldset>
  2588. <legend>Log in<a
  2589. href="./url.php?url=http%3A%2F%2Fdocs.phpmyadmin.net%2Fen%2Flatest%2Findex.html"
  2590. target="documentation"><img src="themes/dot.gif" title="Documentation" alt="Documentation"
  2591. class="icon ic_b_help"></a></legend><div class="item">
  2592. <label for="input_username">Username:</label>
  2593. <input type="text" name="pma_username" id="input_username" value="" size="24"
  2594. class="textfield">
  2595. </div>
  2596. <div class="item">
  2597. <label for="input_password">Contrasigno:</label>
  2598. <input type="password" name="pma_password" id="input_password" value=""
  2599. size="24" class="textfield">
  2600. </div> <input type="hidden" name="server" value="1"></fieldset>
  2601. <fieldset class="tblFooters">
  2602. <input value="Vade" type="submit" id="input_go"><input type="hidden" name="target"
  2603. value="index.php"><input type="hidden" name="token"
  2604. value="ed03f5241d278db93cac7a89eb07c6e2"></fieldset>
  2605. </form>
  2606. Resources
  2607. REMEDIATION - Detectify Support Center - Remote Administration Portal
  2608. 1. Remote Administration Portal
  2609. Summary
  2610. Found At
  2611. https://skidbooter.com/phpmyadmin/
  2612. CVSS
  2613. 0 of 10.0
  2614. Request Headers
  2615. GET /phpmyadmin/ HTTP/1.1
  2616. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2617. Upgrade-Insecure-Requests1
  2618. User-Agent Mozilla/5.0 (compatible; Detectify)
  2619. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2620. Accept-Encoding gzip, deflate
  2621. Accept-Language en-US
  2622. Response Headers
  2623. HTTP/ 1.1 200 OK
  2624. Transfer-Encoding chunked
  2625. Server cloudflare
  2626. CF-RAY 3f383c400cd96b6d-LHR
  2627. Connection keep-alive
  2628. Last-Modified Tue, 27 Feb 2018 04:01:10 +0000
  2629. X-Content-Security-Policy default-src 'self' ;options inline-script eval-script;img-src 'self' data: ;
  2630. Pragma no-cache
  2631. X-ob_mode 0
  2632. Date Tue, 27 Feb 2018 04:00:07 GMT
  2633. X-WebKit-CSP default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer
  2634. no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data: ;
  2635. X-Frame-Options DENY
  2636. Cache-Control no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
  2637. Content-Security-Policy default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self'
  2638. 'unsafe-inline' ;referrer no-referrer;img-src 'self' data: ;
  2639. Content-Encoding gzip
  2640. Set-Cookie phpMyAdmin=7r9g3tef4h2mgv0bi762uhstc86kedon; path=/phpmyadmin/;
  2641. secure; HttpOnly
  2642. Vary Accept-Encoding
  2643. Expires Tue, 27 Feb 2018 04:01:10 +0000
  2644. Content-Type text/html; charset=utf-8
  2645. Expect-CT max-age=604800,
  2646. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  2647. <form method="post" action="index.php" name="login_form" class="disableAjax login hide
  2648. js-show">
  2649. <fieldset>
  2650. <legend>Log in<a
  2651. href="./url.php?url=http%3A%2F%2Fdocs.phpmyadmin.net%2Fen%2Flatest%2Findex.html"
  2652. target="documentation"><img src="themes/dot.gif" title="Documentation" alt="Documentation"
  2653. class="icon ic_b_help"></a></legend><div class="item">
  2654. <label for="input_username">Username:</label>
  2655. <input type="text" name="pma_username" id="input_username" value="" size="24"
  2656. class="textfield">
  2657. </div>
  2658. <div class="item">
  2659. <label for="input_password">Password:</label>
  2660. <input type="password" name="pma_password" id="input_password" value=""
  2661. size="24" class="textfield">
  2662. </div> <input type="hidden" name="server" value="1"></fieldset>
  2663. <fieldset class="tblFooters">
  2664. <input value="Go" type="submit" id="input_go"><input type="hidden" name="target"
  2665. value="index.php"><input type="hidden" name="lang" value="en"><input type="hidden"
  2666. name="collation_connection" value="utf8_general_ci"><input type="hidden" name="token"
  2667. value="bf688cd605ca26c573f7780ba004d76e"></fieldset>
  2668. </form>
  2669. Resources
  2670. REMEDIATION - Detectify Support Center - Remote Administration Portal
  2671. 1. Remote Administration Portal
  2672. Summary
  2673. Found At
  2674. https://skidbooter.com/phpmyadmin/index.php
  2675. CVSS
  2676. 0 of 10.0
  2677. Request Headers
  2678. GET
  2679. /phpmyadmin/index.php?db=&table=&token=5ffe82f52c3eb64dc8d984adc59d613a&lang=ko
  2680. HTTP/1.1
  2681. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2682. Upgrade-Insecure-Requests1
  2683. User-Agent Mozilla/5.0 (compatible; Detectify)
  2684. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2685. Accept-Encoding gzip, deflate
  2686. Accept-Language en-US
  2687. Response Headers
  2688. HTTP/ 1.1 200 OK
  2689. Transfer-Encoding chunked
  2690. Server cloudflare
  2691. CF-RAY 3f384197ae796a67-LHR
  2692. Connection keep-alive
  2693. Last-Modified Tue, 27 Feb 2018 04:04:49 +0000
  2694. X-Content-Security-Policy default-src 'self' ;options inline-script eval-script;img-src 'self' data: ;
  2695. Pragma no-cache
  2696. X-ob_mode 0
  2697. Date Tue, 27 Feb 2018 04:03:46 GMT
  2698. X-WebKit-CSP default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer
  2699. no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data: ;
  2700. X-Frame-Options DENY
  2701. Cache-Control no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
  2702. Content-Security-Policy default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self'
  2703. 'unsafe-inline' ;referrer no-referrer;img-src 'self' data: ;
  2704. Content-Encoding gzip
  2705. Set-Cookie pma_lang=ko; expires=Thu, 29-Mar-2018 04:04:49 GMT; Max-Age=2592000;
  2706. path=/phpmyadmin/; secure; HttpOnly
  2707. Vary Accept-Encoding
  2708. Expires Tue, 27 Feb 2018 04:04:49 +0000
  2709. Content-Type text/html; charset=utf-8
  2710. Expect-CT max-age=604800,
  2711. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  2712. <form method="post" action="index.php" name="login_form" class="disableAjax login hide
  2713. js-show">
  2714. <fieldset>
  2715. <legend>???<a
  2716. href="./url.php?url=http%3A%2F%2Fdocs.phpmyadmin.net%2Fen%2Flatest%2Findex.html"
  2717. target="documentation"><img src="themes/dot.gif" title="??" alt="??" class="icon
  2718. ic_b_help"></a></legend><div class="item">
  2719. <label for="input_username">????:</label>
  2720. <input type="text" name="pma_username" id="input_username" value="" size="24"
  2721. class="textfield">
  2722. </div>
  2723. <div class="item">
  2724. <label for="input_password">??:</label>
  2725. <input type="password" name="pma_password" id="input_password" value=""
  2726. size="24" class="textfield">
  2727. </div> <input type="hidden" name="server" value="1"></fieldset>
  2728. <fieldset class="tblFooters">
  2729. <input value="??" type="submit" id="input_go"><input type="hidden" name="target"
  2730. value="index.php"><input type="hidden" name="token"
  2731. value="846ca674e79a22754971ed20bd51705f"></fieldset>
  2732. </form>
  2733. Resources
  2734. REMEDIATION - Detectify Support Center - Remote Administration Portal
  2735. Service Providers
  2736. What does this mean?
  2737. The listed providers are authorized to host different parts of your infrastructure.
  2738. here (http://support.detectify.com/customer/portal/articles/2792249-service-providers).
  2739. What can happen?
  2740. Anyone can retrieve this data. It's only here to serve as an indicator of what vendors have access to.
  2741. Summary
  2742. Entry Found at CVSS
  2743. 1 skidbooter.com 0
  2744. 1. Service Providers
  2745. Summary
  2746. Found At
  2747. skidbooter.com
  2748. CVSS
  2749. 0 of 10.0
  2750. service_provider_name
  2751. jocelyn.ns.cloudflare.com
  2752. service_provider_host
  2753. CloudFlare
  2754. Resources
  2755. REMEDIATION - Detectify Support Center - Service Providers
  2756. Content Sniffing
  2757. What does this mean?
  2758. The web site lacks content sniffing hardening techniques.
  2759. here (http://support.detectify.com/customer/portal/articles/2792034-content-sniffing).
  2760. What can happen?
  2761. This may open up for XSS attacks as browsers will attempt to guess how to render specific resources
  2762. without the correct policies.
  2763. Summary
  2764. Entry Found at CVSS
  2765. 1 http://skidbooter.com/assets/css/oneui.css 0
  2766. 2 http://skidbooter.com/assets/js/app.js 0
  2767. 3 http://skidbooter.com/assets/js/core/bootstrap.min.js 0
  2768. 4 http://skidbooter.com/assets/js/core/jquery.appear.min.js 0
  2769. 5 http://skidbooter.com/assets/js/core/jquery.countTo.min.js 0
  2770. 6 http://skidbooter.com/assets/js/core/jquery.min.js 0
  2771. 7 http://skidbooter.com/assets/js/core/jquery.placeholder.min.js 0
  2772. 8 http://skidbooter.com/assets/js/core/jquery.scrollLock.min.js 0
  2773. 9 http://skidbooter.com/assets/js/core/jquery.slimscroll.min.js 0
  2774. 10 http://skidbooter.com/assets/js/core/js.cookie.min.js 0
  2775. 11 http://skidbooter.com/assets/js/pages/base_pages_login.js 0
  2776. 12 http://skidbooter.com/assets/js/pages/base_pages_register.js 0
  2777. 13 http://skidbooter.com/assets/js/plugins/jquery-validation/jquery.validate.min.js 0
  2778. 14 http://skidbooter.com/cdn-cgi/apps/body/0-JyvfX_oGnrbE8jiySETU3S9ZY.js 0
  2779. 15 http://skidbooter.com/cdn-cgi/apps/head/82w_gO4sQ5uV5B0ZGSTWHVDRM
  2780. j0.js
  2781. 0
  2782. 16 http://skidbooter.com:2082/cdn-cgi/scripts/jquery.min.js 0
  2783. 17 http://skidbooter.com:8080/cdn-cgi/scripts/jquery.min.js 0
  2784. 18 http://skidbooter.com:8880/cdn-cgi/scripts/jquery.min.js 0
  2785. 19 https://skidbooter.com/assets/js/app.js 0
  2786. 20 https://skidbooter.com/assets/js/core/bootstrap.min.js 0
  2787. 21 https://skidbooter.com/assets/js/core/jquery.appear.min.js 0
  2788. 22 https://skidbooter.com/assets/js/core/jquery.countTo.min.js 0
  2789. 23 https://skidbooter.com/assets/js/core/jquery.min.js 0
  2790. 24 https://skidbooter.com/assets/js/core/jquery.placeholder.min.js 0
  2791. 25 https://skidbooter.com/assets/js/core/jquery.scrollLock.min.js 0
  2792. 26 https://skidbooter.com/assets/js/core/jquery.slimscroll.min.js 0
  2793. 27 https://skidbooter.com/assets/js/core/js.cookie.min.js 0
  2794. 28 https://skidbooter.com/assets/js/pages/base_pages_login.js 0
  2795. 29 https://skidbooter.com/assets/js/pages/base_pages_register.js 0
  2796. 30 https://skidbooter.com/assets/js/plugins/jquery-validation/jquery.validate.min.js 0
  2797. 31 https://skidbooter.com/cdn-cgi/apps/body/0-JyvfX_oGnrbE8jiySETU3S9ZY.js 0
  2798. 32 https://skidbooter.com/cdn-cgi/apps/head/82w_gO4sQ5uV5B0ZGSTWHVDR
  2799. Mj0.js
  2800. 0
  2801. 33 https://skidbooter.com:2083/cdn-cgi/scripts/jquery.min.js 0
  2802. 34 https://skidbooter.com:8443/cdn-cgi/scripts/jquery.min.js 0
  2803. 1. Content Sniffing
  2804. Summary
  2805. Found At
  2806. http://skidbooter.com/assets/css/oneui.css
  2807. CVSS
  2808. 0 of 10.0
  2809. Request Headers
  2810. GET /assets/css/oneui.css HTTP/1.1
  2811. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2812. Upgrade-Insecure-Requests1
  2813. User-Agent Mozilla/5.0 (compatible; Detectify)
  2814. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2815. Accept-Encoding gzip, deflate
  2816. Accept-Language en-US
  2817. Response Headers
  2818. HTTP/ 1.1 200 OK
  2819. Server cloudflare
  2820. CF-RAY 3f38564f04e06b55-LHR
  2821. Connection keep-alive
  2822. Last-Modified Sat, 28 Jan 2017 01:44:28 GMT
  2823. Date Tue, 27 Feb 2018 04:17:55 GMT
  2824. Accept-Ranges bytes
  2825. CF-Cache-Status EXPIRED
  2826. Cache-Control public, max-age=14400
  2827. ETag "5c54e-5471db90fd700-gzip"
  2828. Content-Encoding gzip
  2829. Vary Accept-Encoding
  2830. Expires Tue, 27 Feb 2018 08:17:55 GMT
  2831. Content-Length 48536
  2832. Content-Type text/css
  2833. Resources
  2834. REMEDIATION - Detectify Support Center - Content sniffing
  2835. OWASP - X-Content-Type-Options
  2836. MOZILLA - X-Content-Type-Options
  2837. 1. Content Sniffing
  2838. Summary
  2839. Found At
  2840. http://skidbooter.com/assets/js/app.js
  2841. CVSS
  2842. 0 of 10.0
  2843. Request Headers
  2844. GET /assets/js/app.js HTTP/1.1
  2845. User-Agent Mozilla/5.0 (compatible; Detectify)
  2846. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2847. Referer http://skidbooter.com/login.php
  2848. Accept-Encoding gzip, deflate
  2849. Accept-Language en-US
  2850. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2851. Upgrade-Insecure-Requests1
  2852. Response Headers
  2853. HTTP/ 1.1 200 OK
  2854. Server cloudflare
  2855. CF-RAY 3f383d8b85d96ba3-LHR
  2856. Connection keep-alive
  2857. Last-Modified Sat, 28 Jan 2017 01:45:12 GMT
  2858. Date Tue, 27 Feb 2018 04:01:00 GMT
  2859. Accept-Ranges bytes
  2860. CF-Cache-Status HIT
  2861. Cache-Control public, max-age=14400
  2862. ETag "a649-5471dbbaf3a00-gzip"
  2863. Content-Encoding gzip
  2864. Vary Accept-Encoding
  2865. Expires Tue, 27 Feb 2018 08:01:00 GMT
  2866. Content-Length 7820
  2867. Content-Type application/javascript
  2868. Resources
  2869. REMEDIATION - Detectify Support Center - Content sniffing
  2870. OWASP - X-Content-Type-Options
  2871. MOZILLA - X-Content-Type-Options
  2872. 1. Content Sniffing
  2873. Summary
  2874. Found At
  2875. http://skidbooter.com/assets/js/core/bootstrap.min.js
  2876. CVSS
  2877. 0 of 10.0
  2878. Request Headers
  2879. GET /assets/js/core/bootstrap.min.js HTTP/1.1
  2880. User-Agent Mozilla/5.0 (compatible; Detectify)
  2881. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2882. Referer http://skidbooter.com/login.php
  2883. Accept-Encoding gzip, deflate
  2884. Accept-Language en-US
  2885. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2886. Upgrade-Insecure-Requests1
  2887. Response Headers
  2888. HTTP/ 1.1 200 OK
  2889. Server cloudflare
  2890. CF-RAY 3f383d8aa5a86ba3-LHR
  2891. Connection keep-alive
  2892. Last-Modified Sat, 28 Jan 2017 01:45:16 GMT
  2893. Date Tue, 27 Feb 2018 04:01:00 GMT
  2894. Accept-Ranges bytes
  2895. CF-Cache-Status HIT
  2896. Cache-Control public, max-age=14400
  2897. ETag "8c75-5471dbbec4300-gzip"
  2898. Content-Encoding gzip
  2899. Vary Accept-Encoding
  2900. Expires Tue, 27 Feb 2018 08:01:00 GMT
  2901. Content-Length 9546
  2902. Content-Type application/javascript
  2903. Resources
  2904. REMEDIATION - Detectify Support Center - Content sniffing
  2905. OWASP - X-Content-Type-Options
  2906. MOZILLA - X-Content-Type-Options
  2907. 1. Content Sniffing
  2908. Summary
  2909. Found At
  2910. http://skidbooter.com/assets/js/core/jquery.appear.min.js
  2911. CVSS
  2912. 0 of 10.0
  2913. Request Headers
  2914. GET /assets/js/core/jquery.appear.min.js HTTP/1.1
  2915. User-Agent Mozilla/5.0 (compatible; Detectify)
  2916. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2917. Referer http://skidbooter.com/login.php
  2918. Accept-Encoding gzip, deflate
  2919. Accept-Language en-US
  2920. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2921. Upgrade-Insecure-Requests1
  2922. Response Headers
  2923. HTTP/ 1.1 200 OK
  2924. Server cloudflare
  2925. CF-RAY 3f383d8b05c36ba3-LHR
  2926. Connection keep-alive
  2927. Last-Modified Sat, 28 Jan 2017 01:45:14 GMT
  2928. Date Tue, 27 Feb 2018 04:01:00 GMT
  2929. Accept-Ranges bytes
  2930. CF-Cache-Status HIT
  2931. Cache-Control public, max-age=14400
  2932. ETag "63a-5471dbbcdbe80-gzip"
  2933. Content-Encoding gzip
  2934. Vary Accept-Encoding
  2935. Expires Tue, 27 Feb 2018 08:01:00 GMT
  2936. Content-Length 770
  2937. Content-Type application/javascript
  2938. Resources
  2939. REMEDIATION - Detectify Support Center - Content sniffing
  2940. OWASP - X-Content-Type-Options
  2941. MOZILLA - X-Content-Type-Options
  2942. 1. Content Sniffing
  2943. Summary
  2944. Found At
  2945. http://skidbooter.com/assets/js/core/jquery.countTo.min.js
  2946. CVSS
  2947. 0 of 10.0
  2948. Request Headers
  2949. GET /assets/js/core/jquery.countTo.min.js HTTP/1.1
  2950. User-Agent Mozilla/5.0 (compatible; Detectify)
  2951. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2952. Referer http://skidbooter.com/login.php
  2953. Accept-Encoding gzip, deflate
  2954. Accept-Language en-US
  2955. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2956. Upgrade-Insecure-Requests1
  2957. Response Headers
  2958. HTTP/ 1.1 200 OK
  2959. Server cloudflare
  2960. CF-RAY 3f383d8b35c66ba3-LHR
  2961. Connection keep-alive
  2962. Last-Modified Sat, 28 Jan 2017 01:45:14 GMT
  2963. Date Tue, 27 Feb 2018 04:01:00 GMT
  2964. Accept-Ranges bytes
  2965. CF-Cache-Status HIT
  2966. Cache-Control public, max-age=14400
  2967. ETag "7ec-5471dbbcdbe80-gzip"
  2968. Content-Encoding gzip
  2969. Vary Accept-Encoding
  2970. Expires Tue, 27 Feb 2018 08:01:00 GMT
  2971. Content-Length 771
  2972. Content-Type application/javascript
  2973. Resources
  2974. REMEDIATION - Detectify Support Center - Content sniffing
  2975. OWASP - X-Content-Type-Options
  2976. MOZILLA - X-Content-Type-Options
  2977. 1. Content Sniffing
  2978. Summary
  2979. Found At
  2980. http://skidbooter.com/assets/js/core/jquery.min.js
  2981. CVSS
  2982. 0 of 10.0
  2983. Request Headers
  2984. GET /assets/js/core/jquery.min.js HTTP/1.1
  2985. User-Agent Mozilla/5.0 (compatible; Detectify)
  2986. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  2987. Referer http://skidbooter.com/login.php
  2988. Accept-Encoding gzip, deflate
  2989. Accept-Language en-US
  2990. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  2991. Upgrade-Insecure-Requests1
  2992. Response Headers
  2993. HTTP/ 1.1 200 OK
  2994. Server cloudflare
  2995. CF-RAY 3f383d89d5716ba3-LHR
  2996. Connection keep-alive
  2997. Last-Modified Sat, 28 Jan 2017 01:45:14 GMT
  2998. Date Tue, 27 Feb 2018 04:01:00 GMT
  2999. Accept-Ranges bytes
  3000. CF-Cache-Status HIT
  3001. Cache-Control public, max-age=14400
  3002. ETag "1497d-5471dbbcdbe80-gzip"
  3003. Content-Encoding gzip
  3004. Vary Accept-Encoding
  3005. Expires Tue, 27 Feb 2018 08:01:00 GMT
  3006. Content-Length 29541
  3007. Content-Type application/javascript
  3008. Resources
  3009. REMEDIATION - Detectify Support Center - Content sniffing
  3010. OWASP - X-Content-Type-Options
  3011. MOZILLA - X-Content-Type-Options
  3012. 1. Content Sniffing
  3013. Summary
  3014. Found At
  3015. http://skidbooter.com/assets/js/core/jquery.placeholder.min.js
  3016. CVSS
  3017. 0 of 10.0
  3018. Request Headers
  3019. GET /assets/js/core/jquery.placeholder.min.js HTTP/1.1
  3020. User-Agent Mozilla/5.0 (compatible; Detectify)
  3021. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3022. Referer http://skidbooter.com/login.php
  3023. Accept-Encoding gzip, deflate
  3024. Accept-Language en-US
  3025. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3026. Upgrade-Insecure-Requests1
  3027. Response Headers
  3028. HTTP/ 1.1 200 OK
  3029. Server cloudflare
  3030. CF-RAY 3f383d8b45cb6ba3-LHR
  3031. Connection keep-alive
  3032. Last-Modified Sat, 28 Jan 2017 01:45:14 GMT
  3033. Date Tue, 27 Feb 2018 04:01:00 GMT
  3034. Accept-Ranges bytes
  3035. CF-Cache-Status HIT
  3036. Cache-Control public, max-age=14400
  3037. ETag "a36-5471dbbcdbe80-gzip"
  3038. Content-Encoding gzip
  3039. Vary Accept-Encoding
  3040. Expires Tue, 27 Feb 2018 08:01:00 GMT
  3041. Content-Length 1103
  3042. Content-Type application/javascript
  3043. Resources
  3044. REMEDIATION - Detectify Support Center - Content sniffing
  3045. OWASP - X-Content-Type-Options
  3046. MOZILLA - X-Content-Type-Options
  3047. 1. Content Sniffing
  3048. Summary
  3049. Found At
  3050. http://skidbooter.com/assets/js/core/jquery.scrollLock.min.js
  3051. CVSS
  3052. 0 of 10.0
  3053. Request Headers
  3054. GET /assets/js/core/jquery.scrollLock.min.js HTTP/1.1
  3055. User-Agent Mozilla/5.0 (compatible; Detectify)
  3056. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3057. Referer http://skidbooter.com/login.php
  3058. Accept-Encoding gzip, deflate
  3059. Accept-Language en-US
  3060. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3061. Upgrade-Insecure-Requests1
  3062. Response Headers
  3063. HTTP/ 1.1 200 OK
  3064. Server cloudflare
  3065. CF-RAY 3f383d8af5ba6ba3-LHR
  3066. Connection keep-alive
  3067. Last-Modified Sat, 28 Jan 2017 01:45:12 GMT
  3068. Date Tue, 27 Feb 2018 04:01:00 GMT
  3069. Accept-Ranges bytes
  3070. CF-Cache-Status HIT
  3071. Cache-Control public, max-age=14400
  3072. ETag "4ad-5471dbbaf3a00-gzip"
  3073. Content-Encoding gzip
  3074. Vary Accept-Encoding
  3075. Expires Tue, 27 Feb 2018 08:01:00 GMT
  3076. Content-Length 639
  3077. Content-Type application/javascript
  3078. Resources
  3079. REMEDIATION - Detectify Support Center - Content sniffing
  3080. OWASP - X-Content-Type-Options
  3081. MOZILLA - X-Content-Type-Options
  3082. 1. Content Sniffing
  3083. Summary
  3084. Found At
  3085. http://skidbooter.com/assets/js/core/jquery.slimscroll.min.js
  3086. CVSS
  3087. 0 of 10.0
  3088. Request Headers
  3089. GET /assets/js/core/jquery.slimscroll.min.js HTTP/1.1
  3090. User-Agent Mozilla/5.0 (compatible; Detectify)
  3091. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3092. Referer http://skidbooter.com/login.php
  3093. Accept-Encoding gzip, deflate
  3094. Accept-Language en-US
  3095. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3096. Upgrade-Insecure-Requests1
  3097. Response Headers
  3098. HTTP/ 1.1 200 OK
  3099. Server cloudflare
  3100. CF-RAY 3f383d8ad5b36ba3-LHR
  3101. Connection keep-alive
  3102. Last-Modified Sat, 28 Jan 2017 01:45:12 GMT
  3103. Date Tue, 27 Feb 2018 04:01:00 GMT
  3104. Accept-Ranges bytes
  3105. CF-Cache-Status HIT
  3106. Cache-Control public, max-age=14400
  3107. ETag "1256-5471dbbaf3a00-gzip"
  3108. Content-Encoding gzip
  3109. Vary Accept-Encoding
  3110. Expires Tue, 27 Feb 2018 08:01:00 GMT
  3111. Content-Length 1892
  3112. Content-Type application/javascript
  3113. Resources
  3114. REMEDIATION - Detectify Support Center - Content sniffing
  3115. OWASP - X-Content-Type-Options
  3116. MOZILLA - X-Content-Type-Options
  3117. 1. Content Sniffing
  3118. Summary
  3119. Found At
  3120. http://skidbooter.com/assets/js/core/js.cookie.min.js
  3121. CVSS
  3122. 0 of 10.0
  3123. Request Headers
  3124. GET /assets/js/core/js.cookie.min.js HTTP/1.1
  3125. User-Agent Mozilla/5.0 (compatible; Detectify)
  3126. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3127. Referer http://skidbooter.com/login.php
  3128. Accept-Encoding gzip, deflate
  3129. Accept-Language en-US
  3130. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3131. Upgrade-Insecure-Requests1
  3132. Response Headers
  3133. HTTP/ 1.1 200 OK
  3134. Server cloudflare
  3135. CF-RAY 3f383d8b65d16ba3-LHR
  3136. Connection keep-alive
  3137. Last-Modified Sat, 28 Jan 2017 01:45:12 GMT
  3138. Date Tue, 27 Feb 2018 04:01:00 GMT
  3139. Accept-Ranges bytes
  3140. CF-Cache-Status HIT
  3141. Cache-Control public, max-age=14400
  3142. ETag "6d8-5471dbbaf3a00-gzip"
  3143. Content-Encoding gzip
  3144. Vary Accept-Encoding
  3145. Expires Tue, 27 Feb 2018 08:01:00 GMT
  3146. Content-Length 925
  3147. Content-Type application/javascript
  3148. Resources
  3149. REMEDIATION - Detectify Support Center - Content sniffing
  3150. OWASP - X-Content-Type-Options
  3151. MOZILLA - X-Content-Type-Options
  3152. 1. Content Sniffing
  3153. Summary
  3154. Found At
  3155. http://skidbooter.com/assets/js/pages/base_pages_login.js
  3156. CVSS
  3157. 0 of 10.0
  3158. Request Headers
  3159. GET /assets/js/pages/base_pages_login.js HTTP/1.1
  3160. User-Agent Mozilla/5.0 (compatible; Detectify)
  3161. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3162. Referer http://skidbooter.com/login.php
  3163. Accept-Encoding gzip, deflate
  3164. Accept-Language en-US
  3165. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3166. Upgrade-Insecure-Requests1
  3167. Response Headers
  3168. HTTP/ 1.1 200 OK
  3169. Server cloudflare
  3170. CF-RAY 3f383d8bc5eb6ba3-LHR
  3171. Connection keep-alive
  3172. Last-Modified Fri, 23 Feb 2018 20:29:11 GMT
  3173. Date Tue, 27 Feb 2018 04:01:00 GMT
  3174. Accept-Ranges bytes
  3175. CF-Cache-Status HIT
  3176. Cache-Control public, max-age=14400
  3177. ETag "7a2-565e7035053c0-gzip"
  3178. Content-Encoding gzip
  3179. Vary Accept-Encoding
  3180. Expires Tue, 27 Feb 2018 08:01:00 GMT
  3181. Content-Length 647
  3182. Content-Type application/javascript
  3183. Resources
  3184. REMEDIATION - Detectify Support Center - Content sniffing
  3185. OWASP - X-Content-Type-Options
  3186. MOZILLA - X-Content-Type-Options
  3187. 1. Content Sniffing
  3188. Summary
  3189. Found At
  3190. http://skidbooter.com/assets/js/pages/base_pages_register.js
  3191. CVSS
  3192. 0 of 10.0
  3193. Request Headers
  3194. GET /assets/js/pages/base_pages_register.js HTTP/1.1
  3195. User-Agent Mozilla/5.0 (compatible; Detectify)
  3196. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3197. Referer http://skidbooter.com/register.php
  3198. Accept-Encoding gzip, deflate
  3199. Accept-Language en-US
  3200. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3201. Upgrade-Insecure-Requests1
  3202. Response Headers
  3203. HTTP/ 1.1 200 OK
  3204. Server cloudflare
  3205. CF-RAY 3f383f1187fb6a9d-LHR
  3206. Connection keep-alive
  3207. Last-Modified Sat, 28 Jan 2017 01:45:18 GMT
  3208. Date Tue, 27 Feb 2018 04:02:03 GMT
  3209. Accept-Ranges bytes
  3210. CF-Cache-Status HIT
  3211. Cache-Control public, max-age=14400
  3212. ETag "a72-5471dbc0ac780-gzip"
  3213. Content-Encoding gzip
  3214. Vary Accept-Encoding
  3215. Expires Tue, 27 Feb 2018 08:02:03 GMT
  3216. Content-Length 738
  3217. Content-Type application/javascript
  3218. Resources
  3219. REMEDIATION - Detectify Support Center - Content sniffing
  3220. OWASP - X-Content-Type-Options
  3221. MOZILLA - X-Content-Type-Options
  3222. 1. Content Sniffing
  3223. Summary
  3224. Found At
  3225. http://skidbooter.com/assets/js/plugins/jquery-validation/jquery.validate.min.js
  3226. CVSS
  3227. 0 of 10.0
  3228. Request Headers
  3229. GET /assets/js/plugins/jquery-validation/jquery.validate.min.js HTTP/1.1
  3230. User-Agent Mozilla/5.0 (compatible; Detectify)
  3231. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3232. Referer http://skidbooter.com/login.php
  3233. Accept-Encoding gzip, deflate
  3234. Accept-Language en-US
  3235. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3236. Upgrade-Insecure-Requests1
  3237. Response Headers
  3238. HTTP/ 1.1 200 OK
  3239. Server cloudflare
  3240. CF-RAY 3f383d8ba5e06ba3-LHR
  3241. Connection keep-alive
  3242. Last-Modified Sat, 28 Jan 2017 01:47:22 GMT
  3243. Date Tue, 27 Feb 2018 04:01:00 GMT
  3244. Accept-Ranges bytes
  3245. CF-Cache-Status HIT
  3246. Cache-Control public, max-age=14400
  3247. ETag "5453-5471dc36ede80-gzip"
  3248. Content-Encoding gzip
  3249. Vary Accept-Encoding
  3250. Expires Tue, 27 Feb 2018 08:01:00 GMT
  3251. Content-Length 6792
  3252. Content-Type application/javascript
  3253. Resources
  3254. REMEDIATION - Detectify Support Center - Content sniffing
  3255. OWASP - X-Content-Type-Options
  3256. MOZILLA - X-Content-Type-Options
  3257. 1. Content Sniffing
  3258. Summary
  3259. Found At
  3260. http://skidbooter.com/cdn-cgi/apps/body/0-JyvfX_oGnrbE8jiySETU3S9ZY.js
  3261. CVSS
  3262. 0 of 10.0
  3263. Request Headers
  3264. GET /cdn-cgi/apps/body/0-JyvfX_oGnrbE8jiySETU3S9ZY.js HTTP/1.1
  3265. User-Agent Mozilla/5.0 (compatible; Detectify)
  3266. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3267. Referer http://skidbooter.com/admin
  3268. Accept-Encoding gzip, deflate
  3269. Accept-Language en-US
  3270. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3271. Upgrade-Insecure-Requests1
  3272. Response Headers
  3273. HTTP/ 1.1 200 OK
  3274. Server cloudflare
  3275. CF-RAY 3f383c1f403e6a19-LHR
  3276. Connection keep-alive
  3277. Last-Modified Sat, 24 Feb 2018 03:01:19 GMT
  3278. x-amz-version-id w.wSVPaYjMxx1soiGl19r3EvvWkBEYvz
  3279. Date Tue, 27 Feb 2018 04:00:02 GMT
  3280. CF-Cache-Status HIT
  3281. Cache-Control public, max-age=31536000
  3282. ETag "e5e5fc7485dfaf68a6d7b07439259e36"
  3283. Content-Encoding gzip
  3284. Vary Accept-Encoding
  3285. x-amz-request-id 02524C316DFF8C8D
  3286. Expires Wed, 27 Feb 2019 04:00:02 GMT
  3287. Content-Length 9046
  3288. x-amz-id-2 jJkGw+HyHhk++0sXKZWLit3le3WaZQKWewIerQEmr271GzGeLPoW3/6twZs
  3289. 4NAzh8EZLEyICRL8=
  3290. Content-Type application/javascript; charset=utf-8
  3291. Resources
  3292. REMEDIATION - Detectify Support Center - Content sniffing
  3293. OWASP - X-Content-Type-Options
  3294. MOZILLA - X-Content-Type-Options
  3295. 1. Content Sniffing
  3296. Summary
  3297. Found At
  3298. http://skidbooter.com/cdn-cgi/apps/head/82w_gO4sQ5uV5B0ZGSTWHVDRM
  3299. j0.js
  3300. CVSS
  3301. 0 of 10.0
  3302. Request Headers
  3303. GET /cdn-cgi/apps/head/82w_gO4sQ5uV5B0ZGSTWHVDRMj0.js HTTP/1.1
  3304. User-Agent Mozilla/5.0 (compatible; Detectify)
  3305. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3306. Referer http://skidbooter.com/admin
  3307. Accept-Encoding gzip, deflate
  3308. Accept-Language en-US
  3309. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3310. Upgrade-Insecure-Requests1
  3311. Response Headers
  3312. HTTP/ 1.1 200 OK
  3313. Server cloudflare
  3314. CF-RAY 3f383c1e90196a19-LHR
  3315. Connection keep-alive
  3316. Last-Modified Sat, 24 Feb 2018 03:01:19 GMT
  3317. x-amz-version-id rqjMVQL2I4Kk8KXt5xKMt.azipcuj0Xx
  3318. Date Tue, 27 Feb 2018 04:00:02 GMT
  3319. CF-Cache-Status HIT
  3320. Cache-Control public, max-age=31536000
  3321. ETag "977879dedb46f380cf93614586210c96"
  3322. Content-Encoding gzip
  3323. Vary Accept-Encoding
  3324. x-amz-request-id 7A89128BAA9F1933
  3325. Expires Wed, 27 Feb 2019 04:00:02 GMT
  3326. Content-Length 4056
  3327. x-amz-id-2 TNQyfLK2iMK1OJJueLPJI2r4NJJtNNxKryer3L24drEhMXD5+SWBHGgURVH
  3328. MbSVakX0KjoQx/FU=
  3329. Content-Type application/javascript; charset=utf-8
  3330. Resources
  3331. REMEDIATION - Detectify Support Center - Content sniffing
  3332. OWASP - X-Content-Type-Options
  3333. MOZILLA - X-Content-Type-Options
  3334. 1. Content Sniffing
  3335. Summary
  3336. Found At
  3337. http://skidbooter.com:2082/cdn-cgi/scripts/jquery.min.js
  3338. CVSS
  3339. 0 of 10.0
  3340. Request Headers
  3341. GET /cdn-cgi/scripts/jquery.min.js HTTP/1.1
  3342. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3343. Upgrade-Insecure-Requests1
  3344. User-Agent Mozilla/5.0 (compatible; Detectify)
  3345. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3346. Accept-Encoding gzip, deflate
  3347. Accept-Language en-US
  3348. Response Headers
  3349. HTTP/ 1.1 200 OK
  3350. Transfer-Encoding chunked
  3351. Server cloudflare-nginx
  3352. CF-RAY 3f384c35a7556a49-LHR
  3353. Connection keep-alive
  3354. Last-Modified Wed, 21 Feb 2018 10:29:42 GMT
  3355. Date Tue, 27 Feb 2018 04:11:01 GMT
  3356. X-Frame-Options SAMEORIGIN
  3357. Cache-Control max-age=172800
  3358. ETag W/"5a8d4a16-17bdc"
  3359. Content-Encoding gzip
  3360. Vary Accept-Encoding
  3361. Expires Thu, 01 Mar 2018 04:11:01 GMT
  3362. Content-Type application/javascript
  3363. Resources
  3364. REMEDIATION - Detectify Support Center - Content sniffing
  3365. OWASP - X-Content-Type-Options
  3366. MOZILLA - X-Content-Type-Options
  3367. 1. Content Sniffing
  3368. Summary
  3369. Found At
  3370. http://skidbooter.com:8080/cdn-cgi/scripts/jquery.min.js
  3371. CVSS
  3372. 0 of 10.0
  3373. Request Headers
  3374. GET /cdn-cgi/scripts/jquery.min.js HTTP/1.1
  3375. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3376. Upgrade-Insecure-Requests1
  3377. User-Agent Mozilla/5.0 (compatible; Detectify)
  3378. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3379. Accept-Encoding gzip, deflate
  3380. Accept-Language en-US
  3381. Response Headers
  3382. HTTP/ 1.1 200 OK
  3383. Transfer-Encoding chunked
  3384. Server cloudflare-nginx
  3385. CF-RAY 3f384c8ae64006c4-LHR
  3386. Connection keep-alive
  3387. Last-Modified Wed, 21 Feb 2018 10:29:42 GMT
  3388. Date Tue, 27 Feb 2018 04:11:15 GMT
  3389. X-Frame-Options SAMEORIGIN
  3390. Cache-Control max-age=172800
  3391. ETag W/"5a8d4a16-17bdc"
  3392. Content-Encoding gzip
  3393. Vary Accept-Encoding
  3394. Expires Thu, 01 Mar 2018 04:11:15 GMT
  3395. Content-Type application/javascript
  3396. Resources
  3397. REMEDIATION - Detectify Support Center - Content sniffing
  3398. OWASP - X-Content-Type-Options
  3399. MOZILLA - X-Content-Type-Options
  3400. 1. Content Sniffing
  3401. Summary
  3402. Found At
  3403. http://skidbooter.com:8880/cdn-cgi/scripts/jquery.min.js
  3404. CVSS
  3405. 0 of 10.0
  3406. Request Headers
  3407. GET /cdn-cgi/scripts/jquery.min.js HTTP/1.1
  3408. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3409. Upgrade-Insecure-Requests1
  3410. User-Agent Mozilla/5.0 (compatible; Detectify)
  3411. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3412. Accept-Encoding gzip, deflate
  3413. Accept-Language en-US
  3414. Response Headers
  3415. HTTP/ 1.1 200 OK
  3416. Transfer-Encoding chunked
  3417. Server cloudflare-nginx
  3418. CF-RAY 3f3855d7668f6a01-LHR
  3419. Connection keep-alive
  3420. Last-Modified Wed, 21 Feb 2018 10:29:42 GMT
  3421. Date Tue, 27 Feb 2018 04:17:35 GMT
  3422. X-Frame-Options SAMEORIGIN
  3423. Cache-Control max-age=172800
  3424. ETag W/"5a8d4a16-17bdc"
  3425. Content-Encoding gzip
  3426. Vary Accept-Encoding
  3427. Expires Thu, 01 Mar 2018 04:17:35 GMT
  3428. Content-Type application/javascript
  3429. Resources
  3430. REMEDIATION - Detectify Support Center - Content sniffing
  3431. OWASP - X-Content-Type-Options
  3432. MOZILLA - X-Content-Type-Options
  3433. 1. Content Sniffing
  3434. Summary
  3435. Found At
  3436. https://skidbooter.com/assets/js/app.js
  3437. CVSS
  3438. 0 of 10.0
  3439. Request Headers
  3440. GET /assets/js/app.js HTTP/1.1
  3441. User-Agent Mozilla/5.0 (compatible; Detectify)
  3442. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3443. Referer https://skidbooter.com/register.php
  3444. Accept-Encoding gzip, deflate
  3445. Accept-Language en-US
  3446. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3447. Upgrade-Insecure-Requests1
  3448. Response Headers
  3449. HTTP/ 1.1 200 OK
  3450. Server cloudflare
  3451. CF-RAY 3f383bf68dca69d7-LHR
  3452. Connection keep-alive
  3453. Last-Modified Sat, 28 Jan 2017 01:45:12 GMT
  3454. Date Tue, 27 Feb 2018 03:59:56 GMT
  3455. Accept-Ranges bytes
  3456. CF-Cache-Status MISS
  3457. Cache-Control public, max-age=14400
  3458. ETag "a649-5471dbbaf3a00-gzip"
  3459. Content-Encoding gzip
  3460. Vary Accept-Encoding
  3461. Expires Tue, 27 Feb 2018 07:59:56 GMT
  3462. Content-Length 7820
  3463. Content-Type application/javascript
  3464. Expect-CT max-age=604800,
  3465. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3466. Resources
  3467. REMEDIATION - Detectify Support Center - Content sniffing
  3468. OWASP - X-Content-Type-Options
  3469. MOZILLA - X-Content-Type-Options
  3470. 1. Content Sniffing
  3471. Summary
  3472. Found At
  3473. https://skidbooter.com/assets/js/core/bootstrap.min.js
  3474. CVSS
  3475. 0 of 10.0
  3476. Request Headers
  3477. GET /assets/js/core/bootstrap.min.js HTTP/1.1
  3478. User-Agent Mozilla/5.0 (compatible; Detectify)
  3479. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3480. Referer https://skidbooter.com/register.php
  3481. Accept-Encoding gzip, deflate
  3482. Accept-Language en-US
  3483. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3484. Upgrade-Insecure-Requests1
  3485. Response Headers
  3486. HTTP/ 1.1 200 OK
  3487. Server cloudflare
  3488. CF-RAY 3f383bebba9969d7-LHR
  3489. Connection keep-alive
  3490. Last-Modified Sat, 28 Jan 2017 01:45:16 GMT
  3491. Date Tue, 27 Feb 2018 03:59:54 GMT
  3492. Accept-Ranges bytes
  3493. CF-Cache-Status EXPIRED
  3494. Cache-Control public, max-age=14400
  3495. ETag "8c75-5471dbbec4300-gzip"
  3496. Content-Encoding gzip
  3497. Vary Accept-Encoding
  3498. Expires Tue, 27 Feb 2018 07:59:54 GMT
  3499. Content-Length 9546
  3500. Content-Type application/javascript
  3501. Expect-CT max-age=604800,
  3502. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3503. Resources
  3504. REMEDIATION - Detectify Support Center - Content sniffing
  3505. OWASP - X-Content-Type-Options
  3506. MOZILLA - X-Content-Type-Options
  3507. 1. Content Sniffing
  3508. Summary
  3509. Found At
  3510. https://skidbooter.com/assets/js/core/jquery.appear.min.js
  3511. CVSS
  3512. 0 of 10.0
  3513. Request Headers
  3514. GET /assets/js/core/jquery.appear.min.js HTTP/1.1
  3515. User-Agent Mozilla/5.0 (compatible; Detectify)
  3516. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3517. Referer https://skidbooter.com/register.php
  3518. Accept-Encoding gzip, deflate
  3519. Accept-Language en-US
  3520. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3521. Upgrade-Insecure-Requests1
  3522. Response Headers
  3523. HTTP/ 1.1 200 OK
  3524. Server cloudflare
  3525. CF-RAY 3f383becaae469d7-LHR
  3526. Connection keep-alive
  3527. Last-Modified Sat, 28 Jan 2017 01:45:14 GMT
  3528. Date Tue, 27 Feb 2018 03:59:54 GMT
  3529. Accept-Ranges bytes
  3530. CF-Cache-Status MISS
  3531. Cache-Control public, max-age=14400
  3532. ETag "63a-5471dbbcdbe80-gzip"
  3533. Content-Encoding gzip
  3534. Vary Accept-Encoding
  3535. Expires Tue, 27 Feb 2018 07:59:54 GMT
  3536. Content-Length 770
  3537. Content-Type application/javascript
  3538. Expect-CT max-age=604800,
  3539. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3540. Resources
  3541. REMEDIATION - Detectify Support Center - Content sniffing
  3542. OWASP - X-Content-Type-Options
  3543. MOZILLA - X-Content-Type-Options
  3544. 1. Content Sniffing
  3545. Summary
  3546. Found At
  3547. https://skidbooter.com/assets/js/core/jquery.countTo.min.js
  3548. CVSS
  3549. 0 of 10.0
  3550. Request Headers
  3551. GET /assets/js/core/jquery.countTo.min.js HTTP/1.1
  3552. User-Agent Mozilla/5.0 (compatible; Detectify)
  3553. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3554. Referer https://skidbooter.com/register.php
  3555. Accept-Encoding gzip, deflate
  3556. Accept-Language en-US
  3557. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3558. Upgrade-Insecure-Requests1
  3559. Response Headers
  3560. HTTP/ 1.1 200 OK
  3561. Server cloudflare
  3562. CF-RAY 3f383bef0b8e69d7-LHR
  3563. Connection keep-alive
  3564. Last-Modified Sat, 28 Jan 2017 01:45:14 GMT
  3565. Date Tue, 27 Feb 2018 03:59:55 GMT
  3566. Accept-Ranges bytes
  3567. CF-Cache-Status MISS
  3568. Cache-Control public, max-age=14400
  3569. ETag "7ec-5471dbbcdbe80-gzip"
  3570. Content-Encoding gzip
  3571. Vary Accept-Encoding
  3572. Expires Tue, 27 Feb 2018 07:59:55 GMT
  3573. Content-Length 771
  3574. Content-Type application/javascript
  3575. Expect-CT max-age=604800,
  3576. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3577. Resources
  3578. REMEDIATION - Detectify Support Center - Content sniffing
  3579. OWASP - X-Content-Type-Options
  3580. MOZILLA - X-Content-Type-Options
  3581. 1. Content Sniffing
  3582. Summary
  3583. Found At
  3584. https://skidbooter.com/assets/js/core/jquery.min.js
  3585. CVSS
  3586. 0 of 10.0
  3587. Request Headers
  3588. GET /assets/js/core/jquery.min.js HTTP/1.1
  3589. User-Agent Mozilla/5.0 (compatible; Detectify)
  3590. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3591. Referer https://skidbooter.com/register.php
  3592. Accept-Encoding gzip, deflate
  3593. Accept-Language en-US
  3594. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3595. Upgrade-Insecure-Requests1
  3596. Response Headers
  3597. HTTP/ 1.1 200 OK
  3598. Server cloudflare
  3599. CF-RAY 3f383be9c9f369d7-LHR
  3600. Connection keep-alive
  3601. Last-Modified Sat, 28 Jan 2017 01:45:14 GMT
  3602. Date Tue, 27 Feb 2018 03:59:53 GMT
  3603. Accept-Ranges bytes
  3604. CF-Cache-Status EXPIRED
  3605. Cache-Control public, max-age=14400
  3606. ETag "1497d-5471dbbcdbe80-gzip"
  3607. Content-Encoding gzip
  3608. Vary Accept-Encoding
  3609. Expires Tue, 27 Feb 2018 07:59:53 GMT
  3610. Content-Length 29541
  3611. Content-Type application/javascript
  3612. Expect-CT max-age=604800,
  3613. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3614. Resources
  3615. REMEDIATION - Detectify Support Center - Content sniffing
  3616. OWASP - X-Content-Type-Options
  3617. MOZILLA - X-Content-Type-Options
  3618. 1. Content Sniffing
  3619. Summary
  3620. Found At
  3621. https://skidbooter.com/assets/js/core/jquery.placeholder.min.js
  3622. CVSS
  3623. 0 of 10.0
  3624. Request Headers
  3625. GET /assets/js/core/jquery.placeholder.min.js HTTP/1.1
  3626. User-Agent Mozilla/5.0 (compatible; Detectify)
  3627. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3628. Referer https://skidbooter.com/register.php
  3629. Accept-Encoding gzip, deflate
  3630. Accept-Language en-US
  3631. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3632. Upgrade-Insecure-Requests1
  3633. Response Headers
  3634. HTTP/ 1.1 200 OK
  3635. Server cloudflare
  3636. CF-RAY 3f383bf54d6c69d7-LHR
  3637. Connection keep-alive
  3638. Last-Modified Sat, 28 Jan 2017 01:45:14 GMT
  3639. Date Tue, 27 Feb 2018 03:59:55 GMT
  3640. Accept-Ranges bytes
  3641. CF-Cache-Status MISS
  3642. Cache-Control public, max-age=14400
  3643. ETag "a36-5471dbbcdbe80-gzip"
  3644. Content-Encoding gzip
  3645. Vary Accept-Encoding
  3646. Expires Tue, 27 Feb 2018 07:59:55 GMT
  3647. Content-Length 1103
  3648. Content-Type application/javascript
  3649. Expect-CT max-age=604800,
  3650. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3651. Resources
  3652. REMEDIATION - Detectify Support Center - Content sniffing
  3653. OWASP - X-Content-Type-Options
  3654. MOZILLA - X-Content-Type-Options
  3655. 1. Content Sniffing
  3656. Summary
  3657. Found At
  3658. https://skidbooter.com/assets/js/core/jquery.scrollLock.min.js
  3659. CVSS
  3660. 0 of 10.0
  3661. Request Headers
  3662. GET /assets/js/core/jquery.scrollLock.min.js HTTP/1.1
  3663. User-Agent Mozilla/5.0 (compatible; Detectify)
  3664. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3665. Referer https://skidbooter.com/register.php
  3666. Accept-Encoding gzip, deflate
  3667. Accept-Language en-US
  3668. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3669. Upgrade-Insecure-Requests1
  3670. Response Headers
  3671. HTTP/ 1.1 200 OK
  3672. Server cloudflare
  3673. CF-RAY 3f383bec7ad969d7-LHR
  3674. Connection keep-alive
  3675. Last-Modified Sat, 28 Jan 2017 01:45:12 GMT
  3676. Date Tue, 27 Feb 2018 03:59:54 GMT
  3677. Accept-Ranges bytes
  3678. CF-Cache-Status MISS
  3679. Cache-Control public, max-age=14400
  3680. ETag "4ad-5471dbbaf3a00-gzip"
  3681. Content-Encoding gzip
  3682. Vary Accept-Encoding
  3683. Expires Tue, 27 Feb 2018 07:59:54 GMT
  3684. Content-Length 639
  3685. Content-Type application/javascript
  3686. Expect-CT max-age=604800,
  3687. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3688. Resources
  3689. REMEDIATION - Detectify Support Center - Content sniffing
  3690. OWASP - X-Content-Type-Options
  3691. MOZILLA - X-Content-Type-Options
  3692. 1. Content Sniffing
  3693. Summary
  3694. Found At
  3695. https://skidbooter.com/assets/js/core/jquery.slimscroll.min.js
  3696. CVSS
  3697. 0 of 10.0
  3698. Request Headers
  3699. GET /assets/js/core/jquery.slimscroll.min.js HTTP/1.1
  3700. User-Agent Mozilla/5.0 (compatible; Detectify)
  3701. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3702. Referer https://skidbooter.com/register.php
  3703. Accept-Encoding gzip, deflate
  3704. Accept-Language en-US
  3705. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3706. Upgrade-Insecure-Requests1
  3707. Response Headers
  3708. HTTP/ 1.1 200 OK
  3709. Server cloudflare
  3710. CF-RAY 3f383bec4ace69d7-LHR
  3711. Connection keep-alive
  3712. Last-Modified Sat, 28 Jan 2017 01:45:12 GMT
  3713. Date Tue, 27 Feb 2018 03:59:54 GMT
  3714. Accept-Ranges bytes
  3715. CF-Cache-Status MISS
  3716. Cache-Control public, max-age=14400
  3717. ETag "1256-5471dbbaf3a00-gzip"
  3718. Content-Encoding gzip
  3719. Vary Accept-Encoding
  3720. Expires Tue, 27 Feb 2018 07:59:54 GMT
  3721. Content-Length 1892
  3722. Content-Type application/javascript
  3723. Expect-CT max-age=604800,
  3724. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3725. Resources
  3726. REMEDIATION - Detectify Support Center - Content sniffing
  3727. OWASP - X-Content-Type-Options
  3728. MOZILLA - X-Content-Type-Options
  3729. 1. Content Sniffing
  3730. Summary
  3731. Found At
  3732. https://skidbooter.com/assets/js/core/js.cookie.min.js
  3733. CVSS
  3734. 0 of 10.0
  3735. Request Headers
  3736. GET /assets/js/core/js.cookie.min.js HTTP/1.1
  3737. User-Agent Mozilla/5.0 (compatible; Detectify)
  3738. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3739. Referer https://skidbooter.com/register.php
  3740. Accept-Encoding gzip, deflate
  3741. Accept-Language en-US
  3742. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3743. Upgrade-Insecure-Requests1
  3744. Response Headers
  3745. HTTP/ 1.1 200 OK
  3746. Server cloudflare
  3747. CF-RAY 3f383bf64db069d7-LHR
  3748. Connection keep-alive
  3749. Last-Modified Sat, 28 Jan 2017 01:45:12 GMT
  3750. Date Tue, 27 Feb 2018 03:59:55 GMT
  3751. Accept-Ranges bytes
  3752. CF-Cache-Status MISS
  3753. Cache-Control public, max-age=14400
  3754. ETag "6d8-5471dbbaf3a00-gzip"
  3755. Content-Encoding gzip
  3756. Vary Accept-Encoding
  3757. Expires Tue, 27 Feb 2018 07:59:55 GMT
  3758. Content-Length 925
  3759. Content-Type application/javascript
  3760. Expect-CT max-age=604800,
  3761. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3762. Resources
  3763. REMEDIATION - Detectify Support Center - Content sniffing
  3764. OWASP - X-Content-Type-Options
  3765. MOZILLA - X-Content-Type-Options
  3766. 1. Content Sniffing
  3767. Summary
  3768. Found At
  3769. https://skidbooter.com/assets/js/pages/base_pages_login.js
  3770. CVSS
  3771. 0 of 10.0
  3772. Request Headers
  3773. GET /assets/js/pages/base_pages_login.js HTTP/1.1
  3774. User-Agent Mozilla/5.0 (compatible; Detectify)
  3775. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3776. Referer https://skidbooter.com/login.php
  3777. Accept-Encoding gzip, deflate
  3778. Accept-Language en-US
  3779. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3780. Upgrade-Insecure-Requests1
  3781. Response Headers
  3782. HTTP/ 1.1 200 OK
  3783. Server cloudflare
  3784. CF-RAY 3f383d42ff0d6b6d-LHR
  3785. Connection keep-alive
  3786. Last-Modified Fri, 23 Feb 2018 20:29:11 GMT
  3787. Date Tue, 27 Feb 2018 04:00:49 GMT
  3788. Accept-Ranges bytes
  3789. CF-Cache-Status MISS
  3790. Cache-Control public, max-age=14400
  3791. ETag "7a2-565e7035053c0-gzip"
  3792. Content-Encoding gzip
  3793. Vary Accept-Encoding
  3794. Expires Tue, 27 Feb 2018 08:00:49 GMT
  3795. Content-Length 647
  3796. Content-Type application/javascript
  3797. Expect-CT max-age=604800,
  3798. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3799. Resources
  3800. REMEDIATION - Detectify Support Center - Content sniffing
  3801. OWASP - X-Content-Type-Options
  3802. MOZILLA - X-Content-Type-Options
  3803. 1. Content Sniffing
  3804. Summary
  3805. Found At
  3806. https://skidbooter.com/assets/js/pages/base_pages_register.js
  3807. CVSS
  3808. 0 of 10.0
  3809. Request Headers
  3810. GET /assets/js/pages/base_pages_register.js HTTP/1.1
  3811. User-Agent Mozilla/5.0 (compatible; Detectify)
  3812. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3813. Referer https://skidbooter.com/register.php
  3814. Accept-Encoding gzip, deflate
  3815. Accept-Language en-US
  3816. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3817. Upgrade-Insecure-Requests1
  3818. Response Headers
  3819. HTTP/ 1.1 200 OK
  3820. Server cloudflare
  3821. CF-RAY 3f383bfbbf6869d7-LHR
  3822. Connection keep-alive
  3823. Last-Modified Sat, 28 Jan 2017 01:45:18 GMT
  3824. Date Tue, 27 Feb 2018 03:59:56 GMT
  3825. Accept-Ranges bytes
  3826. CF-Cache-Status MISS
  3827. Cache-Control public, max-age=14400
  3828. ETag "a72-5471dbc0ac780-gzip"
  3829. Content-Encoding gzip
  3830. Vary Accept-Encoding
  3831. Expires Tue, 27 Feb 2018 07:59:56 GMT
  3832. Content-Length 738
  3833. Content-Type application/javascript
  3834. Expect-CT max-age=604800,
  3835. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3836. Resources
  3837. REMEDIATION - Detectify Support Center - Content sniffing
  3838. OWASP - X-Content-Type-Options
  3839. MOZILLA - X-Content-Type-Options
  3840. 1. Content Sniffing
  3841. Summary
  3842. Found At
  3843. https://skidbooter.com/assets/js/plugins/jquery-validation/jquery.validate.min.js
  3844. CVSS
  3845. 0 of 10.0
  3846. Request Headers
  3847. GET /assets/js/plugins/jquery-validation/jquery.validate.min.js HTTP/1.1
  3848. User-Agent Mozilla/5.0 (compatible; Detectify)
  3849. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3850. Referer https://skidbooter.com/register.php
  3851. Accept-Encoding gzip, deflate
  3852. Accept-Language en-US
  3853. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3854. Upgrade-Insecure-Requests1
  3855. Response Headers
  3856. HTTP/ 1.1 200 OK
  3857. Server cloudflare
  3858. CF-RAY 3f383bfb4f4069d7-LHR
  3859. Connection keep-alive
  3860. Last-Modified Sat, 28 Jan 2017 01:47:22 GMT
  3861. Date Tue, 27 Feb 2018 03:59:56 GMT
  3862. Accept-Ranges bytes
  3863. CF-Cache-Status EXPIRED
  3864. Cache-Control public, max-age=14400
  3865. ETag "5453-5471dc36ede80-gzip"
  3866. Content-Encoding gzip
  3867. Vary Accept-Encoding
  3868. Expires Tue, 27 Feb 2018 07:59:56 GMT
  3869. Content-Length 6792
  3870. Content-Type application/javascript
  3871. Expect-CT max-age=604800,
  3872. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3873. Resources
  3874. REMEDIATION - Detectify Support Center - Content sniffing
  3875. OWASP - X-Content-Type-Options
  3876. MOZILLA - X-Content-Type-Options
  3877. 1. Content Sniffing
  3878. Summary
  3879. Found At
  3880. https://skidbooter.com/cdn-cgi/apps/body/0-JyvfX_oGnrbE8jiySETU3S9ZY.js
  3881. CVSS
  3882. 0 of 10.0
  3883. Request Headers
  3884. GET /cdn-cgi/apps/body/0-JyvfX_oGnrbE8jiySETU3S9ZY.js HTTP/1.1
  3885. User-Agent Mozilla/5.0 (compatible; Detectify)
  3886. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3887. Referer https://skidbooter.com/register.php
  3888. Accept-Encoding gzip, deflate
  3889. Accept-Language en-US
  3890. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3891. Upgrade-Insecure-Requests1
  3892. Response Headers
  3893. HTTP/ 1.1 200 OK
  3894. Server cloudflare
  3895. CF-RAY 3f383bdd6d3469d7-LHR
  3896. Connection keep-alive
  3897. Last-Modified Sat, 24 Feb 2018 03:01:19 GMT
  3898. x-amz-version-id w.wSVPaYjMxx1soiGl19r3EvvWkBEYvz
  3899. Date Tue, 27 Feb 2018 03:59:52 GMT
  3900. CF-Cache-Status MISS
  3901. Cache-Control public, max-age=31536000
  3902. ETag "e5e5fc7485dfaf68a6d7b07439259e36"
  3903. Content-Encoding gzip
  3904. Vary Accept-Encoding
  3905. x-amz-request-id 02524C316DFF8C8D
  3906. Expires Wed, 27 Feb 2019 03:59:52 GMT
  3907. Content-Length 9046
  3908. x-amz-id-2 jJkGw+HyHhk++0sXKZWLit3le3WaZQKWewIerQEmr271GzGeLPoW3/6twZs
  3909. 4NAzh8EZLEyICRL8=
  3910. Content-Type application/javascript; charset=utf-8
  3911. Expect-CT max-age=604800,
  3912. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3913. Resources
  3914. REMEDIATION - Detectify Support Center - Content sniffing
  3915. OWASP - X-Content-Type-Options
  3916. MOZILLA - X-Content-Type-Options
  3917. 1. Content Sniffing
  3918. Summary
  3919. Found At
  3920. https://skidbooter.com/cdn-cgi/apps/head/82w_gO4sQ5uV5B0ZGSTWHVDR
  3921. Mj0.js
  3922. CVSS
  3923. 0 of 10.0
  3924. Request Headers
  3925. GET /cdn-cgi/apps/head/82w_gO4sQ5uV5B0ZGSTWHVDRMj0.js HTTP/1.1
  3926. User-Agent Mozilla/5.0 (compatible; Detectify)
  3927. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3928. Referer https://skidbooter.com/register.php
  3929. Accept-Encoding gzip, deflate
  3930. Accept-Language en-US
  3931. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3932. Upgrade-Insecure-Requests1
  3933. Response Headers
  3934. HTTP/ 1.1 200 OK
  3935. Server cloudflare
  3936. CF-RAY 3f383bd70b4369d7-LHR
  3937. Connection keep-alive
  3938. Last-Modified Sat, 24 Feb 2018 03:01:19 GMT
  3939. x-amz-version-id rqjMVQL2I4Kk8KXt5xKMt.azipcuj0Xx
  3940. Date Tue, 27 Feb 2018 03:59:51 GMT
  3941. CF-Cache-Status MISS
  3942. Cache-Control public, max-age=31536000
  3943. ETag "977879dedb46f380cf93614586210c96"
  3944. Content-Encoding gzip
  3945. Vary Accept-Encoding
  3946. x-amz-request-id 7A89128BAA9F1933
  3947. Expires Wed, 27 Feb 2019 03:59:51 GMT
  3948. Content-Length 4056
  3949. x-amz-id-2 TNQyfLK2iMK1OJJueLPJI2r4NJJtNNxKryer3L24drEhMXD5+SWBHGgURVH
  3950. MbSVakX0KjoQx/FU=
  3951. Content-Type application/javascript; charset=utf-8
  3952. Expect-CT max-age=604800,
  3953. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3954. Resources
  3955. REMEDIATION - Detectify Support Center - Content sniffing
  3956. OWASP - X-Content-Type-Options
  3957. MOZILLA - X-Content-Type-Options
  3958. 1. Content Sniffing
  3959. Summary
  3960. Found At
  3961. https://skidbooter.com:2083/cdn-cgi/scripts/jquery.min.js
  3962. CVSS
  3963. 0 of 10.0
  3964. Request Headers
  3965. GET /cdn-cgi/scripts/jquery.min.js HTTP/1.1
  3966. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  3967. Upgrade-Insecure-Requests1
  3968. User-Agent Mozilla/5.0 (compatible; Detectify)
  3969. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  3970. Accept-Encoding gzip, deflate
  3971. Accept-Language en-US
  3972. Response Headers
  3973. HTTP/ 1.1 200 OK
  3974. Transfer-Encoding chunked
  3975. Server cloudflare-nginx
  3976. CF-RAY 3f3859ab98ae69fb-LHR
  3977. Connection keep-alive
  3978. Last-Modified Wed, 21 Feb 2018 10:29:42 GMT
  3979. Date Tue, 27 Feb 2018 04:20:12 GMT
  3980. X-Frame-Options SAMEORIGIN
  3981. Cache-Control max-age=172800
  3982. ETag W/"5a8d4a16-17bdc"
  3983. Content-Encoding gzip
  3984. Vary Accept-Encoding
  3985. Expires Thu, 01 Mar 2018 04:20:12 GMT
  3986. Content-Type application/javascript
  3987. Expect-CT max-age=604800,
  3988. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  3989. Resources
  3990. REMEDIATION - Detectify Support Center - Content sniffing
  3991. OWASP - X-Content-Type-Options
  3992. MOZILLA - X-Content-Type-Options
  3993. 1. Content Sniffing
  3994. Summary
  3995. Found At
  3996. https://skidbooter.com:8443/cdn-cgi/scripts/jquery.min.js
  3997. CVSS
  3998. 0 of 10.0
  3999. Request Headers
  4000. GET /cdn-cgi/scripts/jquery.min.js HTTP/1.1
  4001. Accept text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
  4002. Upgrade-Insecure-Requests1
  4003. User-Agent Mozilla/5.0 (compatible; Detectify)
  4004. +https://detectify.com/bot/da5f80b97c013a864fb70593467f03b9eb03b5cf
  4005. Accept-Encoding gzip, deflate
  4006. Accept-Language en-US
  4007. Response Headers
  4008. HTTP/ 1.1 200 OK
  4009. Transfer-Encoding chunked
  4010. Server cloudflare-nginx
  4011. CF-RAY 3f3854df5b746b4f-LHR
  4012. Connection keep-alive
  4013. Last-Modified Wed, 21 Feb 2018 10:29:42 GMT
  4014. Date Tue, 27 Feb 2018 04:16:56 GMT
  4015. X-Frame-Options SAMEORIGIN
  4016. Cache-Control max-age=172800
  4017. ETag W/"5a8d4a16-17bdc"
  4018. Content-Encoding gzip
  4019. Vary Accept-Encoding
  4020. Expires Thu, 01 Mar 2018 04:16:56 GMT
  4021. Content-Type application/javascript
  4022. Expect-CT max-age=604800,
  4023. report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
  4024. Resources
  4025. REMEDIATION - Detectify Support Center - Content sniffing
  4026. OWASP - X-Content-Type-Options
  4027. MOZILLA - X-Content-Type-Options
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement