Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Spoofing MAC address 2E:B1:1F:6A:B3:63 (No registered vendor)
- # Nmap 6.47 scan initiated Sun Jul 23 2017 as:
- nmap -sVS --version-intensity 9 -T4 --spoof-mac 0 --top-ports 5000 -n -vv -f --data-length 0 --source-port 20 --reason -O --osscan-guess -oN /tmp/berlusconi --script dns-*,banner,whois-ip,http-sitemap-generator,http-errors,http-exif-spider,http-headers,http-passwd,http-robots.txt,http-stored-xss,http-vhosts,http-waf-detect,http-waf-fingerprint 185.61.137.160
- Nmap scan report for 185.61.137.160
- Host is up, received echo-reply (0.044s latency).
- Scanned at 2017-07-23 CDT for 287s
- Not shown: 4237 closed ports
- Reason: 4237 resets
- PORT STATE SERVICE REASON VERSION
- 22/tcp open ssh syn-ack (protocol 2.0)
- |_banner: SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.2
- 23/tcp filtered telnet no-response
- 445/tcp filtered microsoft-ds no-response
- 3306/tcp open mysql syn-ack MySQL (unauthorized)
- | banner: E\x00\x00\x00\xFFj\x04Host 'XX.XX.XX.XX' is not allowed to con
- |_nect to this MySQL server
- 8080/tcp open http syn-ack nginx
- | http-errors:
- | Spidering limited to: maxpagecount=40; withinhost=185.61.137.160
- | Found the following error pages:
- |
- | Error Code: 404
- | http://185.61.137.160:8080/?c=users&a=recover
- |
- | Error Code: 404
- | http://185.61.137.160:8080/?c=users&a=doLogin
- |
- | Error Code: 404
- |_ http://185.61.137.160:8080/?c=users&a=doRegister
- | http-headers:
- | Server: nginx
- | Date: Sun, 23 Jul 2017 10:10:11 GMT
- | Content-Type: text/html; charset=UTF-8
- | Transfer-Encoding: chunked
- | Connection: close
- | Set-Cookie: admin=k1s768ilbc24nv32asmqreslt6; path=/; HttpOnly
- | Expires: Sun, 23 Jul 2017 11:10:11 GMT
- | Cache-Control: max-age=3600
- | Pragma: no-cache
- | Cache-Control: public
- | Pragma: public
- |
- |_ (Request type: GET)
- | http-sitemap-generator:
- | Directory structure:
- | /
- | Other: 2
- | /css/
- | css: 3
- | /img/
- | jpg: 1
- | Longest directory structure:
- | Depth: 1
- | Dir: /css/
- | Total files found (by extension):
- |_ Other: 2; css: 3; jpg: 1
- |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
- | http-vhosts:
- | 56 names had status ERROR
- |_71 names had status 302
- |_http-waf-detect: [ERROR] HTTP request table is empty. This should not ever happen because we at least made one request.
- 8081/tcp open http syn-ack nginx
- | http-errors:
- | Spidering limited to: maxpagecount=40; withinhost=185.61.137.160
- | Found the following error pages:
- |
- | Error Code: 404
- | http://185.61.137.160:8081/?c=users&a=register
- |
- | Error Code: 404
- |_ http://185.61.137.160:8081/?c=admin&a=doLogin
- | http-headers:
- | Server: nginx
- | Date: Sun, 23 Jul 2017 10:09:29 GMT
- | Content-Type: text/html; charset=UTF-8
- | Connection: close
- | Set-Cookie: admin=dtleepjpvn19cfte9g005i18t7; path=/; HttpOnly
- | Expires: Thu, 19 Nov 1981 08:52:00 GMT
- | Cache-Control: no-store, no-cache, must-revalidate
- | Pragma: no-cache
- |
- |_ (Request type: HEAD)
- | http-sitemap-generator:
- | Directory structure:
- | /
- | Other: 1
- | /css/
- | css: 3
- | Longest directory structure:
- | Depth: 1
- | Dir: /css/
- | Total files found (by extension):
- |_ Other: 1; css: 3
- |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
- | http-vhosts:
- | 64 names had status 200
- |_63 names had status ERROR
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
- SF-Port22-TCP:V=6.47%I=9%D=7/23%Time=59747596%P=arm-unknown-linux-gnueabih
- SF:f%r(NULL,29,"SSH-2\.0-OpenSSH_7\.2p2\x20Ubuntu-4ubuntu2\.2\r\n");
- Device type: general purpose
- Running: Linux 3.X
- OS CPE: cpe:/o:linux:linux_kernel:3
- OS details: Linux 3.11 - 3.14
- TCP/IP fingerprint:
- OS:SCAN(V=6.47%E=4%D=7/23%OT=22%CT=1%CU=41695%PV=N%DS=11%DC=I%G=N%TM=597476
- OS:15%P=arm-unknown-linux-gnueabihf)SEQ(SP=108%GCD=1%ISR=107%TI=Z%CI=I%TS=8
- OS:)OPS(O1=M5B4ST11NW7%O2=M5B4ST11NW7%O3=M5B4NNT11NW7%O4=M5B4ST11NW7%O5=M5B
- OS:4ST11NW7%O6=M5B4ST11)WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7120
- OS:)ECN(R=Y%DF=Y%T=3C%W=7210%O=M5B4NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=3C%S=O%A=S+
- OS:%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=3C%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
- OS:T5(R=Y%DF=Y%T=3C%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=3D%W=0%S=A%A
- OS:=Z%F=R%O=%RD=0%Q=)T7(R=N)U1(R=Y%DF=N%T=3C%IPL=164%UN=0%RIPL=G%RID=G%RIPC
- OS:K=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=3D%CD=S)
- Uptime guess: 10.169 days (since Thu Jul 13 01:07:15 2017)
- Network Distance: 11 hops
- TCP Sequence Prediction: Difficulty=264 (Good luck!)
- IP ID Sequence Generation: All zeros
- Host script results:
- | dns-blacklist:
- | SPAM
- |_ bl.nszones.com - SPAM
- |_dns-brute: Can't guess domain of "185.61.137.160"; use dns-brute.domain script argument.
- |_whois-ip: ERROR: Script execution failed (use -d to debug)
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- # Nmap done at Sun Jul 23 2017 -- 1 IP address (1 host up) scanned in 292.95 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement