Advertisement
Guest User

Anonymous V.S BlackHats JTSEC full recon #OpKILLUMINATI #4

a guest
Jan 7th, 2018
832
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 127.20 KB | None | 0 0
  1. #######################################################################################################################################
  2. Hostname www.fenixnews.com ISP Wildcard UK Limited (AS34119)
  3. Continent Europe Flag
  4. GB
  5. Country United Kingdom Country Code GB (GBR)
  6. Region Unknown Local time 07 Jan 2018 09:05 GMT
  7. City Unknown Latitude 51.496
  8. IP Address 31.22.4.75 Longitude -0.122
  9. #######################################################################################################################################
  10. [i] Scanning Site: http://fenixnews.com
  11.  
  12.  
  13.  
  14. B A S I C I N F O
  15. ====================
  16.  
  17.  
  18. [+] Site Title:
  19. [+] IP address: 31.22.4.75
  20. [+] Web Server: Could Not Detect
  21. [+] CMS: Could Not Detect
  22. [+] Cloudflare: Not Detected
  23. [+] Robots File: Could NOT Find robots.txt!
  24.  
  25.  
  26.  
  27.  
  28. W H O I S L O O K U P
  29. ========================
  30.  
  31. Domain Name: FENIXNEWS.COM
  32. Registry Domain ID: 1701647502_DOMAIN_COM-VRSN
  33. Registrar WHOIS Server: whois.PublicDomainRegistry.com
  34. Registrar URL: http://www.publicdomainregistry.com
  35. Updated Date: 2017-02-13T03:21:59Z
  36. Creation Date: 2012-02-11T12:42:13Z
  37. Registry Expiry Date: 2018-02-11T12:42:13Z
  38. Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
  39. Registrar IANA ID: 303
  40. Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com
  41. Registrar Abuse Contact Phone: +1.2013775952
  42. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  43. Name Server: NS1.BYETHOST21.ORG
  44. Name Server: NS2.BYETHOST21.ORG
  45. DNSSEC: unsigned
  46. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  47. >>> Last update of whois database: 2018-01-07T09:16:55Z <<<
  48.  
  49. For more information on Whois status codes, please visit https://icann.org/epp
  50.  
  51.  
  52.  
  53. The Registry database contains ONLY .COM, .NET, .EDU domains and
  54. Registrars.
  55.  
  56.  
  57.  
  58.  
  59. G E O I P L O O K U P
  60. =========================
  61.  
  62. [i] IP Address: 31.22.4.75
  63. [i] Country: GB
  64. [i] State: Newcastle upon Tyne
  65. [i] City: Newcastle Upon Tyne
  66. [i] Latitude: 54.988098
  67. [i] Longitude: -1.619400
  68.  
  69.  
  70.  
  71.  
  72. H T T P H E A D E R S
  73. =======================
  74.  
  75.  
  76.  
  77.  
  78.  
  79.  
  80. D N S L O O K U P
  81. ===================
  82.  
  83. fenixnews.com. 199 IN A 31.22.4.75
  84. fenixnews.com. 21599 IN NS ns1.byethost21.org.
  85. fenixnews.com. 21599 IN NS ns2.byethost21.org.
  86. fenixnews.com. 21599 IN SOA ns1.byethost21.org. response.ifastnet.com. 2017011603 3660 951 604810 952
  87. fenixnews.com. 199 IN MX 0 fenixnews.com.
  88. fenixnews.com. 199 IN TXT "v=spf1 +a +mx +ip4:82.163.176.74 +ip4:31.22.4.169 +ip4:31.22.4.75 -all"
  89.  
  90.  
  91.  
  92.  
  93. S U B N E T C A L C U L A T I O N
  94. ====================================
  95.  
  96. Address = 31.22.4.75
  97. Network = 31.22.4.75 / 32
  98. Netmask = 255.255.255.255
  99. Broadcast = not needed on Point-to-Point links
  100. Wildcard Mask = 0.0.0.0
  101. Hosts Bits = 0
  102. Max. Hosts = 1 (2^0 - 0)
  103. Host Range = { 31.22.4.75 - 31.22.4.75 }
  104.  
  105.  
  106.  
  107. N M A P P O R T S C A N
  108. ============================
  109.  
  110.  
  111. Starting Nmap 7.01 ( https://nmap.org ) at 2018-01-07 09:17 UTC
  112. Nmap scan report for fenixnews.com (31.22.4.75)
  113. Host is up (0.096s latency).
  114. rDNS record for 31.22.4.75: sv21.byethost21.org
  115. PORT STATE SERVICE VERSION
  116. 21/tcp open ftp Pure-FTPd
  117. 22/tcp closed ssh
  118. 23/tcp filtered telnet
  119. 25/tcp open smtp Exim smtpd 4.89
  120. 80/tcp open http nginx
  121. 110/tcp open pop3 Dovecot pop3d
  122. 143/tcp open imap Dovecot imapd
  123. 443/tcp open ssl/http nginx
  124. 445/tcp filtered microsoft-ds
  125. 3389/tcp filtered ms-wbt-server
  126.  
  127. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  128. Nmap done: 1 IP address (1 host up) scanned in 14.85 seconds
  129.  
  130. [!] IP Address : 31.22.4.75
  131. [!] www.fenixnews.com doesn't seem to use a CMS
  132. [+] Honeypot Probabilty: 30%
  133. ----------------------------------------
  134. PORT STATE SERVICE VERSION
  135. 21/tcp open ftp Pure-FTPd
  136. 22/tcp closed ssh
  137. 23/tcp filtered telnet
  138. 25/tcp open smtp Exim smtpd 4.89
  139. 80/tcp open http nginx
  140. 110/tcp open pop3 Dovecot pop3d
  141. 143/tcp open imap Dovecot imapd
  142. 443/tcp open ssl/http nginx
  143. 445/tcp filtered microsoft-ds
  144. 3389/tcp filtered ms-wbt-server
  145. ----------------------------------------
  146.  
  147. [+] DNS Records
  148. ns1.byethost21.org. (31.22.4.75) AS34119 Wildcard UK Limited United Kingdom
  149. ns2.byethost21.org. (185.2.168.411) AS34119 Wildcard UK Limited United Kingdom
  150.  
  151. [+] MX Records
  152. 0 (31.22.4.75) AS34119 Wildcard UK Limited United Kingdom
  153.  
  154. [+] Host Records (A)
  155. www.fenixnews.comHTTP: (sv21.byethost21.org) (31.22.4.75) AS34119 Wildcard UK Limited United Kingdom
  156.  
  157. [+] TXT Records
  158. "v=spf1 +a +mx +ip4:82.163.176.74 +ip4:31.22.4.169 +ip4:31.22.4.75 -all"
  159.  
  160. [+] DNS Map: https://dnsdumpster.com/static/map/fenixnews.com.png
  161.  
  162. [>] Initiating 3 intel modules
  163. [>] Loading Alpha module (1/3)
  164. [>] Beta module deployed (2/3)
  165. [>] Gamma module initiated (3/3)
  166. No emails found
  167. No hosts found
  168. [+] Virtual hosts:
  169. 92m====================================================================================
  170. Server: 192.168.1.254
  171. Address: 192.168.1.254#53
  172.  
  173. Non-authoritative answer:
  174. Name: fenixnews.com
  175. Address: 31.22.4.75
  176.  
  177. fenixnews.com has address 31.22.4.75
  178. fenixnews.com mail is handled by 0 fenixnews.com.
  179. ====================================================================================
  180.  CHECKING OS FINGERPRINT 
  181. ====================================================================================
  182.  
  183. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  184.  
  185. [+] Target is fenixnews.com
  186. [+] Loading modules.
  187. [+] Following modules are loaded:
  188. [x] [1] ping:icmp_ping - ICMP echo discovery module
  189. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  190. [x] [3] ping:udp_ping - UDP-based ping discovery module
  191. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  192. [x] [5] infogather:portscan - TCP and UDP PortScanner
  193. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  194. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  195. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  196. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  197. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  198. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  199. [x] [12] fingerprint:smb - SMB fingerprinting module
  200. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  201. [+] 13 modules registered
  202. [+] Initializing scan engine
  203. [+] Running scan engine
  204. [-] ping:tcp_ping module: no closed/open TCP ports known on 31.22.4.75. Module test failed
  205. [-] ping:udp_ping module: no closed/open UDP ports known on 31.22.4.75. Module test failed
  206. [-] No distance calculation. 31.22.4.75 appears to be dead or no ports known
  207. [+] Host: 31.22.4.75 is down (Guess probability: 0%)
  208. [+] Cleaning up scan engine
  209. [+] Modules deinitialized
  210. [+] Execution completed.
  211. ====================================================================================
  212.  GATHERING WHOIS INFO 
  213. ====================================================================================
  214. Domain Name: FENIXNEWS.COM
  215. Registry Domain ID: 1701647502_DOMAIN_COM-VRSN
  216. Registrar WHOIS Server: whois.PublicDomainRegistry.com
  217. Registrar URL: http://www.publicdomainregistry.com
  218. Updated Date: 2017-02-13T03:21:59Z
  219. Creation Date: 2012-02-11T12:42:13Z
  220. Registry Expiry Date: 2018-02-11T12:42:13Z
  221. Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
  222. Registrar IANA ID: 303
  223. Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com
  224. Registrar Abuse Contact Phone: +1.2013775952
  225. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  226. Name Server: NS1.BYETHOST21.ORG
  227. Name Server: NS2.BYETHOST21.ORG
  228. DNSSEC: unsigned
  229. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  230. >>> Last update of whois database: 2018-01-07T13:04:56Z <<<
  231.  
  232. For more information on Whois status codes, please visit https://icann.org/epp
  233.  
  234. NOTICE: The expiration date displayed in this record is the date the
  235. registrar's sponsorship of the domain name registration in the registry is
  236. currently set to expire. This date does not necessarily reflect the expiration
  237. date of the domain name registrant's agreement with the sponsoring
  238. registrar. Users may consult the sponsoring registrar's Whois database to
  239. view the registrar's reported date of expiration for this registration.
  240.  
  241. TERMS OF USE: You are not authorized to access or query our Whois
  242. database through the use of electronic processes that are high-volume and
  243. automated except as reasonably necessary to register domain names or
  244. modify existing registrations; the Data in VeriSign Global Registry
  245. Services' ("VeriSign") Whois database is provided by VeriSign for
  246. information purposes only, and to assist persons in obtaining information
  247. about or related to a domain name registration record. VeriSign does not
  248. guarantee its accuracy. By submitting a Whois query, you agree to abide
  249. by the following terms of use: You agree that you may use this Data only
  250. for lawful purposes and that under no circumstances will you use this Data
  251. to: (1) allow, enable, or otherwise support the transmission of mass
  252. unsolicited, commercial advertising or solicitations via e-mail, telephone,
  253. or facsimile; or (2) enable high volume, automated, electronic processes
  254. that apply to VeriSign (or its computer systems). The compilation,
  255. repackaging, dissemination or other use of this Data is expressly
  256. prohibited without the prior written consent of VeriSign. You agree not to
  257. use electronic processes that are automated and high-volume to access or
  258. query the Whois database except as reasonably necessary to register
  259. domain names or modify existing registrations. VeriSign reserves the right
  260. to restrict your access to the Whois database in its sole discretion to ensure
  261. operational stability. VeriSign may restrict or terminate your access to the
  262. Whois database for failure to abide by these terms of use. VeriSign
  263. reserves the right to modify these terms at any time.
  264.  
  265. The Registry database contains ONLY .COM, .NET, .EDU domains and
  266. Registrars.
  267. Domain Name: FENIXNEWS.COM
  268. Registry Domain ID: 1701647502_DOMAIN_COM-VRSN
  269. Registrar WHOIS Server: whois.publicdomainregistry.com
  270. Registrar URL: www.publicdomainregistry.com
  271. Updated Date: 2017-02-13T03:22:03Z
  272. Creation Date: 2012-02-11T12:42:13Z
  273. Registrar Registration Expiration Date: 2018-02-11T12:42:13Z
  274. Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
  275. Registrar IANA ID: 303
  276. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  277. Registry Registrant ID: Not Available From Registry
  278. Registrant Name: Domain Admin
  279. Registrant Organization: Privacy Protect, LLC (PrivacyProtect.org)
  280. Registrant Street: 10 Corporate Drive
  281. Registrant City: Burlington
  282. Registrant State/Province: MA
  283. Registrant Postal Code: 01803
  284. Registrant Country: US
  285. Registrant Phone: +1.8022274003
  286. Registrant Phone Ext:
  287. Registrant Fax:
  288. Registrant Fax Ext:
  289. Registrant Email: contact@privacyprotect.org
  290. Registry Admin ID: Not Available From Registry
  291. Admin Name: Domain Admin
  292. Admin Organization: Privacy Protect, LLC (PrivacyProtect.org)
  293. Admin Street: 10 Corporate Drive
  294. Admin City: Burlington
  295. Admin State/Province: MA
  296. Admin Postal Code: 01803
  297. Admin Country: US
  298. Admin Phone: +1.8022274003
  299. Admin Phone Ext:
  300. Admin Fax:
  301. Admin Fax Ext:
  302. Admin Email: contact@privacyprotect.org
  303. Registry Tech ID: Not Available From Registry
  304. Tech Name: Domain Admin
  305. Tech Organization: Privacy Protect, LLC (PrivacyProtect.org)
  306. Tech Street: 10 Corporate Drive
  307. Tech City: Burlington
  308. Tech State/Province: MA
  309. Tech Postal Code: 01803
  310. Tech Country: US
  311. Tech Phone: +1.8022274003
  312. Tech Phone Ext:
  313. Tech Fax:
  314. Tech Fax Ext:
  315. Tech Email: contact@privacyprotect.org
  316. Name Server: ns1.byethost21.org
  317. Name Server: ns2.byethost21.org
  318. DNSSEC: Unsigned
  319. Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com
  320. Registrar Abuse Contact Phone: +1.2013775952
  321. URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
  322. >>> Last update of WHOIS database: 2018-01-07T13:05:14Z <<<
  323.  
  324. For more information on Whois status codes, please visit https://icann.org/epp
  325.  
  326. Registration Service Provided By: I FASTNET LTD
  327.  
  328. PRIVACYPROTECT.ORG is providing privacy protection services to this domain name to
  329. protect the owner from spam and phishing attacks. PrivacyProtect.org is not
  330. responsible for any of the activities associated with this domain name. If you wish
  331. to report any abuse concerning the usage of this domain name, you may do so at
  332. http://privacyprotect.org/contact. We have a stringent abuse policy and any
  333. complaint will be actioned within a short period of time.
  334.  
  335. The data in this whois database is provided to you for information purposes
  336. only, that is, to assist you in obtaining information about or related to a
  337. domain name registration record. We make this information available "as is",
  338. and do not guarantee its accuracy. By submitting a whois query, you agree
  339. that you will use this data only for lawful purposes and that, under no
  340. circumstances will you use this data to:
  341. (1) enable high volume, automated, electronic processes that stress or load
  342. this whois database system providing you this information; or
  343. (2) allow, enable, or otherwise support the transmission of mass unsolicited,
  344. commercial advertising or solicitations via direct mail, electronic mail, or
  345. by telephone.
  346. The compilation, repackaging, dissemination or other use of this data is
  347. expressly prohibited without prior written consent from us. The Registrar of
  348. record is PDR Ltd. d/b/a PublicDomainRegistry.com.
  349. We reserve the right to modify these terms at any time.
  350. By submitting this query, you agree to abide by these terms.
  351.  
  352.  
  353. ====================================================================================
  354.  GATHERING OSINT INFO 
  355. ====================================================================================
  356.  
  357. *******************************************************************
  358. * *
  359. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  360. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  361. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  362. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  363. * *
  364. * TheHarvester Ver. 2.7 *
  365. * Coded by Christian Martorella *
  366. * Edge-Security Research *
  367. * cmartorella@edge-security.com *
  368. *******************************************************************
  369.  
  370.  
  371. Full harvest..
  372. [-] Searching in Google..
  373. Searching 0 results...
  374. [-] Searching in PGP Key server..
  375. [-] Searching in Bing..
  376. Searching 50 results...
  377. [-] Searching in Exalead..
  378. Searching 50 results...
  379.  
  380.  
  381. [+] Emails found:
  382. ------------------
  383. No emails found
  384.  
  385. [+] Hosts found in search engines:
  386. ------------------------------------
  387. [-] Resolving hostnames IPs...
  388. 31.22.4.75:www.fenixnews.com
  389. [+] Virtual hosts:
  390. ==================
  391. 31.22.4.75 bonsfichiers.com
  392. 31.22.4.75 www.cadesexo.com.br
  393. 31.22.4.75 www.cafedesartistesbali.com
  394. 31.22.4.75 www.dogdiplomacy
  395. 31.22.4.75 www.luyeh-chicken.com
  396. 31.22.4.75 www.ccfpa.co.uk
  397. 31.22.4.75 4evervoyage.net
  398. 31.22.4.75 todoescompartido.com
  399. 31.22.4.75 wicuisine.it
  400. 31.22.4.75 www.ccfpa
  401. 31.22.4.75 www.deportivopasto.com.co
  402. 31.22.4.75 www.revascularizar.com.ar
  403. 31.22.4.75 taoyu.4evervoyage.net
  404. 31.22.4.75 nguyenminhgroup.com
  405. 31.22.4.75 escalasdeguitarra.com
  406. 31.22.4.75 www.diesasolutions.mx
  407.  
  408. ******************************************************
  409. * /\/\ ___| |_ __ _ __ _ ___ ___ / _(_) | *
  410. * / \ / _ \ __/ _` |/ _` |/ _ \ / _ \| |_| | | *
  411. * / /\/\ \ __/ || (_| | (_| | (_) | (_) | _| | | *
  412. * \/ \/\___|\__\__,_|\__, |\___/ \___/|_| |_|_| *
  413. * |___/ *
  414. * Metagoofil Ver 2.2 *
  415. * Christian Martorella *
  416. * Edge-Security.com *
  417. * cmartorella_at_edge-security.com *
  418. ******************************************************
  419.  
  420. [-] Starting online search...
  421.  
  422. [-] Searching for doc files, with a limit of 25
  423. Searching 100 results...
  424. Results: 0 files found
  425. Starting to download 25 of them:
  426. ----------------------------------------
  427.  
  428.  
  429. [-] Searching for pdf files, with a limit of 25
  430. Searching 100 results...
  431. Results: 0 files found
  432. Starting to download 25 of them:
  433. ----------------------------------------
  434.  
  435.  
  436. [-] Searching for xls files, with a limit of 25
  437. Searching 100 results...
  438. Results: 0 files found
  439. Starting to download 25 of them:
  440. ----------------------------------------
  441.  
  442.  
  443. [-] Searching for csv files, with a limit of 25
  444. Searching 100 results...
  445. Results: 0 files found
  446. Starting to download 25 of them:
  447. ----------------------------------------
  448.  
  449.  
  450. [-] Searching for txt files, with a limit of 25
  451. Searching 100 results...
  452. Results: 0 files found
  453. Starting to download 25 of them:
  454. ----------------------------------------
  455.  
  456. processing
  457. user
  458. email
  459.  
  460. [+] List of users found:
  461. --------------------------
  462.  
  463. [+] List of software found:
  464. -----------------------------
  465.  
  466. [+] List of paths and servers found:
  467. ---------------------------------------
  468.  
  469. [+] List of e-mails found:
  470. ----------------------------
  471. ====================================================================================
  472.  GATHERING DNS INFO 
  473. ====================================================================================
  474.  
  475. ; <<>> DiG 9.11.2-5-Debian <<>> -x fenixnews.com
  476. ;; global options: +cmd
  477. ;; Got answer:
  478. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11820
  479. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  480.  
  481. ;; OPT PSEUDOSECTION:
  482. ; EDNS: version: 0, flags:; udp: 4096
  483. ;; QUESTION SECTION:
  484. ;com.fenixnews.in-addr.arpa. IN PTR
  485.  
  486. ;; AUTHORITY SECTION:
  487. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017102538 1800 900 604800 3600
  488.  
  489. ;; Query time: 129 msec
  490. ;; SERVER: 10.13.0.1#53(10.13.0.1)
  491. ;; WHEN: Sun Jan 07 08:05:37 EST 2018
  492. ;; MSG SIZE rcvd: 123
  493.  
  494. dnsenum VERSION:1.2.4
  495. 
  496. ----- fenixnews.com -----
  497. 
  498.  
  499. Host's addresses:
  500. __________________
  501.  
  502. fenixnews.com. 200 IN A 31.22.4.75
  503. 
  504.  
  505. Name Servers:
  506. ______________
  507.  
  508. ns1.byethost21.org. 86400 IN A 31.22.4.254
  509. ns2.byethost21.org. 86400 IN A 185.2.168.41
  510. 
  511.  
  512. Mail (MX) Servers:
  513. ___________________
  514.  
  515. fenixnews.com. 200 IN A 31.22.4.75
  516. 
  517.  
  518. Trying Zone Transfers and getting Bind Versions:
  519. _________________________________________________
  520.  
  521. 
  522. Trying Zone Transfer for fenixnews.com on ns2.byethost21.org ...
  523.  
  524. Trying Zone Transfer for fenixnews.com on ns1.byethost21.org ...
  525.  
  526. brute force file not specified, bay.
  527. ====================================================================================
  528.  GATHERING DNS SUBDOMAINS 
  529. ====================================================================================
  530. 
  531. ____ _ _ _ _ _____
  532. / ___| _ _| |__ | (_)___| |_|___ / _ __
  533. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  534. ___) | |_| | |_) | | \__ \ |_ ___) | |
  535. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  536.  
  537. # Coded By Ahmed Aboul-Ela - @aboul3la
  538.  
  539. [-] Enumerating subdomains now for fenixnews.com
  540. [-] verbosity is enabled, will show the subdomains results in realtime
  541. [-] Searching now in Baidu..
  542. [-] Searching now in Yahoo..
  543. [-] Searching now in Google..
  544. [-] Searching now in Bing..
  545. [-] Searching now in Ask..
  546. [-] Searching now in Netcraft..
  547. [-] Searching now in DNSdumpster..
  548. [-] Searching now in Virustotal..
  549. [-] Searching now in ThreatCrowd..
  550. [-] Searching now in SSL Certificates..
  551. [-] Searching now in PassiveDNS..
  552. Yahoo: www.fenixnews.com
  553. Virustotal: www.fenixnews.com
  554. [-] Saving results to file: /usr/share/sniper/loot/domains/domains-fenixnews.com.txt
  555. [-] Total Unique Subdomains Found: 1
  556. www.fenixnews.com
  557.  
  558.  ╔═╗╦═╗╔╦╗╔═╗╦ ╦
  559.  ║ ╠╦╝ ║ ╚═╗╠═╣
  560.  ╚═╝╩╚═ ╩o╚═╝╩ ╩
  561. ====================================================================================
  562.  GATHERING CERTIFICATE SUBDOMAINS 
  563. ====================================================================================
  564. 
  565.  
  566. [+] Domains saved to: /usr/share/sniper/loot/domains/domains-fenixnews.com-full.txt
  567. 
  568. ====================================================================================
  569.  CHECKING FOR SUBDOMAIN HIJACKING 
  570. ====================================================================================
  571. ====================================================================================
  572.  CHECKING EMAIL SECURITY 
  573. ====================================================================================
  574.  
  575. ====================================================================================
  576.  STARTING DOMAIN FLYOVER 
  577. ====================================================================================
  578. ====================================================================================
  579.  STARTING PUBLIC S3 BUCKET SCAN 
  580. ====================================================================================
  581.  
  582.  
  583. ====================================================================================
  584.  PINGING HOST 
  585. ====================================================================================
  586. PING fenixnews.com (31.22.4.75) 56(84) bytes of data.
  587.  
  588. --- fenixnews.com ping statistics ---
  589. 1 packets transmitted, 0 received, 100% packet loss, time 0ms
  590.  
  591.  
  592. ====================================================================================
  593.  RUNNING TCP PORT SCAN 
  594. ====================================================================================
  595.  
  596. Starting Nmap 7.60 ( https://nmap.org ) at 2018-01-07 08:07 EST
  597. Nmap done: 1 IP address (1 host up) scanned in 30.32 seconds
  598.  
  599. ====================================================================================
  600.  RUNNING INTRUSIVE SCANS 
  601. ====================================================================================
  602.  + -- --=[Port 21 closed... skipping.
  603.  + -- --=[Port 22 closed... skipping.
  604.  + -- --=[Port 23 closed... skipping.
  605.  + -- --=[Port 25 closed... skipping.
  606.  + -- --=[Port 53 closed... skipping.
  607.  + -- --=[Port 79 closed... skipping.
  608.  + -- --=[Port 80 closed... skipping.
  609.  + -- --=[Port 110 closed... skipping.
  610.  + -- --=[Port 111 closed... skipping.
  611.  + -- --=[Port 135 closed... skipping.
  612.  + -- --=[Port 139 closed... skipping.
  613.  + -- --=[Port 161 closed... skipping.
  614.  + -- --=[Port 162 closed... skipping.
  615.  + -- --=[Port 389 closed... skipping.
  616.  + -- --=[Port 443 closed... skipping.
  617.  + -- --=[Port 445 closed... skipping.
  618.  + -- --=[Port 512 closed... skipping.
  619.  + -- --=[Port 513 closed... skipping.
  620.  + -- --=[Port 514 closed... skipping.
  621.  + -- --=[Port 623 closed... skipping.
  622.  + -- --=[Port 624 closed... skipping.
  623.  + -- --=[Port 1099 closed... skipping.
  624.  + -- --=[Port 1433 closed... skipping.
  625.  + -- --=[Port 2049 closed... skipping.
  626.  + -- --=[Port 2121 closed... skipping.
  627.  + -- --=[Port 3306 closed... skipping.
  628.  + -- --=[Port 3310 closed... skipping.
  629.  + -- --=[Port 3128 closed... skipping.
  630.  + -- --=[Port 3389 closed... skipping.
  631.  + -- --=[Port 3632 closed... skipping.
  632.  + -- --=[Port 4443 closed... skipping.
  633.  + -- --=[Port 5432 closed... skipping.
  634.  + -- --=[Port 5800 closed... skipping.
  635.  + -- --=[Port 5900 closed... skipping.
  636.  + -- --=[Port 5984 closed... skipping.
  637.  + -- --=[Port 6000 closed... skipping.
  638.  + -- --=[Port 6667 closed... skipping.
  639.  + -- --=[Port 8000 closed... skipping.
  640.  + -- --=[Port 8100 closed... skipping.
  641.  + -- --=[Port 8080 closed... skipping.
  642.  + -- --=[Port 8180 closed... skipping.
  643.  + -- --=[Port 8443 closed... skipping.
  644.  + -- --=[Port 8888 closed... skipping.
  645.  + -- --=[Port 10000 closed... skipping.
  646.  + -- --=[Port 16992 closed... skipping.
  647.  + -- --=[Port 27017 closed... skipping.
  648.  + -- --=[Port 27018 closed... skipping.
  649.  + -- --=[Port 27019 closed... skipping.
  650.  + -- --=[Port 28017 closed... skipping.
  651.  + -- --=[Port 49152 closed... skipping.
  652. ====================================================================================
  653.  SCANNING FOR COMMON VULNERABILITIES 
  654. ====================================================================================
  655. ====================================================================================
  656.  SKIPPING FULL NMAP PORT SCAN 
  657. ====================================================================================
  658. ====================================================================================
  659.  RUNNING BRUTE FORCE 
  660. ====================================================================================
  661.  __________ __ ____ ___
  662.  \______ \_______ __ ___/ |_ ____ \ \/ /
  663.  | | _/\_ __ \ | \ __\/ __ \ \ / 
  664.  | | \ | | \/ | /| | \ ___/ / \ 
  665.  |______ / |__| |____/ |__| \___ >___/\ \ 
  666.  \/ \/ \_/
  667.  
  668.  + -- --=[BruteX v1.7 by 1N3
  669.  + -- --=[http://crowdshield.com
  670.  
  671.  
  672. ################################### Running Port Scan ##############################
  673.  
  674. Starting Nmap 7.60 ( https://nmap.org ) at 2018-01-07 08:07 EST
  675. Nmap done: 1 IP address (1 host up) scanned in 9.28 seconds
  676.  
  677. ################################### Running Brute Force ############################
  678.  
  679.  + -- --=[Port 21 closed... skipping.
  680.  + -- --=[Port 22 closed... skipping.
  681.  + -- --=[Port 23 closed... skipping.
  682.  + -- --=[Port 25 closed... skipping.
  683.  + -- --=[Port 80 closed... skipping.
  684.  + -- --=[Port 110 closed... skipping.
  685.  + -- --=[Port 139 closed... skipping.
  686.  + -- --=[Port 162 closed... skipping.
  687.  + -- --=[Port 389 closed... skipping.
  688.  + -- --=[Port 443 closed... skipping.
  689.  + -- --=[Port 445 closed... skipping.
  690.  + -- --=[Port 512 closed... skipping.
  691.  + -- --=[Port 513 closed... skipping.
  692.  + -- --=[Port 514 closed... skipping.
  693.  + -- --=[Port 993 closed... skipping.
  694.  + -- --=[Port 1433 closed... skipping.
  695.  + -- --=[Port 1521 closed... skipping.
  696.  + -- --=[Port 3306 closed... skipping.
  697.  + -- --=[Port 3389 closed... skipping.
  698.  + -- --=[Port 5432 closed... skipping.
  699.  + -- --=[Port 5900 closed... skipping.
  700.  + -- --=[Port 5901 closed... skipping.
  701.  + -- --=[Port 8000 closed... skipping.
  702.  + -- --=[Port 8080 closed... skipping.
  703.  + -- --=[Port 8100 closed... skipping.
  704.  + -- --=[Port 6667 closed... skipping.
  705. #####################################################################################################################################
  706. Hostname www.orumm.org ISP Level 3 Communications, Inc. (AS3356)
  707. Continent North America Flag
  708. CA
  709. Country Canada Country Code CA (CAN)
  710. Region ON Local time 07 Jan 2018 04:37 EST
  711. Metropolis Unknown Postal Code M9C
  712. City Toronto Latitude 43.644
  713. IP Address 216.55.97.142 Longitude -79.577
  714. #######################################################################################################################################
  715. [i] Scanning Site: http://orumm.org
  716.  
  717.  
  718.  
  719. B A S I C I N F O
  720. ====================
  721.  
  722.  
  723. [+] Site Title: accueil
  724. [+] IP address: 216.55.97.142
  725. [+] Web Server: Apache/2.2.34 (Unix) PHP/5.6.32
  726. [+] CMS: Could Not Detect
  727. [+] Cloudflare: Not Detected
  728. [+] Robots File: Could NOT Find robots.txt!
  729.  
  730.  
  731.  
  732.  
  733. W H O I S L O O K U P
  734. ========================
  735.  
  736. Domain Name: ORUMM.ORG
  737. Registry Domain ID: D148951135-LROR
  738. Registrar WHOIS Server:
  739. Registrar URL: http://www.onlinenic.com
  740. Updated Date: 2017-08-04T09:03:26Z
  741. Creation Date: 2007-08-24T09:59:38Z
  742. Registry Expiry Date: 2018-08-24T09:59:38Z
  743. Registrar Registration Expiration Date:
  744. Registrar: OnlineNIC Inc.
  745. Registrar IANA ID: 82
  746. Registrar Abuse Contact Email:
  747. Registrar Abuse Contact Phone:
  748. Reseller:
  749. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  750. Registry Registrant ID: C32643685-LROR
  751. Registrant Name: ORUMM
  752. Registrant Organization: ORUMM CASTELLI Joseph
  753. Registrant Street: 10 Rue Saint Gaucher
  754. Registrant Street: 10 Rue Saint Gaucher
  755. Registrant City: MONTELIMAR
  756. Registrant State/Province: drome
  757. Registrant Postal Code: 26200
  758. Registrant Country: FR
  759. Registrant Phone: +33.475920090
  760. Registrant Phone Ext: 1111
  761. Registrant Fax: +33.475920090
  762. Registrant Fax Ext:
  763. Registrant Email: webmaster@lcdi.net
  764. Registry Admin ID: C32643686-LROR
  765. Admin Name: Patrick Silva
  766. Admin Organization: ACATIX
  767. Admin Street: BP 21
  768. Admin Street: BP 21
  769. Admin City: BONNAT
  770. Admin State/Province: CREUSE
  771. Admin Postal Code: 23220
  772. Admin Country: FR
  773. Admin Phone: +33.555805498
  774. Admin Phone Ext: 1111
  775. Admin Fax: +33.555805499
  776. Admin Fax Ext:
  777. Admin Email: domaines@acatix.com
  778. Registry Tech ID: C32643688-LROR
  779. Tech Name: Patrick Silva
  780. Tech Organization: ACATIX
  781. Tech Street: BP 21
  782. Tech Street: BP 21
  783. Tech City: BONNAT
  784. Tech State/Province: CREUSE
  785. Tech Postal Code: 23220
  786. Tech Country: FR
  787. Tech Phone: +33.555805498
  788. Tech Phone Ext: 1111
  789. Tech Fax: +33.555805499
  790. Tech Fax Ext:
  791. Tech Email: domaines@acatix.com
  792. Name Server: NS1.AFSW.NET
  793. Name Server: NS2.AFSW.NET
  794. DNSSEC: unsigned
  795. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  796. >>> Last update of WHOIS database: 2018-01-07T09:40:35Z <<<
  797.  
  798. For more information on Whois status codes, please visit https://icann.org/epp
  799.  
  800.  
  801.  
  802.  
  803.  
  804. G E O I P L O O K U P
  805. =========================
  806.  
  807. [i] IP Address: 216.55.97.142
  808. [i] Country: CA
  809. [i] State: Ontario
  810. [i] City: Toronto
  811. [i] Latitude: 43.643700
  812. [i] Longitude: -79.576698
  813.  
  814.  
  815.  
  816.  
  817. H T T P H E A D E R S
  818. =======================
  819.  
  820.  
  821. [i] HTTP/1.1 200 OK
  822. [i] Date: Sun, 07 Jan 2018 09:41:35 GMT
  823. [i] Server: Apache/2.2.34 (Unix) PHP/5.6.32
  824. [i] Last-Modified: Tue, 14 Jun 2016 17:06:21 GMT
  825. [i] ETag: "3522-85ce-535400627bd40"
  826. [i] Accept-Ranges: bytes
  827. [i] Content-Length: 34254
  828. [i] Vary: Accept-Encoding
  829. [i] Connection: close
  830. [i] Content-Type: text/html
  831.  
  832.  
  833.  
  834.  
  835. D N S L O O K U P
  836. ===================
  837.  
  838. orumm.org. 21599 IN SOA ns1.afsw.net. hostmaster.afsw.net. 2014060701 10800 3600 604800 86400
  839. orumm.org. 21599 IN NS ns2.afsw.net.
  840. orumm.org. 21599 IN NS ns1.afsw.net.
  841. orumm.org. 21599 IN MX 100 spamwall.acatix.com.
  842. orumm.org. 21599 IN A 216.55.97.142
  843.  
  844.  
  845.  
  846.  
  847. S U B N E T C A L C U L A T I O N
  848. ====================================
  849.  
  850. Address = 216.55.97.142
  851. Network = 216.55.97.142 / 32
  852. Netmask = 255.255.255.255
  853. Broadcast = not needed on Point-to-Point links
  854. Wildcard Mask = 0.0.0.0
  855. Hosts Bits = 0
  856. Max. Hosts = 1 (2^0 - 0)
  857. Host Range = { 216.55.97.142 - 216.55.97.142 }
  858.  
  859.  
  860.  
  861. N M A P P O R T S C A N
  862. ============================
  863.  
  864.  
  865. Starting Nmap 7.01 ( https://nmap.org ) at 2018-01-07 09:41 UTC
  866. Nmap scan report for orumm.org (216.55.97.142)
  867. Host is up (0.0075s latency).
  868. rDNS record for 216.55.97.142: afsw.net
  869. PORT STATE SERVICE VERSION
  870. 21/tcp closed ftp
  871. 22/tcp open ssh OpenSSH 7.3 (protocol 2.0)
  872. 23/tcp filtered telnet
  873. 25/tcp open smtp Sendmail 8.14.5/8.13.4
  874. 80/tcp open http Apache httpd 2.2.34 ((Unix) PHP/5.6.32)
  875. 110/tcp open pop3 Dovecot pop3d
  876. 143/tcp open imap Dovecot imapd
  877. 443/tcp open https?
  878. 445/tcp closed microsoft-ds
  879. 3389/tcp closed ms-wbt-server
  880. Service Info: OS: Unix
  881.  
  882. Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  883. Nmap done: 1 IP address (1 host up) scanned in 28.11 seconds
  884.  
  885. \/ \/ \/
  886. [?] Enter the target: http://www.orumm.org/
  887. [!] IP Address : 216.55.97.142
  888. [!] Server: Apache/2.2.34 (Unix) PHP/5.6.32
  889. [-] Clickjacking protection is not in place.
  890. [+] Operating System : Unix&#34;
  891. },
  892. &#34;993&#34;: {
  893. &#34;imaps&#34;: {
  894. &#34;tls&#34;: {
  895. &#34;tls&#34;: {
  896. &#34;cipher_suite&#34;: {
  897. &#34;id&#34;: &#34;0x0005&#34;,
  898. &#34;name&#34;: &#34;TLS_RSA_WITH_RC4_128_SHA&#34;
  899. },
  900. &#34;v
  901. [!] www.orumm.org doesn't seem to use a CMS
  902. [+] Honeypot Probabilty: 30%
  903. ----------------------------------------
  904. PORT STATE SERVICE VERSION
  905. 21/tcp closed ftp
  906. 22/tcp open ssh OpenSSH 7.3 (protocol 2.0)
  907. 23/tcp filtered telnet
  908. 25/tcp open smtp Sendmail 8.14.5/8.13.4
  909. 80/tcp open http Apache httpd 2.2.34 ((Unix) PHP/5.6.32)
  910. 110/tcp open pop3 Dovecot pop3d
  911. 143/tcp open imap Dovecot imapd
  912. 443/tcp open https?
  913. 445/tcp closed microsoft-ds
  914. 3389/tcp closed ms-wbt-server
  915. ----------------------------------------
  916.  
  917. [+] DNS Records
  918.  
  919. [+] Host Records (A)
  920. www.orumm.orgHTTP: (afsw.net) (216.55.97.142) AS3356 Level 3 Communications, Inc. Canada
  921.  
  922. [+] TXT Records
  923.  
  924. [+] DNS Map: https://dnsdumpster.com/static/map/orumm.org.png
  925.  
  926. [>] Initiating 3 intel modules
  927. [>] Loading Alpha module (1/3)
  928. [>] Beta module deployed (2/3)
  929. [>] Gamma module initiated (3/3)
  930. No emails found
  931. No hosts found
  932. [+] Virtual hosts:
  933. -----------------
  934.  
  935. Target: http://orumm.org
  936.  
  937. Server: Apache/2.2.34 (Unix) PHP/5.6.32
  938.  
  939.  
  940. ## NOTE: The Administrator URL was renamed. Bruteforce it. ##
  941. ## None of /administrator, /admin, /manage ##
  942.  
  943.  
  944. ## Checking if the target has deployed an Anti-Scanner measure
  945.  
  946. [!] Scanning Passed ..... OK
  947.  
  948.  
  949. ## Detecting Joomla! based Firewall ...
  950.  
  951. [!] .htaccess shipped with Joomla! is being deployed for SEO purpose
  952. [!] It contains some defensive mod_rewrite rules
  953. [!] Payloads that contain strings (mosConfig,base64_encode,<script>
  954. GLOBALS,_REQUEST) wil be responsed with 403.
  955.  
  956.  
  957. ## Fingerprinting in progress ...
  958.  
  959. ~Unable to detect the version. Is it sure a Joomla?
  960.  
  961. ## Fingerprinting done.
  962. [92m====================================================================================
  963. Server: 192.168.1.254
  964. Address: 192.168.1.254#53
  965.  
  966. Non-authoritative answer:
  967. Name: orumm.org
  968. Address: 216.55.97.142
  969.  
  970. orumm.org has address 216.55.97.142
  971. orumm.org mail is handled by 100 spamwall.acatix.com.
  972. ====================================================================================
  973.  CHECKING OS FINGERPRINT 
  974. ====================================================================================
  975.  
  976. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu
  977.  
  978. [+] Target is orumm.org
  979. [+] Loading modules.
  980. [+] Following modules are loaded:
  981. [x] [1] ping:icmp_ping - ICMP echo discovery module
  982. [x] [2] ping:tcp_ping - TCP-based ping discovery module
  983. [x] [3] ping:udp_ping - UDP-based ping discovery module
  984. [x] [4] infogather:ttl_calc - TCP and UDP based TTL distance calculation
  985. [x] [5] infogather:portscan - TCP and UDP PortScanner
  986. [x] [6] fingerprint:icmp_echo - ICMP Echo request fingerprinting module
  987. [x] [7] fingerprint:icmp_tstamp - ICMP Timestamp request fingerprinting module
  988. [x] [8] fingerprint:icmp_amask - ICMP Address mask request fingerprinting module
  989. [x] [9] fingerprint:icmp_port_unreach - ICMP port unreachable fingerprinting module
  990. [x] [10] fingerprint:tcp_hshake - TCP Handshake fingerprinting module
  991. [x] [11] fingerprint:tcp_rst - TCP RST fingerprinting module
  992. [x] [12] fingerprint:smb - SMB fingerprinting module
  993. [x] [13] fingerprint:snmp - SNMPv2c fingerprinting module
  994. [+] 13 modules registered
  995. [+] Initializing scan engine
  996. [+] Running scan engine
  997. [-] ping:tcp_ping module: no closed/open TCP ports known on 216.55.97.142. Module test failed
  998. [-] ping:udp_ping module: no closed/open UDP ports known on 216.55.97.142. Module test failed
  999. [-] No distance calculation. 216.55.97.142 appears to be dead or no ports known
  1000. [+] Host: 216.55.97.142 is up (Guess probability: 50%)
  1001. [+] Target: 216.55.97.142 is alive. Round-Trip Time: 2.02768 sec
  1002. [+] Selected safe Round-Trip Time value is: 4.05535 sec
  1003. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  1004. [-] fingerprint:smb need either TCP port 139 or 445 to run
  1005. [+] Primary guess:
  1006. [+] Host 216.55.97.142 Running OS: P3(ZöU (Guess probability: 100%)
  1007. [+] Other guesses:
  1008. [+] Host 216.55.97.142 Running OS: P3(ZöU (Guess probability: 100%)
  1009. [+] Host 216.55.97.142 Running OS: P3(ZöU (Guess probability: 100%)
  1010. [+] Host 216.55.97.142 Running OS: P3(ZöU (Guess probability: 100%)
  1011. [+] Host 216.55.97.142 Running OS: P3(ZöU (Guess probability: 100%)
  1012. [+] Host 216.55.97.142 Running OS: P3(ZöU (Guess probability: 100%)
  1013. [+] Host 216.55.97.142 Running OS: P3(ZöU (Guess probability: 100%)
  1014. [+] Host 216.55.97.142 Running OS: P3(ZöU (Guess probability: 100%)
  1015. [+] Host 216.55.97.142 Running OS: P3(ZöU (Guess probability: 100%)
  1016. [+] Host 216.55.97.142 Running OS: P3(ZöU (Guess probability: 100%)
  1017. [+] Cleaning up scan engine
  1018. [+] Modules deinitialized
  1019. [+] Execution completed.
  1020. ====================================================================================
  1021.  GATHERING WHOIS INFO 
  1022. ====================================================================================
  1023. Domain Name: ORUMM.ORG
  1024. Registry Domain ID: D148951135-LROR
  1025. Registrar WHOIS Server:
  1026. Registrar URL: http://www.onlinenic.com
  1027. Updated Date: 2017-08-04T09:03:26Z
  1028. Creation Date: 2007-08-24T09:59:38Z
  1029. Registry Expiry Date: 2018-08-24T09:59:38Z
  1030. Registrar Registration Expiration Date:
  1031. Registrar: OnlineNIC Inc.
  1032. Registrar IANA ID: 82
  1033. Registrar Abuse Contact Email:
  1034. Registrar Abuse Contact Phone:
  1035. Reseller:
  1036. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  1037. Registry Registrant ID: C32643685-LROR
  1038. Registrant Name: ORUMM
  1039. Registrant Organization: ORUMM CASTELLI Joseph
  1040. Registrant Street: 10 Rue Saint Gaucher
  1041. Registrant Street: 10 Rue Saint Gaucher
  1042. Registrant City: MONTELIMAR
  1043. Registrant State/Province: drome
  1044. Registrant Postal Code: 26200
  1045. Registrant Country: FR
  1046. Registrant Phone: +33.475920090
  1047. Registrant Phone Ext: 1111
  1048. Registrant Fax: +33.475920090
  1049. Registrant Fax Ext:
  1050. Registrant Email: webmaster@lcdi.net
  1051. Registry Admin ID: C32643686-LROR
  1052. Admin Name: Patrick Silva
  1053. Admin Organization: ACATIX
  1054. Admin Street: BP 21
  1055. Admin Street: BP 21
  1056. Admin City: BONNAT
  1057. Admin State/Province: CREUSE
  1058. Admin Postal Code: 23220
  1059. Admin Country: FR
  1060. Admin Phone: +33.555805498
  1061. Admin Phone Ext: 1111
  1062. Admin Fax: +33.555805499
  1063. Admin Fax Ext:
  1064. Admin Email: domaines@acatix.com
  1065. Registry Tech ID: C32643688-LROR
  1066. Tech Name: Patrick Silva
  1067. Tech Organization: ACATIX
  1068. Tech Street: BP 21
  1069. Tech Street: BP 21
  1070. Tech City: BONNAT
  1071. Tech State/Province: CREUSE
  1072. Tech Postal Code: 23220
  1073. Tech Country: FR
  1074. Tech Phone: +33.555805498
  1075. Tech Phone Ext: 1111
  1076. Tech Fax: +33.555805499
  1077. Tech Fax Ext:
  1078. Tech Email: domaines@acatix.com
  1079. Name Server: NS1.AFSW.NET
  1080. Name Server: NS2.AFSW.NET
  1081. DNSSEC: unsigned
  1082. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  1083. >>> Last update of WHOIS database: 2018-01-07T13:05:48Z <<<
  1084.  
  1085. For more information on Whois status codes, please visit https://icann.org/epp
  1086.  
  1087. Access to Public Interest Registry WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Public Interest Registry registry database. The data in this record is provided by Public Interest Registry for informational purposes only, and Public Interest Registry does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to: (a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Public Interest Registry reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.
  1088. ====================================================================================
  1089.  GATHERING OSINT INFO 
  1090. ====================================================================================
  1091.  
  1092. *******************************************************************
  1093. * *
  1094. * | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ *
  1095. * | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| *
  1096. * | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | *
  1097. * \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| *
  1098. * *
  1099. * TheHarvester Ver. 2.7 *
  1100. * Coded by Christian Martorella *
  1101. * Edge-Security Research *
  1102. * cmartorella@edge-security.com *
  1103. *******************************************************************
  1104.  
  1105.  
  1106. Full harvest..
  1107. [-] Searching in Google..
  1108. Searching 0 results...
  1109. [-] Searching in PGP Key server..
  1110. [-] Searching in Bing..
  1111. Searching 50 results...
  1112. [-] Searching in Exalead..
  1113. Searching 50 results...
  1114.  
  1115.  
  1116. [+] Emails found:
  1117. ------------------
  1118. contact@orumm.org
  1119.  
  1120. [+] Hosts found in search engines:
  1121. ------------------------------------
  1122. [-] Resolving hostnames IPs...
  1123. 216.55.97.142:www.orumm.org
  1124. [+] Virtual hosts:
  1125. ==================
  1126.  
  1127. ******************************************************
  1128. * /\/\ ___| |_ __ _ __ _ ___ ___ / _(_) | *
  1129. * / \ / _ \ __/ _` |/ _` |/ _ \ / _ \| |_| | | *
  1130. * / /\/\ \ __/ || (_| | (_| | (_) | (_) | _| | | *
  1131. * \/ \/\___|\__\__,_|\__, |\___/ \___/|_| |_|_| *
  1132. * |___/ *
  1133. * Metagoofil Ver 2.2 *
  1134. * Christian Martorella *
  1135. * Edge-Security.com *
  1136. * cmartorella_at_edge-security.com *
  1137. ******************************************************
  1138.  
  1139. [-] Starting online search...
  1140.  
  1141. [-] Searching for doc files, with a limit of 25
  1142. Searching 100 results...
  1143. Results: 0 files found
  1144. Starting to download 25 of them:
  1145. ----------------------------------------
  1146.  
  1147.  
  1148. [-] Searching for pdf files, with a limit of 25
  1149. Searching 100 results...
  1150. Results: 0 files found
  1151. Starting to download 25 of them:
  1152. ----------------------------------------
  1153.  
  1154.  
  1155. [-] Searching for xls files, with a limit of 25
  1156. Searching 100 results...
  1157. Results: 0 files found
  1158. Starting to download 25 of them:
  1159. ----------------------------------------
  1160.  
  1161.  
  1162. [-] Searching for csv files, with a limit of 25
  1163. Searching 100 results...
  1164. Results: 0 files found
  1165. Starting to download 25 of them:
  1166. ----------------------------------------
  1167.  
  1168.  
  1169. [-] Searching for txt files, with a limit of 25
  1170. Searching 100 results...
  1171. Results: 0 files found
  1172. Starting to download 25 of them:
  1173. ----------------------------------------
  1174.  
  1175. processing
  1176. user
  1177. email
  1178.  
  1179. [+] List of users found:
  1180. --------------------------
  1181.  
  1182. [+] List of software found:
  1183. -----------------------------
  1184.  
  1185. [+] List of paths and servers found:
  1186. ---------------------------------------
  1187.  
  1188. [+] List of e-mails found:
  1189. ----------------------------
  1190. ====================================================================================
  1191.  GATHERING DNS INFO 
  1192. ====================================================================================
  1193.  
  1194. ; <<>> DiG 9.11.2-5-Debian <<>> -x orumm.org
  1195. ;; global options: +cmd
  1196. ;; Got answer:
  1197. ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56706
  1198. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  1199.  
  1200. ;; OPT PSEUDOSECTION:
  1201. ; EDNS: version: 0, flags:; udp: 4096
  1202. ;; QUESTION SECTION:
  1203. ;org.orumm.in-addr.arpa. IN PTR
  1204.  
  1205. ;; AUTHORITY SECTION:
  1206. in-addr.arpa. 3600 IN SOA b.in-addr-servers.arpa. nstld.iana.org. 2017102538 1800 900 604800 3600
  1207.  
  1208. ;; Query time: 109 msec
  1209. ;; SERVER: 192.168.1.254#53(192.168.1.254)
  1210. ;; WHEN: Sun Jan 07 08:08:49 EST 2018
  1211. ;; MSG SIZE rcvd: 119
  1212.  
  1213. dnsenum VERSION:1.2.4
  1214. 
  1215. ----- orumm.org -----
  1216. 
  1217.  
  1218. Host's addresses:
  1219. __________________
  1220.  
  1221. orumm.org. 73961 IN A 216.55.97.142
  1222. 
  1223.  
  1224. Name Servers:
  1225. ______________
  1226.  
  1227. ns2.afsw.net. 86397 IN A 216.55.98.142
  1228. ns1.afsw.net. 86396 IN A 216.55.97.142
  1229. 
  1230.  
  1231. Mail (MX) Servers:
  1232. ___________________
  1233.  
  1234. spamwall.acatix.com. 86400 IN A 216.55.101.233
  1235. 
  1236.  
  1237. Trying Zone Transfers and getting Bind Versions:
  1238. _________________________________________________
  1239.  
  1240. 
  1241. Trying Zone Transfer for orumm.org on ns2.afsw.net ...
  1242. orumm.org. 86400 IN SOA (
  1243. orumm.org. 86400 IN NS ns1.afsw.net.
  1244. orumm.org. 86400 IN NS ns2.afsw.net.
  1245. orumm.org. 86400 IN MX 100
  1246. orumm.org. 86400 IN A 216.55.97.142
  1247. ftp.orumm.org. 86400 IN A 216.55.97.142
  1248. www.orumm.org. 86400 IN A 216.55.97.142
  1249.  
  1250. Trying Zone Transfer for orumm.org on ns1.afsw.net ...
  1251. orumm.org. 86400 IN SOA (
  1252. orumm.org. 86400 IN NS ns1.afsw.net.
  1253. orumm.org. 86400 IN NS ns2.afsw.net.
  1254. orumm.org. 86400 IN MX 100
  1255. orumm.org. 86400 IN A 216.55.97.142
  1256. ftp.orumm.org. 86400 IN A 216.55.97.142
  1257. www.orumm.org. 86400 IN A 216.55.97.142
  1258.  
  1259. brute force file not specified, bay.
  1260. ====================================================================================
  1261.  GATHERING DNS SUBDOMAINS 
  1262. ====================================================================================
  1263. 
  1264. ____ _ _ _ _ _____
  1265. / ___| _ _| |__ | (_)___| |_|___ / _ __
  1266. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  1267. ___) | |_| | |_) | | \__ \ |_ ___) | |
  1268. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  1269.  
  1270. # Coded By Ahmed Aboul-Ela - @aboul3la
  1271.  
  1272. [-] Enumerating subdomains now for orumm.org
  1273. [-] verbosity is enabled, will show the subdomains results in realtime
  1274. [-] Searching now in Baidu..
  1275. [-] Searching now in Yahoo..
  1276. [-] Searching now in Google..
  1277. [-] Searching now in Bing..
  1278. [-] Searching now in Ask..
  1279. [-] Searching now in Netcraft..
  1280. [-] Searching now in DNSdumpster..
  1281. [-] Searching now in Virustotal..
  1282. [-] Searching now in ThreatCrowd..
  1283. [-] Searching now in SSL Certificates..
  1284. [-] Searching now in PassiveDNS..
  1285. Yahoo: www.orumm.org
  1286. Virustotal: www.orumm.org
  1287. [-] Saving results to file: /usr/share/sniper/loot/domains/domains-orumm.org.txt
  1288. [-] Total Unique Subdomains Found: 1
  1289. www.orumm.org
  1290.  
  1291.  ╔═╗╩═╗╔╩╗╔═╗╩ ╩
  1292.  ║ ╠╩╝ ║ ╚═╗╠═╣
  1293.  ╚═╝╩╚═ ╩o╚═╝╩ ╩
  1294. ====================================================================================
  1295.  GATHERING CERTIFICATE SUBDOMAINS 
  1296. ====================================================================================
  1297. 
  1298.  
  1299. [+] Domains saved to: /usr/share/sniper/loot/domains/domains-orumm.org-full.txt
  1300. 
  1301. ====================================================================================
  1302.  CHECKING FOR SUBDOMAIN HIJACKING 
  1303. ====================================================================================
  1304. ====================================================================================
  1305.  CHECKING EMAIL SECURITY 
  1306. ====================================================================================
  1307.  
  1308. ====================================================================================
  1309.  STARTING DOMAIN FLYOVER 
  1310. ====================================================================================
  1311. ====================================================================================
  1312.  STARTING PUBLIC S3 BUCKET SCAN 
  1313. ====================================================================================
  1314.  
  1315.  
  1316. ====================================================================================
  1317.  PINGING HOST 
  1318. ====================================================================================
  1319. PING orumm.org (216.55.97.142) 56(84) bytes of data.
  1320. 64 bytes from afsw.net (216.55.97.142): icmp_seq=1 ttl=54 time=189 ms
  1321.  
  1322. --- orumm.org ping statistics ---
  1323. 1 packets transmitted, 1 received, 0% packet loss, time 0ms
  1324. rtt min/avg/max/mdev = 189.017/189.017/189.017/0.000 ms
  1325.  
  1326. ====================================================================================
  1327.  RUNNING TCP PORT SCAN 
  1328. ====================================================================================
  1329.  
  1330. Starting Nmap 7.60 ( https://nmap.org ) at 2018-01-07 08:10 EST
  1331. Nmap scan report for orumm.org (216.55.97.142)
  1332. Host is up (0.62s latency).
  1333. rDNS record for 216.55.97.142: afsw.net
  1334. Not shown: 413 closed ports, 47 filtered ports
  1335. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  1336. PORT STATE SERVICE
  1337. 21/tcp open ftp
  1338. 22/tcp open ssh
  1339. 53/tcp open domain
  1340. 80/tcp open http
  1341. 110/tcp open pop3
  1342. 143/tcp open imap
  1343. 443/tcp open https
  1344. 993/tcp open imaps
  1345. 995/tcp open pop3s
  1346. 3306/tcp open mysql
  1347. 8001/tcp open vcom-tunnel
  1348. 8080/tcp open http-proxy
  1349. 8443/tcp open https-alt
  1350.  
  1351. Nmap done: 1 IP address (1 host up) scanned in 4.40 seconds
  1352.  
  1353. ====================================================================================
  1354.  RUNNING INTRUSIVE SCANS 
  1355. ====================================================================================
  1356.  + -- --=[Port 21 opened... running tests...
  1357.  
  1358. Starting Nmap 7.60 ( https://nmap.org ) at 2018-01-07 08:10 EST
  1359. Nmap scan report for orumm.org (216.55.97.142)
  1360. Host is up (0.19s latency).
  1361. rDNS record for 216.55.97.142: afsw.net
  1362. Skipping host orumm.org (216.55.97.142) due to host timeout
  1363. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1364. Nmap done: 1 IP address (1 host up) scanned in 910.58 seconds
  1365.  + -- --=[Port 22 opened... running tests...
  1366. # general
  1367. (gen) banner: SSH-2.0-OpenSSH_7.3
  1368. (gen) software: OpenSSH 7.3
  1369. (gen) compatibility: OpenSSH 7.3+, Dropbear SSH 2016.73+
  1370. (gen) compression: enabled (zlib@openssh.com)
  1371.  
  1372. # key exchange algorithms
  1373. (kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
  1374. (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
  1375. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1376. (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
  1377. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1378. (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
  1379. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1380. (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
  1381. `- [info] available since OpenSSH 4.4
  1382. (kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
  1383. (kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
  1384. (kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
  1385. (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
  1386. `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
  1387.  
  1388. # host-key algorithms
  1389. (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
  1390. (key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
  1391. (key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
  1392. (key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
  1393. `- [warn] using weak random number generator could reveal the key
  1394. `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
  1395. (key) ssh-ed25519 -- [info] available since OpenSSH 6.5
  1396.  
  1397. # encryption algorithms (ciphers)
  1398. (enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
  1399. `- [info] default cipher since OpenSSH 6.9.
  1400. (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
  1401. (enc) aes192-ctr -- [info] available since OpenSSH 3.7
  1402. (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
  1403. (enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
  1404. (enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
  1405.  
  1406. # message authentication code algorithms
  1407. (mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
  1408. `- [info] available since OpenSSH 6.2
  1409. (mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
  1410. (mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
  1411. (mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
  1412. (mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
  1413. `- [info] available since OpenSSH 6.2
  1414. (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
  1415. `- [warn] using small 64-bit tag size
  1416. `- [info] available since OpenSSH 4.7
  1417. (mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
  1418. `- [info] available since OpenSSH 6.2
  1419. (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
  1420. `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
  1421. (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
  1422. `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
  1423. (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
  1424. `- [warn] using weak hashing algorithm
  1425. `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
  1426.  
  1427. # algorithm recommendations (for OpenSSH 7.3)
  1428. (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
  1429. (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
  1430. (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
  1431. (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
  1432. (rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
  1433. (rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
  1434. (rec) -hmac-sha2-512 -- mac algorithm to remove
  1435. (rec) -umac-128@openssh.com -- mac algorithm to remove
  1436. (rec) -hmac-sha2-256 -- mac algorithm to remove
  1437. (rec) -umac-64@openssh.com -- mac algorithm to remove
  1438. (rec) -hmac-sha1 -- mac algorithm to remove
  1439. (rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
  1440. (rec) -umac-64-etm@openssh.com -- mac algorithm to remove
  1441.  
  1442.  
  1443. Starting Nmap 7.60 ( https://nmap.org ) at 2018-01-07 08:25 EST
  1444. NSE: [ssh-run] Failed to specify credentials and command to run.
  1445. NSE: [ssh-brute] Trying username/password pair: root:root
  1446. NSE: [ssh-brute] Trying username/password pair: admin:admin
  1447. NSE: [ssh-brute] Trying username/password pair: administrator:administrator
  1448. NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
  1449. NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
  1450. NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
  1451. NSE: [ssh-brute] Trying username/password pair: guest:guest
  1452. NSE: [ssh-brute] Trying username/password pair: user:user
  1453. NSE: [ssh-brute] Trying username/password pair: web:web
  1454. NSE: [ssh-brute] Trying username/password pair: test:test
  1455. NSE: [ssh-brute] Trying username/password pair: root:
  1456. NSE: [ssh-brute] Trying username/password pair: admin:
  1457. NSE: [ssh-brute] Trying username/password pair: administrator:
  1458. NSE: [ssh-brute] Trying username/password pair: webadmin:
  1459. NSE: [ssh-brute] Trying username/password pair: sysadmin:
  1460. NSE: [ssh-brute] Trying username/password pair: netadmin:
  1461. NSE: [ssh-brute] Trying username/password pair: guest:
  1462. NSE: [ssh-brute] Trying username/password pair: user:
  1463. NSE: [ssh-brute] Trying username/password pair: web:
  1464. NSE: [ssh-brute] Trying username/password pair: test:
  1465. NSE: [ssh-brute] Trying username/password pair: root:123456
  1466. NSE: [ssh-brute] Trying username/password pair: admin:123456
  1467. NSE: [ssh-brute] Trying username/password pair: administrator:123456
  1468. NSE: [ssh-brute] Trying username/password pair: webadmin:123456
  1469. Nmap scan report for orumm.org (216.55.97.142)
  1470. Host is up (0.19s latency).
  1471. rDNS record for 216.55.97.142: afsw.net
  1472. Skipping host orumm.org (216.55.97.142) due to host timeout
  1473. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1474. Nmap done: 1 IP address (1 host up) scanned in 910.40 seconds
  1475.  + -- --=[Port 23 closed... skipping.
  1476.  + -- --=[Port 25 closed... skipping.
  1477.  + -- --=[Port 53 opened... running tests...
  1478.  
  1479. Starting Nmap 7.60 ( https://nmap.org ) at 2018-01-07 08:41 EST
  1480. Nmap scan report for orumm.org (216.55.97.142)
  1481. Host is up (0.20s latency).
  1482. rDNS record for 216.55.97.142: afsw.net
  1483.  
  1484. PORT STATE SERVICE VERSION
  1485. 53/udp open domain ISC BIND 9.9.7-P2
  1486. |_dns-cache-snoop: 0 of 100 tested domains are cached.
  1487. | dns-fuzz: Server stopped responding... He's dead, Jim.
  1488. |_Offending packet: 0x4ed500000002000000000000036e6d6c0362747307726c7879716c6a077a676a61676d6100010001077a736776736b6903776b68056364676f6103656d6fc00c00050001
  1489. | dns-nsec-enum:
  1490. |_ No NSEC records found
  1491. | dns-nsec3-enum:
  1492. |_ DNSSEC NSEC3 not supported
  1493. | dns-nsid:
  1494. |_ bind.version: 9.9.7-P2
  1495. Too many fingerprints match this host to give specific OS details
  1496. Network Distance: 11 hops
  1497.  
  1498. Host script results:
  1499. | dns-brute:
  1500. | DNS Brute-force hostnames:
  1501. | www.orumm.org - 216.55.97.142
  1502. |_ ftp.orumm.org - 216.55.97.142
  1503.  
  1504. TRACEROUTE (using port 53/udp)
  1505. HOP RTT ADDRESS
  1506. 1 109.31 ms 10.13.0.1
  1507. 2 110.16 ms 37.187.24.253
  1508. 3 109.96 ms 10.50.225.61
  1509. 4 109.99 ms 10.17.129.40
  1510. 5 109.96 ms 10.73.0.48
  1511. 6 111.74 ms 10.95.33.10
  1512. 7 118.74 ms be100-1110.th2-1-a9.fr.eu (213.186.32.215)
  1513. 8 ... 10
  1514. 11 187.48 ms afsw.net (216.55.97.142)
  1515.  
  1516. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1517. Nmap done: 1 IP address (1 host up) scanned in 438.10 seconds
  1518.  + -- --=[Port 79 closed... skipping.
  1519.  + -- --=[Port 80 opened... running tests...
  1520. ====================================================================================
  1521.  CHECKING FOR WAF 
  1522. ====================================================================================
  1523.  
  1524. ^ ^
  1525. _ __ _ ____ _ __ _ _ ____
  1526. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  1527. | V V // o // _/ | V V // 0 // 0 // _/
  1528. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  1529. <
  1530. ...'
  1531.  
  1532. WAFW00F - Web Application Firewall Detection Tool
  1533.  
  1534. By Sandro Gauci && Wendel G. Henrique
  1535.  
  1536. Checking http://orumm.org
  1537. The site http://orumm.org is behind a IBM Web Application Security
  1538. Number of requests: 4
  1539.  
  1540. ====================================================================================
  1541.  GATHERING HTTP INFO 
  1542. ====================================================================================
  1543. http://orumm.org [ Unassigned]
  1544.  
  1545.  __ ______ _____ 
  1546.  \ \/ / ___|_ _|
  1547.  \ /\___ \ | | 
  1548.  / \ ___) || | 
  1549.  /_/\_|____/ |_| 
  1550.  
  1551. + -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield
  1552. + -- --=[Target: orumm.org:80
  1553.  
  1554. ====================================================================================
  1555.  CHECKING HTTP HEADERS 
  1556. ====================================================================================
  1557. + -- --=[Checking if X-Content options are enabled on orumm.org... 
  1558.  
  1559. + -- --=[Checking if X-Frame options are enabled on orumm.org... 
  1560.  
  1561. + -- --=[Checking if X-XSS-Protection header is enabled on orumm.org... 
  1562.  
  1563. + -- --=[Checking HTTP methods on orumm.org... 
  1564. Allow: GET,HEAD,POST,OPTIONS
  1565.  
  1566. + -- --=[Checking if TRACE method is enabled on orumm.org... 
  1567.  
  1568. + -- --=[Checking for META tags on orumm.org... 
  1569. <meta charset="utf-8">
  1570. <meta name="viewport" content="initial-scale = 1.0, maximum-scale = 1.0, user-scalable = no, width = device-width">
  1571. <meta name="description" content="Ordre des Rites Unis de Memphis & Misraïm (ORUMM) - Rite Ancien et Primitif de Memphis-Misraïm - Suprême Conseil des Rites Confédérés">
  1572. <meta name="keywords" content="Ordre des Rites Unis de Memphis & Misraïm (ORUMM) - Rite Ancien et Primitif de Memphis-Misraïm - Suprême Conseil des Rites Confédérés">
  1573.  
  1574. + -- --=[Checking for open proxy on orumm.org... 
  1575.  
  1576. <TABLE height="65%" cellSpacing=0 cellPadding=0 width="100%" border=0>
  1577. <TD VALIGN=TOP BGCOLOR=#006699>
  1578. <CENTER><FONT FACE=ARIAL,HELVETICA COLOR=#FFFFFF SIZE=6>
  1579. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;AFSW.NET</FONT></CENTER>
  1580. </TD>
  1581. </TABLE>
  1582.  
  1583. </BODY>
  1584. </HTML>
  1585.  
  1586. + -- --=[Enumerating software on orumm.org... 
  1587. Server: Apache/2.2.34 (Unix) PHP/5.6.32
  1588.  
  1589. + -- --=[Checking if Strict-Transport-Security is enabled on orumm.org... 
  1590.  
  1591. + -- --=[Checking for Flash cross-domain policy on orumm.org... 
  1592. <center>
  1593. <p style="font-size: 9em;color:#778;">404</p>
  1594. <p style="font-size: 2em;color:#888;max-width:60%;">File Not Found</p>
  1595. <br>
  1596. <p style="font-size: 1em;color:#223;max-width:60%;">The object requested could not be found on the server.</p>
  1597. <br>
  1598. <p style="font-size: 1em;color:#223;max-width:60%;">Please check your request for typing errors and retry.</p>
  1599. </center>
  1600. </body>
  1601. </html>
  1602.  
  1603. + -- --=[Checking for Silverlight cross-domain policy on orumm.org... 
  1604. <center>
  1605. <p style="font-size: 9em;color:#778;">404</p>
  1606. <p style="font-size: 2em;color:#888;max-width:60%;">File Not Found</p>
  1607. <br>
  1608. <p style="font-size: 1em;color:#223;max-width:60%;">The object requested could not be found on the server.</p>
  1609. <br>
  1610. <p style="font-size: 1em;color:#223;max-width:60%;">Please check your request for typing errors and retry.</p>
  1611. </center>
  1612. </body>
  1613. </html>
  1614.  
  1615. + -- --=[Checking for HTML5 cross-origin resource sharing on orumm.org... 
  1616.  
  1617. + -- --=[Retrieving robots.txt on orumm.org... 
  1618. <center>
  1619. <p style="font-size: 9em;color:#778;">404</p>
  1620. <p style="font-size: 2em;color:#888;max-width:60%;">File Not Found</p>
  1621. <br>
  1622. <p style="font-size: 1em;color:#223;max-width:60%;">The object requested could not be found on the server.</p>
  1623. <br>
  1624. <p style="font-size: 1em;color:#223;max-width:60%;">Please check your request for typing errors and retry.</p>
  1625. </center>
  1626. </body>
  1627. </html>
  1628.  
  1629. + -- --=[Retrieving sitemap.xml on orumm.org... 
  1630. <center>
  1631. <p style="font-size: 9em;color:#778;">404</p>
  1632. <p style="font-size: 2em;color:#888;max-width:60%;">File Not Found</p>
  1633. <br>
  1634. <p style="font-size: 1em;color:#223;max-width:60%;">The object requested could not be found on the server.</p>
  1635. <br>
  1636. <p style="font-size: 1em;color:#223;max-width:60%;">Please check your request for typing errors and retry.</p>
  1637. </center>
  1638. </body>
  1639. </html>
  1640.  
  1641. + -- --=[Checking cookie attributes on orumm.org... 
  1642.  
  1643. + -- --=[Checking for ASP.NET Detailed Errors on orumm.org... 
  1644. <p style="font-size: 1em;color:#223;max-width:60%;">Please check your request for typing errors and retry.</p>
  1645. <p style="font-size: 1em;color:#223;max-width:60%;">Please check your request for typing errors and retry.</p>
  1646.  
  1647. 
  1648. ====================================================================================
  1649.  SAVING SCREENSHOTS 
  1650. ====================================================================================
  1651. [+] Screenshot saved to /usr/share/sniper/loot/screenshots/orumm.org-port80.jpg
  1652. ====================================================================================
  1653.  RUNNING GOOGLE HACKING QUERIES 
  1654. ====================================================================================
  1655. ====================================================================================
  1656.  RUNNING INURLBR OSINT QUERIES 
  1657. ====================================================================================
  1658.  
  1659.  _____  .701F. .iBR. .7CL. .70BR. .7BR. .7BR'''Cq. .70BR. .1BR'''Yp, .8BR'''Cq.
  1660.  (_____) 01 01N. C 01 C 01 .01. 01  01 Yb 01 .01.
  1661.  (() ()) 01 C YCb C 01 C 01 ,C9 01  01 dP 01 ,C9
  1662.  \ /  01 C .CN. C 01 C 0101dC9 01  01'''bg. 0101dC9
  1663.  \ /  01 C .01.C 01 C 01 YC. 01 ,  01 .Y 01 YC.
  1664.  /=\  01 C Y01 YC. ,C 01 .Cb. 01 ,C  01 ,9 01 .Cb.
  1665.  [___]  .J01L. .JCL. YC .b0101d'. .J01L. .J01. .J01010101C .J0101Cd9 .J01L. .J01./ 2.1
  1666.  
  1667. __[ ! ] Neither war between hackers, nor peace for the system.
  1668. __[ ! ] http://blog.inurl.com.br
  1669. __[ ! ] http://fb.com/InurlBrasil
  1670. __[ ! ] http://twitter.com/@googleinurl
  1671. __[ ! ] http://github.com/googleinurl
  1672. __[ ! ] Current PHP version::[ 7.0.26-1 ]
  1673. __[ ! ] Current script owner::[ root ]
  1674. __[ ! ] Current uname::[ Linux Kali 4.14.0-kali1-amd64 #1 SMP Debian 4.14.2-1kali1 (2017-12-04) x86_64 ]
  1675. __[ ! ] Current pwd::[ /usr/share/sniper ]
  1676. __[ ! ] Help: php inurlbr.php --help
  1677. ------------------------------------------------------------------------------------------------------------------------
  1678.  
  1679. [ ! ] Starting SCANNER INURLBR 2.1 at [07-01-2018 09:00:55]
  1680. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  1681. It is the end user's responsibility to obey all applicable local, state and federal laws.
  1682. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  1683.  
  1684. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-orumm.org.txt ]
  1685. [ INFO ][ DORK ]::[ site:orumm.org ]
  1686. [ INFO ][ SEARCHING ]:: {
  1687. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.br ]
  1688.  
  1689. [ INFO ][ SEARCHING ]:: 
  1690. -[:::]
  1691. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  1692.  
  1693. [ INFO ][ SEARCHING ]:: 
  1694. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1695. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.vu ID: 006748068166572874491:55ez0c3j3ey ]
  1696.  
  1697. [ INFO ][ SEARCHING ]:: 
  1698. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  1699.  
  1700. [ INFO ][ TOTAL FOUND VALUES ]:: [ 61 ]
  1701.  
  1702. 
  1703.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1704. |_[ + ] [ 0 / 61 ]-[09:01:18] [ - ] 
  1705. |_[ + ] Target:: [ http://www.orumm.org/ ]
  1706. |_[ + ] Exploit:: 
  1707. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1708. |_[ + ] More details::  / - / , ISP: 
  1709. |_[ + ] Found:: UNIDENTIFIED
  1710. 
  1711.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1712. |_[ + ] [ 1 / 61 ]-[09:01:21] [ - ] 
  1713. |_[ + ] Target:: [ http://www.orumm.org/accueil.html ]
  1714. |_[ + ] Exploit:: 
  1715. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1716. |_[ + ] More details::  / - / , ISP: 
  1717. |_[ + ] Found:: UNIDENTIFIED
  1718. 
  1719.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1720. |_[ + ] [ 2 / 61 ]-[09:01:30] [ - ] 
  1721. |_[ + ] Target:: [ http://www.orumm.org/scdrc.html ]
  1722. |_[ + ] Exploit:: 
  1723. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1724. |_[ + ] More details::  / - / , ISP: 
  1725. |_[ + ] Found:: UNIDENTIFIED
  1726. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 43564 out of 61790 bytes received
  1727. 
  1728.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1729. |_[ + ] [ 3 / 61 ]-[09:01:33] [ - ] 
  1730. |_[ + ] Target:: [ http://www.orumm.org/contact.html ]
  1731. |_[ + ] Exploit:: 
  1732. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1733. |_[ + ] More details::  / - / , ISP: 
  1734. |_[ + ] Found:: UNIDENTIFIED
  1735. 
  1736.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1737. |_[ + ] [ 4 / 61 ]-[09:01:36] [ - ] 
  1738. |_[ + ] Target:: [ http://www.orumm.org/orumm/chapitres.html ]
  1739. |_[ + ] Exploit:: 
  1740. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1741. |_[ + ] More details::  / - / , ISP: 
  1742. |_[ + ] Found:: UNIDENTIFIED
  1743. 
  1744.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1745. |_[ + ] [ 5 / 61 ]-[09:01:39] [ - ] 
  1746. |_[ + ] Target:: [ http://www.orumm.org/orumm/areopages.html ]
  1747. |_[ + ] Exploit:: 
  1748. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1749. |_[ + ] More details::  / - / , ISP: 
  1750. |_[ + ] Found:: UNIDENTIFIED
  1751. 
  1752.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1753. |_[ + ] [ 6 / 61 ]-[09:01:42] [ - ] 
  1754. |_[ + ] Target:: [ http://www.orumm.org/editons-maconniques.html ]
  1755. |_[ + ] Exploit:: 
  1756. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1757. |_[ + ] More details::  / - / , ISP: 
  1758. |_[ + ] Found:: UNIDENTIFIED
  1759. 
  1760.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1761. |_[ + ] [ 7 / 61 ]-[09:01:46] [ - ] 
  1762. |_[ + ] Target:: [ http://www.orumm.org/ordre-martiniste-initiatique.html ]
  1763. |_[ + ] Exploit:: 
  1764. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1765. |_[ + ] More details::  / - / , ISP: 
  1766. |_[ + ] Found:: UNIDENTIFIED
  1767. 
  1768.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1769. |_[ + ] [ 8 / 61 ]-[09:01:56] [ - ] 
  1770. |_[ + ] Target:: [ http://www.orumm.org/rite-de-misraim.html ]
  1771. |_[ + ] Exploit:: 
  1772. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1773. |_[ + ] More details::  / - / , ISP: 
  1774. |_[ + ] Found:: UNIDENTIFIED
  1775. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 9844 out of 75493 bytes received
  1776. 
  1777.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1778. |_[ + ] [ 9 / 61 ]-[09:02:01] [ - ] 
  1779. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm.html ]
  1780. |_[ + ] Exploit:: 
  1781. |_[ + ] Information Server:: , , IP::0 
  1782. |_[ + ] More details:: 
  1783. |_[ + ] Found:: UNIDENTIFIED
  1784. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1785. 
  1786.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1787. |_[ + ] [ 10 / 61 ]-[09:02:06] [ - ] 
  1788. |_[ + ] Target:: [ http://www.orumm.org/orumm/supremes-conseils.html ]
  1789. |_[ + ] Exploit:: 
  1790. |_[ + ] Information Server:: , , IP::0 
  1791. |_[ + ] More details:: 
  1792. |_[ + ] Found:: UNIDENTIFIED
  1793. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1794. 
  1795.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1796. |_[ + ] [ 11 / 61 ]-[09:02:11] [ - ] 
  1797. |_[ + ] Target:: [ http://www.orumm.org/orumm/loges-symboliques.html ]
  1798. |_[ + ] Exploit:: 
  1799. |_[ + ] Information Server:: , , IP::0 
  1800. |_[ + ] More details:: 
  1801. |_[ + ] Found:: UNIDENTIFIED
  1802. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1803. 
  1804.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1805. |_[ + ] [ 12 / 61 ]-[09:02:16] [ - ] 
  1806. |_[ + ] Target:: [ http://www.orumm.org/orumm/souverains-sanctuaires.html ]
  1807. |_[ + ] Exploit:: 
  1808. |_[ + ] Information Server:: , , IP::0 
  1809. |_[ + ] More details:: 
  1810. |_[ + ] Found:: UNIDENTIFIED
  1811. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1812. 
  1813.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1814. |_[ + ] [ 13 / 61 ]-[09:02:21] [ - ] 
  1815. |_[ + ] Target:: [ http://www.orumm.org/orumm/grands-hierophantes.html ]
  1816. |_[ + ] Exploit:: 
  1817. |_[ + ] Information Server:: , , IP::0 
  1818. |_[ + ] More details:: 
  1819. |_[ + ] Found:: UNIDENTIFIED
  1820. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1821. 
  1822.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1823. |_[ + ] [ 14 / 61 ]-[09:02:26] [ - ] 
  1824. |_[ + ] Target:: [ http://www.orumm.org/accueil/declaration-cnil.html ]
  1825. |_[ + ] Exploit:: 
  1826. |_[ + ] Information Server:: , , IP::0 
  1827. |_[ + ] More details:: 
  1828. |_[ + ] Found:: UNIDENTIFIED
  1829. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1830. 
  1831.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1832. |_[ + ] [ 15 / 61 ]-[09:02:31] [ - ] 
  1833. |_[ + ] Target:: [ http://www.orumm.org/biographie-g-kloppel.html ]
  1834. |_[ + ] Exploit:: 
  1835. |_[ + ] Information Server:: , , IP::0 
  1836. |_[ + ] More details:: 
  1837. |_[ + ] Found:: UNIDENTIFIED
  1838. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1839. 
  1840.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1841. |_[ + ] [ 16 / 61 ]-[09:02:36] [ - ] 
  1842. |_[ + ] Target:: [ http://www.orumm.org/orumm/filiations-magistrales.html ]
  1843. |_[ + ] Exploit:: 
  1844. |_[ + ] Information Server:: , , IP::0 
  1845. |_[ + ] More details:: 
  1846. |_[ + ] Found:: UNIDENTIFIED
  1847. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1848. 
  1849.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1850. |_[ + ] [ 17 / 61 ]-[09:02:41] [ - ] 
  1851. |_[ + ] Target:: [ http://www.orumm.org/biographie-g-garibaldi.html ]
  1852. |_[ + ] Exploit:: 
  1853. |_[ + ] Information Server:: , , IP::0 
  1854. |_[ + ] More details:: 
  1855. |_[ + ] Found:: UNIDENTIFIED
  1856. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1857. 
  1858.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1859. |_[ + ] [ 18 / 61 ]-[09:02:46] [ - ] 
  1860. |_[ + ] Target:: [ http://www.orumm.org/biographie-r-ambelain.html ]
  1861. |_[ + ] Exploit:: 
  1862. |_[ + ] Information Server:: , , IP::0 
  1863. |_[ + ] More details:: 
  1864. |_[ + ] Found:: UNIDENTIFIED
  1865. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1866. 
  1867.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1868. |_[ + ] [ 19 / 61 ]-[09:02:51] [ - ] 
  1869. |_[ + ] Target:: [ http://www.orumm.org/biographie-j-castelli.html ]
  1870. |_[ + ] Exploit:: 
  1871. |_[ + ] Information Server:: , , IP::0 
  1872. |_[ + ] More details:: 
  1873. |_[ + ] Found:: UNIDENTIFIED
  1874. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1875. 
  1876.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1877. |_[ + ] [ 20 / 61 ]-[09:02:56] [ - ] 
  1878. |_[ + ] Target:: [ http://www.orumm.org/orumm/triangles-maconniques.html ]
  1879. |_[ + ] Exploit:: 
  1880. |_[ + ] Information Server:: , , IP::0 
  1881. |_[ + ] More details:: 
  1882. |_[ + ] Found:: UNIDENTIFIED
  1883. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1884. 
  1885.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1886. |_[ + ] [ 21 / 61 ]-[09:03:01] [ - ] 
  1887. |_[ + ] Target:: [ http://www.orumm.org/rite-de-memphis.html ]
  1888. |_[ + ] Exploit:: 
  1889. |_[ + ] Information Server:: , , IP::0 
  1890. |_[ + ] More details:: 
  1891. |_[ + ] Found:: UNIDENTIFIED
  1892. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1893. 
  1894.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1895. |_[ + ] [ 22 / 61 ]-[09:03:06] [ - ] 
  1896. |_[ + ] Target:: [ http://www.orumm.org/orumm/ateliers-de-perfection.html ]
  1897. |_[ + ] Exploit:: 
  1898. |_[ + ] Information Server:: , , IP::0 
  1899. |_[ + ] More details:: 
  1900. |_[ + ] Found:: UNIDENTIFIED
  1901. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1902. 
  1903.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1904. |_[ + ] [ 23 / 61 ]-[09:03:12] [ - ] 
  1905. |_[ + ] Target:: [ http://www.orumm.org/orumm/orumm-en-33.html ]
  1906. |_[ + ] Exploit:: 
  1907. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1908. |_[ + ] More details::  / - / , ISP: 
  1909. |_[ + ] Found:: UNIDENTIFIED
  1910. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 7088 out of 71718 bytes received
  1911. 
  1912.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1913. |_[ + ] [ 24 / 61 ]-[09:03:18] [ - ] 
  1914. |_[ + ] Target:: [ http://www.orumm.org/orumm/grand-temple-mystique.html ]
  1915. |_[ + ] Exploit:: 
  1916. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1917. |_[ + ] More details::  / - / , ISP: 
  1918. |_[ + ] Found:: UNIDENTIFIED
  1919. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 68572 out of 100670 bytes received
  1920. 
  1921.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1922. |_[ + ] [ 25 / 61 ]-[09:03:21] [ - ] 
  1923. |_[ + ] Target:: [ http://www.orumm.org/www.editions-maconniques.fr.html ]
  1924. |_[ + ] Exploit:: 
  1925. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1926. |_[ + ] More details::  / - / , ISP: 
  1927. |_[ + ] Found:: UNIDENTIFIED
  1928. 
  1929.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1930. |_[ + ] [ 26 / 61 ]-[09:03:25] [ - ] 
  1931. |_[ + ] Target:: [ http://www.orumm.org/orumm/grand-cenacle-mystique.html ]
  1932. |_[ + ] Exploit:: 
  1933. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1934. |_[ + ] More details::  / - / , ISP: 
  1935. |_[ + ] Found:: UNIDENTIFIED
  1936. 
  1937.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1938. |_[ + ] [ 27 / 61 ]-[09:03:28] [ - ] 
  1939. |_[ + ] Target:: [ http://www.orumm.org/accueil/contact-web-agengy.html ]
  1940. |_[ + ] Exploit:: 
  1941. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1942. |_[ + ] More details::  / - / , ISP: 
  1943. |_[ + ] Found:: UNIDENTIFIED
  1944. 
  1945.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1946. |_[ + ] [ 28 / 61 ]-[09:03:38] [ - ] 
  1947. |_[ + ] Target:: [ http://www.orumm.org/orumm/orumm-en-99.html ]
  1948. |_[ + ] Exploit:: 
  1949. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  1950. |_[ + ] More details::  / - / , ISP: 
  1951. |_[ + ] Found:: UNIDENTIFIED
  1952. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 49028 out of 90156 bytes received
  1953. 
  1954.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1955. |_[ + ] [ 29 / 61 ]-[09:03:43] [ - ] 
  1956. |_[ + ] Target:: [ http://www.orumm.org/orumm/loges-de-cagliostro.html ]
  1957. |_[ + ] Exploit:: 
  1958. |_[ + ] Information Server:: , , IP::0 
  1959. |_[ + ] More details:: 
  1960. |_[ + ] Found:: UNIDENTIFIED
  1961. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1962. 
  1963.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1964. |_[ + ] [ 30 / 61 ]-[09:03:48] [ - ] 
  1965. |_[ + ] Target:: [ http://www.orumm.org/gl-magistrale-fmm-1960.html ]
  1966. |_[ + ] Exploit:: 
  1967. |_[ + ] Information Server:: , , IP::0 
  1968. |_[ + ] More details:: 
  1969. |_[ + ] Found:: UNIDENTIFIED
  1970. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1971. 
  1972.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1973. |_[ + ] [ 31 / 61 ]-[09:03:53] [ - ] 
  1974. |_[ + ] Target:: [ http://www.orumm.org/orumm/livre-jaune-n6-2013.html ]
  1975. |_[ + ] Exploit:: 
  1976. |_[ + ] Information Server:: , , IP::0 
  1977. |_[ + ] More details:: 
  1978. |_[ + ] Found:: UNIDENTIFIED
  1979. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1980. 
  1981.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1982. |_[ + ] [ 32 / 61 ]-[09:03:58] [ - ] 
  1983. |_[ + ] Target:: [ http://www.orumm.org/orumm/livre-jaune-n10-2015.html ]
  1984. |_[ + ] Exploit:: 
  1985. |_[ + ] Information Server:: , , IP::0 
  1986. |_[ + ] More details:: 
  1987. |_[ + ] Found:: UNIDENTIFIED
  1988. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1989. 
  1990.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  1991. |_[ + ] [ 33 / 61 ]-[09:04:03] [ - ] 
  1992. |_[ + ] Target:: [ http://www.orumm.org/ordre-martiniste-initiatique/omi-organigramme.html ]
  1993. |_[ + ] Exploit:: 
  1994. |_[ + ] Information Server:: , , IP::0 
  1995. |_[ + ] More details:: 
  1996. |_[ + ] Found:: UNIDENTIFIED
  1997. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  1998. 
  1999.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2000. |_[ + ] [ 34 / 61 ]-[09:04:08] [ - ] 
  2001. |_[ + ] Target:: [ http://www.orumm.org/orumm/livre-jaune-n1-2011.html ]
  2002. |_[ + ] Exploit:: 
  2003. |_[ + ] Information Server:: , , IP::0 
  2004. |_[ + ] More details:: 
  2005. |_[ + ] Found:: UNIDENTIFIED
  2006. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  2007. 
  2008.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2009. |_[ + ] [ 35 / 61 ]-[09:04:13] [ - ] 
  2010. |_[ + ] Target:: [ http://www.orumm.org/orumm/livre-jaune-n7-2014.html ]
  2011. |_[ + ] Exploit:: 
  2012. |_[ + ] Information Server:: , , IP::0 
  2013. |_[ + ] More details:: 
  2014. |_[ + ] Found:: UNIDENTIFIED
  2015. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  2016. 
  2017.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2018. |_[ + ] [ 36 / 61 ]-[09:04:18] [ - ] 
  2019. |_[ + ] Target:: [ http://www.orumm.org/orumm/chapitres-de-l-interieur.html ]
  2020. |_[ + ] Exploit:: 
  2021. |_[ + ] Information Server:: , , IP::0 
  2022. |_[ + ] More details:: 
  2023. |_[ + ] Found:: UNIDENTIFIED
  2024. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  2025. 
  2026.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2027. |_[ + ] [ 37 / 61 ]-[09:04:23] [ - ] 
  2028. |_[ + ] Target:: [ http://www.orumm.org/orumm/livre-jaune-n11-2016.html ]
  2029. |_[ + ] Exploit:: 
  2030. |_[ + ] Information Server:: , , IP::0 
  2031. |_[ + ] More details:: 
  2032. |_[ + ] Found:: UNIDENTIFIED
  2033. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  2034. 
  2035.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2036. |_[ + ] [ 38 / 61 ]-[09:04:28] [ - ] 
  2037. |_[ + ] Target:: [ http://www.orumm.org/orumm/conseils-philosophiques-et-alchimiques.html ]
  2038. |_[ + ] Exploit:: 
  2039. |_[ + ] Information Server:: , , IP::0 
  2040. |_[ + ] More details:: 
  2041. |_[ + ] Found:: UNIDENTIFIED
  2042. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  2043. 
  2044.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2045. |_[ + ] [ 39 / 61 ]-[09:04:33] [ - ] 
  2046. |_[ + ] Target:: [ http://www.orumm.org/orumm/proclamation-de-l-ordre.html ]
  2047. |_[ + ] Exploit:: 
  2048. |_[ + ] Information Server:: , , IP::0 
  2049. |_[ + ] More details:: 
  2050. |_[ + ] Found:: UNIDENTIFIED
  2051. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  2052. 
  2053.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2054. |_[ + ] [ 40 / 61 ]-[09:04:38] [ - ] 
  2055. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm/ss-congo-mm.html ]
  2056. |_[ + ] Exploit:: 
  2057. |_[ + ] Information Server:: , , IP::0 
  2058. |_[ + ] More details:: 
  2059. |_[ + ] Found:: UNIDENTIFIED
  2060. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  2061. 
  2062.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2063. |_[ + ] [ 41 / 61 ]-[09:04:43] [ - ] 
  2064. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm/sgc-italiano-mm.html ]
  2065. |_[ + ] Exploit:: 
  2066. |_[ + ] Information Server:: , , IP::0 
  2067. |_[ + ] More details:: 
  2068. |_[ + ] Found:: UNIDENTIFIED
  2069. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  2070. 
  2071.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2072. |_[ + ] [ 42 / 61 ]-[09:04:48] [ - ] 
  2073. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm/ss-madagascar-mm.html ]
  2074. |_[ + ] Exploit:: 
  2075. |_[ + ] Information Server:: , , IP::0 
  2076. |_[ + ] More details:: 
  2077. |_[ + ] Found:: UNIDENTIFIED
  2078. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  2079. 
  2080.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2081. |_[ + ] [ 43 / 61 ]-[09:04:53] [ - ] 
  2082. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm/ss-belge-mm.html ]
  2083. |_[ + ] Exploit:: 
  2084. |_[ + ] Information Server:: , , IP::0 
  2085. |_[ + ] More details:: 
  2086. |_[ + ] Found:: UNIDENTIFIED
  2087. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  2088. 
  2089.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2090. |_[ + ] [ 44 / 61 ]-[09:04:58] [ - ] 
  2091. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm/sgc-francais-mm.html ]
  2092. |_[ + ] Exploit:: 
  2093. |_[ + ] Information Server:: , , IP::0 
  2094. |_[ + ] More details:: 
  2095. |_[ + ] Found:: UNIDENTIFIED
  2096. |_[ + ] ERROR CONECTION:: Connection timed out after 5000 milliseconds
  2097. 
  2098.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2099. |_[ + ] [ 45 / 61 ]-[09:05:04] [ - ] 
  2100. |_[ + ] Target:: [ http://www.orumm.org/ordre-martiniste-initiatique/omi-rectification-1968.html ]
  2101. |_[ + ] Exploit:: 
  2102. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2103. |_[ + ] More details::  / - / , ISP: 
  2104. |_[ + ] Found:: UNIDENTIFIED
  2105. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 47674 out of 73359 bytes received
  2106. 
  2107.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2108. |_[ + ] [ 46 / 61 ]-[09:05:08] [ - ] 
  2109. |_[ + ] Target:: [ http://www.orumm.org/ordre-martiniste-initiatique/omi-filiation-russe.html ]
  2110. |_[ + ] Exploit:: 
  2111. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2112. |_[ + ] More details::  / - / , ISP: 
  2113. |_[ + ] Found:: UNIDENTIFIED
  2114. 
  2115.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2116. |_[ + ] [ 47 / 61 ]-[09:05:11] [ - ] 
  2117. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm/ss-sardegna-mm.html ]
  2118. |_[ + ] Exploit:: 
  2119. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2120. |_[ + ] More details::  / - / , ISP: 
  2121. |_[ + ] Found:: UNIDENTIFIED
  2122. 
  2123.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2124. |_[ + ] [ 48 / 61 ]-[09:05:13] [ - ] 
  2125. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm/ss-suisse-mm.html ]
  2126. |_[ + ] Exploit:: 
  2127. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2128. |_[ + ] More details::  / - / , ISP: 
  2129. |_[ + ] Found:: UNIDENTIFIED
  2130. 
  2131.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2132. |_[ + ] [ 49 / 61 ]-[09:05:16] [ - ] 
  2133. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm/ss-france-mm.html ]
  2134. |_[ + ] Exploit:: 
  2135. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2136. |_[ + ] More details::  / - / , ISP: 
  2137. |_[ + ] Found:: UNIDENTIFIED
  2138. 
  2139.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2140. |_[ + ] [ 50 / 61 ]-[09:05:19] [ - ] 
  2141. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm/ss-liban-mm.html ]
  2142. |_[ + ] Exploit:: 
  2143. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2144. |_[ + ] More details::  / - / , ISP: 
  2145. |_[ + ] Found:: UNIDENTIFIED
  2146. 
  2147.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2148. |_[ + ] [ 51 / 61 ]-[09:05:22] [ - ] 
  2149. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm/ss-haitien-mm.html ]
  2150. |_[ + ] Exploit:: 
  2151. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2152. |_[ + ] More details::  / - / , ISP: 
  2153. |_[ + ] Found:: UNIDENTIFIED
  2154. 
  2155.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2156. |_[ + ] [ 52 / 61 ]-[09:05:25] [ - ] 
  2157. |_[ + ] Target:: [ http://www.orumm.org/ordre-martiniste-initiatique/livre-jaune-n2-2011.html ]
  2158. |_[ + ] Exploit:: 
  2159. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2160. |_[ + ] More details::  / - / , ISP: 
  2161. |_[ + ] Found:: UNIDENTIFIED
  2162. 
  2163.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2164. |_[ + ] [ 53 / 61 ]-[09:05:29] [ - ] 
  2165. |_[ + ] Target:: [ http://www.orumm.org/rite-de-memphis/livre-jaune-n9-2015.html ]
  2166. |_[ + ] Exploit:: 
  2167. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2168. |_[ + ] More details::  / - / , ISP: 
  2169. |_[ + ] Found:: UNIDENTIFIED
  2170. 
  2171.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2172. |_[ + ] [ 54 / 61 ]-[09:05:32] [ - ] 
  2173. |_[ + ] Target:: [ http://www.orumm.org/ordre-martiniste-initiatique/livre-jaune-n5-2013.html ]
  2174. |_[ + ] Exploit:: 
  2175. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2176. |_[ + ] More details::  / - / , ISP: 
  2177. |_[ + ] Found:: UNIDENTIFIED
  2178. 
  2179.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2180. |_[ + ] [ 55 / 61 ]-[09:05:36] [ - ] 
  2181. |_[ + ] Target:: [ http://www.orumm.org/ordre-martiniste-initiatique/livre-jaune-n3-2012.html ]
  2182. |_[ + ] Exploit:: 
  2183. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2184. |_[ + ] More details::  / - / , ISP: 
  2185. |_[ + ] Found:: UNIDENTIFIED
  2186. 
  2187.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2188. |_[ + ] [ 56 / 61 ]-[09:05:40] [ - ] 
  2189. |_[ + ] Target:: [ http://www.orumm.org/rite-de-misraim/regime-de-naples-1816.html ]
  2190. |_[ + ] Exploit:: 
  2191. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2192. |_[ + ] More details::  / - / , ISP: 
  2193. |_[ + ] Found:: UNIDENTIFIED
  2194. 
  2195.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2196. |_[ + ] [ 57 / 61 ]-[09:05:43] [ - ] 
  2197. |_[ + ] Target:: [ http://www.orumm.org/ss-international-mm/ss-cote-d-ivoire-mm.html ]
  2198. |_[ + ] Exploit:: 
  2199. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2200. |_[ + ] More details::  / - / , ISP: 
  2201. |_[ + ] Found:: UNIDENTIFIED
  2202. 
  2203.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2204. |_[ + ] [ 58 / 61 ]-[09:05:48] [ - ] 
  2205. |_[ + ] Target:: [ http://www.orumm.org/rite-de-misraim/rite-de-misraim-conferance-1897.html ]
  2206. |_[ + ] Exploit:: 
  2207. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2208. |_[ + ] More details::  / - / , ISP: 
  2209. |_[ + ] Found:: UNIDENTIFIED
  2210. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 71280 out of 71998 bytes received
  2211. 
  2212.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2213. |_[ + ] [ 59 / 61 ]-[09:05:53] [ - ] 
  2214. |_[ + ] Target:: [ http://www.orumm.org/rite-de-memphis/echelle-97-degres-rite-de-memphis.html ]
  2215. |_[ + ] Exploit:: 
  2216. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2217. |_[ + ] More details::  / - / , ISP: 
  2218. |_[ + ] Found:: UNIDENTIFIED
  2219. |_[ + ] ERROR CONECTION:: Operation timed out after 5000 milliseconds with 71280 out of 74209 bytes received
  2220. 
  2221.  _[ - ]::--------------------------------------------------------------------------------------------------------------
  2222. |_[ + ] [ 60 / 61 ]-[09:05:57] [ - ] 
  2223. |_[ + ] Target:: [ http://www.orumm.org/rite-de-misraim/echelle-90-grades-rite-de-misraim.html ]
  2224. |_[ + ] Exploit:: 
  2225. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.34 (Unix) PHP/5.6.32 , IP:216.55.97.142:80 
  2226. |_[ + ] More details::  / - / , ISP: 
  2227. |_[ + ] Found:: UNIDENTIFIED
  2228.  
  2229. [ INFO ] [ Shutting down ]
  2230. [ INFO ] [ End of process INURLBR at [07-01-2018 09:05:57]
  2231. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  2232. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/output/inurlbr-orumm.org.txt ]
  2233. |_________________________________________________________________________________________
  2234.  
  2235. \_________________________________________________________________________________________/
  2236.  
  2237.  + -- --=[Port 110 opened... running tests...
  2238.  
  2239. Starting Nmap 7.60 ( https://nmap.org ) at 2018-01-07 09:05 EST
  2240. Nmap scan report for orumm.org (216.55.97.142)
  2241. Host is up (0.19s latency).
  2242. rDNS record for 216.55.97.142: afsw.net
  2243.  
  2244. PORT STATE SERVICE VERSION
  2245. 110/tcp open pop3 Dovecot pop3d
  2246. | pop3-brute:
  2247. | Accounts: No valid accounts found
  2248. | Statistics: Performed 124 guesses in 38 seconds, average tps: 3.0
  2249. |_ ERROR: Failed to connect.
  2250. |_pop3-capabilities: UIDL CAPA SASL(PLAIN) TOP STLS PIPELINING USER RESP-CODES
  2251. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  2252. Aggressive OS guesses: FreeBSD 7.0-RELEASE (96%), FreeBSD 7.1-PRERELEASE 7.2-STABLE (96%), FreeBSD 8.0-RELEASE (96%), FreeBSD 8.1-RELEASE (96%), FreeBSD 8.2-RELEASE (96%), FreeBSD 9.0-RELEASE (95%), FreeBSD 9.0-RELEASE - 10.3-RELEASE (95%), FreeBSD 9.1-RELEASE or 10.1-RELEASE (95%), FreeBSD 10.1-RELEASE (95%), FreeBSD 7.0-RELEASE - 9.0-RELEASE (93%)
  2253. No exact OS matches for host (test conditions non-ideal).
  2254. Network Distance: 10 hops
  2255.  
  2256. TRACEROUTE (using port 110/tcp)
  2257. HOP RTT ADDRESS
  2258. 1 109.33 ms 10.13.0.1
  2259. 2 109.85 ms 37.187.24.253
  2260. 3 109.52 ms 10.50.225.61
  2261. 4 109.82 ms 10.17.129.40
  2262. 5 109.31 ms 10.73.0.54
  2263. 6 110.87 ms 10.95.33.10
  2264. 7 114.35 ms be100-1110.th2-1-a9.fr.eu (213.186.32.215)
  2265. 8 ... 9
  2266. 10 187.06 ms afsw.net (216.55.97.142)
  2267.  
  2268. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  2269. Nmap done: 1 IP address (1 host up) scanned in 52.74 seconds
  2270.  + -- --=[Port 111 closed... skipping.
  2271.  + -- --=[Port 135 closed... skipping.
  2272.  + -- --=[Port 139 closed... skipping.
  2273.  + -- --=[Port 161 closed... skipping.
  2274.  + -- --=[Port 162 closed... skipping.
  2275.  + -- --=[Port 389 closed... skipping.
  2276.  + -- --=[Port 443 opened... running tests...
  2277. ====================================================================================
  2278.  CHECKING FOR WAF 
  2279. ====================================================================================
  2280.  
  2281. ^ ^
  2282. _ __ _ ____ _ __ _ _ ____
  2283. ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
  2284. | V V // o // _/ | V V // 0 // 0 // _/
  2285. |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
  2286. <
  2287. ...'
  2288.  
  2289. WAFW00F - Web Application Firewall Detection Tool
  2290.  
  2291. By Sandro Gauci && Wendel G. Henrique
  2292.  
  2293. Checking https://orumm.org
  2294.  
  2295. ====================================================================================
  2296.  GATHERING HTTP INFO 
  2297. ====================================================================================
  2298. https://orumm.org [ Unassigned]
  2299.  
  2300. ====================================================================================
  2301.  GATHERING SSL/TLS INFO 
  2302. ====================================================================================
  2303.  
  2304.  
  2305.  
  2306. AVAILABLE PLUGINS
  2307. -----------------
  2308.  
  2309. PluginHSTS
  2310. PluginOpenSSLCipherSuites
  2311. PluginCertInfo
  2312. PluginSessionRenegotiation
  2313. PluginCompression
  2314. PluginChromeSha1Deprecation
  2315. PluginSessionResumption
  2316. PluginHeartbleed
  2317.  
  2318.  
  2319.  
  2320. CHECKING HOST(S) AVAILABILITY
  2321. -----------------------------
  2322.  
  2323. orumm.org:443 => 216.55.97.142:443
  2324.  
  2325.  
  2326.  
  2327. SCAN RESULTS FOR ORUMM.ORG:443 - 216.55.97.142:443
  2328. --------------------------------------------------
  2329.  
  2330. Unhandled exception when processing --reneg:
  2331. socket.timeout - timed out
  2332.  
  2333. Unhandled exception when processing --compression:
  2334. socket.timeout - timed out
  2335.  
  2336. * Session Resumption:
  2337. With Session IDs: ERROR (0 successful, 0 failed, 5 errors, 5 total attempts).
  2338. ERROR #1: timeout - timed out
  2339. ERROR #2: timeout - timed out
  2340. ERROR #3: timeout - timed out
  2341. ERROR #4: timeout - timed out
  2342. ERROR #5: timeout - timed out
  2343. With TLS Session Tickets: ERROR: timeout - timed out
  2344.  
  2345. Unhandled exception when processing --certinfo:
  2346. socket.timeout - timed out
  2347.  
  2348. * SSLV2 Cipher Suites:
  2349. Undefined - An unexpected error happened:
  2350. RC4-MD5 timeout - timed out
  2351. RC2-CBC-MD5 timeout - timed out
  2352. IDEA-CBC-MD5 timeout - timed out
  2353. EXP-RC4-MD5 timeout - timed out
  2354. EXP-RC2-CBC-MD5 timeout - timed out
  2355. DES-CBC3-MD5 timeout - timed out
  2356. DES-CBC-MD5 timeout - timed out
  2357.  
  2358. * SSLV3 Cipher Suites:
  2359. Undefined - An unexpected error happened:
  2360. SEED-SHA timeout - timed out
  2361. RC4-SHA timeout - timed out
  2362. RC4-MD5 timeout - timed out
  2363. NULL-SHA timeout - timed out
  2364. NULL-MD5 timeout - timed out
  2365. IDEA-CBC-SHA timeout - timed out
  2366. EXP-RC4-MD5 timeout - timed out
  2367. EXP-RC2-CBC-MD5 timeout - timed out
  2368. EXP-EDH-RSA-DES-CBC-SHA timeout - timed out
  2369. EXP-EDH-DSS-DES-CBC-SHA timeout - timed out
  2370. EXP-DES-CBC-SHA timeout - timed out
  2371. EXP-ADH-RC4-MD5 timeout - timed out
  2372. EXP-ADH-DES-CBC-SHA timeout - timed out
  2373. EDH-RSA-DES-CBC3-SHA timeout - timed out
  2374. EDH-RSA-DES-CBC-SHA timeout - timed out
  2375. EDH-DSS-DES-CBC3-SHA timeout - timed out
  2376. EDH-DSS-DES-CBC-SHA timeout - timed out
  2377. ECDHE-RSA-RC4-SHA timeout - timed out
  2378. ECDHE-RSA-NULL-SHA timeout - timed out
  2379. ECDHE-RSA-DES-CBC3-SHA timeout - timed out
  2380. ECDHE-RSA-AES256-SHA timeout - timed out
  2381. ECDHE-RSA-AES128-SHA timeout - timed out
  2382. ECDHE-ECDSA-RC4-SHA timeout - timed out
  2383. ECDHE-ECDSA-NULL-SHA timeout - timed out
  2384. ECDHE-ECDSA-DES-CBC3-SHA timeout - timed out
  2385. ECDHE-ECDSA-AES256-SHA timeout - timed out
  2386. ECDHE-ECDSA-AES128-SHA timeout - timed out
  2387. ECDH-RSA-RC4-SHA timeout - timed out
  2388. ECDH-RSA-NULL-SHA timeout - timed out
  2389. ECDH-RSA-DES-CBC3-SHA timeout - timed out
  2390. ECDH-RSA-AES256-SHA timeout - timed out
  2391. ECDH-RSA-AES128-SHA timeout - timed out
  2392. ECDH-ECDSA-RC4-SHA timeout - timed out
  2393. ECDH-ECDSA-NULL-SHA timeout - timed out
  2394. ECDH-ECDSA-DES-CBC3-SHA timeout - timed out
  2395. ECDH-ECDSA-AES256-SHA timeout - timed out
  2396. ECDH-ECDSA-AES128-SHA timeout - timed out
  2397. DHE-RSA-SEED-SHA timeout - timed out
  2398. DHE-RSA-CAMELLIA256-SHA timeout - timed out
  2399. DHE-RSA-CAMELLIA128-SHA timeout - timed out
  2400. DHE-RSA-AES256-SHA timeout - timed out
  2401. DHE-RSA-AES128-SHA timeout - timed out
  2402. DHE-DSS-SEED-SHA timeout - timed out
  2403. DHE-DSS-CAMELLIA256-SHA timeout - timed out
  2404. DHE-DSS-CAMELLIA128-SHA timeout - timed out
  2405. DHE-DSS-AES256-SHA timeout - timed out
  2406. DHE-DSS-AES128-SHA timeout - timed out
  2407. DH-RSA-SEED-SHA timeout - timed out
  2408. DH-RSA-DES-CBC3-SHA timeout - timed out
  2409. DH-RSA-DES-CBC-SHA timeout - timed out
  2410. DH-RSA-CAMELLIA256-SHA timeout - timed out
  2411. DH-RSA-CAMELLIA128-SHA timeout - timed out
  2412. DH-RSA-AES256-SHA timeout - timed out
  2413. DH-RSA-AES128-SHA timeout - timed out
  2414. DH-DSS-SEED-SHA timeout - timed out
  2415. DH-DSS-DES-CBC3-SHA timeout - timed out
  2416. DH-DSS-DES-CBC-SHA timeout - timed out
  2417. DH-DSS-CAMELLIA256-SHA timeout - timed out
  2418. DH-DSS-CAMELLIA128-SHA timeout - timed out
  2419. DH-DSS-AES256-SHA timeout - timed out
  2420. DH-DSS-AES128-SHA timeout - timed out
  2421. DES-CBC3-SHA timeout - timed out
  2422. DES-CBC-SHA timeout - timed out
  2423. CAMELLIA256-SHA timeout - timed out
  2424. CAMELLIA128-SHA timeout - timed out
  2425. AES256-SHA timeout - timed out
  2426. AES128-SHA timeout - timed out
  2427. AECDH-RC4-SHA timeout - timed out
  2428. AECDH-NULL-SHA timeout - timed out
  2429. AECDH-DES-CBC3-SHA timeout - timed out
  2430. AECDH-AES256-SHA timeout - timed out
  2431. AECDH-AES128-SHA timeout - timed out
  2432. ADH-SEED-SHA timeout - timed out
  2433. ADH-RC4-MD5 timeout - timed out
  2434. ADH-DES-CBC3-SHA timeout - timed out
  2435. ADH-DES-CBC-SHA timeout - timed out
  2436. ADH-CAMELLIA256-SHA timeout - timed out
  2437. ADH-CAMELLIA128-SHA timeout - timed out
  2438. ADH-AES256-SHA timeout - timed out
  2439. ADH-AES128-SHA timeout - timed out
  2440.  
  2441.  
  2442.  
  2443. SCAN COMPLETED IN 176.66 S
  2444. --------------------------
  2445. Version: 1.11.10-static
  2446. OpenSSL 1.0.2-chacha (1.0.2g-dev)
  2447. 
  2448. Testing SSL server orumm.org on port 443 using SNI name orumm.org
  2449.  
  2450. TLS Fallback SCSV:
  2451. Server does not support TLS Fallback SCSV
  2452.  
  2453. TLS renegotiation:
  2454. Session renegotiation not supported
  2455.  
  2456. TLS Compression:
  2457. Compression disabled
  2458.  
  2459. Heartbleed:
  2460. TLS 1.2 not vulnerable to heartbleed
  2461. TLS 1.1 not vulnerable to heartbleed
  2462. TLS 1.0 not vulnerable to heartbleed
  2463. #######################################################################################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement